equalitie / np1sec
A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging
☆406Updated 7 years ago
Alternatives and similar repositories for np1sec:
Users that are interested in np1sec are comparing it to the libraries listed below
- Noise Specification☆450Updated 6 years ago
- Securely locate peers without central servers☆151Updated 7 years ago
- Pond☆911Updated 3 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Double Ratchet Algorithm☆377Updated 8 years ago
- serverless, encrypted, NAT-breaking p2p connections - DEPRECATED☆267Updated 4 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- ☆283Updated 8 years ago
- Axolotl Protocol Implementation☆421Updated 6 months ago
- Pretty Curved Privacy☆122Updated 7 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆272Updated 4 years ago
- opmsg message encryption☆753Updated last year
- SC4 - Strong Crypto for Mere Mortals☆122Updated 3 years ago
- Memory-hard scheme Argon2☆202Updated 4 years ago
- ☆88Updated 8 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆188Updated 2 years ago
- $2 hardware SSH keys storage☆156Updated 3 years ago
- YubiHSM2-backed signing server☆209Updated 6 years ago
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆88Updated 7 years ago
- Peer-to-peer IPv6 networking, secure and near-zero-conf.☆153Updated 8 years ago
- The DIME resolver library and command line utilities.☆413Updated last year
- Constant-Time Toolkit☆295Updated 6 years ago
- ☆283Updated 8 years ago
- One-end encryption, stronger than end-to-end☆196Updated 2 years ago
- aims to distribute the DNS service on many nodes so it can neither be taken down nor be manipulated☆248Updated 10 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 5 years ago
- Provably Anonymous Overlay☆323Updated 10 years ago
- OZ: a sandboxing system targeting everyday workstation applications☆431Updated 6 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆347Updated 2 years ago