Human Proxies in Cryptographic Networks

Human Proxies in Cryptographic Networks

  • Uni Nurf
Publisher:BoD – Books on DemandISBN 13: 9783759740946ISBN 10: 3759740944

Paperback & Hardcover deals ―

Amazon IndiaGOFlipkart GOSnapdealGOSapnaOnlineGOJain Book AgencyGOBooks Wagon₹1,476Book ChorGOCrosswordGODC BooksGO

e-book & Audiobook deals ―

Amazon India GOGoogle Play Books GOAudible GO

* Price may vary from time to time.

* GO = We're not able to fetch the price (please check manually visiting the website).

Know about the book -

Human Proxies in Cryptographic Networks is written by Uni Nurf and published by BoD – Books on Demand. It's available with International Standard Book Number or ISBN identification 3759740944 (ISBN 10) and 9783759740946 (ISBN 13).

Human Proxies offer new directions to end-to-end encryption: End-A-to-End-Z encryption must be rethought when it turns out to be an End-B-to-End-Z encryption. And, Human Proxies raise questions that were neither answered by science, journalists nor the public. Regular Proxies on a network are forwarding Internet requests, e.g., to download a webpage. Also, in political and social settings a Proxy as an intermediate, deputy or representative with a similar function is given. Human Proxies now enable within the Encryption and Messenger Application Spot-On to choose a friend as a Human Proxy. The Spot-On program is a most modern and elaborated encryption suite available for several operation systems and provides many innovations in applied cryptography. It builds based on the Echo Protocol a cryptographic network, that is beyond Cryptographic Routing. With Human Proxies now a friend from the Messenger friends list sends out the chat message instead of the original sender. The construct of the "Inner Envelope" behind the Human Proxy function also creates new cryptographic challenges, provides plausible deniability to included nodes, and offers new perspectives in encryption, its analysis and decryption: As all messages in the network are encrypted, end-to-end encryption is new defined and gets with Human Proxies a potential second and plausible deniable start point. The essay in this book discusses some related aspects of Human Proxies and their referring's to encryption, networking, graph theory and comparable social and political processes of Proxies. This leads to a further general approach: Endpoints in Encryption are equipped by the application Spot-On with the vision of interoperability of endpoints in communications. | English & German language.