These are two small files which are different but have the same SHA-1 sum:
File 1 — f92d74e3874587aaf443d1db961d4e26dde13e9c — 320 bytes
File 2 — f92d74e3874587aaf443d1db961d4e26dde13e9c — 320 bytes
CryFS encrypts your Dropbox and protects you against hackers and data leaks. It also works well together with other cloud providers.
Free hosted instance of PrivateBin.
General information on the PrivateBin project.
Creates GPG encrypted, compressed backups; client-side encryption allows to upload the backup onto untrusted servers.
Encrypted backups with a clean and simple interface; easy to use and set up; possibility to mount the backup archive with FUSE and inspect it as a regular file system.
Password management belongs to the command line, deep into the Unix heartland, the shell. Titan is written in C and is available under the MIT license.
Pure Bash script to manage secure archives; simple and clean; uses
gnugpg for encryption/decryption, thus can leverage tools like GPG Agent.
Hard disk encryption tool; it stores all setup information in the partition header, enabling easy data transport or migration.
Encrypted filesystem in user-space based on
FUSE; mounts an encrypted directory into a clear one.
A robust and efficient password cracking tool that can help you recover lost passwords, audit password security, benchmark, or just figure out what data is stored in a hash.
An Ash module that makes it easy to perform aes-256-cbc encryption for files and directories.
Simplifies the use of duplicity by keeping clean configuration files to automate the backup.
PSSH provides parallel versions of OpenSSH and related tools. Included are pssh, pscp, prsync, pnuke, and pslurp. The project includes psshlib which can be used within custom applications
Password management should be simple and follow Unix philosophy. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.
In order to use a GnuPG key on a smartcard or Yubikey, a GnuPG key needs to be created. This post will show you how to create a GnuPG key with sub-keys for signing, encryption and authentication. The authentication key can be used later on to authenticate via ssh as well.
Tutanota is the secure email service, built in Germany. Use encrypted emails on all devices with our open source email client, mobile apps & desktop clients.
Generate and store secure passwords. Everything is accessible only to you on our No Knowledge cloud, whether you're on your phone or at your desk. It's totally free!
Simple password-based file encryption. Contribute to spieglt/Cloaker development by creating an account on GitHub.
Are you sure you want to delete this link?
The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community