46 results for “topic:authenticity”
How to tell original from fake DS18B20 temperature sensors.
Hardware-based attestation and intrusion detection app for Android. It provides both local verification with another Android device via QR codes and optional scheduled server-based verification with support for alert emails. It uses hardware-backed keys and attestation support as the foundation and chains trust to the app for software checks.
[Feature complete] SHA-3 and Keccak checksum utility
attestation.app remote attestation server. Server code for use with the Auditor app: https://github.com/GrapheneOS/Auditor. It provides two services: submission of attestation data samples and a remote attestation implementation with email alerts to go along with the local implementation based on QR code scanning in the app.
[Basically feature complete] Keccak-family hashing library
Python implementation of C2PA: Coalition for Content Provenance and Authenticity.
A small subset of the submitted sample data from https://github.com/GrapheneOS/Auditor. It has a sample attestation certificate chain per device model (ro.product.model) along with a subset of the system properties from the sample as supplementary information.
Digitally signs and verifies files using RSA and SHA-256 to ensure file authenticity, integrity, and tamper detection.
Auditor app prebuilt using the latest official release of the Auditor app.
Public addresses for OriginalMy Dapps and smart-contracts (ETC/ETH)
What is the checksum of a directory?
Web application for NFC device authenticity check
Verify GOG Setup Integrity/Authenticity
VerificationGPT (www.verificationgpt.org)
A C++ library & CLI tool 🛠 to seal the state of a directory 📦🔒 (think checksums, but for a directory)
🧬 Peak Human Authenticity Achievement Engine - 27 distinct behavioral patterns for 98%+ AI detection resistance
[Feature complete] SHA-2-family hashing library
Checksum utilities for the BLAKE-family of hashing functions
Flutter App for authenticating the validity of a purchased product through scanning the code it was assigned to by the manufacturer who uploaded the product. Making use of Provider and Firebase for persisting and fetching data
Timestamp your WordPress content into the blockchain to empower your content authenticity and increase user trust.
Hash-based encrypt/decrypt for PHP
Proof of Human Process" protocol built on the Internet Computer (ICP). OriginStamp allows creators to generate immutable on-chain certificates of origin for their work, fighting digital forgery and proving authenticity in the age of AI
A blockchain-based verification system for tracking and verifying product authenticity and ownership. Used in SUPPLY: THE FUTURE apparel.
Echain Supply is a comprehensive decentralized supply chain management platform that leverages Stacks blockchain technology and Clarity smart contracts to provide end-to-end product traceability. The platform enables manufacturers, vendors, warehouses, and customers to track products through every stage of the supply chain, ensuring authenticity.
A tool to sign and verify files using Nostr. Think GPG, but user-friendly.
Library for the BLAKE-family of hashing functions
how can create one secured access from browser like https://site.test
An GCM reaching 10Gbits per second in a self researched and discovered feedback pipeline.
🎩 A comprehensive document authenticity verification tool with advanced image forensics and LLM-based text analysis.
Authenticity Protocol lets NFT creators establish the authenticity of their NFTs, enabling a more robust, vibrant NFT ecosystem.