warner / petmailLinks
secure messaging, file-transfer, and directory synchronization
☆41Updated 7 years ago
Alternatives and similar repositories for petmail
Users that are interested in petmail are comparing it to the libraries listed below
Sorting:
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- PANORAMIX repo☆20Updated 2 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- Cables Communication, secure and anonymous communication using email-like addresses.☆58Updated 10 years ago
- Fast Python library for decrypting pgp messages☆17Updated 12 years ago
- ☆20Updated 9 years ago
- Privacy enhanced instant messenger☆44Updated 5 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆36Updated 10 years ago
- Website privacy checker☆27Updated 9 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 5 months ago
- PGP packet parser library☆57Updated 5 years ago
- Easy creation of Tor Hidden Services☆40Updated 10 years ago
- Module for Qubes OS to integrate Yubikey authentication through a USB VM☆19Updated 7 years ago
- Command-line utility to control Tor.☆89Updated last year
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- ☆16Updated 8 years ago
- Planning for next generation secure chat.☆37Updated 10 years ago
- USB keyboard where keystrokes are end-to-end encrypted between the keyboard and dom0☆9Updated 6 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 7 years ago
- A Python implementation of JOSE☆14Updated 6 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- I2P bindings for Twisted.☆15Updated 2 years ago
- Sign JSON objects with ED25519 signatures☆12Updated 2 years ago
- A protocol testing platform that simulates network conditions and peer behavior to produce programmer-friendly benchmark data☆11Updated 6 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 4 months ago
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆29Updated 9 years ago
- ☆33Updated 2 years ago
- Python bindings to the Crypto++ library☆50Updated last year