averagesecurityguy / zkmLinks
Zero Knowledge Messaging
☆17Updated 5 years ago
Alternatives and similar repositories for zkm
Users that are interested in zkm are comparing it to the libraries listed below
Sorting:
- secure messaging, file-transfer, and directory synchronization☆41Updated 8 years ago
- A high-security scalable solution for online backups.☆45Updated 11 years ago
- Bram's steganographic framework☆493Updated 11 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- a web page / paper☆18Updated 8 years ago
- Python bindings to the Crypto++ library☆50Updated 2 years ago
- an ipfs-based encrypted backup solution☆20Updated 8 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 11 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 8 years ago
- Website privacy checker☆27Updated 9 years ago
- a rebuild of marionette, encrypted programmable traffic obfuscation proxy☆12Updated 2 years ago
- Sign and verify author signatures on git commits☆17Updated 11 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 11 months ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Privacy enhanced instant messenger☆44Updated 6 years ago
- Compiler & Language definition for the Ethereum project☆60Updated 10 years ago
- Mix Network Bibliography☆15Updated 6 years ago
- Zcash Vanity Address Generator☆24Updated 4 years ago
- Encrypted, compressed, distributed backups☆27Updated 10 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 11 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Updated 8 years ago
- Cryptography library. X25519, Ed25519, qDSA, Elligator2, Ristretto, ChaCha20, Blake2, Poly1305, Scrypt, Noise protocol, File encryption i…☆34Updated 6 years ago
- i2p c++ implementation☆19Updated 10 years ago
- Solidity Contract Function Profiler☆16Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- A docker'ized internal-only tor relay.☆41Updated 10 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago