zoom / zoom-e2e-whitepaper
Zoom Cryptography Whitepaper
☆549Updated 3 months ago
Alternatives and similar repositories for zoom-e2e-whitepaper:
Users that are interested in zoom-e2e-whitepaper are comparing it to the libraries listed below
- ☆108Updated 5 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆320Updated 4 years ago
- Security Bulletins that relate to Netflix Open Source☆744Updated 6 months ago
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees☆266Updated 3 years ago
- ☆278Updated last year
- ☆145Updated 2 years ago
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.☆824Updated 3 years ago
- X.509 Certificate Linter focused on Web PKI standards and requirements.☆384Updated last week
- A collection of common (interesting) cryptographic mistakes and learning resources.☆338Updated this week
- Named vulnerabilities and their practical impact☆432Updated 3 years ago
- HTTP Extensions in progress☆461Updated this week
- a modern crypto messaging format☆1,000Updated 2 months ago
- Library and command line tool to detect SHA-1 collision in a file☆1,343Updated 8 months ago
- A MITM (monster-in-the-middle) detection tool. Used to build MALCOLM:☆810Updated 11 months ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 3 years ago
- A set of FIDO2 / WebAuthn demo servers☆357Updated 3 years ago
- Adiantum and HPolyC specification and test vectors☆474Updated last year
- ☆378Updated this week
- IBM Homomorphic Encryption Toolkit For MacOS☆365Updated 2 years ago
- Auditing for TLS certificates (Go code)☆968Updated this week
- DNS covert channel implant for Red Teams.☆731Updated 5 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆535Updated 3 years ago
- ElectionGuard is a set of open source software components that can be used to create and publish end to end verifiable elections as well …☆836Updated 3 weeks ago
- Imagine your SSH server only listens on an IPv6 address, and where the last 6 digits are changing every 30 seconds as a TOTP code...☆418Updated 3 years ago
- Provides library functionality for FIDO2, including communication with a device over USB or NFC.☆625Updated this week
- An implementation of an auditable key directory☆268Updated 4 months ago
- The W3C Web Cryptography API☆273Updated 3 weeks ago
- Harden your Chrome browser via enterprise policy.☆284Updated 2 years ago
- A proposed standard that allows websites to define security policies.☆1,816Updated 2 years ago
- BetterTLS: A Name Constraints test suite for HTTPS clients.☆167Updated 3 months ago