n8fr8 / talksLinks
Talks, presentations, and more
☆51Updated 8 years ago
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below
Sorting:
- Provably Anonymous Overlay☆323Updated 10 years ago
- The Awareness Hub for the Internet of Things☆168Updated 10 months ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- Privacy enhanced instant messenger☆44Updated 5 years ago
- RaspberryPi port of Byzantium Linux.☆71Updated 11 years ago
- Cyborg Unplug firmware files☆175Updated 8 years ago
- Subgraph OS Handbook☆122Updated 8 years ago
- Usable Privacy Box☆174Updated last year
- PAM module for two-factor authentication through signal.☆35Updated 7 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 8 years ago
- udev helper and rule to identify U2F tokens☆51Updated 7 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Universal Free Backup Script for Linux☆33Updated 8 years ago
- Blog-type notes about building Onion sites☆142Updated 7 years ago
- Easy & Secure Guest WLAN setup with QR code GUI and photodiashow.☆141Updated 8 years ago
- Pretty Curved Privacy☆122Updated 8 years ago
- voodoo networking: post-VPN session obfuscation for a post-Snowden world☆33Updated 6 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 9 years ago
- Raspberry PI Surveillance Automation☆79Updated 7 years ago
- An all-inclusive Tor configuration for Raspberry Pi, serves as both a relay and personal Tor network☆113Updated 7 years ago
- An attempt to streamline the Android hardening process from the Tor Blog.☆48Updated 9 years ago
- A set of scripts to root and install gapps and orbot+orwall into a CopperheadOS image and re-sign it for verified boot.☆223Updated 7 years ago
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆89Updated 8 years ago
- Configuration to use gpg smartcards for ssh authentication☆112Updated 4 years ago
- An Ansible role for using tor!☆72Updated 10 years ago
- A Linux shell script to improve your privacy online☆85Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- Context - Using old smartphones as stationary IoT devices☆57Updated 8 years ago
- Removes all "Social DRM" from booXtream ePub files☆185Updated 6 years ago
- SIP answering machine running on Raspberry Pi☆208Updated 3 years ago