-
Updated
Jul 20, 2021 - Python
privacy-enhancing-technologies
Here are 153 public repositories matching this topic...
-
Updated
Jul 23, 2021 - JavaScript
-
Updated
Jul 13, 2021 - C++
-
Updated
Jun 17, 2021 - Python
-
Updated
Jul 24, 2021 - HTML
-
Updated
Apr 3, 2021 - Dart
-
Updated
Dec 16, 2018 - Python
-
Updated
May 10, 2021 - Shell
-
Updated
Jul 20, 2021 - Kotlin
-
Updated
Jul 21, 2021 - C++
-
Updated
Feb 2, 2020 - JavaScript
-
Updated
Feb 20, 2019 - Shell
-
Updated
Aug 30, 2019 - Shell
-
Updated
Jul 15, 2021 - JavaScript
-
Updated
Dec 9, 2020
-
Updated
Jun 8, 2021 - JavaScript
To avoid future code duplication and the problems associated with it, we should clean up the duplicate code in our tests and pull the helpers methods (e.g. activate_cfund) into a seperate util library that we can import into our tests
-
Updated
May 10, 2021 - JavaScript
Describe the bug
The SGX enclave entry functions for Sonora are not easily discoverable
To Reproduce
Try grepping for sinaloa_init_remote_attestation_enc in the project directory. You will find calls to it but not an implementation
Expected behaviour
To aide newcomers to the project, functions should be easy for them to find the implementations of.
Additional context
-
Updated
Jul 23, 2021 - Shell
-
Updated
Dec 5, 2019 - JavaScript
-
Updated
Jun 28, 2020 - Go
-
Updated
Apr 12, 2021
Is your feature request related to a problem? Please describe.
We want every model extraction attack to be achievable in PrivacyRaven. This does not include side channel, white-box, full or partial prediction, or explanation-based attacks.
Describe the solution you'd like.
PrivacyRaven has three interfaces for attacks:
- The core interface defines each attack parameter individuall
-
Updated
Jul 23, 2021 - Python
-
Updated
May 10, 2021 - Haskell
-
Updated
May 21, 2021 - Python
-
Updated
Jun 12, 2021 - PowerShell
-
Updated
Jun 9, 2021 - Shell
Improve this page
Add a description, image, and links to the privacy-enhancing-technologies topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the privacy-enhancing-technologies topic, visit your repo's landing page and select "manage topics."


I noticed that TC is using a enormous amount of data, whether in wifi or cellular. It reaches around 200-300 MB of daily data, and I've got a total of 1.2 GB for the last 4 days.
Is it some sort of "virtual data usage", i.e. data wrongly attributed to TC whereas it was actually established by another app, or data wrongly counted but actually blocked by TC thus not visible out of the smartphone