trevp / double_ratchetLinks
Double Ratchet Algorithm
☆377Updated 9 years ago
Alternatives and similar repositories for double_ratchet
Users that are interested in double_ratchet are comparing it to the libraries listed below
Sorting:
- Noise Specification☆457Updated 6 years ago
- Pond☆913Updated 3 years ago
- Provably Anonymous Overlay☆324Updated 10 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- ☆57Updated 8 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆405Updated 8 years ago
- Memory-hard scheme Argon2☆206Updated 4 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 8 years ago
- Peer-to-peer IPv6 networking, secure and near-zero-conf.☆152Updated 8 years ago
- Securely locate peers without central servers☆153Updated 8 years ago
- opmsg message encryption☆753Updated 2 years ago
- TextSecure client package for Go☆131Updated 5 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆189Updated 2 years ago
- Encrypted peer-to-peer web application platform for decentralized, privacy-preserving applications☆1,148Updated 9 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- ☆222Updated 7 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- ☆89Updated 9 years ago
- Reference implementations (software)☆85Updated 8 years ago
- The DIME resolver library and command line utilities.☆411Updated last year
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 3 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- A set of scripts to root and install gapps and orbot+orwall into a CopperheadOS image and re-sign it for verified boot.☆222Updated 7 years ago
- udev helper and rule to identify U2F tokens☆51Updated 7 years ago
- The "Intel x86 considered harmful" paper☆199Updated 9 years ago
- network notary implementation for the Perspectives project☆50Updated 9 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- A JavaScript implementation of axolotl. Axolotl is a ratcheting forward secrecy protocol.☆75Updated 9 years ago
- A public database for software and firmware hashes☆216Updated 8 years ago