Open Call Beneficiaries

DISCOVER THE WINNER PROJECTS

This page contains a concise overview of projects funded by NGI Assure. There is more information
available on each of the projects listed on this page – all you need to do is click on the title on
each project to read more.

Applications are still open, you can apply today.

0KNOW


Group Theoretic Zero-knowledge Proofs (0KNOW)

More

Aerogramme


Standards-compliant open-source IMAP server with server-side encryption

More

Ari


Purely functional programming language designed to "type" binary files

More

Atomic Data


Typesafe handling of LinkedData

More

Authenticated DNSSEC bootstrapping


Secure in-band announcements of DNSSEC parameters

More

Heads-OpenPGP


OpenPGP Authenticated Heads and long-time awaited security improvements

More

Bertie


Formally verified TLS 1.3 implementation

More

Blink Qt Messaging


Add modern encryption to SIP softphone

More

Briar Desktop


E2EE online and offline messaging and discussion

More

CNSPRCY


E2EE connections between trusted devices

More

Converged Security Suite Improvements


Open source tooling for BIOS configuration

More

Cable


A new wire protocol for cabal (and beyond)

More

Libre-SOC Cavatools: Power ISA Simulator


Power ISA Simulator

More

Choreographic Programming: From Theory To Practice


Generating a standard library of core distributed algorithms with formal proofs

More

Coko Docs


A modern, open source replacement for Google Docs and Drive

More

Condensation Data System


CRDT-driven data store that guarantees data ownership

More

Conversations 3.0


Secure and standards-compliant XMPP client for Android

More

CryptPad Auth


Implement external identity mechanisms to E2EE collaborative editor

More

CryptoLyzer


Cryptographic settings analyzer library

More

Securing Internet protocols with DIDs


Bridge Decentralized Identifiers with standardised authorisation mechanisms

More

DATALISP


Universal data interchange format using canonical S-expressions

More

dream2nix


Automate reproducible packaging for various language ecosystems

More

Python supply-chain with dream2nix


 Towards a secure, extensible & reproducible Python supply-chain with dream2nix

More

Encoding for Robust Immutable Storage (ERIS)


Encrypted and content-addressable data blocks

More

Earthstar


P2P protocol and APIs for collaborative and social applications

More

Earthstar (Encryption, Safety, and Local Sync)


Improve security, encryption and sync capabilities in Earthstar CRDT

More

Friendly Forge Format (F3)


Proposed Standard for secure communication between software forges

More

FOSS Code Supply Chain Assurance


Mitigate attacks through software dependencies

More

Federated Task-Tracking with Live Data


Track tasks and issues in a federated way

More

Federated Timesheets


Interoperable machine-readable time tracking

More

Fobnail


Remote attestation delivered locally

More

Full-source GNU Mes on ARM and RISC-V


Expand full-source bootstrap to other CPU platforms

More

GNU Mes RISC-V


Bringing the trustworthy bootstrap to RISC-V

More

RISC-V bootstrapping effort via GNU Mes


Allow bootstrapping Guix on RISC-V via GNU Mes

More

GNU Mes Tower


GNU Mes with alternative scheme implementations and WASM

More

GNU Taler KYC


Know-Your-Customer support for GNU Taler

More

Layer-2-Overlay


Generalising the GNUnet Layer-2 Overlay for broader usage

More

GNUnet Messenger API


API for decentralized instant messaging using CADET

More

Gash


Port Gash to GNU Mes for auditable bootstrap

More

Gosling


Generic Onions Services Library Project

More

Guix Peer-to-Peer substitutes


More

Porting Guix to Riscv64


Port Guix software collection to Riscv64 architecture

More

TPM 2.0 for HEADS


TPM 2.0 support for open source BIOS replacement firmware

More

Himalaya


End-to-end encryption capable scriptable email

More

Hyper Hyper Space


Cryptographically secure append-only distributed data layer

More

IPDL


Equational Proofs for Distributed Cryptographic Protocols

More

Interpeer SDKs


Secure and efficient peer-to-peer networking stack

More

json-joy


JSON data structure as a CRDT

More

K-Gen


From datasets in DCAT catalogs to knowledge graphs

More

KDE Connect


KDE Connect discovery and transport protocol improvements

More

Standardizing KEMTLS


Post-quantum TLS without handshake signatures

More

Kaidan


Encrypted A/V calls, group chat messaging

More

Katzen


Meta-data resistant instant messaging over the Katzenpost mixnet

More

Keyoxide Mobile


Mobile client for identity magement tool Keyoxide

More

Private Key Operations for Keyoxide


Implement Private Key Store design in Keyoxide

More

Keyoxide v2


Add cryptographic signature based to Keyoxide

More

Kintex-nextpnr


Open toolchain for high performance FPGAs

More

Improve Krill (RPKI) BGP integration


Real-time routing for Krill RPKI daemon

More

Let's Connect! Client-Server to P2P


Add P2P features to Let's Connect!

More

LiberaForms


End tot End Encrypted Forms

More

Audio/Video Calls in Libervia


Encrypted Audio/Video Calls in multi-frontend XMPP client

More

Librecast


E2E encrypted multicast

More

The Libre-SOC Gigabit Router


Native Open Hardware chip implementation of crypto primitives

More

LumoSQL at-rest data security


Modern embedded database with encryption and signed data

More

Maemo Leste Telepathy


Modernise open source real-time communications stack

More

Manyverse Private Groups


Implement SSB Private Groups in Manyverse

More

Mellium


Add OMEMO support to XMPP library

More

MirageVPN


Robust OpenVPN client and server, and QubesOS client

More

Monal IM


Free Jabber/XMPP client for iOS and macOS

More

Naisho


Efficiently combine end-to-end encryption with CRDTs

More

Namecoin: Electrum-NMC


Security hardening and futureproofing Namecoin and Electrum-NMC

More

NeoChat


Native Matrix encrypted instant messaging client

More

Packet classification extensions for Netfilter


High throughput packet classification of tunneled traffic

More

neuropil


DHT based overlay network

More

NextGraph


Interlinked data graphs, with privacy, security, data locality, and interoperability in mind

