Hey, kudos!
You don't run arbitrary scripts either!

My apologies for the JS on this page…
it's prettify.js for syntax highlighting
in code blocks. I've added one line of
CSS for you; the rest of this site
should work fine.

      ♥Ⓐ isis

code.

Other articles


  1. Some Ideas For Darknet Implementation, Encryption, and Integration


    Notes on Reading Private Communication Through a Network of Trusted Connections: The Dark Freenet (click for pdf)

    I learned that data encryption within a Freenet (not necessarily dark) is often restricted to two types: CHKs and SSKs (6). As a basic measure against profiling and traffic analysis, documents are relegated to set sizes — 32kb for CHKs (Content Hash Key, a type of symmetric cryptographic key generation in which the data includes the means of generating the key) and 1kb for SSKs (Signed Subspace Key, i.e. ain information publisher has an asymmetric key-pair used to sign documents within a free(/dark)net subspace. Any larger documents are split up into smaller ones to maintain this size imperative. Also, as anyone who has used any type of P2P net has experienced, search functions within the network are limited, but I just learned the reason why: directories aren’t plaintext, but are (usually) MD5 hashes of locations. So, unless you know the precise location of the document or information you’re trying to access, and thus can generate the matching MD5 hash, you can’t even discover that the directory is there. Kind of like how you can’t access an .onion site unless you already know the address. This was making my brain itch a little bit, but I’m good now.

    Fuzzy Logic Operations within Computerized Social Networks applied to Darknet Operations:

    Instead [of Stanley Milgram’s small-world model], we use a method which draws off the small world models of Jon Kleinberg. The routing we perform is purely greedy: at each step, the desirability of the neighbors is ordered by the proximity of their identities to the route key K (seen as floating point number between 0 and 1 with periodic boundary). The question then becomes one of trying affect the randomized assignment of identities such that this becomes an efficient way of routing. For routing to be efficient Kleinberg’s results show that certain relation between the frequency of connections of different lengths (with respect to the identities) must be present, so our goal is to, to the degree that it is possible, assign identities so that this holds. The method we have chosen for doing this is a development of that described in [“Distributed routing in small-world networks” by O. Sandberg].” (7)

    Basically, the propinquity of your friend Miss X to her friend Sir Y’s node which contains the data you’re attempting to access, this proximity is systematized via a fuzzy logic operator which outputs between a range of [0,1], 0 representing no connections to the desired node, and 1 representing the desired node. Thus, an informational subgraph is overlayed onto the subgraph of the world’s social network which contains the portion of your social network connected to the darknet.

    caption id=”” align=”alignleft” width=”450” caption=”Fuzzy Logic Explained!”[/caption]

    Sorry for the fuzzy logic geek out…I thought it was a cool application in informational network analysis.

    In our implementation nodes …

    read more

Page 1 / 1

blogroll

social