cryptoparty / teaching-resourcesLinks
a collection of teaching resources
☆12Updated 7 years ago
Alternatives and similar repositories for teaching-resources
Users that are interested in teaching-resources are comparing it to the libraries listed below
Sorting:
- an attempt to create a universal basic set of presentation slides to help teach basic concepts at Cryptoparties.☆18Updated 10 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Passphrases is a tool that helps you generate high-entropy passphrases and memorize them using a technique called spaced repetition☆23Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 6 years ago
- A project to convert the world to liquid democracy☆41Updated 4 years ago
- ☆37Updated 10 years ago
- Server & client software for Firewall Cafe☆3Updated 3 weeks ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Tips to protect your personal and company data☆28Updated 5 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆61Updated 13 years ago
- An application that helps you notify your friends and/or family if you've gone missing.☆11Updated 8 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆36Updated 10 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 5 months ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆26Updated 2 months ago
- You'll never take me alive.☆86Updated 11 years ago
- Every document published from the Snowden archive☆69Updated 10 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- The web site☆14Updated 2 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- A tool (and library) for TACKs☆29Updated 8 years ago
- Easy creation of Tor Hidden Services☆40Updated 10 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Distributed, tamper-resistant circumvention tools☆50Updated 9 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- The vulnerability disclosure policy for 18F and GSA's Technology Transformation Service.☆27Updated 3 years ago
- ☆29Updated 10 years ago
- parse Tor consensus to generate google maps and google earth KML of tor relays☆11Updated 12 years ago