Security Utilities and Instructions
This repository is a collection of programs and instructions for various security and privacy-related software. The software contained are not custom implementations of security protocols, they are wrappers for well-established tools.
Outline
GnuPG
- card: create business cards from gpg keys
- skeybase: an independent keybase.io client, capable of verifying identity proofs
SSL
- instructions on manually managing keys and certicates
- uca: tiny certificate authority