[Cryptography Team] SPADS Support

Robert robert.withers at pm.me
Wed Aug 31 02:09:53 UTC 2022


Cha-Ching for independent establishments offering services, like Escrow. They can make money. Not I, I am a non-profit, Callisto House preparing to file with the NC Secretary of State, after we all 4 of us review the bylaws I’m massaging. We have a President, myself, Will our architect is Vice-President, Claude my old neighbor from the Bull City Hood is Treasurer and Hector, our retired General zContractor and master of trades is our Secretary.

Callisto House :: decentralized mobile homeless solutions

The initial bylaws now to be replaced when we figure out the rules for a replicating non-profit bylaws for a Board/Council/Court of a squad of 9, my trinity of trinities. Three teams of Three. Three turns out to be a fine replica number, go to 9, 27, when under attack. Each Squad’s BCC has a parent with some power over. The top Squad, Callisto House is it’s own parent. All other Squads go through us, as franchise non-profits. Cha-Ching for us! All connected businesses must be Squads. Each Squad runs a ParrotTalk naming service, 9 formerly homeless in a development program housed in a mobile camp, housing 54. Moveable as shipping containers dropped on some semi-trailers and hauled to the next city that has a spot for us. Will is going to design all the buildings in the camp, 6 Squads, a DoublePlatoon. We gots plans on top of plans. They manage themselves and act politically as a unit. Leave it cleaner than you found it. I could go on. We did for 2 hours last night at another Squad session. Decisions made. Practical Politics.

Would it be possible to use UDP? I really don’t understand it. I was thinking to drop OpenCroquet on top of ParrotTalk, which uses UDP, I believe. and bring eventual capabilities to metaverse protocol. When I get them working again. 🐰

Finally, tomorrow is a web talk on

Intro to Asynchronous Programming with VAST.

https://www.meetup.com/ukstug/events/287330710/?_xtd=gqFyqTMxNDM1NzE3NaFwo2FwaQ&from=ref

It’s also Promises and eventual sending I believe. I’ll find out more tomorrow! Join us!

Have a good one; take it, light.
Kindly,
Robert

Sent from Callisto House :: decentralized homeless solutions

On Tue, Aug 30, 2022 at 21:43, Robert <robert.withers at pm.me> wrote:

