hardenedvault / vault1317Links
Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.
☆25Updated 11 months ago
Alternatives and similar repositories for vault1317
Users that are interested in vault1317 are comparing it to the libraries listed below
Sorting:
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 2 months ago
- ☆12Updated last week
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆38Updated 2 years ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆15Updated this week
- ☆12Updated last year
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆60Updated this week
- A proof-of-concept implementation of a Grin-Bitcoin atomic swap☆18Updated 4 years ago
- Simple constant-time AES implementation☆120Updated 7 months ago
- Geolocate your files!☆16Updated 3 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 5 years ago
- Methods for IP Address Encryption and Obfuscation.☆12Updated last week
- Ecash wallet implementation in javacard☆11Updated this week
- An HTTP proxy that enables access to Tor Onion Services☆16Updated 3 years ago
- Fork of dnscrypt-proxy to implement a multiple-relay-based DNS anonymization protocol (mu-ODNS)☆31Updated 5 months ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 4 years ago
- Github pages site which hosts an archive of posts from the Cypherpunks Mailing List during its 90s heyday. Soon to be extended to include…☆30Updated 4 years ago
- Determinstic backup and recovery of PGP keys using human-readable phrases.☆74Updated last year
- Internet History, Digital Cryptography, Cypherpunks, Money \ Economics... All the history is related to Bitcoin.☆27Updated last year
- Build your personal docker-compose.yml file for Monero services.☆49Updated 2 weeks ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- A tool for downloading, checking, and applying (CVE) patches to a repository.☆51Updated 10 months ago
- Linux kernel module to fight against police terror☆29Updated 4 years ago
- Automated 🧅 Tor ❄️ Snowflake Proxy (any Linux device). Run install.sh and you have a new Snowflake ProxyService (every boot)☆27Updated last year
- C SAMv3 library☆32Updated last month
- Sanitize documents to safe PDFs, for active content removal☆40Updated 3 weeks ago
- ☆12Updated 2 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆44Updated 9 months ago
- ☆12Updated 2 years ago
- Encryption Algorithm Combined☆27Updated 9 years ago
- List of Hardware Wallets for Digital Forensics☆27Updated 8 months ago