Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for Human Proxies in Cryptographic Networks: Establishing a new direction to end-to-end encryption with the introduction of the inner envelope in the echo protocol

Human Proxies in Cryptographic Networks: Establishing a new direction to end-to-end encryption with the introduction of the inner envelope in the echo protocol

Sprog
Engelsk
Format
Kategori

Fakta

Human Proxies offer new directions to end-to-end encryption: End-A-to-End-Z encryption must be rethought when it turns out to be an End-B-to-End-Z encryption. And, Human Proxies raise questions that were neither answered by science, journalists nor the public. Regular Proxies on a network are forwarding Internet requests, e.g., to download a webpage. Also, in political and social settings a Proxy as an intermediate, deputy or representative with a similar function is given. Human Proxies now enable within the Encryption and Messenger Application Spot-On to choose a friend as a Human Proxy. The Spot-On program is a most modern and elaborated encryption suite available for several operation systems and provides many innovations in applied cryptography. It builds based on the Echo Protocol a cryptographic network, that is beyond Cryptographic Routing. With Human Proxies now a friend from the Messenger friends list sends out the chat message instead of the original sender. The construct of the "Inner Envelope" behind the Human Proxy function also creates new cryptographic challenges, provides plausible deniability to included nodes, and offers new perspectives in encryption, its analysis and decryption: As all messages in the network are encrypted, end-to-end encryption is new defined and gets with Human Proxies a potential second and plausible deniable start point. The essay in this book discusses some related aspects of Human Proxies and their referring's to encryption, networking, graph theory and comparable social and political processes of Proxies. This leads to a further general approach: Endpoints in Encryption are equipped by the application Spot-On with the vision of interoperability of endpoints in communications.

| English & German language.

© 2024 BoD - Books on Demand (E-bog): 9783759740946

Udgivelsesdato

E-bog: 26. juli 2024

Tags

    Andre kan også lide...

    Vælg dit abonnement

    • Over 1 million titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis

    Unlimited

    For dig som lytter og læser ubegrænset.

    159 kr. /måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    Dig + 1 familiemedlem2 konti

    179 kr. /måned

    Prøv gratis

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis