linenoise / asemica
An asemic Markov-chained cipher
☆203Updated 4 years ago
Alternatives and similar repositories for asemica:
Users that are interested in asemica are comparing it to the libraries listed below
- a censorship resistant deadman's switch☆522Updated last year
- Documentation for cjdns and Hyperboria☆199Updated last year
- Put data inside dubstep drops☆280Updated 6 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- Blog-type notes about building Onion sites☆143Updated 7 years ago
- Onion delivery, so delicious☆205Updated 2 years ago
- ☆221Updated 7 years ago
- A light version of Tor portable to the browser☆120Updated 4 years ago
- nntp based decentralized imageboard☆73Updated last month
- Get things from one computer to another, safely. Over IPFS (which not even required to receive those things).☆115Updated 4 years ago
- The | state-of-the-art | secure-by-default | one-touch-deployed | XMPP server for everyone.☆173Updated 4 years ago
- Encrypted pastebin using IPFS☆254Updated last year
- Make PGP messages and signatures more interesting☆495Updated last year
- A Linux shell script to improve your privacy online☆83Updated 9 years ago
- PirateBox Scriptcollection for running in Webserver☆207Updated 3 years ago
- Easily create Tor hidden services with one command.☆56Updated 8 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆699Updated last year
- A command line encryption/decryption tool using an adaptive mirror field algorithm.☆49Updated 4 months ago
- Post-quantum cryptography tool (THIS REPOSITORY IS ONLY A MIRROR OF THE MAIN ONE, PLEASE DO NOT FILE BUGS HERE)☆314Updated 2 years ago
- An add-on to help TOR users find hidden services for ClearNet sites they use every day☆32Updated 7 years ago
- An imageboard, but images are stored in a peer-to-peer network☆100Updated 3 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- Browse Hacker News in Gopherspace☆85Updated 3 years ago
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆89Updated 7 years ago
- ☆36Updated 4 years ago
- One-end encryption, stronger than end-to-end☆219Updated 2 years ago
- An entropy generator using SDR peripherals, including rtl-sdr and BladeRF☆360Updated 4 years ago
- A geographically sorted list of public peering credentials for joining Hyperboria☆199Updated last year
- A pam module written in C for duress codes in linux authentication☆148Updated 4 years ago
- A ncurses animation to make decryption look like, well, decryption.☆241Updated 5 years ago