/* Recherche */

This commit is contained in:
Demos 2014-11-07 08:11:53 +00:00
parent 0fdc778445
commit 4a898eb5e5

View File

@ -137,6 +137,9 @@ Forschungsaufgaben verteilen, wo Erkenntnisse fehlen -> Herauskristallisierung d
*
== Recherche ==
'''Strukturvorlagen, Bausteine, Schlüsseltechnologien'''
Vergleich bestehender Netzwerke (qualitative Analyse)und seiner Elemente
* Gnunet (https://gnunet.org/), ECRS: content encoding (), gap: protocoll for ananonymous routing (),GNS Gnu Name System: public key infrastructure PKI, SecuShare: Social Networking (http://www.secushare.org/), PSYC protocol: data migration
@ -153,11 +156,11 @@ Vergleich bestehender Netzwerke (qualitative Analyse)und seiner Elemente
Einzelne Elemente:
* OTR (https://otr.cypherpunks.ca/)
* Askemos Protokoll (askemos.org),Vorlesungsscript Askemos & Rechtssicherheit (http://wwwm.htwk-leipzig.de/~m6bast/RIVL06/Wittenberger060607.pdf)Gutachten Askemos:(http://askemos.org/index.html?_v=search&_id=2963) Suche Askemos: (http://www.dwheeler.com/trusting-trust/), BALL(http://ball.askemos.org/?_v=search&_id=1251), wallet: bezahlen (http://ball.askemos.org/?_v=search&_id=1856 )Konzeption wallet (http://webfunds.org/guide/ricardian_implementations.html )
* Dime Dark Internet Mail Environment: Mailprotocoll (http://www.eweek.com/security/former-head-of-lavabit-revives-dream-of-secure-email.html)
* Peer to peer under the Hood (https://media.ccc.de/browse/congress/2005/22C3-461-en-peer_to_peer_under_the_hood.html)[Datei.pdf]
* Invisible (http://invisible.im/): filetransfer and conversation without trace/evidence
* Pisces: Anonymous Communication Using Social Networks (http://arxiv.org/pdf/1208.6326)
* Askemos Protokoll: askemos.org, Vorlesungsscript Askemos & Rechtssicherheit: http://wwwm.htwk-leipzig.de/~m6bast/RIVL06/Wittenberger060607.pdf, Gutachten Askemos: http://askemos.org/index.html?_v=search&_id=2963, Suche Askemos: http://www.dwheeler.com/trusting-trust/, BALL: http://ball.askemos.org/?_v=search&_id=1251, Wallet (Bezahlen): http://ball.askemos.org/?_v=search&_id=1856, Konzeption Wallet: http://webfunds.org/guide/ricardian_implementations.html
* Dime Dark Internet Mail Environment (Mailprotocoll): http://www.eweek.com/security/former-head-of-lavabit-revives-dream-of-secure-email.html
* Peer to peer under the Hood: https://media.ccc.de/browse/congress/2005/22C3-461-en-peer_to_peer_under_the_hood.html, [Datei.pdf]
* Invisible (filetransfer and conversation without trace/evidence): http://invisible.im/
* Pisces (Anonymous Communication Using Social Networks): http://arxiv.org/pdf/1208.6326
Smartphone-Apps zum meshen:
@ -165,7 +168,22 @@ Smartphone-Apps zum meshen:
* thelifenetwork (http://thelifenetwork.org/)
* Servalproject (http://www.servalproject.org/),(http://developer.servalproject.org/dokuwiki/doku.php#serval_mesh)
https://guardianproject.info/2012/05/02/mobile-mesh-in-a-real-world-test/
Messenger:
Messenger im Vergleich durch Electronic Frontier Foundation (EFF): https://www.eff.org/de/secure-messaging-scorecard
Signal und RedPhone: https://whispersystems.org/blog/signal/
TextSecure: https://whispersystems.org/
TextSecure Security Check Ruhr Uni Bochum: https://eprint.iacr.org/2014/904.pdf
ChatSecure mit dem Orbot-Plugin: https://chatsecure.org/
Silent Text: https://silentcircle.com/
Silent Phone :https://silentcircle.com/
CryptoCat: https://crypto.cat/
Allgemeines:
https://guardianproject.info/2012/05/02/mobile-mesh-in-a-real-world-test/
== Links ==