More

Type Inference for Nix


Adding static typing and type inference to Nix

More

NixOS/Clevis


Unattented disk decryption with Clevis on NixOS

More

Securing NixOS services with systemd


More

UEFI Secure Boot support for NixOS


Add a self-sovereign root of trust as part of supply chain security

More

Adopting the Noise Key Exchange in Tox


Improved security of Tox instant messaging with NoiseIK

More

Oil Shell


A new dialect of shell that is less error-prone

More

Oil Shell


Modern shell language and runtime

More

Improve Okular digital signature support


Improve open source tooling for digital signatures

More

OpenCryptoHW


CGRA- based reconfigurable open-source cryptographic IP cores

More

OpenCryptoLinux


Make Linux run on OpenCryptoHW

More

OpenCryptoTester


System-on-Chip for hardware/software testing

More

Open MLS Infrastructure


End-to-end encrypted group messaging

More

Improving OpenSSH's Authentication and PKI


Improving SSH Authentication with OpenPGP transitive trust

More

Interoperable Certificate Store for OpenPGP


Standardisation effort for shared OpenPGP certificate storage

More

Hardening OpenPGP CA deployments


HSM support for OpenPGP key infrastructure

More

OpenQRNG


Open source, certified Quantum Random Number Generator

More

p2panda


p2p protocol and event-driven data store

More

Adding Web-of-Trust Support to PGPainless


Web-of-Trust specification support for Java

More

Post-Quantum Crypto in DNSSEC


Experimental platform for DNSSEC with post-quantum cryptography

More

Statime


Memory-safe high-precision clock synchronization

More

Peppol for the masses


Hybrid self-hosted e-invoicing with decentralized identities

More

Probabilistic NAT Traversal


Last resort ad hoc connections for GNUnet

More

Prosody IM


Implement SASL authentication mechanism for XMPP

More

ProveThis


Prove statements about authenticated API resources

More

PyCM


Evaluate the performance of ML algorithms

More

R5N-DHT


Formalisation within IETF of R5N Distributed Hash Table design

More

rasn


Safe ASN.1 codec framework for Rust

More

Rosenpass


Post Quantum Security Add-On for WireGuard

More

SES - SimplyEdit Spaces


SimplyEdit Spaces - collaborative presentations

More

Subliminal Messaging


Embedded secure channels within traditional and internet telephony

More

A Secret Key Store for Sequoia PGP


Standards-compliant private key store for OpenPGP

More

Adding TPM Support to Sequoia PGP


Implement use of TPM 2.0 crypto hardware for OpenPGP

More

Sequoia PGP


Improve interface of Sequoia PGP commandline

More

Sequoia GPG Chameleon


Implement well-known API's for using OpenPGP

More

Signature PDF


Self-hosted tool to add signature to PDFs

More

SignRoom


Zenroom based signature and credential platform

More

smoltcp RPL


Implement Routing Protocol for Low-Power and Lossy networks

More

Peer-to-Peer Access to Our Software Heritage


Access Software Heritage data via IPFS DHT

More

Solid Wallet


Authorization reasoning, rule-based controls and fluid integration for Solid

More

Dual-level Specification Inference


Make formal verification more practical with dual-level Specification Inference

More

Spritely (and OCapN)


Enable secure P2P applications with Object Capabilities

More

Statime PTP Master


Statime - Zero-allocation cross-platform Precision Time Protocol

More

Sustainable web apps with m-ld


Empower users and developers with distributed interlinked data using local-first principles

More

Great Black Swamp


Decentralized cloud storage with provider-independent security

More

Tauri Apps


A safer run-time for web technology based apps

More

Servo Webview for Tauri


Integrated portable webview based on Servo engine into Tauri

More

TerosHDL


Assisting hardware developers to deliver safer designs

More

TrustING


Ultrafast AS-level Public-Key Infrastructure

More

Trust semantic learning and monitoring


Measure on-going trust between interacting agents

More

Trustix


Make build logs available as publicly verifiable, tamper-proof Merkle trees

More

Tvix


Alternative Rust-based software build transparency

More

TwPM


Open hardware implementation of Trusted Platform Module

More

TypeCell


CRDT-based collaborative block-based editor

More

UEFI isolation in VM from non UEFI firmware


Safer booting into UEFI-compliant operating system

More

LIP6 VLSI Tools


Logical validation of ASIC layouts

More

Verified Reowolf


Formal protocol verification with Reowolf

More

Vula


Encrypted ad hoc local-area networking

More

WikiRate: More Sites, More Cites


Persistent citation for Dekko-based open source data collections

More

Winden/Magic Wormhole dilation


Improving Magic-Wormhole by implementing dilation and multiple file support for the web

More

Wispwot


Implement generalized scalable protection against disruptive behavior in content discovery

More

Yrs


Collaborative editing with CRDT written in Rust

More

Yrs Undo


Rust-based CRDT framework for real-time multi-user applications

More

Quantum-Proof Zenroom


Implementation of Quantum-Proof Cryptography in Zenroom

More

Reinstatement of crypto.signText()


Cryptographic signatures brought back to the browser

More

Distributed Mechanism Learning


Privacy preserving ways of distributed data usage

More

imap-codec library


Release version 1.0 of the imap-codec library

More

libresilient


Create robust web presence with service workers and DHT

More

lpnTPM


TPM 2.0 compliant open hardware Trusted Platform Module

More

Securing Decentralised Live Information with m-ld


Collaborative editing of LInked Data based on CRDT

More

oqsprovider


Post-quantum/quantum-safe cryptographic algorithms for OpenSSL

More

p4-nix


Combine Programming Protocol-independent Packet Processors language with declarative Nix packaging

More