Update documentation

This commit is contained in:
2025-10-22 20:07:15 +00:00
parent 271f95dbf9
commit 55e341ec0f
5 changed files with 8 additions and 8 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 72 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 84 KiB

View File

@@ -1,15 +1,15 @@
{
"timestamp": "2025-10-22T17:04:32Z",
"timestamp": "2025-10-22T20:07:14Z",
"git": {
"commit": "49297e58f7fda0cc6add445fd690d046f94ec710",
"commit": "5f0f14419346f2704b317f05e92594d018abf2ad",
"branch": "origin/develop",
"url": "git@github.com:vacp2p/vac.dev.git"
},
"build": {
"id": "3615",
"number": "3615",
"id": "3616",
"number": "3616",
"name": "website/dev.vac.dev",
"slave": "linux-01",
"url": "https://ci.infra.status.im/job/website/job/dev.vac.dev/3615/"
"slave": "linux-02-container",
"url": "https://ci.infra.status.im/job/website/job/dev.vac.dev/3616/"
}
}

View File

@@ -3,7 +3,7 @@
<head>
<meta charset="UTF-8">
<meta name="generator" content="Docusaurus v3.7.0">
<title data-rh="true">Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research</title><meta data-rh="true" name="viewport" content="width=device-width,initial-scale=1"><meta data-rh="true" name="twitter:card" content="summary_large_image"><meta data-rh="true" property="og:url" content="https://vac.dev/rlog/wakuv2-relay-anon"><meta data-rh="true" property="og:locale" content="en"><meta data-rh="true" name="docusaurus_locale" content="en"><meta data-rh="true" name="docusaurus_tag" content="default"><meta data-rh="true" name="docsearch:language" content="en"><meta data-rh="true" name="docsearch:docusaurus_tag" content="default"><meta data-rh="true" name="image" content="https://vac.dev/_og/5e8213de01e59b7eda0331ad469a4d15a77f86c8.png"><meta data-rh="true" property="og:title" content="Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research"><meta data-rh="true" name="description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:image" content="https://vac.dev/_og/5e8213de01e59b7eda0331ad469a4d15a77f86c8.png"><meta data-rh="true" name="twitter:image" content="https://vac.dev/_og/5e8213de01e59b7eda0331ad469a4d15a77f86c8.png"><meta data-rh="true" property="og:type" content="article"><meta data-rh="true" property="article:published_time" content="2022-07-22T10:00:00.000Z"><link data-rh="true" rel="icon" href="/theme/image/favicon.ico"><link data-rh="true" rel="canonical" href="https://vac.dev/rlog/wakuv2-relay-anon"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="en"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="x-default"><script data-rh="true" type="application/ld+json">{"@context":"https://schema.org","@type":"BlogPosting","@id":"https://vac.dev/rlog/wakuv2-relay-anon","mainEntityOfPage":"https://vac.dev/rlog/wakuv2-relay-anon","url":"https://vac.dev/rlog/wakuv2-relay-anon","headline":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","name":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","description":"Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol.","datePublished":"2022-07-22T10:00:00.000Z","author":{"@type":"Person","name":"Daniel"},"image":{"@type":"ImageObject","@id":"https://vac.dev/img/anonymity_trilemma.svg","url":"https://vac.dev/img/anonymity_trilemma.svg","contentUrl":"https://vac.dev/img/anonymity_trilemma.svg","caption":"title image for the blog post: Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay"},"keywords":[],"isPartOf":{"@type":"Blog","@id":"https://vac.dev/rlog","name":"Research Blog"}}</script><link rel="alternate icon" type="image/png" href="/theme/image/favicon.png">
<title data-rh="true">Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research</title><meta data-rh="true" name="viewport" content="width=device-width,initial-scale=1"><meta data-rh="true" name="twitter:card" content="summary_large_image"><meta data-rh="true" property="og:url" content="https://vac.dev/rlog/wakuv2-relay-anon"><meta data-rh="true" property="og:locale" content="en"><meta data-rh="true" name="docusaurus_locale" content="en"><meta data-rh="true" name="docusaurus_tag" content="default"><meta data-rh="true" name="docsearch:language" content="en"><meta data-rh="true" name="docsearch:docusaurus_tag" content="default"><meta data-rh="true" name="image" content="https://vac.dev/_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png"><meta data-rh="true" property="og:title" content="Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research"><meta data-rh="true" name="description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:image" content="https://vac.dev/_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png"><meta data-rh="true" name="twitter:image" content="https://vac.dev/_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png"><meta data-rh="true" property="og:type" content="article"><meta data-rh="true" property="article:published_time" content="2022-07-22T10:00:00.000Z"><link data-rh="true" rel="icon" href="/theme/image/favicon.ico"><link data-rh="true" rel="canonical" href="https://vac.dev/rlog/wakuv2-relay-anon"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="en"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="x-default"><script data-rh="true" type="application/ld+json">{"@context":"https://schema.org","@type":"BlogPosting","@id":"https://vac.dev/rlog/wakuv2-relay-anon","mainEntityOfPage":"https://vac.dev/rlog/wakuv2-relay-anon","url":"https://vac.dev/rlog/wakuv2-relay-anon","headline":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","name":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","description":"Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol.","datePublished":"2022-07-22T10:00:00.000Z","author":{"@type":"Person","name":"Daniel"},"image":{"@type":"ImageObject","@id":"https://vac.dev/img/anonymity_trilemma.svg","url":"https://vac.dev/img/anonymity_trilemma.svg","contentUrl":"https://vac.dev/img/anonymity_trilemma.svg","caption":"title image for the blog post: Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay"},"keywords":[],"isPartOf":{"@type":"Blog","@id":"https://vac.dev/rlog","name":"Research Blog"}}</script><link rel="alternate icon" type="image/png" href="/theme/image/favicon.png">
<link rel="icon" type="image/svg+xml" href="/theme/image/favicon.svg">
<link rel="alternate" type="application/rss+xml" href="/rlog/rss.xml" title="Vac Research RSS Feed">
<link rel="alternate" type="application/atom+xml" href="/rlog/atom.xml" title="Vac Research Atom Feed">

File diff suppressed because one or more lines are too long