averagesecurityguy / zkm
Zero Knowledge Messaging
☆17Updated 4 years ago
Alternatives and similar repositories for zkm:
Users that are interested in zkm are comparing it to the libraries listed below
- an ipfs-based encrypted backup solution☆20Updated 7 years ago
- A password-based implementation of threshold encryption☆32Updated 12 years ago
- Go implementation of rendezvous protocol☆12Updated 11 months ago
- a web page / paper☆18Updated 7 years ago
- Zcash Vanity Address Generator☆22Updated 3 years ago
- daemon for PolySwarm, the first decentralized threat intelligence market.☆14Updated 3 years ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 8 years ago
- A tool (and library) for TACKs☆25Updated 7 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆16Updated 8 years ago
- Harvests ZeroNet peers IP addresses☆13Updated 3 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- primitives and protocols for implementing privacy preserving networks☆16Updated 6 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated last year
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- i2p c++ implementation☆19Updated 9 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated last year
- Homomorphic encryption for voting☆11Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- Encrypted, compressed, distributed backups☆26Updated 9 years ago
- A docker'ized internal-only tor relay.☆42Updated 9 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 5 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- A Decentralized Vulnerability Management☆9Updated 9 years ago
- Detect some forms of linux kernel tampering☆12Updated 9 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 4 years ago
- End-to-End encrypted Tor2Web gateway☆37Updated 4 years ago
- A library for peer discovery inside the Tor network☆28Updated 9 months ago
- Module for Qubes OS to integrate Yubikey authentication through a USB VM☆19Updated 6 years ago
- axolotl based on libsodium☆22Updated 8 years ago