What is the best approach ( network topology ) ? #1
Labels
help wanted
Extra attention is needed
open problem
A problem , with no solution so far!
question
Further information is requested
What is the motivation behind this project?
It's not over, what Assange started...
The original Wikileaks was shut down due to Single Point Of Failure (SPOF)...
Because it needed to rely on a single entity, a single host, a brave man, who was willing to put himself in danger.
It's true, that they have the resources , they can frame anyone standing to shout the truth...
But we have imagination!
We can make the tools to take back our sovereignty ( so said Amir Taaki) .
As
Bitcoin
,TOR
,BitTorrent
,.. etc, proved that our future is decentralized, Decentralization for our systems is a solution for preventing such SPOFs...But will this be enough?
That is going to be the central question.
In this repository , the main goal is to achieve such topology of the network that it'll be safe to say it's secure for leaking information after all.
What are the main issues?
Suppose we come up with an idea which merely solves the SPOF problem, but it brings another problem:
I will mark this issue as an open problem and help wanted , and I need your help/ideas in developing this project..
Regards:
Tadavomnist:Behrad.B
The text was updated successfully, but these errors were encountered: