Files
research.logos.co/assets/js/ec8fd1ee.6ed2009f.js
2026-02-13 14:11:27 +00:00

1 line
2.7 KiB
JavaScript

"use strict";(self.webpackChunkresearch_logos_co=self.webpackChunkresearch_logos_co||[]).push([[9050],{10598:a=>{a.exports=JSON.parse('{"permalink":"/rlog/wakuv2-relay-anon","source":"@site/rlog/2022-07-22-relay-anonymity.mdx","title":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","description":"Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol.","date":"2022-07-22T10:00:00.000Z","tags":[],"readingTime":16.795,"hasTruncateMarker":true,"authors":[{"name":"Daniel","github":"kaiserd","key":"kaiserd","page":null}],"frontMatter":{"layout":"post","name":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","title":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","date":"2022-07-22T10:00:00.000Z","authors":"kaiserd","published":true,"slug":"wakuv2-relay-anon","categories":"research","image":"/img/anonymity_trilemma.svg","discuss":"https://forum.research.logos.co/t/discussion-waku-privacy-and-anonymity-analysis/149","_includes":["math"],"toc_min_heading_level":2,"toc_max_heading_level":5},"unlisted":false,"prevItem":{"title":"Building Privacy-Protecting Infrastructure","permalink":"/rlog/building-privacy-protecting-infrastructure"},"nextItem":{"title":"Noise handshakes as key-exchange mechanism for Waku","permalink":"/rlog/wakuv2-noise"}}')},28453:(a,e,n)=>{n.d(e,{R:()=>s,x:()=>o});var t=n(96540);const i={},r=t.createContext(i);function s(a){const e=t.useContext(r);return t.useMemo((function(){return"function"==typeof a?a(e):{...e,...a}}),[e,a])}function o(a){let e;return e=a.disableParentContext?"function"==typeof a.components?a.components(i):a.components||i:s(a.components),t.createElement(r.Provider,{value:e},a.children)}},47290:(a,e,n)=>{n.r(e),n.d(e,{assets:()=>l,contentTitle:()=>o,default:()=>y,frontMatter:()=>s,metadata:()=>t,toc:()=>c});var t=n(10598),i=n(74848),r=n(28453);const s={layout:"post",name:"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay",title:"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay",date:new Date("2022-07-22T10:00:00.000Z"),authors:"kaiserd",published:!0,slug:"wakuv2-relay-anon",categories:"research",image:"/img/anonymity_trilemma.svg",discuss:"https://forum.research.logos.co/t/discussion-waku-privacy-and-anonymity-analysis/149",_includes:["math"],toc_min_heading_level:2,toc_max_heading_level:5},o=void 0,l={authorsImageUrls:[void 0]},c=[];function u(a){const e={p:"p",...(0,r.R)(),...a.components};return(0,i.jsx)(e.p,{children:"Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."})}function y(a={}){const{wrapper:e}={...(0,r.R)(),...a.components};return e?(0,i.jsx)(e,{...a,children:(0,i.jsx)(u,{...a})}):u(a)}}}]);