> Bluetooth connections?
>
> Have a good one; take it, light.
> Kindly,
> Robert
>
> Sent from Callisto House :: decentralized homeless solutions
>
> On Tue, Aug 30, 2022 at 21:38, Robert <robert.withers at pm.me> wrote:
>
>> I was thinking about the crypto plugins. Would passing a full block of data into the plugins and let the plugin do the chunking, would that perform better? What about putting that on top of libsodium I think
>> It’s called, is it cross-platform? Would anyone have interest in tackling some of these elliptical-curve based algorithms ? That would be an advantage to a libsodium port. What we gonna do as a Cryptography team, solely in squeak, as that other performance moved away from ensuring it loaded and ran there. Is it to die on the Vine (the object in RemotePromises that holds a reference to an object Bob as he’s ephemerally passed to Amy on another machine) the introduction method of giving clients capabilities to have. Potentially leaky. Best to have tight control over the spreading of SqCaps.
>>
>> I think the answer is to bake the naming service and secure login into the ParrotTalk v3.8 protocol. As well, to ensure a no-man-in-middle attacks through shared third-party servers, doubly encrypt a pair of connections that link in a multitude of bridging servers. In this way, clients can anonymously login from behind any firewall to a tree-based distributed naming server. Then friend connections happen as presence is made known. Amy says hi to Bob and the naming service chooses a locally registered (cached?) bridging service, and tells Amy and Bob to hook up on Bridge number 9 under cryptographic call# (valid). The V3.8 protocol ought have ASN1 Messages to connect to Bridge ##9 and connect through the call#. However the link passes traffic back and forth between Amy and Bob. But it is in the clear in cross-transmission. So we have to handshake over the link and double-encrypt the channel. So v3.8 protocol is only usable by registered users of the network. Cha-Ching!
>>
>> Other thoughts are to make a multiport listener and drop a SPADS Operation onto each connection that pops up. Listen on 443, 943, any other many ports, concurrently. Do a Kafka, Hadoop, Cassandra, … move and have replicas of encrypted channels. Broadcast comms multipath. The objective is to build a fault-tolerant system that can handle concerted DDOS attacks and cut through it like butter as long as sockets can be used. Can they be created? That’s a different question.
>>
>> Anyhow, these are some of my thoughts where I’d like to take ParrotTalk.
>>
>> Please share your thoughts!
>>
>> Have a good one; keep it, light.
>> Kindly,
>> rabbit
>> . .. … ‘…^,^
>>
>> Sent from Callisto House :: decentralized homeless solutions
>>
>> On Tue, Aug 30, 2022 at 14:28, Robert <robert.withers at pm.me> wrote:
>>
>>> Yes, me too! The protocol state machines are still broken, having tried to separate out the protocol negation messages / states / events / actions. I’ll repair that next.
>>>
>>> SSL needs broken into SSL 1.0 operations and TLS 1.2 operations. And made functional in thunk stack framework. SSH needs ported entirely to think stack. So they need work. TLS 1.3 ( the latest ) needs Elliptical DH, which we do not have.
>>>
>>> Thanks!!
>>>
>>> Have a good one; take it, light.
>>> Kindly,
>>> Robert
>>>
>>> Sent from Callisto House :: decentralized homeless solutions
>>>
>>> On Tue, Aug 30, 2022 at 14:23, Ron Teitelbaum <ron at usmedrec.com> wrote:
>>>
>>>> Hi Rob,
>>>>
>>>> So glad you are doing well. Looking forward to seeing the results of all your hard work. Good luck with it!
>>>>
>>>> Keep it light :)
>>>>
>>>> Ron
>>>>
>>>> On Tue, Aug 30, 2022, 2:02 PM Robert <robert.withers at pm.me> wrote:
>>>>
>>>>> I am doing incredibly well. I finally opened up Squeak to work on this. I got those ParrotTalk frame probes working properly and tested. Now to test the actual selection…
>>>>>
>>>>> Have a good one; take it, light.
>>>>> Kindly,
>>>>> Robert
>>>>>
>>>>> Sent from Callisto House :: decentralized homeless solutions
>>>>>
>>>>> On Tue, Aug 30, 2022 at 13:54, Ron Teitelbaum <ron at usmedrec.com> wrote:
>>>>>
>>>>>> That sounds very cool Robert!
>>>>>>
>>>>>> Hope you are doing well!
>>>>>>
>>>>>> Ron
>>>>>>
>>>>>> On Tue, Aug 30, 2022 at 9:11 AM Robert <robert.withers at pm.me> wrote:
>>>>>>
>>>>>>> Currently installing ParrotTalk Protocol Selector (negotiation) and ParrotTalk V36, V37 & V38 FrameProbes.
>>>>>>>
>>>>>>> SSL 1.0, TLS 1.2 & SSH forthcoming. TLS 1.3? Need EDH.
>>>>>>>
>>>>>>> Have a good one; take it, light.
>>>>>>> Kindly,
>>>>>>> Robert
>>>>>>>
>>>>>>> Sent from Callisto House :: decentralized homeless solutions
>>>>>>>
>>>>>>> On Tue, Aug 30, 2022 at 08:46, Robert Withers <robert.withers at pm.me> wrote:
>>>>>>>
>>>>>>>> I have started shaping my new SPADS server, the
>>>>>>>> SecureProtocolAnalysisDetetectionSelection server. I have the
>>>>>>>> ProbingFrameBuffer using frame probes to analyze, detect and select the
>>>>>>>> operations for the discovered protocol. This SPADS server can come
>>>>>>>> online with all available functional protocols installed and probing
>>>>>>>> incoming traffic to detect and select the appropriate secure handshake
>>>>>>>> protocol based on the initial frame arriving. Then proceed with that
>>>>>>>> handshake to establish a secure connection.
>>>>>>>>
>>>>>>>> Currently non-functional and non-tested. I like to mold the clay before
>>>>>>>> making it sound.
>>>>>>>>
>>>>>>>> Get it working; get it working right; get it working fast. It is not yet
>>>>>>>> working, but it is molding well.
>>>>>>>>
>>>>>>>> ThunkStack-rabbit.40.mcz
>>>>>>>>
>>>>>>>> take it, light,
>>>>>>>> rabbit
>>>>>>>>
>>>>>>>> . .. ... '...^,^
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> Cryptography mailing list
>>>>>>> Cryptography at lists.squeakfoundation.org
>>>>>>> http://lists.squeakfoundation.org/cgi-bin/mailman/listinfo/cryptography
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.squeakfoundation.org/pipermail/cryptography/attachments/20220831/fd279a27/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 06c53bd5-3191-4582-9f17-78aedb900f97_image.jpeg
Type: image/png
Size: 11598 bytes
Desc: not available
URL: <http://lists.squeakfoundation.org/pipermail/cryptography/attachments/20220831/fd279a27/attachment-0001.png>


More information about the Cryptography mailing list