c2pa-org / public-draft
Repository for the public drafts of the C2PA Specifications
☆36Updated 2 years ago
Alternatives and similar repositories for public-draft:
Users that are interested in public-draft are comparing it to the libraries listed below
- The public specifications for the C2PA☆129Updated 2 weeks ago
- C2PA Website☆17Updated this week
- Source Code Transparency☆11Updated last year
- Specifications for Privacy Proxy Implementations☆30Updated last week
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆12Updated this week
- A dead man's switch for full but responsible disclosure of vulnerabilities☆55Updated 6 months ago
- A Ledger-backed Secure Key-Value store (LSKV), built on the Confidential Consortium Framework (CCF)☆35Updated last year
- WebPKI-level Certificate Revocation via Multi-Level Bloom Filter Cascade☆92Updated this week
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆49Updated this week
- ☆17Updated this week
- Privacy Pass implementation in Rust☆30Updated 4 months ago
- A collection of high-performance crypto implementations.☆50Updated 2 weeks ago
- ☆27Updated 3 years ago
- Making transparency normal!☆24Updated last year
- ☆26Updated this week
- ☆22Updated 9 months ago
- ☆22Updated this week
- Coordination of implementation and interop specific details☆115Updated this week
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆60Updated 2 years ago
- Internet-Draft on IP address privacy☆16Updated 3 weeks ago
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- PlanAI: A graph-based framework for complex task automation integrating traditional compute and LLM capabilities☆33Updated 3 weeks ago
- The public release of LeftoverLocals code☆65Updated last year
- VDAF specification☆23Updated 3 weeks ago
- Filesystems that cause an OS panic☆13Updated 4 years ago
- ☆53Updated 3 weeks ago
- Signature-based Resource Loading Restrictions☆37Updated 3 weeks ago
- Python implementation of C2PA: Coalition for Content Provenance and Authenticity.☆37Updated 2 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated 3 weeks ago
- BlindBox is a tool to isolate and deploy applications inside Trusted Execution Environments for privacy-by-design apps☆57Updated last year