autocrypt / ame2016
berlin automatic mail encryption meetup 2016
☆13Updated 8 years ago
Alternatives and similar repositories for ame2016
Users that are interested in ame2016 are comparing it to the libraries listed below
Sorting:
- in-band opportunistic mail encryption☆9Updated 8 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- A (hopefully) unbiased timeline of events related to accusations against Jacob Appelbaum☆20Updated 8 years ago
- specification and design documents☆54Updated 2 years ago
- Specifications of the Futuristic Connectivity protocol☆28Updated 8 years ago
- js-ctypes wrapper for libotr☆29Updated 7 years ago
- Planning for next generation secure chat.☆37Updated 10 years ago
- ☆16Updated 8 years ago
- A-ringa-pin-ping-a-ringa-pin-pong☆31Updated 8 years ago
- a collection of flyers and, where possible, their source files to help others make new cryptoparty flyers☆28Updated 10 months ago
- Secure multiparty messaging (kindof)☆21Updated 8 years ago
- The Onion Name System - Tor Browser integration☆12Updated 8 years ago
- A place to organize redecentralize.org, in a decentralized way, of course. Share ideas & add proposals in 'Issues', start contributing by…☆76Updated 8 years ago
- Hyperboria (CJDNS network) map☆63Updated 5 years ago
- An initiative to decentralize public PGP keys.☆56Updated 9 years ago
- a bot for the ipfs irc channel that pins things (among other menial tasks)☆24Updated 7 years ago
- Privacy enhanced instant messenger☆44Updated 5 years ago
- Distributed, tamper-resistant circumvention tools☆50Updated 9 years ago
- Autocrypt and more for Mail User Agents☆36Updated 9 months ago
- An open graph inspired API and website for Hyperboria.☆18Updated 7 years ago
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- Organization site☆11Updated 5 years ago
- Notes relating to secure messaging☆19Updated 8 years ago
- security in a box - tools and tactics for your digital security☆19Updated 10 years ago
- ☆11Updated 5 years ago
- A collection of best practices UX flows for various circumstances that arise from interacting with PGP☆15Updated 9 years ago
- Protocol to facilitate cjdns peering☆13Updated 10 years ago
- a collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, hand…☆30Updated 6 years ago
- ☆62Updated 10 years ago
- cjdns swiss army knife☆48Updated 7 years ago