Skip to content
This repository has been archived by the owner on Nov 5, 2021. It is now read-only.

Protocol Engineering Swarm #332

Merged
merged 1 commit into from Dec 12, 2018
Merged

Protocol Engineering Swarm #332

merged 1 commit into from Dec 12, 2018

Conversation

oskarth
Copy link
Contributor

@oskarth oskarth commented Dec 1, 2018

RFC.

@oskarth oskarth changed the title [WIP] Protocol Engineering Swarm Protocol Engineering Swarm Dec 5, 2018
Copy link
Contributor

@mandrigin mandrigin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks good!


## Goals

1. Create a set of open protocol(s) for secure messaging that reflects our
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

a small inconsistency: "secure messaging" here, "communication protocol" in other places

requires, what it provides, under what threat models, and with what
trade-offs.

5. Enable implementation of clients to participate in the Stauts Network, and
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

typo: should be "Status Network"

5. Reasonable Bandwidth
6. Adaptable Anonymity
7. Scalable
8. No specialized Services
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would still want to add that it should be designed with mobile in mind: internet connection is unstable an mostly missing, CPU resources are limited, we can't stay in background for a long time and we are behind very strict firewalls that makes it hard for NAT to pass through.

Maybe it is already incorporated in these requirements, but I just want to reiterate :-P

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good point, w3f/messaging#18

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is NAT a problem for UDP in general?

I'm assuming mixnet nodes must be specialized into "relays" and "clients" for numerous reasons.

likely the scope will be limited, at least initially, to ensure solid progress
in the most fruitful direction and avoid scope creep.

Expect the precise scope and requirements to change soemwhat as we get more
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

typo, should be "somewhat"

– as well as anonymity/secure p2p specific (Tor, Briar, etc)
2. Sketch out rough layers of concerns
3. Team formation and collaboration with others in the space
4. Do write-up of lessons learned so far
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would love a presentation about lessons learned and the landscape on the Town Hall or a separate meeting, sounds super interesting to me (though I'm not ready to dig through all the papers myself atm).

@oskarth
Copy link
Contributor Author

oskarth commented Dec 10, 2018

Thanks! Addressed comments.

@oskarth oskarth merged commit 986bf49 into master Dec 12, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants