Showing 16 open source projects for "secret sharing"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 1
    SimpleX

    SimpleX

    The first messaging platform operating without user identifiers

    Other apps have user IDs: Signal, Matrix, Session, Briar, Jami, Cwtch, etc. SimpleX does not, not even random numbers. This radically improves your privacy. The video shows how you connect to your friend via their 1-time QR-code, in person or via a video link. You can also connect by sharing an invitation link. Temporary anonymous pairwise identifiers SimpleX uses temporary anonymous pairwise addresses and credentials for each user contact or group member. It allows to deliver messages without...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    Inbucket

    Inbucket

    Disposable webmail server (similar to Mailinator) with built in SMTP

    Inbucket is an email testing application; it will accept messages from any email address and make them available to view via a web interface. When you need to test your webapp's outbound emails with Mailinator but are stuck behind a firewall, Inbucket provides the solution. It allows you to keep your new application development secret until it's time to release it. Inbucket is ideal for validating that emails go out as part of your integration test suite, sending links to coworkers...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Modern Errors

    Modern Errors

    Handle errors in a simple, stable, consistent way

    Handle errors in a simple, stable, consistent way. Exporting and documenting all error classes allows consumers to check them. This also enables sharing error classes between modules. Error properties that are internal or secret can be prefixed. This makes them non-enumerable, which prevents iterating or logging them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    transfer.sh

    transfer.sh

    Easy and fast file sharing from the command-line

    Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh currently supports the s3 (Amazon S3), gdrive (Google Drive), storj (Storj) providers, and local file system (local). For easy deployment, we've created a Docker container. For the usage with a AWS S3 Bucket, you just need to specify the following options, provider, aws-access-key, aws-secret-key, bucket, and s3-region. If you specify the s3-region...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Software Testing Platform | Testeum Icon
    Software Testing Platform | Testeum

    Testeum is a Software Testing & User Test platform

    Tired of bugs and poor UX going unnoticed despite thorough internal testing? Testeum is the SaaS crowdtesting platform that connects mobile and web app creators with carefully selected testers based on your criteria.
    Learn More
  • 5
    Diffuse

    Diffuse

    A music player that connects to your cloud/distributed storage

    ... may need HTTPS for it to work smoothly in certain browsers. I should also note that some source services use OAuth, so you'll need to use your own application credentials (eg. Google Drive client ID + secret).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Cookiecutter Data Science

    Cookiecutter Data Science

    Project structure for doing and sharing data science work

    A logical, reasonably standardized, but flexible project structure for doing and sharing data science work. When we think about data analysis, we often think just about the resulting reports, insights, or visualizations. While these end products are generally the main event, it's easy to focus on making the products look nice and ignore the quality of the code that generates them. Because these end products are created programmatically, code quality is still important! And we're not talking...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Cnry

    Cnry

    Cnry makes it easy to publish and keep track of warrant canaries

    Cnry makes it easy to publish and keep track of warrant canaries. A warrant canary is a method by which a service provider can inform users that they've been served with a government subpoena despite legal prohibitions on revealing the existence of the subpoena. The idea of using negative pronouncements to thwart the nondisclosure requirements of court orders and served secret warrants was first proposed by Steven Schear on the cypherpunks mailing list. Even if you don't need a warrant canary...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Lepton

    Lepton

    A lean snippet manager

    Lepton is a beautiful open source snippet manager for ubuntu. Manage your Github gists with support for tags, search and sharing. Lepton features a rich-text editor and markdown viewer. Try the snap today! Lepton's can be customized by <home_dir>/.leptonrc! Theme (light/dark), Snippet, Editor, Logger, Proxy, Shortcuts, Enterprise, Notifications, and more! Check out the configuration docs to explore different customization options. Lepton is an open source project on GitHub. It's free and we...
    Downloads: 1 This Week
    Last Update:
    See Project
  • The #1 Embedded Analytics Solution for SaaS Teams. Icon
    The #1 Embedded Analytics Solution for SaaS Teams.

    Qrvey saves engineering teams time and money with a turnkey multi-tenant solution connecting your data warehouse to your SaaS application.

    Qrvey’s comprehensive embedded analytics software enables you to design more customizable analytics experiences for your end users.
    Try Developer Playground
  • 10
    IPFS Publish

    IPFS Publish

    Continuous Delivery of static websites to IPFS

    This is a tool that aims to enable the automatic publishing of static webpages from Git repositories into IPFS. It consists of two parts: a small web server and management CLI. Web server exposes an endpoint that you use as your Git's webhook. When the hook is invoked, it clones your repo, build it (if needed), add it to the IPFS node (pin it if configured) and publish the new IPFS address under configured IPNS name.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    lecithine

    FUSE File system powered by secret sharing scheme

    Lecithine is a FUSE (file system in user space) using a secret sharing scheme. You can use Lecithine as regular file system. When writing to disk, data will be devided into randomly chosen pieces (secret shares) and stored into different places. Upon reading, the shares are merged together such that in turn the plaintext results. From a cryptographers point of view, there is no symmetric or private key ever needed to produce a ciphertext. This is how secret sharing schemes are designed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Shamir's Secret Sharing Scheme
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ESOSI (Employment of Secret-Sharing for Object Security in Intranets) offers a security solution for companies and authorities. It extends the eCryptfs file encryption system by adding Secret-Sharing, smartcard support and a Linux Security Module (LSM).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A PHP base webtools, let you share Informations and files to your friends from your gmail account, keep your gmail password secret. Simple setup , easy manage category by rename the labels by adding a prefix to become share folder.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next