1 -<h1>Stage 0</h1>
2 -
1 +<h1>TODO</h1>
3 2 <ul>
4 - <li>
5 - Write a Ruby program that assembles a container header string in
6 - <a href="http://longterm.softf1.com/specifications/progfte/">ProgFTE format</a>. For data that is greater than a ~30KiB the data is not serialized and added to the header.
7 - </li>
3 +
4 +<blockquote></blockquote>
5 +<li>Write a reference tunnel implementation for USB-sticks. <i>(Silktorrent
6 +packages must be placed to different folders to keep the file system operating
7 +at bearable speeds. To avoid reading file names, Silktorrent package names,
8 +from distant memory regions of the HDD/RAM/some-slow-USB, there must be some
9 +SQLite3 database that has a table with relative file paths and the file
10 +basenames. The silktorrent packages have to be verified before insertion.)</i></li>
11 +
12 +<blockquote></blockquote>
13 +<li>The USB-stick tunnel implementation will be the core of many, if not all,
14 +network based tunnels. Implement a gateway component to many network based
15 +tunnels. Metadata like "suggested-deletion-timestamp" is tunnel implementation
16 +specific and must be closely tied to authentication.</li>
8 17
9 - <li>
10 - Write a reference tunnel implementation, a code sample,
11 - for USB-sticks, mail-pigeon-drones.
12 - <i>(It's not a trivial task, needs simulation to figure out an optimial
13 - dispersion/distribution algorithm. Probably the system
14 - depends on some sort of anonymized form of signing,
15 - system of temporary ID-s, which also needs a proper
16 - spec.)</i>
17 - </li>
18 +<blockquote></blockquote>
19 +<li>Write a fast, formally verified, version of the proper symmetric cropto
20 +algorithm, essentially the mmmv_shallowcrypt_t1. <i>(It probably takes 2 months
21 +to complete that step, one month for the GPU based implementation, OpenGL ES,
22 +and the other for the plain CPU based implementation.)</i></li>
18 23
19 - <li>
20 - Implement a network based tunnel, a code sample, by using existing symmetric crypto software, [https://www.gnu.org/software/wget/manual/wget.html|wget], [https://gitweb.torproject.org/torsocks.git|torsocks].
21 - <i>(That tunnel might utilize some of the data
22 - selection code that was developed for the tunnel
23 - for USB-sticks and mail-pigeon-drones.)</i>
24 - </li>
25 -
26 - <li>
27 - Write a fast version of the proper symmetric cropto algorithm, essentially the mmmv_shallowcrypt_t1. <i>(It probably takes 2 months to complete that step, one month for the GPU based implementation, OpenGL ES, and the other for the plain CPU based implementation.)</i>
28 - </li>
29 -
30 - <li>
31 - Smartphone software that allows people to propagate
32 - info through an ad-hoc network, including bus drivers, who
33 - drive regular routes, etc. <i>(It probably takes 3 months to complete that step, because it assumes the use of native code and on phones the use of native code can be very problematic.)</i>
34 - </li>
24 +<blockquote></blockquote>
25 +<li>Implement Apache Cordova based smartphone software that allows people to
26 +propagate info through an ad-hoc network, including bus drivers, who drive
27 +regular routes, etc. <i>(It probably takes 3 months to complete that step,
28 +because it assumes the use of native code and on phones the use of native code
29 +can be very problematic.)</i></li>
35 30 </ul>
36 31
37 -
38 -The later stage, Stage_1, is about the physical drones, swapping of firmware-malware-prone-USB-sticks, studying of various private LAN technologies, etc.
32 +<p>Some later stage is about the physical drones, swapping of
33 +firmware-malware-prone-USB-sticks, studying of various private LAN
34 +technologies, etc.</p>