trevp / double_ratchet
Double Ratchet Algorithm
☆375Updated 9 years ago
Alternatives and similar repositories for double_ratchet:
Users that are interested in double_ratchet are comparing it to the libraries listed below
- Noise Specification☆453Updated 6 years ago
- Pond☆910Updated 3 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆404Updated 7 years ago
- Memory-hard scheme Argon2☆202Updated 4 years ago
- ☆57Updated 8 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 8 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- Provably Anonymous Overlay☆324Updated 10 years ago
- Contents of the site☆483Updated 4 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆188Updated 2 years ago
- Peer-to-peer IPv6 networking, secure and near-zero-conf.☆153Updated 8 years ago
- TextSecure client package for Go☆129Updated 5 years ago
- Encrypted peer-to-peer web application platform for decentralized, privacy-preserving applications☆1,148Updated 9 years ago
- Securely locate peers without central servers☆151Updated 8 years ago
- CLI for keybase.io written in/for Node.js☆300Updated 8 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- OpenPGP applet for the YubiKey NEO☆215Updated 5 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- A JavaScript implementation of axolotl. Axolotl is a ratcheting forward secrecy protocol.☆75Updated 9 years ago
- The DIME resolver library and command line utilities.☆414Updated last year
- ☆88Updated 9 years ago
- serverless, encrypted, NAT-breaking p2p connections - DEPRECATED☆265Updated 4 years ago
- An XMPP client with OTR support☆365Updated 3 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆208Updated last year
- udev helper and rule to identify U2F tokens☆51Updated 6 years ago
- A CONIKS implementation in Java☆60Updated 6 years ago
- network notary implementation for the Perspectives project☆50Updated 8 years ago
- Python port of libaxolotl☆141Updated 2 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago