skewthreads / QR-secret-sharingLinks
Create QR codes to secret-share a message. Ideal for cryptocurrency wallet recovery keys and passwords.
☆121Updated 2 years ago
Alternatives and similar repositories for QR-secret-sharing
Users that are interested in QR-secret-sharing are comparing it to the libraries listed below
Sorting:
- Run an isolated instance of a tor network in Docker containers☆165Updated 6 years ago
- Transfer files from Air gapped machines using QR codes☆110Updated 4 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Sunder is a user-friendly graphical interface for Shamir's Secret Sharing.☆160Updated 6 years ago
- ☆96Updated 7 years ago
- PriFi, a low-latency, local-area anonymous communication network.☆48Updated last year
- Simple Secret Sharing Service for social and decentralised management of passwords☆35Updated 8 years ago
- TLS - what can go wrong?☆108Updated 6 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆23Updated 8 months ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- Vanity public key generator for use with IPFS and IPNS☆40Updated 2 years ago
- PANORAMIX repo☆20Updated 2 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- The Swiss Army knife for backend engineers.☆97Updated 4 years ago
- OpenBank - Your BTC realtime tracker.☆74Updated 2 years ago
- Proof of Concept for Ledger Nano S MCU exploit☆168Updated 7 years ago
- IoT device indexer and search engine.☆59Updated 5 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- A curated collection of links for secure messaging.☆33Updated 5 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- Archives of the Cypherpunks Mailing List☆54Updated 8 years ago
- All publicly known blockchain incidents☆204Updated 2 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- The noise swiss army knife☆44Updated 4 years ago
- Small scripts and utilities, often for using other programs with Tor, routing traffic safely, removing fingerprintable system traits, and…☆175Updated 7 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆67Updated 2 years ago