vteague / contactTracingLinks
Examination of security and privacy implications of automated contact tracing
☆98Updated 5 years ago
Alternatives and similar repositories for contactTracing
Users that are interested in contactTracing are comparing it to the libraries listed below
Sorting:
- Specification and reference implementation of the TCN Protocol for decentralized, privacy-preserving contact tracing.☆264Updated 4 years ago
- ☆281Updated 2 years ago
- An ethical license for open source.☆294Updated 3 years ago
- 🇪🇺 Your Right to be Informed and Erased. The General Data Protection Regulation (EU) 2016/679 ("GDPR") documents for personal use.☆264Updated 3 years ago
- ☆29Updated 4 years ago
- Root KSK Ceremony Operating ENvironment☆85Updated 11 months ago
- A privacy preserving contact tracing design to battle infectious diseases☆27Updated 5 years ago
- Schema for the ehn DCC payload☆162Updated 2 years ago
- Code for the twitter bot nyt_diff☆215Updated last year
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆324Updated 5 years ago
- Report and raw data about privacy leaks in Grindr.☆18Updated 7 years ago
- ☆127Updated 5 years ago
- 🎭 Quebec's 735kv power lines can survive the apocalypse, but can they run TCP?!☆36Updated last year
- The Digital Standard is an ambitious, community-led effort to build a framework to test and rate products and services on the basis of pr…☆136Updated 3 years ago
- RWOT9 in Prague, The Czech Republic (September 2019)☆117Updated 9 months ago
- Share your blocks and subscribe to others'☆326Updated 3 years ago
- Key management is hard☆129Updated 3 years ago
- Resources, guides, slides for the Simply Secure community.☆41Updated 3 years ago
- Chrome extension that disables WebUSB☆34Updated 7 years ago
- Face shield personal protective equipment (PPE)☆99Updated 2 years ago
- reading lists☆31Updated 6 years ago
- Streamlined version of the tech in the Goodbye Big Five Series☆57Updated 6 years ago
- A configuration file for in-solidarity-bot that flags some of the terms in the NIST Technical Series Publications Author Instructions and…☆72Updated last year
- Disposable Identities for Health Crisis☆27Updated 5 years ago
- Discusses how to verify DKIM signatures in old emails, namely one of the Hunter Biden emails in the news☆102Updated 3 years ago
- Estimating the COVID risk of ordinary activities☆266Updated last year
- exploration with the keybase chat API☆263Updated 11 months ago
- ☆57Updated 3 years ago
- A conference schedule optimiser using linear programming.☆17Updated 4 months ago
- Lemonade’s Policy 2.0, a radically simplified, modernized, and digitized insurance policy.☆223Updated 3 years ago