diff options
author | Andrew Manning <tamanning@zoho.com> | 2016-08-28 08:01:37 -0400 |
---|---|---|
committer | GitHub <noreply@github.com> | 2016-08-28 08:01:37 -0400 |
commit | b752acdeef5c51315729c6503ea83f295e6f6449 (patch) | |
tree | 71b9d01cd6a636da0f6abb057d72d6e3af7ac0a0 /doc/zot.md | |
parent | f2ff6f394ba993bafd65d49939853f4dabb53dc3 (diff) | |
parent | ba224f382dfc02f187591a49b437d89973650e46 (diff) | |
download | volse-hubzilla-b752acdeef5c51315729c6503ea83f295e6f6449.tar.gz volse-hubzilla-b752acdeef5c51315729c6503ea83f295e6f6449.tar.bz2 volse-hubzilla-b752acdeef5c51315729c6503ea83f295e6f6449.zip |
Merge pull request #502 from anaqreon/docfix
Remove definite article before $Projectname in docs
Diffstat (limited to 'doc/zot.md')
-rw-r--r-- | doc/zot.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/zot.md b/doc/zot.md index 1e454e495..06c4d6083 100644 --- a/doc/zot.md +++ b/doc/zot.md @@ -57,7 +57,7 @@ In order to implement high performance communications, the data transfer format Bi-directional encryption is based on RSA 4096-bit keys expressed in DER/ASN.1 format using the PKCS#8 encoding variant, with AES-256-CBC used for block encryption of variable length or large items. -Some aspects of well known "federation protocols" (webfinger, salmon, activitystreams, portablecontacts, etc.) may be used in zot, but we are not tied to them and will not be bound by them. The $Projectname project is attempting some rather novel developments in decentralised communications and if there is any need to diverge from such "standard protocols" we will do so without question or hesitation. +Some aspects of well known "federation protocols" (webfinger, salmon, activitystreams, portablecontacts, etc.) may be used in zot, but we are not tied to them and will not be bound by them. $Projectname project is attempting some rather novel developments in decentralised communications and if there is any need to diverge from such "standard protocols" we will do so without question or hesitation. In order to create a globally unique ID, we will base it on a whirlpool hash of the identity URL of the origination node and a psuedo-random number, which should provide us with a 256 bit ID with an extremely low probability of collision (256 bits represents approximately 115 quattuorviginitillion or 1.16 X 10^77 unique numbers). This will be represented in communications as a base64url-encoded string. We will not depend on probabilities however and the ID must also be attached to a public key with public key cryptography used to provide an assurance of identity which has not been copied or somehow collided in whirlpool hash space. |