stef / pbpLinks
salty privacy
☆52Updated 4 years ago
Alternatives and similar repositories for pbp
Users that are interested in pbp are comparing it to the libraries listed below
Sorting:
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- Yet another signify tool☆90Updated last year
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 7 years ago
- "control-port-filter" without the bash☆14Updated 9 years ago
- NameCoin-style names using consensus instead of proof of work☆100Updated 7 years ago
- network notary implementation for the Perspectives project☆50Updated 9 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- PEFS - stacked cryptographic file system for FreeBSD☆76Updated last year
- IRC to Matrix bridge☆48Updated 8 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- A collection of best practices UX flows for various circumstances that arise from interacting with PGP☆15Updated 9 years ago
- Bidirectional secure channels over TCP/IP☆26Updated 5 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆42Updated 8 years ago
- Decentralised gossip driven data sharing for the 21st century.☆59Updated 2 years ago
- Your internet-wide general-purpose DHT to store key/value pairs☆124Updated 7 years ago
- Script for starting bhyve instances based on a libUCL config file☆25Updated 10 years ago
- DHCP client disclosing less identifying information.☆61Updated 5 years ago
- cjdns swiss army knife☆48Updated 7 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- An Ansible role for using tor!☆72Updated 9 years ago
- udev helper and rule to identify U2F tokens☆51Updated 7 years ago
- OpenSSL library interposer to make existing binary software use more secure TLS protocol variants☆38Updated 10 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago