View | Details | Raw Unified | Return to bug 283488 | Differences between
and this patch

Collapse All | Expand All

(-)b/security/hidden-lake/Makefile (-2 / +2 lines)
Lines 1-10 Link Here
1
PORTNAME=	hidden-lake
1
PORTNAME=	hidden-lake
2
DISTVERSIONPREFIX=	v
2
DISTVERSIONPREFIX=	v
3
DISTVERSION=	1.8.1
3
DISTVERSION=	1.8.2
4
CATEGORIES=	security net-p2p
4
CATEGORIES=	security net-p2p
5
5
6
MAINTAINER=	alster@vinterdalen.se
6
MAINTAINER=	alster@vinterdalen.se
7
COMMENT=	F2F Anonymous network based on the QB-problem
7
COMMENT=	F2F Anonymous network based on the QB-problem & GP/12 protocol stack
8
WWW=		https://github.com/number571/hidden-lake/
8
WWW=		https://github.com/number571/hidden-lake/
9
9
10
LICENSE=	MIT
10
LICENSE=	MIT
(-)b/security/hidden-lake/distinfo (-5 / +5 lines)
Lines 1-5 Link Here
1
TIMESTAMP = 1734291044
1
TIMESTAMP = 1734860802
2
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.1/v1.8.1.mod) = ed3357aa38c69af64bcd23253d5277be1832d8c0dbff34f78d8778e9c4475d08
2
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.mod) = ed3357aa38c69af64bcd23253d5277be1832d8c0dbff34f78d8778e9c4475d08
3
SIZE (go/security_hidden-lake/hidden-lake-v1.8.1/v1.8.1.mod) = 339
3
SIZE (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.mod) = 339
4
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.1/v1.8.1.zip) = dd931a26c789c6965bd9bdd8cd6d563b5eea0a00905f9c33c7399a696f54c67c
4
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.zip) = e65497ea0a3ec6ece0f15959a77f5a86d612eb1c97c36875237d87d45229efde
5
SIZE (go/security_hidden-lake/hidden-lake-v1.8.1/v1.8.1.zip) = 10615850
5
SIZE (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.zip) = 10617070
(-)b/security/hidden-lake/pkg-descr (-9 / +7 lines)
Lines 1-9 Link Here
1
The Hidden Lake is an anonymous network built on a micro-service
1
The Hidden Lake is an anonymous network built on a micro-service
2
architecture. At the heart of HL is the core - HLS (service), which
2
architecture. At the heart of HL is the core - HLS (service), which generates
3
generates anonymizing traffic and combines many other services (for
3
anonymizing traffic and combines many other services (for example, HLF and
4
example, HLT and HLM). Thus, Hidden Lake is not a whole and monolithic
4
HLM). Thus, Hidden Lake is not a whole and monolithic solution, but a
5
solution, but a composition of several combined services. The HL is a
5
composition of several combined services. The HL is a friend-to-friend (F2F)
6
friend-to-friend (F2F) network, which means building trusted
6
network, which means building trusted communications. Due to this approach,
7
communications. Due to this approach, members of the HL network can
7
members of the HL network can avoid spam in their direction, as well as possible
8
avoid spam in their direction, as well as possible attacks if
8
attacks if vulnerabilities are found in the code.
9
vulnerabilities are found in the code.
10
- 

Return to bug 283488