Shaare your links...
2371 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 4 / 6
Newer►
113 results for tags cryptography x
  • Webseite von Hanno Böck
    Found via http://www.metzdowd.com/pipermail/cryptography/2015-December/027444.html.
    Tue Aug 30 19:29:44 2016 - permalink -
    - https://hboeck.de/
    blog cryptography german security
  • cryptography Info Page
    "Cryptography" is a low-noise moderated mailing list devoted to cryptographic technology and its political impact. Occasionally, the moderator allows the topic to veer more generally into security and privacy technology and its impact, but this is rare.

    WHAT TOPICS ARE APPROPRIATE:
    "On topic" discussion includes technical aspects of cryptosystems, social repercussions of cryptosystems, and the politics of cryptography such as export controls or laws restricting cryptography.

    Discussions unrelated to cryptography are considered off topic.
    Sun Aug 28 23:02:34 2016 - permalink -
    - http://www.metzdowd.com/mailman/listinfo/cryptography
    cryptography list mailing
  • VeraCrypt - Home
    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and that is based on TrueCrypt 7.1a.
    Windows / MacOSX / Linux / Source
    Thu Aug 4 15:50:32 2016 - permalink -
    - https://veracrypt.codeplex.com/
    cryptography FOSS security software
  • TCnext - Site dedicated to the development of the next "truecrypt"
    TrueCrypt will not die

    TrueCrypt.ch is the gathering place for all up-to-date information.  Unfortunately TrueCrypt.org is dead. But, we (the pure-privacy people) will help organize a future.
    Thu Aug 4 15:48:17 2016 - permalink -
    - https://truecrypt.ch/
    cryptography FOSS security software
  • cryptsetup / cryptsetup · GitLab
    Cryptsetup is utility used to conveniently setup disk encryption based on DMCrypt kernel module.

    These include plain dm-crypt volumes, LUKS volumes, loop-AES and TrueCrypt (including VeraCrypt extension) format.

    Project also includes veritysetup utility used to conveniently setup DMVerity block integrity checking kernel module.
    Thu Aug 4 15:12:42 2016 - permalink -
    - https://gitlab.com/cryptsetup/cryptsetup
    cryptography Linux security
  • SECURE SHARE
    Think of Facebook, Whatsapp, Gmail and Skype rolled into one, without the centralized surveillance and control. secushare employs GNUnet for end-to-end encryption and anonymizing mesh routing (because it has a more suitable architecture than Tor or I2P) and applies PSYC on top (because it performs better than XMPP, JSON or OStatus) to create a distributed social graph.
    Tue Jul 19 01:17:48 2016 - permalink -
    - http://secushare.org/
    cryptography security TODO
  • Modern Crypto
    Forums for discussing modern cryptographic practice. As of 2016-07-19, there are two mailing lists:
    Curves - Elliptic curve cryptography.
     New curves, implementation techniques, and protocols such as PAKE and  
     signatures.

    Messaging - Secure end-to-end messaging.
     New approaches to key management, authentication, usability, and deployment.
    Tue Jul 19 01:08:16 2016 - permalink -
    - https://moderncrypto.org/
    cryptography reading
  • TAxable electronic Libre Electronic Reserve - Electronic payments for a liberal society!
    Taler is a new electronic payment system under development at Inria. Today, this website only presents the advantages our system is expected to provide. We expect to make the payment system available to the general public in 2016.
    Fri Jul 8 16:55:36 2016 - permalink -
    - https://taler.net/
    cryptography GNU security software
  • Home - CONIKS
    CONIKS is a key management system for end users capable of integration in end-to-end secure communication services. The main idea is that users should not have to worry about managing encryption keys when they want to communicate securely, but they also should not have to trust their secure communication service providers to act in their interest.
    Fri Apr 15 17:36:13 2016 - permalink -
    - https://coniks.cs.princeton.edu/
    cryptography security software
  • Easy PGP Composer - Encrypting PGP messages in your browser | Sebastian Neef - 0day.work
    People can type their message into the text area on the left side and the encrypted PGP message will be displayed on the right side in real time.
    After that, the encrypted message can be sent over an unencrypted channel.
    All encryption is done with javascript in the browser. No data is sent to the server.
    Sat Apr 2 21:06:15 2016 - permalink -
    - https://0day.work/easy-pgp-composer-encrypting-pgp-messages-in-your-browser/
    cryptography JavaScript PGP
  • Keybase
    "Get a public key, safely, starting just with someone's social media username(s).
    The goal is a simple way to look up and trust keys, based on known public identities."

