The Distributed Privacy Guard (DKGPG) implements Distributed Key Generation (DKG) and Threshold Cryptography for OpenPGP. The generated public keys are compatible with the standard and thus can be used by any RFC4880-compliant application (e.g. GnuPG). The main purposes of this software are
... [More] distributing power among multiple parties, eliminating single points of failure, and increasing the difficulty of side-channel attacks on private key material. [Less]
Tari enables creators to design new types of stories and experiences. Someday a mesmerizing and digitally scarce asset or collectible you covet will unlock new business opportunities for the creator and a new world of possibilities for you. This asset will be issued on Tari. Tari is built in Rust, private by default, and open source.
getdns is a modern asynchronous DNS API. It implements DNS entry points from a design developed and vetted by application developers, in an API specification. The open source C implementation of getdns is developed and maintained in collaboration by NLnet Labs, Sinodun and No Mountain Software. This
... [More] implementation is licensed under the New BSD License.
Stubby is the name given to an application developed in tandem with the API which provides a mode of using getdns which acts as a local DNS Privacy stub resolver daemon (using DNS-over-TLS). [Less]
aTox is a beautiful, modern and free open-source messaging app for the Tox protocol on Android. Why use aTox?
* Open-source: free to share, inspect, and change as you like.
* Reasonable: sane defaults, no guesses about what you care about, doesn't ignore what you want.
* End-to-end
... [More] encrypted: the only people who can see your conversations are the people you're talking to.
* Distributed: no central servers that can be taken down or compelled to turn over data.
* Lightweight: no telemetry, ads, or other forms of monitoring. [Less]
Security and Privacy Risk Simulator for Machine Learning
AIJack is an open source tool that helps you identify and protect against security and privacy attacks on machine learning algorithms. It includes defense techniques like Differential Privacy and Homomorphic Encryption, as well as APIs for
... [More] distributed learning methods like Federated Learning and Split Learning. AIJack currently supports over 30 state-of-the-art methods. [Less]
This site uses cookies to give you the best possible experience.
By using the site, you consent to our use of cookies.
For more information, please see our
Privacy Policy