zoom / zoom-e2e-whitepaper
Zoom Cryptography Whitepaper
☆549Updated 4 months ago
Alternatives and similar repositories for zoom-e2e-whitepaper:
Users that are interested in zoom-e2e-whitepaper are comparing it to the libraries listed below
- ☆278Updated last year
- The Illustrated TLS 1.3 Connection: Every byte explained☆860Updated 5 months ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- The W3C Web Cryptography API☆275Updated last month
- ☆108Updated 5 years ago
- Auditing for TLS certificates.☆873Updated last year
- A MITM (monster-in-the-middle) detection tool. Used to build MALCOLM:☆808Updated last year
- A set of FIDO2 / WebAuthn demo servers☆358Updated 3 years ago
- BetterTLS: A Name Constraints test suite for HTTPS clients.☆168Updated 4 months ago
- Auditing for TLS certificates (Go code)☆976Updated 2 weeks ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- Security Bulletins that relate to Netflix Open Source☆744Updated 6 months ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆535Updated 3 years ago
- ElectionGuard is a set of open source software components that can be used to create and publish end to end verifiable elections as well …☆837Updated last month
- ☆252Updated 4 years ago
- An implementation of an auditable key directory☆267Updated 4 months ago
- X.509 Certificate Linter focused on Web PKI standards and requirements.☆392Updated this week
- Adiantum and HPolyC specification and test vectors☆474Updated last year
- A transparent and secure way to look up public keys.☆1,574Updated 3 years ago
- IBM Homomorphic Encryption Toolkit For MacOS☆365Updated 2 years ago
- USB Keystroke Injection Protection☆536Updated last year
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- Intuitive Advanced Cryptography☆435Updated 2 years ago
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees☆266Updated 3 years ago
- ☆814Updated this week
- Lecture notes for a course on cryptography☆525Updated last year
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.☆824Updated 4 years ago
- Library and command line tool to detect SHA-1 collision in a file☆1,344Updated 9 months ago
- HTTP Extensions in progress☆465Updated this week
- A tool to monitor a certificate transparency log for operational problems☆183Updated last year