𐑿𐑯𐑦𐑝𐑻𐑕𐑩𐑤 𐑚𐑱𐑕𐑦𐑒 𐑦𐑯𐑑𐑼𐑯𐑧𐑑
https://null.media/cryptogen/
| bencoding | ||
| cryptogen | ||
| off-system | ||
| .gitignore | ||
| exo.json | ||
| flake.lock | ||
| flake.nix | ||
| metadata.txt | ||
| mkfile | ||
| Morse_code_tree3.svg | ||
| ndn-narrow-waist.jpg | ||
| package.nix | ||
| README.gmi | ||
| shell.nix | ||
| ssb-narrow-waist.png | ||
# cryptogen > —it reaches out it reaches out it reaches out it reaches out—one hundred and thirteen times a second, nothing answers and it reaches out. > — cibola burn temporal oscillations expecting each other at repeating intervals. using memory to ask the right question at the right time. passing notes in-between classes. ## goals / challenge * develop a SCALABLE mobile adhoc network that can be used over a wide range of wireless bands and high-bandwidth transports including sneakernet * deploy a (test)net on SALVAGED hardware * connect a world-wide community of leftists (inclusive, not liberals) on an independent low-infrastructure wireless inter-network * define a transport abstraction that makes sense for overlay networking and physical broadcast links * refine transport concepts so they can handle large binary objects as well as the plain text meta channels * deploy physical mesh networks for testing * deploy a virtual mesh to link the test networks over the internet => cryptogen/ spec ## design principles ### trivial technology a network stack is going to be fairly complex, but it should be easy to understand. simple components that work together in a way that is easy to reason about. => //sunshinegardens.org/trivial-technology/ trivial technology ### long-term thinking how do we roll out an independent network without creating a lot of waste? how much of the existing hardware can be reused and modified to support information centric networking? how low can we make the minimum required specs? encryption has to be optional, but without signatures we can only work with self-certifying, static data. perhaps a simplified scheme can be devied that is suitable for transmitting short messages over human-mediated links without the overhead of cryptography. cryptogen traffic can be tunnled over arbitrary transports including fully DIY wireless transport using homebrew SDR or your everyday sneakernet. the idea is to make anything that can hold or transmit information into a condiut for the network. this does require making some trades when it comes to worst-case latency. => https://wiki.xxiivv.com/site/lasting.html lasting ### privacy there is some evidence that information-centric networks can make anonymous routing cheaper. these types of networks are potentially more private than IP to start with as well. * modified global passive adversary attack (reduced cost via mesh network localization) => https://named-data.net/publications/andana/ ANDaNA: Anonymous Named Data Networking Application => ./off-system/ owner-free filesystem reboot ### narrow waist this diagram shows how ip and named data networking organize their various layers around a simple common layer. this is the common protocol that ties the network together, any changes at this layer get more expensive as the network grows AND represent a breaking change. => ./ndn-narrow-waist.jpg ndn narrow waist secure scuttlebutt (SecSB) uses the same EBT strategy for gossip as described above. one interesting shared detail about NDN and SecSB is that the file format of the logs are actually the common piece that connects the high level applications of the network to the actual dissemination and storage protocols. one important consequence of this is that data replication is not coupled to the gossip network or any other repliction strategy. there are some proposals around SecSB that intend to take advantage of this, but cryptogen will put this feature at the forefront. => ./ssb-narrow-waist.png ssb narrow waist => https://pub.sunshinegardens.org/xjix/2019-May-Aljoscha-notes.pdf SecSB Paper (annotated) the narrow waist must address some important concerns: * how are messages interpreted? * how are messages and their components validated? * how can a sender be verified? * how does the network evolve as the relative security of its primitives changes? ### plain-text formats in addition to the software design, the file formats we choose and/or design should be plain text and easy to parse. not only for the sake of writing software, but to enable humans to participate in the network. ### threads => gemini://gemini.circumlunar.space/~shufei/phlog/20200915-Reply-X9-WalkawayNet.gmi 2020-09-15 - re: X9 WalkawayNet ### background ⁂ => https://sci-hub.tw/10.1109/IEEESTD.2016.7460875 802.15.4-2015 - IEEE Standard for Low-Rate Wireless Networks => https://doi.org/10.1109/SMARTSENS.2015.7873617 A practical evaluation for routing performance of BATMAN-ADV and HWMN in a Wireless Mesh Network test-bed ⁂ => https://www.youtube.com/watch?v=uvnP-_R-RYA NDN: Why Bother? => https://named-data.net/ named data networking => https://hackaday.io/project/164092-npr-new-packet-radio NPR New Packet Radio => https://qaul.net قول => https://yggdrasil-network.github.io/ yggdrasil => https://scuttlebutt.nz/ secure scuttlebutt => http://dominictarr.github.io/secret-handshake-paper/shs.pdf SHS - Tarr (2015) ⁂ => https://www.youtube.com/watch?v=uvnP-_R-RYA NDN: Why Bother? ⁂ => https://doi.org/10.1007/s11235-016-0209-8 A learning automata and clustering-based routing protocol for named data networking => https://doi.org/10.1016/S0129-6264(02)00077-X EMBEDDING OF FAULT-TOLERANT TREES IN THE JOSEPHUS CUBE => https://doi.org/10.1109/hpdc.2003.1210033 planetP => https://doi.org/10.1109/TNET.2002.803864 compressed bloom filters => https://doi.org/10.1109/SMARTSENS.2015.7873617 A practical evaluation for routing performance of BATMAN-ADV and HWMN in a Wireless Mesh Network test-bed => https://doi.org/10.1109/IEEESTD.2016.7460875 802.15.4-2015 - IEEE Standard for Low-Rate Wireless Networks => http://www.ijdcst.com/pdf/Compressed%20Bloom%20Filters%20for%20Secure%20Range%20Queries%20in%20Sensor%20Networks.pdf compressed bloom filters for secure range queries in sensor networks => https://asc.di.fct.unl.pt/~jleitao/pdf/srds07-leitao.pdf Epidemic Broadcast Trees - Leit ̃ao (2007) => https://lemire.me/blog/2019/12/19/xor-filters-faster-and-smaller-than-bloom-filters/ XOR filters => https://scuttlebot.io/more/protocols/shs.pdf shs => https://doi.org/10.1145/3357150.3357396 secure scuttlebutt ⁂ => http://man.cat-v.org/inferno/2/venti venti(2) => http://man.cat-v.org/inferno/6/plumbing plumbing(6) => http://man.cat-v.org/plan_9/6/venti venti(6) => https://en.wikipedia.org/wiki/HMAC HMAC => https://en.wikipedia.org/wiki/Magnet_URI_scheme magnet uri scheme ⁂ => https://codeburst.io/simpler-transducers-for-javascript-4d02a0926648 Simpler Transducers for JavaScript => http://okmij.org/ftp/continuations/PPYield/yield-pp.pdf Lazy v. Yield: Incremental, Linear Pretty-printing ⁂ => ssb:%HP6fjCSM+37ei+mA7DdWImgO1PeXC1ddtRqjuuEBNxQ=.sha256