Zama's fhEVM Coprocessor is an open-source tool for building applications with Fully Homomorphic Encryption (FHE). It enables developers to create privacy-preserving solutions for various use cases including: 1. Confidential credit scoring 2. Preventive medicine 3. Biometric authentication 4. Tokenization 5. Confidential trading 6. On-chain identity management The tool provides libraries such as TFHE-RS, CONCRETE, CONCRETE ML, and FHEVM to facilitate the implementation of FHE in blockchain and AI applications. It aims to maintain data privacy while allowing computations on encrypted data.
FEATURES
ALTERNATIVES
A security solution that monitors, detects, and responds to insider threats by providing visibility into user activities across endpoints, email, and cloud to prevent data loss from careless, compromised, or malicious insiders.
A tool for breaking crypto and identifying weak cryptosystems, with a humorous name and a separate library called Cryptanalib.
A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.
Helm plugin for cryptographically signing and verifying charts with GnuPG integration.
Automated tool for detecting steganographic content in images, with F5 detection capabilities.
An AI-powered data security governance platform that autonomously discovers, classifies, monitors, and protects sensitive information across cloud and on-premises environments.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

OSINTLeak
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.