averagesecurityguy / zkm
Zero Knowledge Messaging
☆17Updated 3 years ago
Related projects: ⓘ
- secure messaging, file-transfer, and directory synchronization☆42Updated 7 years ago
- a web page / paper☆18Updated 7 years ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 9 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- ☆29Updated this week
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 7 months ago
- Mix Network Bibliography☆15Updated 4 years ago
- Go implementations of BLAKE2b and BLAKE2s with support for salts and personalization☆10Updated 3 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆17Updated 8 years ago
- Easily attest to and read attestations on the Bloom protocol☆16Updated 3 years ago
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 8 years ago
- A library for peer discovery inside the Tor network☆26Updated 5 months ago
- Zcash Vanity Address Generator☆22Updated 3 years ago
- a rebuild of marionette, encrypted programmable traffic obfuscation proxy☆12Updated 9 months ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆34Updated 4 years ago
- C implementation of the BlaBla20 cipher☆9Updated 3 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 4 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 9 years ago
- A high-security scalable solution for online backups.☆46Updated 9 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 9 months ago
- axolotl based on libsodium☆22Updated 8 years ago
- Open Source cookbooks developed by Twelve Tone Software☆21Updated 10 years ago
- A password-based implementation of threshold encryption☆32Updated 11 years ago
- Repository of now harmless TREZOR security exploits☆9Updated 9 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14Updated 6 years ago
- Python bindings to the Crypto++ library☆49Updated last year
- Ansible role to install & maintain Tor Hidden Services☆28Updated 5 years ago
- (Oblivious) DoH Server☆27Updated 2 years ago
- A Decentralized Vulnerability Management☆9Updated 9 years ago
- A warrant canary system☆30Updated 6 years ago