alecmuffett / dohotLinks
DoHoT: making practical use of DNS over HTTPS over Tor
☆276Updated 4 years ago
Alternatives and similar repositories for dohot
Users that are interested in dohot are comparing it to the libraries listed below
Sorting:
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆58Updated 3 weeks ago
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆253Updated 4 months ago
- Vanguards help guard you from getting vanned...☆240Updated last year
- Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely force…☆123Updated 5 years ago
- a more secure way to force programs to exclusively use tor network☆207Updated 3 years ago
- OONI Probe Engine and CLI☆271Updated 2 weeks ago
- Onionbalance -- mirror of https://gitlab.torproject.org/tpo/onion-services/onionbalance/ -- please create issues and pull requests there☆172Updated last week
- Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.☆514Updated 9 months ago
- Community documentation, code, links to third-party resources, ... See the issues and pull requests for pending content. Contributions ar…☆262Updated 2 years ago
- ☆157Updated last year
- An easy to install, high-performance, zero maintenance proxy to run an encrypted DNS server.☆1,243Updated last week
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆66Updated 3 weeks ago
- Repository is intended to provide patches and rpm specs with experimental features to run under the Qubes OS.☆25Updated 4 years ago
- Tirdad kernel module for random ISN generation☆28Updated last year
- VPN configuration in Qubes OS☆132Updated 2 years ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆184Updated last year
- Domain blocklists, IP blocklists, Little Snitch .lsrules, and cloaking files for blocking Apple telemetry☆215Updated last year
- A curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a …☆255Updated 5 months ago
- cryptostorm's DeepDNS, a decentralized, crypto-hardened, DNS framework☆104Updated 5 months ago
- Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separati…☆576Updated this week
- Hardened kernel configuration optimized for virtual machines. - https://www.kicksecure.com/wiki/Hardened-kernel☆53Updated 4 months ago
- trustor (PoC)☆25Updated 4 years ago
- TorBox is an easy to use, anonymizing router based on Raspberry Pi, which also runs on Debian and Ubuntu based systems.☆310Updated last week
- DNSCrypt protocol specification☆162Updated 4 months ago
- Anonymous peer-to-peer instant messaging☆341Updated last week
- deprecated - maybe replaced by: `apparmor.d`☆85Updated 2 years ago
- Meshname, a universal naming system for all IPv6-based mesh networks, including CJDNS and Yggdrasil☆108Updated last month
- mat2 is a metadata removal tool, supporting a wide range of commonly used file formats, written in python3: at its core, it's a library…☆216Updated last week
- Few tools for a Tor relay.☆65Updated this week
- Qubes-based SecureDrop Journalist Workstation environment for submission handling☆170Updated this week