joncamfield / cryptowarLinks
Great quotes from the never-ending cryptowars
☆11Updated 3 years ago
Alternatives and similar repositories for cryptowar
Users that are interested in cryptowar are comparing it to the libraries listed below
Sorting:
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆54Updated 7 years ago
- PGP key poisoner☆36Updated 5 years ago
- A collection of best practices UX flows for various circumstances that arise from interacting with PGP☆15Updated 9 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- Various articles I've written☆115Updated 2 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- a distributed PGP keyserver project based on the dat protocol☆91Updated 3 years ago
- SQLite-backed mail processing suite☆50Updated 5 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- Send encrypted secrets. Fluidkeys lets you send passwords, keys and personal information from the terminal. Powered by OpenPGP end-to-end…☆74Updated 6 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Record and playback a terminal session☆15Updated 12 years ago
- The "State considered harmful" paper☆106Updated 9 years ago
- Helpful utilities and documentation for Free Software live audio/video streaming☆77Updated 10 years ago
- A minimalist client for sending mail direct to recipient's MX☆43Updated last year
- .onion discovery via SRV DNS lookups for use with postfix☆14Updated last year
- A flat file social network for tilde servers☆15Updated 4 years ago
- Interpreter for Anguish programming language☆17Updated 5 months ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- A mastodon bot for showing the world the best your instance has to offer.☆29Updated 7 years ago
- Command-line utility to control Tor.☆89Updated last year
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- English☆15Updated 4 years ago
- Generate RSA keypairs containing an arbitrary string in the public key.☆45Updated 2 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 9 years ago
- Extended verification for git tags☆133Updated 2 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago