Difference between revisions of "Cloakshield"

From CloakCoin Wiki
Jump to: navigation, search
(Removed page from translation)
Line 1: Line 1:
[[File:Cloakshield.png|150px|thumb|rigth|The CloakShield Logo]]
+
<languages/>
 +
[[File:Cloakshield.png|150px|thumb|rigth|<translate>The CloakShield Logo</translate>]]
 +
<translate>
 
CloakShield is the onion-routing implementation for CloakCoin's network traffic.
 
CloakShield is the onion-routing implementation for CloakCoin's network traffic.
  
Line 5: Line 7:
  
 
Combined with [[Enigma]], it is designed for privacy, utilizing up to 25 hops using symmetric RSA encryption backed by an ECDH key exchange.
 
Combined with [[Enigma]], it is designed for privacy, utilizing up to 25 hops using symmetric RSA encryption backed by an ECDH key exchange.
This means all network traffic in a ENIGMA transaction is impossible to monitor or trace.
+
This means all network traffic in a ENIGMA transaction is impossible to monitor or trace.</translate>
  
  
Line 11: Line 13:
  
  
[[File:Cloakshield_onion.png|300px|thumb|rigth|Cloakshield Onion Routing]]
+
[[File:Cloakshield_onion.png|300px|thumb|rigth|<translate>Cloakshield Onion Routing</translate>]]
  
*Uses end-to-end encryption and provides secure communication
+
<translate>*Uses end-to-end encryption and provides secure communication
  
 
*Designed to secure both ENIGMA and decentralized CloakCoin applications, and will ensure your data stays as private as possible.
 
*Designed to secure both ENIGMA and decentralized CloakCoin applications, and will ensure your data stays as private as possible.
Line 27: Line 29:
  
 
Page under construction!
 
Page under construction!
 +
</translate>

Revision as of 01:52, 18 October 2018

Other languages:
English • ‎Tiếng Việt • ‎Türkçe • ‎español • ‎português • ‎中文(中国大陆)‎
The CloakShield Logo

CloakShield is the onion-routing implementation for CloakCoin's network traffic.

CloakShield utilizes end-to-end encryption and delivers secure communication, allowing nodes to circumvent traffic analysis.

Combined with Enigma, it is designed for privacy, utilizing up to 25 hops using symmetric RSA encryption backed by an ECDH key exchange. This means all network traffic in a ENIGMA transaction is impossible to monitor or trace.



Cloakshield Onion Routing
  • Uses end-to-end encryption and provides secure communication
  • Designed to secure both ENIGMA and decentralized CloakCoin applications, and will ensure your data stays as private as possible.
  • Allows the encrypted sending of data to one or more recipients.
  • Allows any CloakCoin data objects to be serialized and transmitted securely to one or more recipients.
  • Allows nodes to communicate indirectly to circumvent traffic analysis.
  • Provides an onion routing network and you can use up to 25 hops!


Page under construction!