The CryptoParty Handbook
☆533Oct 30, 2020Updated 5 years ago
Alternatives and similar repositories for handbook
Users that are interested in handbook are comparing it to the libraries listed below
Sorting:
- a collection of teaching resources☆12Feb 27, 2018Updated 8 years ago
- a collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, hand…☆30Aug 19, 2018Updated 7 years ago
- a collection of flyers and, where possible, their source files to help others make new cryptoparty flyers☆28Jul 8, 2024Updated last year
- a collection of stickers and, where possible, their source files to help others make new cryptoparty flyers☆18Mar 20, 2018Updated 7 years ago
- The web site☆15Apr 12, 2023Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Research on the various credentials databases that have been dumped.☆11Jan 31, 2018Updated 8 years ago
- Installation, configuration and security hardening guidance for DeadDrop☆90Apr 15, 2018Updated 7 years ago
- A command line-based parameterized contracting tool☆46Sep 6, 2023Updated 2 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- Go package to connect to Ledger devices☆19Aug 22, 2025Updated 6 months ago
- Transparent, uncensorable chat on the Cosmos Hub.☆16Nov 5, 2025Updated 3 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Jun 15, 2017Updated 8 years ago
- ☆63May 22, 2014Updated 11 years ago
- Bitcloud Project☆610Jan 21, 2015Updated 11 years ago
- This is where we work on the newsletter☆28Dec 2, 2017Updated 8 years ago
- Address book-like application to manage contact information.☆40Oct 10, 2018Updated 7 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- ☆198Jan 21, 2016Updated 10 years ago
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- A (hopefully) unbiased timeline of events related to accusations against Jacob Appelbaum☆19Mar 18, 2017Updated 8 years ago
- OTR plugin for Hexchat☆22Dec 23, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- Evil Genius plays the role of the Descartes demon, creating a distorted view of the internet with censorship (it's a censorship simulator…☆38Nov 12, 2014Updated 11 years ago
- dotfiles☆11Feb 20, 2026Updated last week
- A library for peer discovery inside the Tor network☆28Apr 19, 2024Updated last year
- ☆30Apr 16, 2015Updated 10 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Small repo for implementing the 2018 EUROCRYPT paper "Simple Proofs of Sequential Work" by Cohen and Pietrzak. Also used as part of our C…☆10Aug 26, 2018Updated 7 years ago
- Notes relating to secure messaging☆19Jun 11, 2016Updated 9 years ago
- ☆13Updated this week
- Don't let *them* read your mail. Encrypt it now.☆18Jun 13, 2018Updated 7 years ago
- Source Repository for Aram Bartholl's OFFLINEART project. More information at http://www.offlineart.net (we be filled later)☆16Jan 12, 2014Updated 12 years ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Jan 4, 2022Updated 4 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- An implementation of Penticons in go programming language☆10Sep 28, 2018Updated 7 years ago
- ☆17Apr 3, 2025Updated 10 months ago