Changes To Action Plan
Not logged in
     5      5   storage projects try to figure out, how to store a vast amount of Silktorrent
     6      6   packets, the tar-files that have their cryptographic hash as their file name,
     7      7   so that the usage of various computing resources is minimized. The tunnels
     8      8   projects try to figure out, how to copy those tar-files from one computer to
     9      9   another at the presence of various adversaries, including censors and
    10     10   assassins. The search projects try to figure out, how to find the tar-files or
    11     11   sets of tar-files at the presence of various adversaries, including censors,
    12         -<a href="http://www.projecthoneypot.org/">honeypots</a>,
           12  +assassins, <a href="http://www.projecthoneypot.org/">honeypots</a>,
    13     13   <a href="./raw/The_Byzantine_Generals_Problem_byLESLIE_LAMPORT_and_ROBERT_SHOSTAK_and_MARSHALL_PEASE.pdf?name=baf15d022e30fd2dfaa7a35f7789d5ed1823413f">lying</a>
    14     14   Silktorrent servers/nodes.</div>
    15     15   
    16     16   <div><br>
    17     17   </div>
    18     18   
    19     19   <div><br>