Differences

This shows you the differences between two versions of the page.

Link to this comparison view

content:tech:security_framework [28/05/2013 16:22]
Andrew Bettison grab text from the NAF1 Final Report
content:tech:security_framework [26/09/2013 13:31] (current)
Andrew Bettison more Rhizome security features
Line 10: Line 10:
   * [[MDP]] natively supports unsigned clear, signed clear, and signed encrypted payloads using the destination and origin [[SID]]s as keys;   * [[MDP]] natively supports unsigned clear, signed clear, and signed encrypted payloads using the destination and origin [[SID]]s as keys;
   * the Serval routing protocol uses randomly generated [[SID]]s, not MAC or IMSI device addresses, making it difficult for eavesdroppers to link a person to a handset;   * the Serval routing protocol uses randomly generated [[SID]]s, not MAC or IMSI device addresses, making it difficult for eavesdroppers to link a person to a handset;
-  * [[Rhizome]] can encrypt its payloads (independently of MDP encryption), authenticate authorship, and also supports anonymous and fully deniable authorship.+  * [[Rhizome]] uses a strong hash (digest) algorithm to prevent tampering with the contents of files that it distributes; 
 +  * [[Rhizome]] uses cryptographic signatures on all manifests to prevent tampering with file meta data and identity; 
 +  * [[Rhizome]] can encrypt its payloads (independently of MDP encryption)
 +  * [[Rhizome]] allows anonymous and fully deniable authorship.

Login