Copyfree: resources > works

Copyfree Works

The license status of some works may be more complex than it at first appears here. In some cases, the license status listed for a given work is the "primary" license under which it is distributed. In several cases, parts of the work may be distributed under other licenses -- potentially even non-copyfree licenses.

Where present, descriptions are typically drawn from the claims of the projects themselves, and represent neither claims nor opinions of the Copyfree Initiative. Inclusion here (with or without description) does not constitute, and should not be inferred as, endorsement of any project.

Listings are presented for informational purposes only, and no representation is made as to the accuracy or utility of any information provided. Use at your own risk.

Filter Tags

To filter the list, click either the + or - link for a given tag.

+: Clicking the + link will include only works that are tagged with that term.

-: Clicking the - link will exclude only works that are tagged with that term.

Submit Works

There are presently two ways to submit a work:

ASMR [1]permalink

License Reference

ASMR stands for Atomic Swaps for Meros, and provides Bitcoin-Monero cross-chain atomic swap capabilities, with potential support for support of more cryptocurrencies.

License(s)

Tag(s)

axTLSpermalink

License(s)

Tag(s)

BadWolfpermalink

License Reference

BadWolf is a minimalist and privacy-oriented browser with an intentionally counter-vi UI.

License(s)

Tag(s)

BearSSLpermalink

License Reference

BearSSL is an implementation of the SSL/TLS protocol (RFC 5246) written in C.

License(s)

Tag(s)

Cake Wallet [1]permalink

License Reference

Cake Wallet is a non-custodial, "thin", multi-coin cryptocurrency wallet for Monero (XMR), Litecoin (LTC), and Bitcoin (BTC) that supports inter-cryptocurrency exchange.

License(s)

Tag(s)

calccrypto/OpenPGPpermalink

License Reference

This calccrypto implementation of OpenPGP is a toy/educational implementation of the RFC 4880 standard.

License(s)

Tag(s)

Demoncryptpermalink

License Reference

Demoncrypt is a lightweight C++ wrapper around some of the more common crypto routines in Crypto++. It is the open source crypto layer used in the closed source demonsaw privacy tool.

License(s)

Tag(s)

I2Ppermalink

License Reference

The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P.

License(s)

Tag(s)

Note(s)

Several noncritical components (I2Psnark, Susidns, and Susmail) are strictly GPLed, and they are bundled with the default install package. The rest of the standard I2P system uses a tangled web of alternate licenses, where the options are such that all those components can be accepted under copyfree terms.

i2pdpermalink

License Reference

I2P (Invisible Internet Protocol) is a universal anonymous network layer, and i2pd (I2P Daemon) is a full-featured C++ I2P client implementation. All communications over I2P are anonymous and end-to-end encrypted; participants don't reveal their real IP addresses.

License(s)

Tag(s)

Jeeves In Haskell [1]permalink

License Reference

Jeeves is a programming language for automatically enforcing privacy policies. This implementation was built in Haskell.

License(s)

Tag(s)

keybase clientpermalink

License Reference

This is the keybase client repository. It includes the Go library and command line client, the Keybase service code, and clients for Android, iOS, Linux, MacOS, and MS Windows. It also contains packaged versions of clients for various OSes.

License(s)

Tag(s)

keybase libwebpermalink

License Reference

This is a library for building web clients for keybase.

License(s)

Tag(s)

Monero [1]permalink

License Reference

Monero is cash for a connected world (and a blockchain based cryptocurrency). It's fast, private, and secure. With Monero, you are your own bank. You can spend safely, because others cannot see your balances or track your activity.

License(s)

Tag(s)

netpgppermalink

License(s)

Tag(s)

node-Torpermalink

License Reference

License(s)

Tag(s)

OpenPGP SDKpermalink

License(s)

Tag(s)

Parleypermalink

License Reference

Parley was an email service that is intended to make secure email communications more accessible to end-users without requiring a technical background. Its client and server code are now abandonware.

License(s)

Tag(s)

Pondpermalink

License Reference

Pond is forward secure, asynchronous messaging for the discerning.

License(s)

Tag(s)

ProtonMail Web Clientpermalink

License Reference

The ProtonMail Web Client is the official Official AngularJS web client for the ProtonMail secure email service. ProtonMail also makes use of OpenPGPjs to ensure message crytography is OpenPGP compliant.

License(s)

Tag(s)

PyBitmessagepermalink

License Reference

Bitmessage is a trustless, encrypted, P2P communications protocol used to send encrypted messages to another person or to many subscribers.

License(s)

Tag(s)

Tom Zerucha's OpenPGPpermalink

License(s)

Tag(s)

twisterpermalink

License Reference

A fully decentralized P2P microblogging platform, twister builds on open implementations of Bitcoin and BitTorrent protocols.

License(s)

Tag(s)

Universal Encrypted Email Specificationpermalink

License Reference

Universal Email Encryption Specification is a specification for an encryption email solution.

License(s)

Tag(s)

Urbit [1]permalink

License Reference

Urbit is secure decentralized P2P "personal server platform" that runs on any existing Unix OS. The platform seeks to deconstruct the client-server model in favor of a federated network of personal servers with a consistent digital identity. Its components include Nock and Hoon programming languages.

License(s)

Tag(s)

Vanadiumpermalink

License Reference

Vanadium is a privacy and security enhanced release of Chromium for GrapheneOS.

License(s)

Tag(s)

Where Are The Eyes?permalink

License Reference

Where Are The Eyes is a program for detecting and mapping surveillance cameras. Users mark cameras on their phone as they walk past them, and build a shared global map of surveillance. It is used to help activists in two ways -- to increase awareness of surveillance and authoritarian practices, and to plan activist movements.

License(s)

Tag(s)

Whiteout Mailpermalink

License Reference

Whiteout Mail is an easy to use email client with integrated OpenPGP encryption written in pure JavaScript. It is abandonware, with many forks on GitHub.

License(s)

Tag(s)

zkcpermalink

License Reference

Zero Knowledge Communications (zkc) is a suite of programs to enable private and secure communications between any number of parties.

License(s)

Tag(s)