mutecomm / muteLinks
Mute — secure messaging
☆41Updated 5 years ago
Alternatives and similar repositories for mute
Users that are interested in mute are comparing it to the libraries listed below
Sorting:
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- oht is an onion routed (using the Tor network, similar in design to ricochet and onionshare) distributed hash table to be used as the bas…☆46Updated 6 years ago
- Delicious Onion Service Wraps.☆23Updated 10 years ago
- An experimental cooperative keyserver based on ideas from dename.☆107Updated 8 years ago
- NameCoin-style names using consensus instead of proof of work☆100Updated 7 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 8 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 9 years ago
- Bootstrapping Secure Communication without Leaking Metadata☆77Updated 6 years ago
- Tor Control Port Filter and State Tracker Daemon☆26Updated 7 years ago
- TextSecure client package for Go☆128Updated 5 years ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Updated 9 years ago
- As a proof-of-concept, we will show how easy it is to revoke a self-signed certificate using the bitcoin blockchain. This will also demon…☆122Updated 10 years ago
- zero-knowledge chat suite☆102Updated 3 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- Provably Anonymous Overlay☆323Updated 10 years ago
- orc - Onion router control protocol library.☆39Updated 7 years ago
- Encrypted, taggable, searchable cloud storage. Unveiled at DEF CON 23☆210Updated 5 months ago
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆78Updated 6 years ago
- Subgraph Application Firewall☆106Updated 6 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- [UNMAINTAINED: Try https://github.com/cmars/oniongrok instead] onion-routed mesh☆61Updated 3 years ago
- reading lists☆31Updated 6 years ago
- A password-based implementation of threshold encryption☆32Updated 12 years ago
- ☆58Updated 8 years ago
- A warrant canary system☆30Updated 7 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Shamir's Secret Sharing Algorithm implementation in golang combined with PGP and a mail delivery system☆35Updated 7 years ago
- NaCl-based Cryptographic Relay☆82Updated this week
- User-space deniable data encryption client.☆94Updated last year