Overview
Artifact ID: | b4825b4261583144a62ad0835e2fefbe4c6c90a4 |
---|---|
Page Name: | Action Plan |
Date: | 2015-09-22 07:16:45 |
Original User: | martin_vahi |
Parent: | 7bd97f16e724e63c9051a506e2d22b843febd7ff (diff) |
Next | 86bbb863d7151f859a443ba7b64395937c11cacb |
Content
Stage 0
- Write a Ruby program that assembles a container header string in ProgFTE format. For data that is greater than a ~30KiB the data is not serialized and added to the header.
- Write a reference tunnel implementation, a code sample, for USB-sticks, mail-pigeon-drones. (It's not a trivial task, needs simulation to figure out an optimial dispersion/distribution algorithm. Probably the system depends on some sort of anonymized form of signing, system of temporary ID-s, which also needs a proper spec.)
-
Implement a network based tunnel, a code sample, by using existing symmetric crypto software,
wget, torsocks. (That tunnel might utilize some of the data selection code that was developed for the tunnel for USB-sticks and mail-pigeon-drones.)
- Write a fast version of the proper symmetric cropto algorithm, essentially the mmmv_shallowcrypt_t1. (It probably takes 2 months to complete that step, one month for the GPU based implementation, OpenGL ES, and the other for the plain CPU based implementation.)
- Smartphone software that allows people to propagate info through an ad-hoc network, including bus drivers, who drive regular routes, etc. (It probably takes 3 months to complete that step, because it assumes the use of native code and on phones the use of native code can be very problematic.)