Difference between revisions of "Cloakshield"

From CloakCoin Wiki
Jump to: navigation, search
m (Protected "Cloakshield" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)))
Line 1: Line 1:
<!--T:1-->
+
<!--T:3-->
 +
[[File:The_CloakShield_Logo.png|300px|thumb|rigth|The CloakShield Logo]]
 +
CloakShield is the onion-routing implementation for CloakCoin's network traffic.
 +
 
 +
Traffic sent during the ENIGMA process is fully end-to-end encrypted and onion routed across the ENIGMA network. This encryption and onion routing is carried out by CloakShield. which uses ECDH (elliptical curve diffe hellman) to generate a shared AES (256 bit) encryption key, this key is then used for all communication with that node.
 +
 
 +
This means all network traffic in a ENIGMA transaction is impossible to monitor or trace.
 +
<!--T:3-->
 
[[File:Cloakshield_onion.png|300px|thumb|rigth|Cloakshield Onion Routing]]
 
[[File:Cloakshield_onion.png|300px|thumb|rigth|Cloakshield Onion Routing]]
  
<!--T:2-->
+
<!--T:4-->
 
*Uses end-to-end encryption and provides secure communication
 
*Uses end-to-end encryption and provides secure communication
  

Revision as of 00:46, 7 November 2017

File:The CloakShield Logo.png
The CloakShield Logo

CloakShield is the onion-routing implementation for CloakCoin's network traffic.

Traffic sent during the ENIGMA process is fully end-to-end encrypted and onion routed across the ENIGMA network. This encryption and onion routing is carried out by CloakShield. which uses ECDH (elliptical curve diffe hellman) to generate a shared AES (256 bit) encryption key, this key is then used for all communication with that node.

This means all network traffic in a ENIGMA transaction is impossible to monitor or trace.

Cloakshield Onion Routing
  • Uses end-to-end encryption and provides secure communication
  • Designed to secure both ENIGMA and decentralized CloakCoin applications, and will ensure your data stays as private as possible.
  • Allows the encrypted sending of data to one or more recipients.
  • Allows any CloakCoin data objects to be serialized and transmitted securely to one or more recipients.
  • Allows nodes to communicate indirectly to circumvent traffic analysis.
  • Provides an onion routing network and you can use up to 25 hops!