Copyfree: resources > works

Copyfree Works

The license status of some works may be more complex than it at first appears here. In some cases, the license status listed for a given work is the "primary" license under which it is distributed. In several cases, parts of the work may be distributed under other licenses -- potentially even non-copyfree licenses.

Where present, descriptions are typically drawn from the claims of the projects themselves, and represent neither claims nor opinions of the Copyfree Initiative. Inclusion here (with or without description) does not constitute, and should not be inferred as, endorsement of any project.

Listings are presented for informational purposes only, and no representation is made as to the accuracy or utility of any information provided. Use at your own risk.

Filter Tags

To filter the list, click either the + or - link for a given tag.

+: Clicking the + link will include only works that are tagged with that term.

-: Clicking the - link will exclude only works that are tagged with that term.

Submit Works

There are presently two ways to submit a work:

Demoncryptpermalink

License Reference

Demoncrypt is a lightweight C++ wrapper around some of the more common crypto routines in Crypto++. It is the open source crypto layer used in the closed source demonsaw privacy tool.

License(s)

Tag(s)

node-Torpermalink

License Reference

License(s)

Tag(s)

ProtonMail Web Clientpermalink

License Reference

The ProtonMail Web Client is the official Official AngularJS web client for the ProtonMail secure email service. ProtonMail also makes use of OpenPGPjs to ensure message crytography is OpenPGP compliant.

License(s)

Tag(s)

PyBitmessagepermalink

License Reference

Bitmessage is a trustless, encrypted, P2P communications protocol used to send encrypted messages to another person or to many subscribers.

License(s)

Tag(s)

twisterpermalink

License Reference

A fully decentralized P2P microblogging platform, twister builds on open implementations of Bitcoin and BitTorrent protocols.

License(s)

Tag(s)

Where Are The Eyes?permalink

License Reference

Where Are The Eyes is a program for detecting and mapping surveillance cameras. Users mark cameras on their phone as they walk past them, and build a shared global map of surveillance. It is used to help activists in two ways -- to increase awareness of surveillance and authoritarian practices, and to plan activist movements.

License(s)

Tag(s)

zkcpermalink

License Reference

Zero Knowledge Communications (zkc) is a suite of programs to enable private and secure communications between any number of parties.

License(s)

Tag(s)