On Tue, Oct 29, 2019 at 01:08:50PM +1100, Zenaan Harkness wrote:
> On Tue, Oct 29, 2019 at 11:27:43AM +1100, Zenaan Harkness wrote:
> > Re randomized fan outs, here is a bit of a conundrum/ potential
> > opportunity - in the balance between various options available to us:
> >
> > - Does it
https://www.usatoday.com/story/news/politics/2019/10/28/abu-bakr-al-baghdadi-washington-post-austere-headline/2483340001/
Post correspondents have spent years in Iraq and Syria documenting
ISIS savagery, often at great personal risk. Unfortunately, a headline
written in haste to portray the
ZDNet: Top Linux developer on Intel chip security problems: 'They're not going
away.'.
https://www.zdnet.com/article/top-linux-developer-on-intel-chip-security-problems-theyre-not-going-away/
On Tue, Oct 29, 2019 at 11:27:43AM +1100, Zenaan Harkness wrote:
> Re randomized fan outs, here is a bit of a conundrum/ potential
> opportunity - in the balance between various options available to us:
>
> - Does it make sense for N0 to leave certain routing decisions to
> another node in
> implemented on a GPP. For prototyping on GPPs Matlab or Gnu Radio.
Please, something libre - there's a cornucopia to choose from, from
GNU R to GNU Octave, Scilab and Sagemath.
https://www.gnu.org/software/octave/
https://en.wikipedia.org/wiki/GNU_Octave
https://www.r-project.org/
> On Mon, Oct 28, 2019 at 05:19:08PM -0300, Punk - Stasi 2.0 wrote:
> > http://www.weidai.com/pipenet.txt
(I won't focus on errors in this paper, e.g.:
- the description of the return path packet encryption (dest to
origin) appears in error - but that's not interesting afaics.
-
Unlike encryption, which is generally practiced at intermediate wireless
communication protocol layers, implementing covert features requires
fundamental new tech at the PHY. In commercial stacks the PHY is invariably
implemented in hardware so a prototype (or a limited production) device
using
On Mon, Oct 28, 2019 at 05:19:08PM -0300, Punk - Stasi 2.0 wrote:
> On Mon, 28 Oct 2019 01:33:29 -0400
> grarpamp wrote:
>
> > Then you realize that again, a proper fill contract aware network
> > will auto detect and depeer any link that gets DoS,
>
> The 'literature' I've seen so far
Tsunami UDP Protocol
https://en.wikipedia.org/wiki/Tsunami_UDP_Protocol
The Tsunami UDP Protocol is a UDP-based protocol that was developed
for high-speed file transfer over network paths that have a high
bandwidth-delay product. Such protocols are needed because standard
TCP does not
===
Why Mark Zuckerberg covers his laptop's camera and micophrone
Is taping your laptop a necessary security precaution?
The chief executive officer of Facebook apparently thinks so.
https://www.csmonitor.com/Technology/2016/0623/Why-Mark-Zuckerberg-covers-his-laptop-s-camera-and-micophrone
Secure Reliable Transport
https://en.wikipedia.org/wiki/Secure_Reliable_Transport
Secure Reliable Transport is an open source video transport
protocol developed originally by Haivision. According to SRT
Alliance, an organisation that promotes the technology, it
optimises streaming
> https://en.wikipedia.org/wiki/UDP-based_Data_Transfer_Protocol
UDT began in 2001 as a successful attempt to overcome TCP protocol
overhead problems, especially over high speed networks.
UDT is built on top of User Datagram Protocol (UDP), adding
congestion control and reliability control
On Mon, Oct 28, 2019 at 10:51:14PM +1100, Zenaan Harkness wrote:
> A link between two peers B and C, may not naturally sustain the hoped
> for bandwidth.
>
> Active link management, and whole-of-interfaces management, may be
> required to achieve required b/w and latency stability, e.g.:
>
> -
A link between two peers B and C, may not naturally sustain the hoped
for bandwidth.
Active link management, and whole-of-interfaces management, may be
required to achieve required b/w and latency stability, e.g.:
- In the face of a node in a household with a single ADSL router
shared by
In the academic sphere the favored, publicly released, applications of
these technologies has been to improve spectrum utilization and jamming
resistance. However, these same technologies can also confir covertness.
While encryption can protect the content of communication covertness can
deny an
We must consider UDP/IP based protocols.
>From here:
https://en.wikipedia.org/wiki/Micro_Transport_Protocol
We find links to these:
https://en.wikipedia.org/wiki/Internet2
https://en.wikipedia.org/wiki/LEDBAT
Awesome!
Thank you for this clarity.
I had not grokked the below.
On Mon, Oct 28, 2019 at 01:33:29AM -0400, grarpamp wrote:
> > GPA was monitoring the upload, thus why GPA attacked X (and others in
> > their target set), and due to the [temp|full] link dropout (latency
> > trough), GPA IDs
https://www.youtube.com/watch?v=-_ymZbwy9TY
18 matches
Mail list logo