Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

🔐 Library for developing secure, decentralized, anonymous and quantum-resistant networks in Go language

License

NotificationsYou must be signed in to change notification settings

number571/go-peer

Repository files navigation

go-peer_logo.png

Anonymity and Security without compromise

GoReleaseLicenseBuildCoverageGoDocAwesome

GoReportCardActivityCommitsCode LinesCodeSizeDownloads

VKontakteTelegram

About project

Thego-peer library contains a large number of functions necessary to ensure the security of transmitted or stored information, as well as for the anonymity of nodes in the decentralized form. The library can be divided into several mainpkg modules:

  1. Thecrypto module represents cryptographic primitives: 1) asymmetric encryption, decryption; 2) asymmetric signing and signature verification; 3) symmetric encryption and decryption; 4) hashing; 5) key building; 6) computational problems (puzzles); 7) cryptographically stable pseudorandom number generator.
  2. Theclient module for encrypting and decrypting information with the attached data integrity (hash) and authentication (signature). It is a basic part of theanonymity module.
  3. Thenetwork module is a decentralized communication between network nodes. Allows you to delimit networks and give information a random appearance using the network key.
  4. Theanonymity module to ensure anonymity based on the fifth^ stage. Presents the main functions for working with the network on top of theanonymity/adapters andanonymity/queue modules.
  5. Theanonymity/queue module represents the generation, storage and issuance of encrypted messages every time the period specified by the application is reached. Uses theclient,message/layer1 andmessage/layer2 modules.

Examples of works in the directoriespkg/client/examples,pkg/network/examples,pkg/anonymity/examples,pkg/anonymity/queue/examples;

Coverage map

coverage.svg

Installation

$ go get github.com/number571/go-peer

Requirements

  1. Go version>= 1.23

Releases

All cmd programs are compiled for {amd64,arm64} ARCH and {windows,linux,darwin} OS as pattern =appname_arch_os. In total, one application is compiled into six versions. The entire list of releases can be found here:github.com/number571/go-peer/releases.

Dependencies

  1. Go librarygo.etcd.io/bbolt (used bypkg/storage/database)
  2. Go librarygolang.org/x/crypto (used bypkg/crypto/keybuilder)
  3. Go librarygopkg.in/yaml.v2 (used bypkg/encoding)
  4. Go librarygithub.com/cloudflare/circl (used bypkg/crypto/asymmetric)

Makefile

There are a number of dependencies that represent separate applications for providing additional information about the quality of the code. These applications are not entered into the project, but are loaded via themake install-deps command. The list of applications is as follows:

  1. golangci-lintgithub.com/golangci/golangci-lint/cmd/golangci-lintv1.60.0
  2. go-cover-treemapgithub.com/nikolaydubina/go-cover-treemap@v1.4.2

Theoretical works

  1. Theory of the structure of hidden systems
  2. Monolithic cryptographic protocol
  3. Abstract anonymous networks
  4. Decentralized key exchange protocol

Also, the composition of these works can be found in the bookThe general theory of anonymous communications (Ridero). This book can be purchased in a tangible form on theOzon andWildberries marketplaces. You can download the book in digital form for freehere.

How can you help the project

  1. Find bugs, vulnerabilities, and errors in the code
  2. Suggest improvements, ask questions, create issues
  3. Append new theoretical works or update current
  4. Create new secure / anonymity applications
  5. Popularize technology and applications

Library based applications

  1. Anonymous network «Hidden Lake»
  2. Console messenger «secpy-chat» based on Hidden Lake servicesHLT,HLE
  3. Generator of asymmetric keys «tkeygen» inPrivKey{hex},PubKey{hex} format
  4. Serverless and stateless password manager «tpmanager»

Star History

Star History Chart

License

Licensed under the MIT License. SeeLICENSE for the full license text.

⬆ back to top


[8]ページ先頭

©2009-2025 Movatter.jp