tomrittervg / crypto-usability-study
☆29Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for crypto-usability-study
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago
- Keyname format for public-key fingerprints☆22Updated 10 years ago
- ☆10Updated 6 years ago
- ☆62Updated 10 years ago
- Secure multiparty messaging (kindof)☆21Updated 8 years ago
- Simple script for PGP encrypted newsletter☆26Updated 8 years ago
- reading lists☆31Updated 5 years ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 9 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Planning for next generation secure chat.☆37Updated 9 years ago
- A collection of best practices UX flows for various circumstances that arise from interacting with PGP☆15Updated 8 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 9 years ago
- Distributed, tamper-resistant circumvention tools☆48Updated 8 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 8 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- Links to stuff arising from or related to the HACS workshop.☆35Updated 6 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 7 years ago
- A user-first approach to threat modeling.☆15Updated 5 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 8 years ago
- Reference implementations (software)☆85Updated 8 years ago
- repository for tracking open tasks☆18Updated 6 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆101Updated 3 years ago
- DEPRECATED - TLS regression scanner for Firefox☆18Updated last year
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- Command-line utility to control Tor.☆88Updated 11 months ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago