Changes To Action Plan
Not logged in

Changes to "Action Plan" between 2015-09-22 07:16:45 and 2016-06-21 06:20:08

     1         -<h1>Stage 0</h1>
     2         -
            1  +<h1>TODO</h1>
     3      2   <ul>
     4         -    <li>
     5         -    Write a Ruby program that assembles a container header string in 
     6         -    <a href="http://longterm.softf1.com/specifications/progfte/">ProgFTE format</a>. For data that is greater than a ~30KiB the data is not serialized and added to the header.
     7         -    </li>
            3  +
            4  +<blockquote></blockquote>
            5  +<li>Write a reference tunnel implementation for USB-sticks. <i>(Silktorrent
            6  +packages must be placed to different folders to keep the file system operating
            7  +at bearable speeds. To avoid reading file names, Silktorrent package names,
            8  +from distant memory regions of the HDD/RAM/some-slow-USB, there must be some
            9  +SQLite3 database that has a table with relative file paths and the file
           10  +basenames. The silktorrent packages have to be verified before insertion.)</i></li>
           11  +
           12  +<blockquote></blockquote>
           13  +<li>The USB-stick tunnel implementation will be the core of many, if not all,
           14  +network based tunnels. Implement a gateway component to many network based
           15  +tunnels. Metadata like "suggested-deletion-timestamp" is tunnel implementation
           16  +specific and must be closely tied to authentication.</li>
     8     17   
     9         -    <li>
    10         -    Write a reference tunnel implementation, a code sample,
    11         -    for USB-sticks, mail-pigeon-drones. 
    12         -   <i>(It's not a trivial task, needs simulation to figure out an optimial
    13         -   dispersion/distribution algorithm. Probably the system
    14         -    depends on some sort of anonymized form of signing, 
    15         -    system of temporary ID-s, which also needs a proper
    16         -    spec.)</i>
    17         -    </li>
           18  +<blockquote></blockquote>
           19  +<li>Write a fast, formally verified, version of the proper symmetric cropto
           20  +algorithm, essentially the mmmv_shallowcrypt_t1. <i>(It probably takes 2 months
           21  +to complete that step, one month for the GPU based implementation, OpenGL ES,
           22  +and the other for the plain CPU based implementation.)</i></li>
    18     23   
    19         -    <li>
    20         -    Implement a network based tunnel, a code sample, by using existing symmetric crypto software, [https://www.gnu.org/software/wget/manual/wget.html|wget],  [https://gitweb.torproject.org/torsocks.git|torsocks].
    21         -   <i>(That tunnel might utilize some of the data
    22         -   selection code that was developed for the tunnel
    23         -   for USB-sticks and mail-pigeon-drones.)</i> 
    24         -    </li>
    25         -
    26         -    <li>
    27         -    Write a fast version of the proper symmetric cropto algorithm, essentially the mmmv_shallowcrypt_t1. <i>(It probably takes 2 months to complete that  step, one month for the GPU based implementation, OpenGL ES, and the other for the plain CPU based implementation.)</i>
    28         -    </li>
    29         -
    30         -    <li>
    31         -    Smartphone software that allows people to propagate 
    32         -    info through an ad-hoc network, including bus drivers, who 
    33         -    drive regular routes, etc. <i>(It probably takes 3 months to complete that  step, because it assumes the use of native code and on phones the use of native code can be very problematic.)</i>
    34         -    </li>
           24  +<blockquote></blockquote>
           25  +<li>Implement Apache Cordova based smartphone software that allows people to
           26  +propagate info through an ad-hoc network, including bus drivers, who drive
           27  +regular routes, etc. <i>(It probably takes 3 months to complete that step,
           28  +because it assumes the use of native code and on phones the use of native code
           29  +can be very problematic.)</i></li>
    35     30   </ul>
    36     31   
    37         -
    38         -The later stage, Stage_1, is about the physical drones, swapping of firmware-malware-prone-USB-sticks, studying of various private LAN technologies, etc.
           32  +<p>Some later stage is about the physical drones, swapping of
           33  +firmware-malware-prone-USB-sticks, studying of various private LAN
           34  +technologies, etc.</p>