Changes To Action Plan
Not logged in

Changes to "Action Plan" between 2015-09-22 07:01:29 and 2015-09-22 07:02:34

    13     13      dispersion/distribution algorithm. Probably the system
    14     14       depends on some sort of anonymized form of signing, 
    15     15       system of temporary ID-s, which also needs a proper
    16     16       spec.)</i>
    17     17       </li>
    18     18   
    19     19       <li>
    20         -    Implement a reference implementation of a tunnel, a code sample, by using existing symmetric crypto software, [https://www.gnu.org/software/wget/manual/wget.html|wget],  [https://gitweb.torproject.org/torsocks.git|torsocks].
    21         -   <i>(That tunnel might utilise some of the data
           20  +    Implement a network based tunnel, a code sample, by using existing symmetric crypto software, [https://www.gnu.org/software/wget/manual/wget.html|wget],  [https://gitweb.torproject.org/torsocks.git|torsocks].
           21  +   <i>(That tunnel might utilize some of the data
    22     22      selection code that was developed for the tunnel
    23     23      for USB-sticks and mail-pigeon-drones.)</i> 
    24     24       </li>
    25     25   
    26     26       <li>
    27     27       Write a fast version of the proper symmetric cropto algorithm.
    28     28       </li>
    29     29   </ul>