Refactor structs with some getters/setters - Peers part
	
		
			
	
		
	
	
		
	
		
			All checks were successful
		
		
	
	
		
			
				
	
				continuous-integration/drone/push Build is passing
				
			
		
		
	
	
				
					
				
			
		
			All checks were successful
		
		
	
	continuous-integration/drone/push Build is passing
				
			This commit is contained in:
		@@ -43,13 +43,14 @@ The server requires very few ressources and will run on any low cost single boar
 | 
			
		||||
\textffm{Meow} also provides an anonymizing transfer service very similar to the Tor Onion protocol, we call it the Matriochka protocol.
 | 
			
		||||
Any server can be used for building the transfer chain. 
 | 
			
		||||
Some of them might be marked as trusted.
 | 
			
		||||
Random delays and random payload padding might be set for each forwarding step, making the overall message tracking much more difficult, even for organizations having capabilities of global network surveillance.
 | 
			
		||||
Random delays and random size payload padding might be set for each forwarding step, making the overall message tracking much more difficult, even for organizations having capabilities of global network surveillance.
 | 
			
		||||
It is strongly advised to use trusted servers as your first node and message server (the one that holds your incoming messages).
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
\subsubsection{Message lookup obfuscation}
 | 
			
		||||
Your device will request for messages using conversation keys on a very regular basis to youy messaging(s) server(s).
 | 
			
		||||
Your device will request for messages using conversation keys on a very regular basis to your messaging(s) server(s).
 | 
			
		||||
The device will check for conversation keys for all your contacts. If you check that option, it will also check for hidden contact keys. 
 | 
			
		||||
In case of data interception on your device link, in order to prevent statistical analysis, every request might be answered with random data.
 | 
			
		||||
In case of data interception on your device link, in order to prevent statistical analysis, every request might be answered with size useful data (server's known server list).
 | 
			
		||||
Moreover, some random keys will be added to your requests list.
 | 
			
		||||
 | 
			
		||||
\subsubsection{Presence protocol for direct messaging TBC}
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user