Difference between revisions of "Cloakshield"
m (Protected "Cloakshield" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) |
|||
Line 1: | Line 1: | ||
− | <!--T: | + | <!--T:3--> |
+ | [[File:The_CloakShield_Logo.png|300px|thumb|rigth|The CloakShield Logo]] | ||
+ | CloakShield is the onion-routing implementation for CloakCoin's network traffic. | ||
+ | |||
+ | Traffic sent during the ENIGMA process is fully end-to-end encrypted and onion routed across the ENIGMA network. This encryption and onion routing is carried out by CloakShield. which uses ECDH (elliptical curve diffe hellman) to generate a shared AES (256 bit) encryption key, this key is then used for all communication with that node. | ||
+ | |||
+ | This means all network traffic in a ENIGMA transaction is impossible to monitor or trace. | ||
+ | <!--T:3--> | ||
[[File:Cloakshield_onion.png|300px|thumb|rigth|Cloakshield Onion Routing]] | [[File:Cloakshield_onion.png|300px|thumb|rigth|Cloakshield Onion Routing]] | ||
− | <!--T: | + | <!--T:4--> |
*Uses end-to-end encryption and provides secure communication | *Uses end-to-end encryption and provides secure communication | ||
Revision as of 00:46, 7 November 2017
CloakShield is the onion-routing implementation for CloakCoin's network traffic.
Traffic sent during the ENIGMA process is fully end-to-end encrypted and onion routed across the ENIGMA network. This encryption and onion routing is carried out by CloakShield. which uses ECDH (elliptical curve diffe hellman) to generate a shared AES (256 bit) encryption key, this key is then used for all communication with that node.
This means all network traffic in a ENIGMA transaction is impossible to monitor or trace.
- Uses end-to-end encryption and provides secure communication
- Designed to secure both ENIGMA and decentralized CloakCoin applications, and will ensure your data stays as private as possible.
- Allows the encrypted sending of data to one or more recipients.
- Allows any CloakCoin data objects to be serialized and transmitted securely to one or more recipients.
- Allows nodes to communicate indirectly to circumvent traffic analysis.
- Provides an onion routing network and you can use up to 25 hops!