flipchan / LayerProxLinks
a rebuild of marionette, encrypted programmable traffic obfuscation proxy
☆12Updated 2 years ago
Alternatives and similar repositories for LayerProx
Users that are interested in LayerProx are comparing it to the libraries listed below
Sorting:
- Zcash Vanity Address Generator☆24Updated 4 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- Zero Knowledge Messaging☆17Updated 5 years ago
- Deterministic build environment for Zcash☆19Updated last month
- NaCl wrapper; uses `sodium` for the server-side and `tweetnacl-js` for the client☆22Updated 2 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- Anonymous RSA signatures☆67Updated 7 months ago
- a Private Publish Subscribe System☆52Updated last year
- A password-based implementation of threshold encryption☆33Updated 13 years ago
- NaCl-based Cryptographic Relay☆83Updated 3 weeks ago
- Decentralized monetary trust network☆32Updated 8 years ago
- As a proof-of-concept, we will show how easy it is to revoke a self-signed certificate using the bitcoin blockchain. This will also demon…☆122Updated 10 years ago
- Dr. Y's Ethereum Contract Analyzer☆41Updated 3 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Non-C Implementations of the yescrypt KDF.☆30Updated 7 years ago
- Reference implementations (software)☆85Updated 9 years ago
- A small program for sending messages via zcash encrypted memo fields☆99Updated 8 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆64Updated 13 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 9 years ago
- Network bootstrapping for the Zcash cryptocurrency via DNS☆17Updated 3 months ago
- ☆21Updated 8 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 9 years ago
- The original p2p version (non-transferable proofs)☆143Updated 4 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- Technical paper on the Borromean ring signature construction☆47Updated 8 years ago
- An independent implementation of the Powers of Tau MPC ceremony.☆33Updated 7 years ago
- Deterministic execution virtual machine sandbox for Moxie arch☆78Updated 5 years ago
- A Camouflage Proxy for the Tor Anonymity System☆88Updated 10 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 8 years ago