Lines 2-13
Link Here
|
2 |
secure store-and-forward files and mail exchanging. |
2 |
secure store-and-forward files and mail exchanging. |
3 |
|
3 |
|
4 |
This utilities are intended to help build up small size (dozens of |
4 |
This utilities are intended to help build up small size (dozens of |
5 |
nodes) ad-hoc friend-to-friend (F2F) statically routed darknet networks |
5 |
nodes) ad-hoc friend-to-friend (F2F) statically routed darknet |
6 |
for fire-and-forget secure reliable files, file requests and Internet |
6 |
delay-tolerant networks for fire-and-forget secure reliable files, file |
7 |
mail transmission. All packets are integrity checked, end-to-end |
7 |
requests, Internet mail and commands transmission. All packets are |
8 |
encrypted (E2EE), explicitly authenticated by known participants public |
8 |
integrity checked, end-to-end encrypted (E2EE), explicitly authenticated |
9 |
keys. Onion encryption is applied to relayed packets. Each node acts |
9 |
by known participants public keys. Onion encryption is applied to |
10 |
both as a client and server, can use push and poll behaviour model. |
10 |
relayed packets. Each node acts both as a client and server, can use |
|
|
11 |
push and poll behaviour model. |
11 |
|
12 |
|
12 |
Out-of-box offline sneakernet/floppynet, dead drops, sequential and |
13 |
Out-of-box offline sneakernet/floppynet, dead drops, sequential and |
13 |
append-only CD-ROM/tape storages, air-gapped computers support. But |
14 |
append-only CD-ROM/tape storages, air-gapped computers support. But |