covert-encryption / covert
An encryption format offering better security, performance and ease of use than PGP. File a bug if you found anything where we are worse than our competition, and we will fix it.
☆41Updated 8 months ago
Alternatives and similar repositories for covert:
Users that are interested in covert are comparing it to the libraries listed below
- Linux kernel module to fight against police terror☆28Updated 3 years ago
- Onionbalance -- mirror of https://gitlab.torproject.org/tpo/onion-services/onionbalance/ -- please create issues and pull requests there☆149Updated last month
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆54Updated 2 weeks ago
- 🐍 i2plib: A modern asynchronous library for building I2P applications☆32Updated 5 years ago
- Anonymous peer-to-peer instant messaging☆227Updated last week
- Python bindings for rage (age in Rust)☆54Updated last month
- tor/i2p/lokinet socks proxy router☆28Updated 10 months ago
- Tirdad kernel module for random ISN generation☆26Updated 3 months ago
- Application-level P2P non-VPN for securely accessing personal servers without a VPN☆37Updated 3 years ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆45Updated last week
- A GUI application, command line interface, and wrapper for Tomb☆36Updated 5 months ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- End-to-end encrypted email for the mesh networking age☆141Updated last month
- Rust crate providing anonymous, secure, and private peer-to-peer functionality using Tor onion services☆33Updated last month
- PANORAMIX repo☆20Updated 2 years ago
- Codechain — code trust through hash chains☆47Updated 3 years ago
- Zero dependency, small footprint, cross-platform I2P Java Router with simple tunnel/socks controller and SAM interface☆147Updated 3 years ago
- Vanguards help guard you from getting vanned...☆220Updated 6 months ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆9Updated 2 weeks ago
- A tool to create human-writable versions of your PGP paperkey backup.☆10Updated 2 years ago
- A Monero node installer in a single command☆34Updated last year
- Mnemonic seed library for Monero and other CryptoNote-based currencies.☆48Updated 8 months ago
- Meshname, a universal naming system for all IPv6-based mesh networks, including CJDNS and Yggdrasil☆102Updated 10 months ago
- Encrypt files and hide encrypted data☆11Updated last week
- A curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a …☆207Updated 11 months ago
- OnionTip is a web app which parses Tor relay data to allow users to tip volunteers for running relay in a fair and open way.☆53Updated 6 years ago
- Katzenpost is a free and open source software project dedicated to researching and developing mix network protocols☆96Updated this week
- Session open group server☆31Updated last year
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆16Updated 4 years ago