Lines 8-14
requests, Internet mail and commands transmission. All packets are
Link Here
|
8 |
integrity checked, end-to-end encrypted (E2EE), explicitly authenticated |
8 |
integrity checked, end-to-end encrypted (E2EE), explicitly authenticated |
9 |
by known participants public keys. Onion encryption is applied to |
9 |
by known participants public keys. Onion encryption is applied to |
10 |
relayed packets. Each node acts both as a client and server, can use |
10 |
relayed packets. Each node acts both as a client and server, can use |
11 |
push and poll behaviour model. |
11 |
push and poll behaviour model. Also there is multicasting areas support. |
12 |
|
12 |
|
13 |
Out-of-box offline sneakernet/floppynet, dead drops, sequential and |
13 |
Out-of-box offline sneakernet/floppynet, dead drops, sequential and |
14 |
append-only CD-ROM/tape storages, air-gapped computers support. But |
14 |
append-only CD-ROM/tape storages, air-gapped computers support. But |