dual-licensed implementation of SSL. It includes SSL client libraries and an SSL server implementation. It supports multiple APIs, including those defined by SSL and TLS. It also supports an OpenSSL compatibility interface.
Encryption Toolkit that provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low-level details that make the encryption or authentication work.
a simple tool that takes two arbitrary binary files (called a Basis file and an Element file) and "munges" them together to produce a Mono binary file (with a .mono extension). Monolith can also reconstruct an Element file from a Basis file...
comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of
a fast password cracker, currently available for many flavors. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, many others supported out of the box
a free distributed version control system. it provides a simple, single-file transactional version store, with fully disconnected operation and an efficient peer-to-peer synchronization protocol. it understands history-sensitive merging, lightweight branc
a library of functions and a framework to interface with crypto algorithms provided by the calling application, built-in, or provided through shared libraries.
There are many good reasons of using Android without Google Play Services (the Google's proprietary part of Android operating system), mostly to protect its privacy. Google Play Services contain background processes used by Google not only to provide services (e.g., push notifications, acc
From typing a business letter to taking pictures with friends, the internet has changed every part of our lives. We don’t just share information with people, we also want it synced across our computer
Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora. Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.