agl / pondLinks
Pond
☆913Updated 3 years ago
Alternatives and similar repositories for pond
Users that are interested in pond are comparing it to the libraries listed below
Sorting:
- opmsg message encryption☆753Updated 2 years ago
- Noise Specification☆457Updated 6 years ago
- An XMPP client with OTR support☆364Updated 3 years ago
- Double Ratchet Algorithm☆377Updated 9 years ago
- OZ: a sandboxing system targeting everyday workstation applications☆438Updated 7 years ago
- Provably Anonymous Overlay☆324Updated 10 years ago
- Quantum Insert detector/recorder☆307Updated 5 years ago
- The DIME resolver library and command line utilities.☆411Updated last year
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆405Updated 8 years ago
- TextSecure client package for Go☆131Updated 5 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 8 years ago
- Configuration to use gpg smartcards for ssh authentication☆159Updated 7 years ago
- ☆779Updated 7 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- Memory-hard scheme Argon2☆206Updated 4 years ago
- List of crypto projects that might not suck☆421Updated 2 years ago
- Encrypted peer-to-peer web application platform for decentralized, privacy-preserving applications☆1,148Updated 9 years ago
- INTERLOCK - file encryption and HSM front-end☆305Updated 4 months ago
- ☆222Updated 7 years ago
- ☆307Updated 2 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- LibOTR functionality in Irssi.☆185Updated 7 years ago
- secure parasitic rdate replacement☆368Updated 7 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆974Updated 3 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆348Updated 2 years ago
- A public database for software and firmware hashes☆216Updated 8 years ago
- As a proof-of-concept, we will show how easy it is to revoke a self-signed certificate using the bitcoin blockchain. This will also demon…☆121Updated 10 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 3 years ago
- ☆57Updated 8 years ago