net using net2o
play

net : Using net2o reinventing the internet Bernd Paysan EuroForth - PowerPoint PPT Presentation

Motivation Layer 7: Applications Get it Try it net : Using net2o reinventing the internet Bernd Paysan EuroForth 2016, Konstanz/Reichenau Motivation Layer 7: Applications Get it Try it Outline Motivation Layer 7: Applications Basic


  1. Motivation Layer 7: Applications Get it Try it net : Using net2o reinventing the internet Bernd Paysan EuroForth 2016, Konstanz/Reichenau

  2. Motivation Layer 7: Applications Get it Try it Outline Motivation Layer 7: Applications Basic Frameworks Get it Try it

  3. Motivation Layer 7: Applications Get it Try it 3 years after Snowden What happend to change the world: Politics Manhatten project to fjnd “the golden key”? Users don’t want their dick picks be watched and use DuckDuckGo and encrypted chat Software NSA backdoors have been refjtted by attackers (Juniper) Solutions net2o starts to be increasingly usable

  4. Motivation Layer 7: Applications Get it Try it 3 years after Snowden What happend to change the world: Politics Manhatten project to fjnd “the golden key”? Users don’t want their dick picks be watched and use DuckDuckGo and encrypted chat Software NSA backdoors have been refjtted by attackers (Juniper) Solutions net2o starts to be increasingly usable

  5. Motivation Layer 7: Applications Get it Try it 3 years after Snowden What happend to change the world: Politics Manhatten project to fjnd “the golden key”? Users don’t want their dick picks be watched and use DuckDuckGo and encrypted chat Software NSA backdoors have been refjtted by attackers (Juniper) Solutions net2o starts to be increasingly usable

  6. Motivation Layer 7: Applications Get it Try it 3 years after Snowden What happend to change the world: Politics Manhatten project to fjnd “the golden key”? Users don’t want their dick picks be watched and use DuckDuckGo and encrypted chat Software NSA backdoors have been refjtted by attackers (Juniper) Solutions net2o starts to be increasingly usable

  7. Motivation Layer 7: Applications Get it Try it 3 years after Snowden What happend to change the world: Politics Manhatten project to fjnd “the golden key”? Users don’t want their dick picks be watched and use DuckDuckGo and encrypted chat Software NSA backdoors have been refjtted by attackers (Juniper) Solutions net2o starts to be increasingly usable

  8. Motivation symmetric authenticated encryption+hash+prng with Keccak, trie) 6. Distributed data (fjles) and distributed metadata (prefjx hash 5. Stack–oriented tokenized command language 4. Timing driven delay minimizing fmow control onion routing camoufmage probably with AES symmetric block encryption with Threefjsh 3. Ephemeral key exchange and signatures with Ed25519, Layer 7: Applications memory bufgers net2o consists of the following 6 layers (implemented bottom up): net2o in a nutshell Try it Get it 7. Apps in a sandboxed environment for displaying content 2. Path switched packets with 2 n size writing into shared

  9. Motivation symmetric authenticated encryption+hash+prng with Keccak, trie) 6. Distributed data (fjles) and distributed metadata (prefjx hash 5. Stack–oriented tokenized command language 4. Timing driven delay minimizing fmow control onion routing camoufmage probably with AES symmetric block encryption with Threefjsh 3. Ephemeral key exchange and signatures with Ed25519, Layer 7: Applications memory bufgers net2o consists of the following 6 layers (implemented bottom up): net2o in a nutshell Try it Get it 7. Apps in a sandboxed environment for displaying content 2. Path switched packets with 2 n size writing into shared

  10. Motivation symmetric authenticated encryption+hash+prng with Keccak, trie) 6. Distributed data (fjles) and distributed metadata (prefjx hash 5. Stack–oriented tokenized command language 4. Timing driven delay minimizing fmow control onion routing camoufmage probably with AES symmetric block encryption with Threefjsh 3. Ephemeral key exchange and signatures with Ed25519, Layer 7: Applications memory bufgers net2o consists of the following 6 layers (implemented bottom up): net2o in a nutshell Try it Get it 7. Apps in a sandboxed environment for displaying content 2. Path switched packets with 2 n size writing into shared

  11. Motivation symmetric authenticated encryption+hash+prng with Keccak, trie) 6. Distributed data (fjles) and distributed metadata (prefjx hash 5. Stack–oriented tokenized command language 4. Timing driven delay minimizing fmow control onion routing camoufmage probably with AES symmetric block encryption with Threefjsh 3. Ephemeral key exchange and signatures with Ed25519, Layer 7: Applications memory bufgers net2o consists of the following 6 layers (implemented bottom up): net2o in a nutshell Try it Get it 7. Apps in a sandboxed environment for displaying content 2. Path switched packets with 2 n size writing into shared

