/* Recherche */
This commit is contained in:
parent
0fdc778445
commit
4a898eb5e5
|
@ -137,6 +137,9 @@ Forschungsaufgaben verteilen, wo Erkenntnisse fehlen -> Herauskristallisierung d
|
|||
*
|
||||
== Recherche ==
|
||||
|
||||
'''Strukturvorlagen, Bausteine, Schlüsseltechnologien'''
|
||||
|
||||
|
||||
Vergleich bestehender Netzwerke (qualitative Analyse)und seiner Elemente
|
||||
|
||||
* Gnunet (https://gnunet.org/), ECRS: content encoding (), gap: protocoll for ananonymous routing (),GNS Gnu Name System: public key infrastructure PKI, SecuShare: Social Networking (http://www.secushare.org/), PSYC protocol: data migration
|
||||
|
@ -153,11 +156,11 @@ Vergleich bestehender Netzwerke (qualitative Analyse)und seiner Elemente
|
|||
Einzelne Elemente:
|
||||
|
||||
* OTR (https://otr.cypherpunks.ca/)
|
||||
* Askemos Protokoll (askemos.org),Vorlesungsscript Askemos & Rechtssicherheit (http://wwwm.htwk-leipzig.de/~m6bast/RIVL06/Wittenberger060607.pdf)Gutachten Askemos:(http://askemos.org/index.html?_v=search&_id=2963) Suche Askemos: (http://www.dwheeler.com/trusting-trust/), BALL(http://ball.askemos.org/?_v=search&_id=1251), wallet: bezahlen (http://ball.askemos.org/?_v=search&_id=1856 )Konzeption wallet (http://webfunds.org/guide/ricardian_implementations.html )
|
||||
* Dime Dark Internet Mail Environment: Mailprotocoll (http://www.eweek.com/security/former-head-of-lavabit-revives-dream-of-secure-email.html)
|
||||
* Peer to peer under the Hood (https://media.ccc.de/browse/congress/2005/22C3-461-en-peer_to_peer_under_the_hood.html)[Datei.pdf]
|
||||
* Invisible (http://invisible.im/): filetransfer and conversation without trace/evidence
|
||||
* Pisces: Anonymous Communication Using Social Networks (http://arxiv.org/pdf/1208.6326)
|
||||
* Askemos Protokoll: askemos.org, Vorlesungsscript Askemos & Rechtssicherheit: http://wwwm.htwk-leipzig.de/~m6bast/RIVL06/Wittenberger060607.pdf, Gutachten Askemos: http://askemos.org/index.html?_v=search&_id=2963, Suche Askemos: http://www.dwheeler.com/trusting-trust/, BALL: http://ball.askemos.org/?_v=search&_id=1251, Wallet (Bezahlen): http://ball.askemos.org/?_v=search&_id=1856, Konzeption Wallet: http://webfunds.org/guide/ricardian_implementations.html
|
||||
* Dime Dark Internet Mail Environment (Mailprotocoll): http://www.eweek.com/security/former-head-of-lavabit-revives-dream-of-secure-email.html
|
||||
* Peer to peer under the Hood: https://media.ccc.de/browse/congress/2005/22C3-461-en-peer_to_peer_under_the_hood.html, [Datei.pdf]
|
||||
* Invisible (filetransfer and conversation without trace/evidence): http://invisible.im/
|
||||
* Pisces (Anonymous Communication Using Social Networks): http://arxiv.org/pdf/1208.6326
|
||||
|
||||
Smartphone-Apps zum meshen:
|
||||
|
||||
|
@ -165,7 +168,22 @@ Smartphone-Apps zum meshen:
|
|||
* thelifenetwork (http://thelifenetwork.org/)
|
||||
* Servalproject (http://www.servalproject.org/),(http://developer.servalproject.org/dokuwiki/doku.php#serval_mesh)
|
||||
|
||||
https://guardianproject.info/2012/05/02/mobile-mesh-in-a-real-world-test/
|
||||
|
||||
Messenger:
|
||||
|
||||
Messenger im Vergleich durch Electronic Frontier Foundation (EFF): https://www.eff.org/de/secure-messaging-scorecard
|
||||
|
||||
Signal und RedPhone: https://whispersystems.org/blog/signal/
|
||||
TextSecure: https://whispersystems.org/
|
||||
TextSecure Security Check Ruhr Uni Bochum: https://eprint.iacr.org/2014/904.pdf
|
||||
ChatSecure mit dem Orbot-Plugin: https://chatsecure.org/
|
||||
Silent Text: https://silentcircle.com/
|
||||
Silent Phone :https://silentcircle.com/
|
||||
CryptoCat: https://crypto.cat/
|
||||
|
||||
Allgemeines:
|
||||
|
||||
https://guardianproject.info/2012/05/02/mobile-mesh-in-a-real-world-test/
|
||||
|
||||
== Links ==
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user