Bitcoin is a peer-to-peer electronic cash system that is completely decentralized, without the need for a central server or trusted parties. Users hold the crypto keys to their own money and transact directly with each other, with the help of a P2P network to check for double-spending.
jQuery.pidCrypt uses HTML5 localStorage or sessionStorage for implementing an RSA public keyring within the browser, allowing transparent asymmetric encryption of form submissions while protecting the keys with AES symmetric encryption. It is easy to implement and has numerous configurable options for pre, post, and error-handling callbacks.
libre is a generic library for real-time communications with asynchronous I/O support. It is written in portable POSIX source code that conforms to the ANSI C89 and ISO C99 standards. It is robust and fast, with a low memory footprint. It also features RFC compliance and support for IPv4 and IPv6. Protocol implementations include SIP, SDP, RTP/RTCP, BFCP, DNS, STUN/TURN/ICE, HTTP, and WebSockets.
The Open-Transactions project is a collaborative effort to develop a robust, commercial-grade, fully-featured, free-software toolkit implementing a full-strength financial cryptography library, API, CLI, and prototype server. Open-Transactions democratizes financial and monetary actions. You can use it for issuing currencies/stock, paying dividends, creating asset accounts, sending/receiving digital cash, writing/depositing cheques, cashier's cheques, creating basket currencies, trading on markets, scripting custom agreements, recurring payments, escrow, etc. Strong crypto is used. Balances are unchangeable (even by a malicious server). Receipts are destructible and redundant. The transactions are unforgeable. The cash is untraceable. The cheques are non-repudiable.
Cardpeek is a tool to read the contents of ISO7816 smartcards. It features a GUI to represent card data in a tree view, and it is extendable with a scripting language (LUA). The goal of this project is to allow smartcard owners to be better informed about what type of personal information is stored in these devices. The tool currently reads the contents of: EMV bank cards, Calypso public transport cards (such as Navigo, RavKav, and Mobib), Belgian eID cards, GSM SIM cards, the French Vitale 2 health card, some Mifare cards, and Moneo electronic purse cards.
XCA is an interface for managing RSA and DSA keys, certificates, certificate signing requests, revocation lists and templates. It uses the OpenSSL and Qt4 libraries. Certificates and requests can be created and signed and many x509v3 extensions can be added. XCA supports multiple root and intermediate Certificate authorities. The CAs can be used to create CRLs and extend certificates. The following file-formats are supported: PEM, DER, PKCS#7, PKCS#8, PKCS#10, PKCS#12, and SPKAC.
EncFS is an encrypted pass-through filesystem which runs in userspace on Linux (using the FUSE kernel module). Similar in design to CFS and other pass-through filesystems, all data is encrypted and stored in the underlying filesystem. Unlike loopback filesystems, there is no predetermined or pre-allocated filesystem size.
conexus is a generalized C++ I/O library that includes network support for IPv4 and IPv6 sockets, serial/TTY communications, kernel message queues, pipes, and files. Objects use sigc++ for signaling property changes and other information. Sub-libraries include conexus-gtkmm (provides a set of gtkmm widgets), conexus-dbus (provides dbus support for endpoints), conexus-nspr (provides NSPR endpoints), conexus-nss (provides NSS endpoints), and conexus-ssl (provides OpenSSL endpoints).
SSLsplit is a tool that performs man-in-the-middle attacks against SSL/TLS encrypted network connections for network forensics and penetration testing. It terminates SSL/TLS and initiates a new connection to the original destination, logging all data transmitted. It supports plain TCP and SSL, HTTP and HTTPS, and IPv4 and IPv6. For SSL and HTTPS, it generates and signs forged X509v3 certificates on-the-fly using the original certificate's subject DN and subjectAltName extension. It supports Server Name Indication, RSA, DSA, and ECDSA keys, and DHE and ECDHE cipher suites. It can also use existing certificates if the private key is available.