Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech The CryptNet

Status
Not open for further replies.
aKEDUiB.png
| Image Source and OOC |
Image Source: Self-made [Smiley taken from google search result]
Intent: A way for Jen to offer a network that is able to offer anonymity to its users and enhance the capabilities of the Slicer Community, while helping out the Criminal Underworld. The name "CryptNet" is a homage to the security network Jennifer used to help monitor back when The Red Ravens were still active. It is from that time where most of her cryptography skills come from.
Development Thread: N/A


| Roleplay Information |
Name: The CryptNet
Manufacturer: Phoenix and her [in the works] slicer team
Model: Version 1.1
Affiliation: Open Market [everyone is free to use it]
Modularity: No
Production: It is downloaded through the HoloNet
Classification: Anonymity Software/Browser


| Description |
Coded and developed by Phoenix and her slicer friends, CryptNet is a software that enables anonymous communication, by directing HoloNet traffic through a galaxy wide network of relays, consisting of volunteers from those who downloaded the program. This helps conceal the user’s location and usage from anyone conducting network surveillance or traffic monitoring.

This means that using CryptNet makes it harder (to near impossible) for slicers to remotely track the HoloNet activity of its targets. This includes webpage visits, online posting, instantaneous messaging, file sharing and other communication forms. The purpose of this is to easily protect personal privacy of its users and their ability to conduct confidential communication, by keeping their HoloNet activities from being monitored.

CryptNet also has the ability to hide HoloNet websites and servers, so only users of the CryptNet client can access them, these are called ghost services. Instead of using a typical HoloNet web address, the servers are accessed through its crypt address, which is then decoded by the CryptNet client and is able to route data to and from the ghost service. To access the ghost services, users use the CryptNet browser that when activated automatically starts the security processes of the CryptNet program, routing the traffic through its network. Unlike other HoloNet browsers, this one does not save privacy-sensitive data.

CryptNet also has a build in Messenger called [Crypt Chat], which lets users of the program chat with each other through the client, users of the Messenger is also able to form chat groups that can contain multiple people. Communication through the messenger undergoes the same crypt routing* and encryption as all other traffic that goes through the CryptNet.

It is important to remember that the CryptNet services doesn’t safe guard the device it is installed upon from getting sliced, but safeguards the data that it sends and receives. This is important as it puts responsibility on the user to know what they are doing, in order for them to stay safe.

*Crypt routing is the technique that ensures the promised privacy part of the CryptNet. When a data package is send it is encapsulated in layers of encryption. The encrypted data package is transmitted through a series of network nodes called relays that each add another layer of encryption to the data package. Each relay looks at just a single layer, uncovering the data's next destination (another relay that is chosen randomly or the final recipient). When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes.

Primary Source: N/A
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom