cryptoparty / teaching-resourcesLinks
a collection of teaching resources
☆12Updated 7 years ago
Alternatives and similar repositories for teaching-resources
Users that are interested in teaching-resources are comparing it to the libraries listed below
Sorting:
- An application that helps you notify your friends and/or family if you've gone missing.☆11Updated 8 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- reading lists☆31Updated 6 years ago
- ☆62Updated 11 years ago
- The web site☆14Updated 2 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆61Updated 13 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆36Updated 10 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 6 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 6 months ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 8 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- Advice on how to do computer things securely for non-experts☆59Updated 4 years ago
- ☆31Updated 5 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- ☆29Updated 11 years ago
- [ARCHIVED] A collection of descriptions for terms related to ipfs and surrounding techs☆10Updated 5 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- Easy creation of Tor Hidden Services☆40Updated 10 years ago
- ☆37Updated 10 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- ☆200Updated 9 years ago
- Every document published from the Snowden archive☆70Updated 10 years ago
- a collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, hand…☆30Updated 7 years ago
- A user-first approach to threat modeling.☆17Updated 4 months ago
- Ephemeral, self-destructing, optionally in-browser, end-to-end encrypted chat rooms☆14Updated 8 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago