Artifact Content
Not logged in

Artifact 86bbb863d7151f859a443ba7b64395937c11cacb:

Wiki page [Action Plan] by martin_vahi on 2016-06-21 06:20:08.
D 2016-06-21T06:20:08.028
L Action\sPlan
P b4825b4261583144a62ad0835e2fefbe4c6c90a4
U martin_vahi
W 1679
<h1>TODO</h1>
<ul>

<blockquote></blockquote>
<li>Write a reference tunnel implementation for USB-sticks. <i>(Silktorrent
packages must be placed to different folders to keep the file system operating
at bearable speeds. To avoid reading file names, Silktorrent package names,
from distant memory regions of the HDD/RAM/some-slow-USB, there must be some
SQLite3 database that has a table with relative file paths and the file
basenames. The silktorrent packages have to be verified before insertion.)</i></li>

<blockquote></blockquote>
<li>The USB-stick tunnel implementation will be the core of many, if not all,
network based tunnels. Implement a gateway component to many network based
tunnels. Metadata like "suggested-deletion-timestamp" is tunnel implementation
specific and must be closely tied to authentication.</li>

<blockquote></blockquote>
<li>Write a fast, formally verified, version of the proper symmetric cropto
algorithm, essentially the mmmv_shallowcrypt_t1. <i>(It probably takes 2 months
to complete that step, one month for the GPU based implementation, OpenGL ES,
and the other for the plain CPU based implementation.)</i></li>

<blockquote></blockquote>
<li>Implement Apache Cordova based smartphone software that allows people to
propagate info through an ad-hoc network, including bus drivers, who drive
regular routes, etc. <i>(It probably takes 3 months to complete that step,
because it assumes the use of native code and on phones the use of native code
can be very problematic.)</i></li>
</ul>

<p>Some later stage is about the physical drones, swapping of
firmware-malware-prone-USB-sticks, studying of various private LAN
technologies, etc.</p>

Z 7b062f1a85d4785ddd7c70abd61fc00b