joshua-m-david / jerichoencryption
Jericho Chat - Information-theoretically secure communications
☆21Updated 5 months ago
Alternatives and similar repositories for jerichoencryption:
Users that are interested in jerichoencryption are comparing it to the libraries listed below
- Toxmail Client☆46Updated 10 years ago
- Encrypted, compressed, distributed backups☆26Updated 9 years ago
- voodoo networking: post-VPN session obfuscation for a post-Snowden world☆34Updated 6 years ago
- Reference implementations (software)☆85Updated 8 years ago
- ☆139Updated 5 years ago
- Subgraph OS Handbook☆121Updated 7 years ago
- Code to disrupt the Tox network for hardening/testing purposes.☆35Updated 10 years ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆63Updated 2 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆59Updated 8 years ago
- Password hashing scheme Argon☆18Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- C library that implements the OTR protocol.☆61Updated 8 years ago
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆28Updated 9 years ago
- An encryption tool for creating file archives☆26Updated last year
- ☆29Updated 2 years ago
- Torbutton for Thunderbird and related *bird forks☆84Updated 5 years ago
- The Single Tox Standard: To keep Tox's clients & services simple, unison, and to further promote the brand.☆32Updated 9 years ago
- A simple (and rather ad-hoc) port scanner for Tor hidden services.☆29Updated 10 years ago
- An open source encryption program that uses the "one-time pad" method.☆32Updated 4 years ago
- Encrypted Text Messaging☆147Updated 9 years ago
- Easy creation of Tor Hidden Services☆40Updated 9 years ago
- Hashing tool supporting md5,sha1,sha256,sha512,whirlpool,jh and hmac versions of these. Includes recursive file hashing and other feature…☆66Updated 2 weeks ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- Experimental multiprocess Ricochet client in Go☆45Updated 7 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- A browser extension to block unencrypted web traffic for added security.☆18Updated 9 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago