amluto / u2f-hidraw-policy
udev helper and rule to identify U2F tokens
☆51Updated 6 years ago
Alternatives and similar repositories for u2f-hidraw-policy:
Users that are interested in u2f-hidraw-policy are comparing it to the libraries listed below
- Cross platform personalization tool for the YubiKey NEO☆57Updated 8 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- Prosody module that suggest users to enable OTR (not mandatory)☆40Updated 3 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆207Updated last year
- Abusing U2F to 'store' a stable secret☆16Updated 9 years ago
- Configuration to use gpg smartcards for ssh authentication☆111Updated 4 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- OpenPGP applet for the YubiKey NEO☆215Updated 5 years ago
- [This fork is not maintained] git-remote-gcrypt: A git remote helper for GPG-encrypted remotes☆145Updated 8 years ago
- SSH configuration analysis☆75Updated 2 years ago
- PAM module for two-factor authentication through signal.☆35Updated 7 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- Configuration to use gpg smartcards for ssh authentication☆158Updated 7 years ago
- TextSecure client package for Go☆129Updated 5 years ago
- Easy GnuPG key generation tool.☆62Updated 6 years ago
- U2F support extension for Firefox☆196Updated 7 years ago
- Yubikey full disk encryption☆127Updated 9 years ago
- salty privacy☆52Updated 4 years ago
- PKCS#11 token on top of gpg-agent. NOTE: Maintainers are not tracking this mirror. Do not make pull requests here, nor comment any commit…☆22Updated 4 months ago
- Jump to Full Encryption☆61Updated 8 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- Qubes component: antievilmaid☆146Updated 8 months ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆144Updated 4 years ago
- The "State considered harmful" paper☆106Updated 9 years ago
- network notary implementation for the Perspectives project☆50Updated 8 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆40Updated 8 years ago
- A collection of best practices UX flows for various circumstances that arise from interacting with PGP☆15Updated 9 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago