Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Here's a link to the PDF[1] which contains some details about what this does and how it works. And here's an excerpt:

"We ended up with a simple protocol packet: the Lulzpacket. This simple packet contains information to verify there was no corruption during the transmission and a random code to pseudo-identify the packet. We define the addresses of nodes in the net by their ability to decrypt a given packet. Addresses are derived from the hashes of asymmetric encryption keys, Every radio node defines its own address by the pair of keys it has generated for itself and the addresses change if users choose to regenerate their keys. Each node only cares for what is being received. No hardware identification, no transmitter plain identification. only packets matter. transmissions are anonymous. whenever an address is needed to reply to a packet, it is encrypted inside the packet. Packets targeting specific addresses are encrypted and they must be decrypted by the private key only the target possesses. Anyone trying to spoof an address will not be able to decrypt the packet."

[1]:https://github.com/lulzlabs/AirChat/blob/master/Airchat-Rele...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: