chris-wood / odoh-serverLinks
(Oblivious) DoH Server
☆26Updated 3 years ago
Alternatives and similar repositories for odoh-server
Users that are interested in odoh-server are comparing it to the libraries listed below
Sorting:
- Specifications for Privacy Proxy Implementations☆31Updated 2 weeks ago
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- ☆24Updated 9 months ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 11 months ago
- A docker image to host one's DNS-over-HTTPS proxy☆28Updated 6 years ago
- A warrant canary system☆30Updated 7 years ago
- Pong revolution.☆13Updated 5 years ago
- Internet-Draft on IP address privacy☆17Updated 3 months ago
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Updated 2 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- ☆18Updated last year
- Oblivious HTTP implementation☆31Updated last year
- Cryptography code examples using libsodium and mbedtls C libraries and Python cryptography and PyNaCl modules☆71Updated 5 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 5 years ago
- ipcrypt implementation in C☆32Updated 2 months ago
- Implementation of libsodium's secretstream in Go☆20Updated this week
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 2 months ago
- Opportunistic Onions plugin for Caddy☆21Updated 5 years ago
- An implementation of Noise in Go☆42Updated 7 years ago
- ☆19Updated 5 years ago
- A tiny DNS server that returns the client (resolver) IP☆27Updated 6 months ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- Entity Attestation Token IETF Draft Standard☆18Updated 2 months ago
- Differential fuzzing for elliptic curves☆23Updated last year
- The noise swiss army knife☆44Updated 4 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 9 years ago
- End-to-End encrypted Tor2Web gateway☆37Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆20Updated 7 years ago