safing / jessLinks
Jess is a cryptographic library and cli tool that focuses on usability and freedom.
☆46Updated 11 months ago
Alternatives and similar repositories for jess
Users that are interested in jess are comparing it to the libraries listed below
Sorting:
- Stingle API Server☆13Updated 2 years ago
- Runs distributed Badger Sett scans on Digital Ocean.☆25Updated 6 months ago
- Mirror of https://codeberg.org/UnifiedPush/specifications☆105Updated 5 months ago
- Storage server for Oxen Service Nodes☆32Updated this week
- a fully in-browser tool to encrypt data with the age encryption tool.☆58Updated 4 months ago
- over-the-air installation and testing of mobile applications (TestFlight alternative)☆106Updated 2 years ago
- 🔒 Let's DANE is an experimental way to enable the use of DANE/TLSA in browsers and other apps using a lightweight proxy.☆120Updated last year
- BulwarkID FIDO Passkey☆118Updated last year
- Everything Radicle growing around Git☆72Updated 8 months ago
- Tahoe-LAFS-based file synchronization☆31Updated 7 months ago
- The Web interface for Peergos☆88Updated this week
- Audited, Open-Source Email Aliasing Service☆37Updated this week
- User Interfaces for Portmaster☆147Updated last year
- End-to-end encrypted file transfer for Android and iOS. A Magic Wormhole Mobile client.☆193Updated 9 months ago
- A browser extension to verify the authenticity (PGP signature) of web pages☆197Updated 6 months ago
- ☆35Updated last year
- End-to-end encrypted email for the mesh networking age☆152Updated 10 months ago
- Moonbounce is graphical user interface for using an OpenVPN client and server with Pluggable Transport support. The goal of Moonbounce is…☆37Updated last year
- A legacy http/2 and http/3 proxy for images and videos, originally designed for use with Invidious, later repurposed for Piped.☆29Updated last year
- All your files in one simple, replicated, encrypted place - with built-in backups and configurable ransomware protection.☆61Updated 3 months ago
- Extensions and experiments.☆65Updated 2 years ago
- Key management is hard☆128Updated 2 years ago
- AMI is a web application that helps people to create legal requests for copies of their personal information from data operators.☆32Updated 6 years ago
- tor/i2p/lokinet socks proxy router☆33Updated last year
- CLI program to encrypt/decrypt andOTP files☆31Updated 2 years ago
- Network diagnostic tool☆109Updated 10 months ago
- Storj edge services (including multi-tenant, S3-compatible server to interact with the Storj network)☆58Updated last week
- UI for the matrix federation tester (forked from https://git.lain.haus/f0x/fed-tester)☆42Updated 2 years ago
- ☆129Updated last year
- WebDAV/gRPC/HTTP high performance server to link high level clients to storage backends☆15Updated last week