  12. Motivation symmetric authenticated encryption+hash+prng with Keccak, trie) 6. Distributed data (fjles) and distributed metadata (prefjx hash 5. Stack–oriented tokenized command language 4. Timing driven delay minimizing fmow control onion routing camoufmage probably with AES symmetric block encryption with Threefjsh 3. Ephemeral key exchange and signatures with Ed25519, Layer 7: Applications memory bufgers net2o consists of the following 6 layers (implemented bottom up): net2o in a nutshell Try it Get it 7. Apps in a sandboxed environment for displaying content 2. Path switched packets with 2 n size writing into shared

  13. Motivation symmetric authenticated encryption+hash+prng with Keccak, trie) 6. Distributed data (fjles) and distributed metadata (prefjx hash 5. Stack–oriented tokenized command language 4. Timing driven delay minimizing fmow control onion routing camoufmage probably with AES symmetric block encryption with Threefjsh 3. Ephemeral key exchange and signatures with Ed25519, Layer 7: Applications memory bufgers net2o consists of the following 6 layers (implemented bottom up): net2o in a nutshell Try it Get it 7. Apps in a sandboxed environment for displaying content 2. Path switched packets with 2 n size writing into shared

  14. Motivation symmetric authenticated encryption+hash+prng with Keccak, trie) 6. Distributed data (fjles) and distributed metadata (prefjx hash 5. Stack–oriented tokenized command language 4. Timing driven delay minimizing fmow control onion routing camoufmage probably with AES symmetric block encryption with Threefjsh 3. Ephemeral key exchange and signatures with Ed25519, Layer 7: Applications memory bufgers net2o consists of the following 6 layers (implemented bottom up): net2o in a nutshell Try it Get it 7. Apps in a sandboxed environment for displaying content 2. Path switched packets with 2 n size writing into shared

  15. Motivation Layer 7: Applications Get it Try it Objectives net2o’s design objectives are replace the entire stack • lightweight, fast, scalable • easy to implement • secure • media capable • works as overlay on current networks (UDP/IP), but can

  16. Motivation Layer 7: Applications Get it Try it Objectives net2o’s design objectives are replace the entire stack • lightweight, fast, scalable • easy to implement • secure • media capable • works as overlay on current networks (UDP/IP), but can

  17. Motivation Layer 7: Applications Get it Try it Objectives net2o’s design objectives are replace the entire stack • lightweight, fast, scalable • easy to implement • secure • media capable • works as overlay on current networks (UDP/IP), but can

  18. Motivation Layer 7: Applications Get it Try it Objectives net2o’s design objectives are replace the entire stack • lightweight, fast, scalable • easy to implement • secure • media capable • works as overlay on current networks (UDP/IP), but can

  19. Motivation Layer 7: Applications Get it Try it Objectives net2o’s design objectives are replace the entire stack • lightweight, fast, scalable • easy to implement • secure • media capable • works as overlay on current networks (UDP/IP), but can

  20. Motivation Layer 7: Applications Get it Try it Objectives net2o’s design objectives are replace the entire stack • lightweight, fast, scalable • easy to implement • secure • media capable • works as overlay on current networks (UDP/IP), but can

  21. Motivation Layer 7: Applications Get it Try it Basic Frameworks PKI Create, import, and exchange keys Named fjle copy For testing only Vault A container for encrypted data without metadata exposure DHT Query key/value pairs (keys are pubkeys or hash keys) Chat Instant messaging 1:1 or in chat groups Version control system For larger/structured content Sync to synchronize your computers (RSN) Audio/Video Chat Real time data streaming (RSN)

  22. Motivation Layer 7: Applications Get it Try it Basic Frameworks PKI Create, import, and exchange keys Named fjle copy For testing only Vault A container for encrypted data without metadata exposure DHT Query key/value pairs (keys are pubkeys or hash keys) Chat Instant messaging 1:1 or in chat groups Version control system For larger/structured content Sync to synchronize your computers (RSN) Audio/Video Chat Real time data streaming (RSN)

  23. Motivation Layer 7: Applications Get it Try it Basic Frameworks PKI Create, import, and exchange keys Named fjle copy For testing only Vault A container for encrypted data without metadata exposure DHT Query key/value pairs (keys are pubkeys or hash keys) Chat Instant messaging 1:1 or in chat groups Version control system For larger/structured content Sync to synchronize your computers (RSN) Audio/Video Chat Real time data streaming (RSN)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend