Lines 1-9
Link Here
|
1 |
The Hidden Lake is an anonymous network built on a micro-service |
1 |
The Hidden Lake is an anonymous network built on a micro-service |
2 |
architecture. At the heart of HL is the core - HLS (service), which |
2 |
architecture. At the heart of HL is the core - HLS (service), which generates |
3 |
generates anonymizing traffic and combines many other services (for |
3 |
anonymizing traffic and combines many other services (for example, HLF and |
4 |
example, HLT and HLM). Thus, Hidden Lake is not a whole and monolithic |
4 |
HLM). Thus, Hidden Lake is not a whole and monolithic solution, but a |
5 |
solution, but a composition of several combined services. The HL is a |
5 |
composition of several combined services. The HL is a friend-to-friend (F2F) |
6 |
friend-to-friend (F2F) network, which means building trusted |
6 |
network, which means building trusted communications. Due to this approach, |
7 |
communications. Due to this approach, members of the HL network can |
7 |
members of the HL network can avoid spam in their direction, as well as possible |
8 |
avoid spam in their direction, as well as possible attacks if |
8 |
attacks if vulnerabilities are found in the code. |
9 |
vulnerabilities are found in the code. |
|
|
10 |
- |
|
|