freedomofpress / fingerprint-securedropLinks
A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.
☆30Updated 8 years ago
Alternatives and similar repositories for fingerprint-securedrop
Users that are interested in fingerprint-securedrop are comparing it to the libraries listed below
Sorting:
- The Tor Path Simulator☆87Updated 8 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Parsing library for Tor-specific data formats.☆43Updated last year
- Hunting for Sybils and anomalies in archived Tor network data.☆44Updated 6 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- Command-line utility to control Tor.☆89Updated last year
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 3 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 9 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Collection of IOCs related to targeting of civil society☆189Updated 3 years ago
- The public repository of the Loopix mix system☆69Updated 7 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆19Updated 9 years ago
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆21Updated 10 months ago
- ☆62Updated 11 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆63Updated 9 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- free crypto audit☆31Updated 8 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆80Updated this week
- Passive SSL client fingerprinting using handshake analysis.☆112Updated 7 years ago
- ☆10Updated 6 years ago