amluto / u2f-hidraw-policyLinks
udev helper and rule to identify U2F tokens
☆51Updated 7 years ago
Alternatives and similar repositories for u2f-hidraw-policy
Users that are interested in u2f-hidraw-policy are comparing it to the libraries listed below
Sorting:
- Configuration to use gpg smartcards for ssh authentication☆112Updated 4 years ago
- Cross platform personalization tool for the YubiKey NEO☆57Updated 8 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆57Updated last year
- Use a TPM to store a TOTP token in order to attest boot state to another device☆208Updated 2 years ago
- LUKS support for storing keys in TPM NVRAM☆185Updated 7 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- network notary implementation for the Perspectives project☆49Updated 9 years ago
- salty privacy☆52Updated 5 years ago
- [This fork is not maintained] git-remote-gcrypt: A git remote helper for GPG-encrypted remotes☆146Updated 9 years ago
- PAM module for two-factor authentication through signal.☆35Updated 7 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆151Updated 4 years ago
- TextSecure client package for Go☆128Updated 5 years ago
- OpenPGP applet for the YubiKey NEO☆217Updated 5 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- Qubes component: antievilmaid☆148Updated last year
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 7 years ago
- Extended verification for git tags☆134Updated 2 years ago
- Python based U2F Validation Server☆76Updated 5 years ago
- Configuration to use gpg smartcards for ssh authentication☆159Updated 7 years ago
- Subgraph Application Firewall☆106Updated 6 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 8 years ago
- NameCoin-style names using consensus instead of proof of work☆100Updated 7 years ago
- U2F support extension for Firefox☆196Updated 8 years ago
- The "State considered harmful" paper☆108Updated 9 years ago
- Abusing U2F to 'store' a stable secret☆16Updated 9 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- ZFS On Linux with crypto patches☆39Updated 10 years ago
- An Ansible role for using tor!☆72Updated 10 years ago
- Double Ratchet Algorithm☆378Updated 9 years ago