arthur: encrypted*

Bookmarks on this page are managed by an admin user.

12 bookmark(s) - Sort by: Date ↓ / Title / Voting / - Bookmarks from other users for this tag

  1. Secure peer-to-peer file transfer directly from your browser
    https://bitf.ly
    Tags: , by Arthur Lutz (2016-03-01)
    Voting 0
  2. Subrosa is an encrypted communication platform.

    Reclaim your privacy and talk freely.

    It's free and open source, with no ads. Independently audited.
    https://subrosa.io
    Tags: , , , by Arthur Lutz (2014-06-17)
    Voting 0
  3. Threema is a new mobile messaging app that puts security first. With true end-to-end encryption, you can rest assured that only you and the intended recipient can read your messages. Unlike other popular messaging apps (including those claiming to use encryption), even we as the server operator have absolutely no way to read your messages.
    http://threema.ch/en
    Tags: , , , by Arthur Lutz (2013-01-30)
    Voting 0
  4. Schleuder is a gpg-enabled mailinglist with remailer-capabilities. It is designed to serve as a tool for group communication: subscribers can communicate encrypted (and pseudonymously) among themselves, receive emails from non-subscribers and send emails to non-subscribers via the list. Schleuder takes care of all de- and encryption, stripping of headers, formatting conversions, etc. Further schleuder can send out its own public key upon request and receive administrative commands by email. (Read more about the ?concept.)
    https://schleuder2.nadir.org
    Tags: , , , by Arthur Lutz (2012-06-18)
    Voting 0
  5. IHU is a Voice over IP (VoIP) application for Linux (using Qt), that creates an audio stream between two computers easily and with the minimal traffic on the network.
    http://ihu.sourceforge.net/index.html
    Tags: , , by Arthur Lutz (2011-05-13)
    Voting 0
  6. -
    http://tinc-vpn.org
    Tags: , , by Arthur Lutz (2010-09-02)
    Voting 0
  7. -
    http://schleuder2.nadir.org
    Voting 0
  8. -
    http://www.downloadsquad.com/2009/06/...ymous-torrenting-options-have-arrived
    Tags: , by Arthur Lutz (2009-06-17)
    Voting 0
  9. setup a nearly complete encrypted system using Debian Etch and cryptsetup with LUKS. The goal is: encrypt all partitions except /boot.
    http://www.debian-administration.org/articles/428
    Tags: , , by Arthur Lutz (2006-08-16)
    Voting 0

Top of the page

First / Previous / Next / Last / Page 1 of 2 Bookmarks: Tags: encrypted

About - Propulsed by SemanticScuttle