warner / petmailLinks
secure messaging, file-transfer, and directory synchronization
☆41Updated 8 years ago
Alternatives and similar repositories for petmail
Users that are interested in petmail are comparing it to the libraries listed below
Sorting:
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 8 years ago
- Privacy enhanced instant messenger☆44Updated 5 years ago
- Command-line utility to control Tor.☆89Updated last year
- Cables Communication, secure and anonymous communication using email-like addresses.☆58Updated 11 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- ☆10Updated 6 years ago
- Hash-based password manager☆19Updated 6 years ago
- Python bindings to the Crypto++ library☆50Updated 2 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 7 months ago
- Module for Qubes OS to integrate Yubikey authentication through a USB VM☆19Updated 7 years ago
- Web of trust grapher☆38Updated 3 months ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 9 years ago
- DHCP client disclosing less identifying information.☆61Updated 5 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 7 months ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Password manager for USB Armory☆37Updated 10 years ago
- Tor traffic whitelisting gateway☆73Updated 5 months ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- salty privacy☆52Updated 5 years ago
- Easy creation of Tor Hidden Services☆40Updated 10 years ago
- ☆62Updated 11 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Command-line access to Up1☆43Updated 7 years ago