ZeroNet is an open source peer-to-peer network that uses BitTorrent technologies to deliver content of sites to their visitors. It also uses Bitcoin cryptography to sign published data.
If you visit some ZeroNet resource you become a hoster of this resource, so files are distributed between many nodes in the network.
There are no dedicated servers, no censorship and no hosting costs.
You can create a new ZeroNet site by just one click. Many services are available like mail, blogs, forums and chat rooms.
ZeroNet uses Namecoin as a decentralized domain system.
https://zeronet.io/
#infosec #darknet #cryptography
If you visit some ZeroNet resource you become a hoster of this resource, so files are distributed between many nodes in the network.
There are no dedicated servers, no censorship and no hosting costs.
You can create a new ZeroNet site by just one click. Many services are available like mail, blogs, forums and chat rooms.
ZeroNet uses Namecoin as a decentralized domain system.
https://zeronet.io/
#infosec #darknet #cryptography
A nice free book on cryptography.
http://web.engr.oregonstate.edu/~rosulekm/crypto/
#book #cryptography #infosec
http://web.engr.oregonstate.edu/~rosulekm/crypto/
#book #cryptography #infosec
Typically, hand-computed ciphers are very simple and easy to break. They are interesting only from a historical perspective.
LC4 (ElsieFour) is different. This low-tech stream cipher is well designed to be difficult to break. The cipher allows to encrypt and decrypt messages without any computing device, using only pen and paper.
A simple handmade wooden appliance can greatly simplify the routines required for encryption and decryption.
LC4 can be used not only to encrypt a message but also to authenticate the sender.
#math #cryptography #lowtech
LC4 (ElsieFour) is different. This low-tech stream cipher is well designed to be difficult to break. The cipher allows to encrypt and decrypt messages without any computing device, using only pen and paper.
A simple handmade wooden appliance can greatly simplify the routines required for encryption and decryption.
LC4 can be used not only to encrypt a message but also to authenticate the sender.
#math #cryptography #lowtech