covert-encryption / covertLinks
An encryption format offering better security, performance and ease of use than PGP. File a bug if you found anything where we are worse than our competition, and we will fix it.
☆44Updated last year
Alternatives and similar repositories for covert
Users that are interested in covert are comparing it to the libraries listed below
Sorting:
- Onionbalance -- mirror of https://gitlab.torproject.org/tpo/onion-services/onionbalance/ -- please create issues and pull requests there☆172Updated this week
- One-time pad encryption command line tool - OT7.☆19Updated 9 years ago
- Zero dependency, small footprint, cross-platform I2P Java Router with simple tunnel/socks controller and SAM interface☆152Updated 4 years ago
- Linux kernel module to fight against police terror☆31Updated 4 years ago
- Encrypt files & Hide encrypted data☆19Updated last week
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆253Updated 4 months ago
- Rust crate providing anonymous, secure, and private peer-to-peer functionality using Tor onion services☆47Updated 2 months ago
- Anonymous peer-to-peer instant messaging☆336Updated last month
- Simple Post Quantum File Encryption☆29Updated 7 months ago
- Mnemonic seed library for Monero and other CryptoNote-based currencies.☆54Updated last year
- A tool to create human-writable versions of your PGP paperkey backup.☆10Updated 3 years ago
- OnionTip is a web app which parses Tor relay data to allow users to tip volunteers for running relay in a fair and open way.☆53Updated 7 years ago
- Vanguards help guard you from getting vanned...☆239Updated last year
- Katzenpost is a free and open source software project dedicated to researching and developing mix network protocols☆141Updated last week
- A simple tool to securely communicate with others.☆19Updated 3 years ago
- I2P-Bote is a serverless, encrypted e-mail application.☆157Updated 4 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 5 years ago
- A quick and simple cryptographically secure script to generate high entropy passphrases using EFF's wordlists☆264Updated 8 months ago
- Determinstic backup and recovery of PGP keys using human-readable phrases.☆82Updated 2 years ago
- Some useful tools for I2P☆143Updated 3 months ago
- DoHoT: making practical use of DNS over HTTPS over Tor☆276Updated 4 years ago
- Python nostr bot framework☆22Updated 2 years ago
- 🐍 i2plib: A modern asynchronous library for building I2P applications☆37Updated 7 years ago
- Nitrokey WebSmartCard Specification and Documentation☆32Updated 2 years ago
- a more secure way to force programs to exclusively use tor network☆207Updated 3 years ago
- How Jason Bourne Stores His Bitcoin in 2021☆15Updated 4 years ago
- How to securely create and operate a pseudonymous identity.☆98Updated 3 years ago
- Securely build a system Tor and optionally configure numerous high-security Onion services.☆51Updated 2 years ago
- Command line program for secret-sharing strings☆81Updated 3 months ago
- Codechain — code trust through hash chains☆48Updated 4 years ago