Chrubix installs the GNU/LInux distro of your choice - ArchLinux, Debian, Fedora, Kali, SuSE, or Ubuntu - onto a removable MultiMediaCard (MMC) on your ARM-based Chromebook. Chrubix supplies Guest Mode, full-disk encryption, Windows XP camouflage mode, MAC address randomizing, a panic button, additional checksums, and a variety of important security-oriented software applications such as Freenet, I2P, Tor, GPG, and LEAP-Bitmask. In addition, Chrubix offers you the option to tweak the software so that it will run on no hardware but yours (MMC and laptop must match). In this way, it transforms your ARM-based Chromebook into a fully functional, more secure laptop.
Nautilus secure phone is a program that allows two parties to hold a secure voice conversation. Released in May of 1995, it ran on ordinary phone lines using a pair of modems (one at each end). It was meant as an answer to NSA's attempts to force "key escrow" on encrypted communication. Later versions of the program could also use TCP, i.e. the Internet. After the original developers abandoned the project, it was taken over by German maintainers. Actual development focuses on porting to the ARM platform and portability.
ecca-proxy is a Web proxy server that transparently handles Eccentric Authentication key and certificate management. Eccentric Authentication is a protocol designed to make using client certificates easy, secure, and private. The proxy handles the difficult cryptographic details and provides an easy to use interface to the user.
Whonix is an anonymous general-purpose operating system based on Virtual Box, Debian GNU/Linux, and Tor. By design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location, because Whonix consists of two (virtual) machines. One machine solely runs Tor and acts as a gateway, called Whonix-Gateway. The other machine, Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.
Coquelicot is a “one-click” file sharing Web application with a focus on protecting users’ privacy. Its basic principle is that users can upload a file to the server, and in return they get a unique URL which can be shared with others in order to download the file. Coquelicot aims to protect, to some extent, users and system administrators from disclosure of the files exchanged from passive and not-so-active attackers.