trevp / double_ratchetLinks
Double Ratchet Algorithm
☆375Updated 9 years ago
Alternatives and similar repositories for double_ratchet
Users that are interested in double_ratchet are comparing it to the libraries listed below
Sorting:
- Noise Specification☆462Updated 7 years ago
- Pond☆920Updated 4 years ago
- Provably Anonymous Overlay☆325Updated 11 years ago
- Memory-hard scheme Argon2☆207Updated 5 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆406Updated 8 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆192Updated 3 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆222Updated 9 years ago
- ☆58Updated 8 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 9 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- The DIME resolver library and command line utilities.☆411Updated 2 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆274Updated 5 years ago
- TextSecure client package for Go☆128Updated 6 years ago
- opmsg message encryption☆757Updated 2 years ago
- ☆89Updated 9 years ago
- Encrypted peer-to-peer web application platform for decentralized, privacy-preserving applications☆1,146Updated 10 years ago
- Securely locate peers without central servers☆153Updated 8 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- ☆225Updated 8 years ago
- Peer-to-peer IPv6 networking, secure and near-zero-conf.☆152Updated 9 years ago
- udev helper and rule to identify U2F tokens☆51Updated 7 years ago
- A CONIKS implementation in Java☆60Updated 7 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 4 years ago
- Reference implementations (software)☆85Updated 9 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 9 years ago
- NameCoin-style names using consensus instead of proof of work☆100Updated 7 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 8 years ago
- Encrypted, taggable, searchable cloud storage. Unveiled at DEF CON 23☆211Updated 2 months ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated 2 years ago
- OZ: a sandboxing system targeting everyday workstation applications☆440Updated 7 years ago