e2email-org / e2emailLinks
E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.
☆807Updated 8 years ago
Alternatives and similar repositories for e2email
Users that are interested in e2email are comparing it to the libraries listed below
Sorting:
- A transparent and secure way to look up public keys.☆1,572Updated 4 years ago
- The USG is Good, not Bad☆403Updated 5 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 8 years ago
- A blockchain-based DNS + HTTP server that fixes HTTPS security, and more!☆1,730Updated 8 years ago
- opmsg message encryption☆753Updated 2 years ago
- Allows an application to delegate the capability to recover an account to an account controlled by the same user or entity at a third par…☆220Updated 6 years ago
- Reviews of U2F devices☆433Updated 6 years ago
- Main CipherShed Development☆647Updated 4 years ago
- Keybase Filesystem (KBFS)☆1,208Updated 6 years ago
- A Chrome Extension to help protect against phishing attacks.☆315Updated 4 months ago
- The DIME resolver library and command line utilities.☆412Updated last year
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆582Updated 7 years ago
- A single repo for managing publicly recognized issues with the keybase client, installer, and website.☆901Updated last year
- DEPRECATED A dev tool for SSH auth + Git commit/tag signing using a key stored in Krypton.☆1,579Updated last year
- Library and command line tool to detect SHA-1 collision in a file☆1,362Updated 11 months ago
- ACME Specification☆1,129Updated last year
- End-To-End is a crypto library to encrypt, decrypt, digital sign, and verify signed messages (implementing OpenPGP)☆4,136Updated 2 years ago
- Easy two-factor authentication for ssh servers☆796Updated 7 years ago
- The magma server daemon, is an encrypted email system with support for SMTP, POP, IMAP, HTTP and MOLTEN,. Additional support for DMTP and…☆1,826Updated 4 months ago
- This project implements a data-driven password meter. Its effects on password security and usability were evaluated in the following publ…☆186Updated 4 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆348Updated 2 years ago
- Sniffing browser history using HSTS☆933Updated 7 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆751Updated 7 years ago
- U2F reference implementations☆588Updated 2 years ago
- Yubico Universal 2nd Factor (U2F) Host C Library☆325Updated 4 years ago
- ☆306Updated 2 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆931Updated 2 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆768Updated 5 years ago
- Wannacry in-memory key recovery☆1,087Updated 8 years ago
- Encryptr is a zero-knowledge cloud-based password manager / e-wallet powered by Crypton☆1,575Updated 7 years ago