defuse / ictmLinks
A user-first approach to threat modeling.
☆19Updated 8 months ago
Alternatives and similar repositories for ictm
Users that are interested in ictm are comparing it to the libraries listed below
Sorting:
- secure messaging, file-transfer, and directory synchronization☆41Updated 8 years ago
- repository for tracking open tasks☆18Updated 8 years ago
- A coding challenge to learn Rust☆14Updated 8 years ago
- MLS architecture☆74Updated 9 months ago
- ☆10Updated 7 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆29Updated 5 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- a Private Publish Subscribe System☆52Updated last year
- Mix Network Bibliography☆15Updated 5 years ago
- free crypto audit☆31Updated 8 years ago
- Notes relating to secure messaging☆19Updated 9 years ago
- reading lists☆31Updated 6 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- QubesOS dom0 automation in Python☆12Updated 8 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- misc stuff☆19Updated 8 years ago
- ☆29Updated 11 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 6 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆36Updated 10 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 5 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 7 years ago
- Drafts of the IRTF-HRPC research group.☆15Updated 3 years ago
- 🎄🖋 A Rust implementation of Merkle signing☆15Updated 5 years ago
- Keyname format for public-key fingerprints☆22Updated 11 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 4 years ago