Skip to content

Latest commit

 

History

History
136 lines (107 loc) · 8 KB

README.md

File metadata and controls

136 lines (107 loc) · 8 KB

go-peer_logo.png

Anonymity and Security without compromise

Go Release License Build Coverage GoDoc Awesome

GoReportCard Activity Commits Code Lines CodeSize Downloads

VKontakte

About project

The go-peer library contains a large number of functions necessary to ensure the security of transmitted or stored information, as well as for the anonymity of nodes in the decentralized form. The library can be divided into several main pkg modules:

  1. The crypto module represents cryptographic primitives: 1) asymmetric encryption, decryption; 2) asymmetric signing and signature verification; 3) symmetric encryption and decryption; 4) hashing; 5) key building; 6) computational problems (puzzles); 7) cryptographically stable pseudorandom number generator.
  2. The client module for encrypting and decrypting information with the attached data integrity (hash) and authentication (signature). It is a basic part of the network/anonymity module.
  3. The network module is a decentralized communication between network nodes. Allows you to delimit networks and give information a random appearance using the network key.
  4. The network/anonymity module to ensure anonymity based on the fifth^ stage. Presents the main functions for working with the network on top of the network and network/anonymity/queue modules.
  5. The network/anonymity/queue module represents the generation, storage and issuance of encrypted messages every time the period specified by the application is reached. Uses the client, client/message and network/message modules.

Examples of works in the directories pkg/client/examples, pkg/network/examples, pkg/network/anonymity/examples, pkg/network/anonymity/queue/examples;

Coverage map

coverage.svg

Installation

$ go get github.com/number571/go-peer

Requirements

  1. Go version >= 1.23

Releases

All cmd programs are compiled for {amd64, arm64} ARCH and {windows, linux, darwin} OS as pattern = appname_arch_os. In total, one application is compiled into six versions. The entire list of releases can be found here: github.com/number571/go-peer/releases.

Dependencies

  1. Go library go.etcd.io/bbolt (used by pkg/storage/database)
  2. Go library golang.org/x/crypto (used by pkg/crypto/keybuilder)
  3. Go library gopkg.in/yaml.v2 (used by pkg/encoding)
  4. Go library github.com/cloudflare/circl (used by pkg/crypto/asymmetric)

Makefile

There are a number of dependencies that represent separate applications for providing additional information about the quality of the code. These applications are not entered into the project, but are loaded via the make install-deps command. The list of applications is as follows:

  1. golangci-lint github.com/golangci/golangci-lint/cmd/golangci-lintv1.60.0
  2. go-cover-treemap github.com/nikolaydubina/go-cover-treemap@v1.4.2

Theoretical works

  1. Theory of the structure of hidden systems
  2. Monolithic cryptographic protocol
  3. Abstract anonymous networks
  4. Decentralized key exchange protocol

Also, the composition of these works can be found in the book The general theory of anonymous communications (Ridero). This book can be purchased in a tangible form on the Ozon and Wildberries marketplaces. You can download the book in digital form for free here.

How can you help the project

  1. Find bugs, vulnerabilities, and errors in the code
  2. Suggest improvements, ask questions, create issues
  3. Append new theoretical works or update current
  4. Create new secure / anonymity applications
  5. Popularize technology and applications

Library based applications

  1. Anonymous network «Hidden Lake»
  2. Console messenger «secpy-chat» based on Hidden Lake services HLT, HLE
  3. Generator of asymmetric keys «tkeygen» in PrivKey{hex}, PubKey{hex} format
  4. Serverless and stateless password manager «tpmanager»

Star History

Star History Chart

License

Licensed under the MIT License. See LICENSE for the full license text.

⬆ back to top