Overview
Artifact ID: | 86bbb863d7151f859a443ba7b64395937c11cacb |
---|---|
Page Name: | Action Plan |
Date: | 2016-06-21 06:20:08 |
Original User: | martin_vahi |
Parent: | b4825b4261583144a62ad0835e2fefbe4c6c90a4 (diff) |
Next | ce58d4fe67579d289fa32de527da0015f8425557 |
Content
TODO
- Write a reference tunnel implementation for USB-sticks. (Silktorrent packages must be placed to different folders to keep the file system operating at bearable speeds. To avoid reading file names, Silktorrent package names, from distant memory regions of the HDD/RAM/some-slow-USB, there must be some SQLite3 database that has a table with relative file paths and the file basenames. The silktorrent packages have to be verified before insertion.)
- The USB-stick tunnel implementation will be the core of many, if not all, network based tunnels. Implement a gateway component to many network based tunnels. Metadata like "suggested-deletion-timestamp" is tunnel implementation specific and must be closely tied to authentication.
- Write a fast, formally verified, version of the proper symmetric cropto algorithm, essentially the mmmv_shallowcrypt_t1. (It probably takes 2 months to complete that step, one month for the GPU based implementation, OpenGL ES, and the other for the plain CPU based implementation.)
- Implement Apache Cordova based smartphone software that allows people to propagate info through an ad-hoc network, including bus drivers, who drive regular routes, etc. (It probably takes 3 months to complete that step, because it assumes the use of native code and on phones the use of native code can be very problematic.)
Some later stage is about the physical drones, swapping of firmware-malware-prone-USB-sticks, studying of various private LAN technologies, etc.