Check out the #1 security key lineup that provides strong two-factor, multi-factor and passwordless authentication!| Yubico
Anything that uses encryption to keep content away from spying eyes. End-to-end encryption is the best, because there need be no trusted intermediary. Some software projects are always fully end-to-end encrypted. Examples include NNCP, Syncthing, Yggdrasil, and Gemini. For more on encryption, see: OpenPGP tools: GnuPG (GPG) Sequoia PGP Age (Encryption) signify (not encryption, but cryptographic authentication) Links to this note Encrypting Filespooler Jobs With Age Like the process described ...| www.complete.org
Age is a public-key encryption system, similar in certain concepts to GnuPG (GPG), but simpler because it isn’t focused on building a web of trust. Homepage: https://github.com/FiloSottile/age Conveniently, Age can use not just its own keypairs, but also a person’s SSH keypairs for encryption and decryption. This is nice because many systems already have authenticated SSH keypairs for each other. Links to this note Encrypting Filespooler Jobs With Age Like the process described in Encrypt...| www.complete.org
Here are some (potentially) interesting topics you can find here: Old and Small Technology and benefits to us today NNCP, which is an Asynchronous, Encrypted, onion-routed, offline-capable way to send data and execute remote commands. Yggdrasil, a network using IPv6 space where IPs are linked to public keys How this site is built (hint: it’s exported from Emacs!) Amateur Radio ZFS on Linux Long-Distance Train Travel in the USA The Grumpy Cricket - an interactive fiction game for children So...| www.complete.org
ssh-keygen can sign and verify signatures, and it's way better than PGP| www.agwa.name