The go-peer library contains a large number of functions necessary to ensure the security of transmitted or stored information, as well as for the anonymity of nodes in the decentralized form. The library can be divided into several main pkg modules:
- The
cryptomodule represents cryptographic primitives: 1) asymmetric encryption, decryption; 2) asymmetric signing and signature verification; 3) symmetric encryption and decryption; 4) hashing; 5) key building; 6) computational problems (puzzles); 7) cryptographically stable pseudorandom number generator. - The
clientmodule for encrypting and decrypting information with the attached data integrity (hash) and authentication (signature). It is a basic part of theanonymitymodule. - The
networkmodule is a decentralized communication between network nodes. Allows you to delimit networks and give information a random appearance using the network key. - The
anonymitymodule to ensure anonymity based on the fifth^ stage. Presents the main functions for working with the network on top of theanonymity/adaptersandanonymity/queuemodules. - The
anonymity/queuemodule represents the generation, storage and issuance of encrypted messages every time the period specified by the application is reached. Uses theclient,message/layer1andmessage/layer2modules.
Examples of works in the directories pkg/client/examples, pkg/network/examples, pkg/anonymity/examples, pkg/anonymity/queue/examples;
$ go get github.com/number571/go-peer- Go version
>= 1.23
All cmd programs are compiled for {amd64, arm64} ARCH and {windows, linux, darwin} OS as pattern = appname_arch_os. In total, one application is compiled into six versions. The entire list of releases can be found here: github.com/number571/go-peer/releases.
- Go library go.etcd.io/bbolt (used by
pkg/storage/database) - Go library golang.org/x/crypto (used by
pkg/crypto/keybuilder) - Go library gopkg.in/yaml.v2 (used by
pkg/encoding) - Go library github.com/cloudflare/circl (used by
pkg/crypto/asymmetric)
There are a number of dependencies that represent separate applications for providing additional information about the quality of the code. These applications are not entered into the project, but are loaded via the make install-deps command. The list of applications is as follows:
- golangci-lint github.com/golangci/golangci-lint/cmd/golangci-lintv1.60.0
- go-cover-treemap github.com/nikolaydubina/[email protected]
- Theory of the structure of hidden systems
- Monolithic cryptographic protocol
- Abstract anonymous networks
- Decentralized key exchange protocol
Also, the composition of these works can be found in the book The general theory of anonymous communications (Ridero). This book can be purchased in a tangible form on the Ozon and Wildberries marketplaces. You can download the book in digital form for free here.
- Find bugs, vulnerabilities, and errors in the code
- Suggest improvements, ask questions, create issues
- Append new theoretical works or update current
- Create new secure / anonymity applications
- Popularize technology and applications
- Anonymous network Β«Hidden LakeΒ»
- Console messenger Β«secpy-chatΒ» based on Hidden Lake services
HLT,HLE - Generator of asymmetric keys Β«tkeygenΒ» in
PrivKey{hex},PubKey{hex}format - Serverless and stateless password manager Β«tpmanagerΒ»
Licensed under the MIT License. See LICENSE for the full license text.