    Note that keybase has been bought by Zoom, which is not trusted by some people. See https://alexschroeder.ch/wiki/2020-05-08_Replacing_Keybase and https://idiomdrottning.org/pgp for an alternative using free software.
    Fri Feb 26 12:46:52 2016 - permalink -
    - https://keybase.io/
    cryptography FOSS gpg TODO tool
  • /dev/random - Random Thoughts On Programming In Parentheses - Pee - A password manager for the command line
    A simple password manager written in Chicken Scheme.

    Other articles on the blog are interesting as well, e.g. http://pestilenz.org/~ckeen/blog/posts/germany.html has an interesting plot.
    Wed Jan 13 17:05:14 2016 - permalink -
    - http://pestilenz.org/~ckeen/blog/posts/pee.html
    cryptography Scheme security
  • Pond - forward secure, asynchronous messaging
    So Pond is not email. Pond is forward secure, asynchronous messaging for the discerning. Pond messages are asynchronous, but are not a record; they expire automatically a week after they are received. Pond seeks to prevent leaking traffic information against everyone except a global passive attacker.
    Written in go.
    Tue Dec 15 13:07:01 2015 - permalink -
    - https://pond.imperialviolet.org/
    cryptography Go security software
  • Academic Signature
    An open source program for elliptic curve cryptography
    using a wxWidgets GUI  ( ecc digital signatures, ecc encryption and timestamps)
    Thu Sep 17 22:15:26 2015 - permalink -
    - https://www.fh-wedel.de/~an/crypto/Academic_signature_eng.html
    cryptography FOSS security
  • Pass: The Standard Unix Password Manager
    Password management should be simple and follow Unix philosophy. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.
    On https://hackaday.io/project/9564-rpi-zero-wifi-enabled-hardware-password-manager, a Raspberry π 0 is used to run it.
    Thu Sep 3 11:38:23 2015 - permalink -
    - http://www.passwordstore.org/
    cryptography pi raspberry security tool π
  • Open WhisperSystems | Is it secure? Can I trust it?
    Secure text messages for Android and iOS.
    Wed Jul 15 16:57:57 2015 - permalink -
    - http://support.whispersystems.org/customer/portal/articles/1473575-is-it-secure-can-i-trust-it-
    Android cryptography iOS security
  • ProtonMail - Secure email based in Switzerland
    Browser-based end-to-end encryption for e-mail.
    Wed Jun 3 19:29:12 2015 - permalink -
    - https://protonmail.ch/
    cryptography e-mail security
  • Hardware encrypted portable HDD SSD drives iStorage
    USB storage devices with hardware encryption and keypad. Capacities range from 4 GB to 6 TB.
    Fri May 8 22:18:39 2015 - permalink -
    - http://www.istorage-uk.com/index.php
    cryptography hardware security
  • http://ecryptfs.org/about.html
    eCryptfs is a POSIX-compliant enterprise cryptographic stacked filesystem for Linux. eCryptfs stores cryptographic metadata in the header of each file, so that encrypted files can be copied between hosts; the file will be decrypted with the proper key in the Linux kernel keyring. There is no need to keep track of any additional information aside from what is already in the encrypted file itself. You may think of eCryptfs as a sort of "gnupg as a filesystem".
    Tue Apr 28 10:44:30 2015 - permalink -
    - http://ecryptfs.org/about.html
    cryptography FOSS Linux security
  • FST-01 - Wiki
    Small Cortex-M3 based computer with USB device interface. Can be used as Cryptographic Token for GnuPG (gnuk) and true random number generator (NeuG).
    Tue Feb 17 17:00:25 2015 - permalink -
    - http://www.seeedstudio.com/wiki/index.php?title=FST-01#Development_Environment
    cryptography hardware
Links per page: 20 50 100
◄Older
page 4 / 6
Newer►
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.