Showing 2 open source projects for "encryption"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    Conversations

    Conversations

    The very last word in instant messaging

    ...XMPP is a federated protocol that can work with every XMPP server out there, giving you the freedom to choose a trustworthy server for yourself while still being able to chat with contacts from other servers. All communications are TLS encrypted and Conversations offers to enable one of two state of the art end-to-end encryption mechanisms, so you can be assured of the highest level of security in messaging. Conversations also offers plenty of unique features, such as image sharing, read markers, dynamic history loading and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SecuXabber

    SecuXabber

    A secure Jabber-client for Android using strong encryption

    ...This ensures the origin of the public key because people do a face-to-face check during key exchange. After the keys are imported by both users, all communication between them is done fully encrpyted using a strong 4096 bit end-to-end encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next