twosixlabs / coffeebreakLinks
☆25Updated 2 years ago
Alternatives and similar repositories for coffeebreak
Users that are interested in coffeebreak are comparing it to the libraries listed below
Sorting:
- Blogs about Cryptography/Security to follow☆47Updated 3 years ago
- ☆128Updated 2 years ago
- A history of PGP-related vulnerabilities☆24Updated 3 years ago
- Internet-Draft on IP address privacy☆17Updated 2 months ago
- Mirror only. Official repository at https://git.glasklar.is/system-transparency/core/system-transparency☆87Updated 3 months ago
- Specifications for Privacy Proxy Implementations☆31Updated this week
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 3 months ago
- Geolocate your files!☆16Updated 3 years ago
- ☆23Updated 2 years ago
- Privacy Enhancements for Android☆14Updated 5 years ago
- Privacy Pass implementation in Rust☆38Updated last month
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Updated 2 years ago
- Tool to verify DKIM signatures on an mbox of emails☆95Updated 6 years ago
- Source Code Transparency☆11Updated last year
- Paused mirror. Official repository at https://git.glasklar.is/system-transparency/core/stboot☆113Updated last year
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated 2 months ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆49Updated this week
- Blowing the whistle through a news app☆186Updated last week
- ☆23Updated 11 months ago
- ☆81Updated 5 years ago
- A light version of Tor portable to the browser☆120Updated 4 years ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated last week
- List of crackpot 'scientists' and 'thinkers'☆19Updated this week
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆72Updated 2 months ago
- Tools for power measurements of post-quantum cryptographic algorithms☆28Updated 5 years ago
- ☆27Updated 2 years ago
- Models for authenticated key exchange in Tamarin☆12Updated 5 years ago
- Signature-based Resource Loading Restrictions☆39Updated last month
- QubesOS dom0 automation in Python☆12Updated 7 years ago