[Military AST]
MID GRADE MILITARY AST - MODED AES SERPERNT AND TWOFISH CASCADE. A WEB BEACON THEN, BOOT AND NUKE WORM BETWEEN LAYERS. EXTREME KEY AND CYPHER BLOCK SIZE, (IN AS MAY LAYERS A THE TERMINAL CAN HANDEL. 20 TIMES LAYERS EACH.) WITH HASHCHECK AUTO-RESTORE INDESTRUCTIBLE CODE.
[Military PGP] MODED PGP.
( IN AS MAY LAYERS A THE TERMINAL CAN HANDEL. 20
TIMES LAYERS EACH.) A WEB BEACON THEN, BOOT AND NUKE WORM BETWEEN LAYERS.
EXTREME KEY AND CYPHER BLOCK SIZE. WITH HASHCHECK AUTO-RESTORE INDESTRUCTIBLE CODE.
[SUPER COMPUTER AST]
SUPER COMPUTER AST - MODED AES
SERPERNT AND TWOFISH CASCADE, A WEB BEACON THEN, BOOT AND NUKE WORM BETWEEN LAYERS. SUPER COMPUTER KEY LENGTH AND CYPHER BLOCK SIZE, (AS MUCH A THE TERMINAL CAN HANDEL.
10 TIMES EACH PROTOCOL.) WITH HASHCHECK AUTO-RESTORE INDESTRUCTIBLE
CODE.
[SUPER COMPUTER PGP] MODED PGP.
( IN AS MAY LAYERS A THE TERMINAL CAN HANDEL. 20
TIMES LAYERS EACH.) A WEB BEACON THEN, BOOT AND NUKE WORM BETWEEN LAYERS.
SUPER COMPUTER KEY AND CYPHER BLOCK SIZE. WITH HASHCHECK AUTO-RESTORE INDESTRUCTIBLE CODE.
ON THE FLY AND ON THE FLY TRAFFIC.
[Military THORP CARD] - [Military AST] [Military PGP]
[SUPER COMPUTER THORP CARD] - [SUPER COMPUTER AST] & [SUPER COMPUTER PGP]
Anonymity and security with end to end layered
encryption.Round Robin, P2P, Onion Architecture. 3 nodes, expandable
according to math . Perfect forward secrecy. A secure authentication
scheme to be routed underneath. These are routed randomly. The duration
of the circuits are at a per packet cycle, a new circuit is open on a
per message basis. Only the sending node knows the circuit path taken
there and the way back. This uses a AES, SERPENT and TWOFISH cascade
as Symmetric Encryption for the the data passed. It also uses Extremely
long key RSA as asymmetric Encryption/Decryption of the address to the
next node. Only at the last node the Symmetric key for the Data on the
path in question. Circuits looped three times through THORP (as a 9 node
hop recommended).Udp AES encrypted packets with RSA encrypted
muti-layered onion ip header. last sending header contains a symmetric
AES key to unlock the AES encrypted bulk of the udp packet, As well as a
symmetric AES key to for the return bulk of the packet. sending and
receiving multiple node hops in each direction Determined by the sender.
Routes are only known by the sender. Node simply strips away RSA
encrypted Headers, Reads the next IP and sends. up until the last node
in which the AES key is reveled.
To be hard coded into a series of chips and onto a FIBER OPTIC
PCI-EXPRESS network interface card that directly interfaces onto the
THORP Network. 443 port, dipped in black quick dry epoxy to keep reverse
engineering, and water resistant. tamper proof.
No comments:
Post a Comment