Repository navigation
confidentiality
- Website
- Wikipedia
Hyperledger Fabric is an enterprise-grade permissioned distributed ledger framework for developing solutions and applications. Its modular and versatile design satisfies a broad range of industry use cases. It offers a unique approach to consensus that enables performance at scale while preserving privacy.
Confidential Consortium Framework
Tor2web is an HTTP proxy software that enables access to Tor Hidden Services by mean of common web browsers
Public repository for the AZTEC V1 protocol. For the latest zkRollup release see here https://github.com/AztecProtocol/aztec-2-bug-bounty
zkPoD: A decentralized system for perfect fair data exchange
FPC enables Confidential Chaincode Execution for Hyperledger Fabric using Intel SGX.
Town Crier: an Authenticated Data Feeds for Smart Contracts
[Basically feature complete] Keccak-family hashing library
Whispers in the Machine: Confidentiality in Agentic Systems
Private money streaming on Ethereum using AZTEC Protocol
A Lightweight Single Header file C++ AES Library that also supports AES Hardware Acceleration Technology
Ma liste de paramètres à modifier dans le menu about:config de Firefox
🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and seamless copying of protected files.
Trusted execution experiments with Intel SGX
The CIA Compliance Manager is an application that helps organizations assess and manage the availability, integrity, and confidentiality of their systems and data based on customizable security levels, providing real-time cost estimates, business impact assessments, and technical implementation details.
[CVPR 2023] CaPriDe Learning: Confidential and Private Decentralized Learning based on Encryption-friendly Distillation Loss
Common (and Advanced) Information Security Questions. Questions you should know the answer to for your information security career.
Some classical/modern ciphers in C language and Python to encrypt and decrypt important information and keep the information safe, such as integrity, authentication, confidentiality and availability of the data. Some implemented ciphers are: Affine, DES and AES (with modes of operation for BMP images)
Bury latent information to your web page for confidentiality and track.
Anonymize Veeam Log files