mirror of
https://github.com/vacp2p/vac.dev.git
synced 2026-01-06 21:34:17 -05:00
Update documentation
This commit is contained in:
BIN
_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png
Normal file
BIN
_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 72 KiB |
Binary file not shown.
|
Before Width: | Height: | Size: 72 KiB |
@@ -1,15 +1,15 @@
|
||||
{
|
||||
"timestamp": "2026-01-03T17:05:38Z",
|
||||
"timestamp": "2026-01-04T17:05:38Z",
|
||||
"git": {
|
||||
"commit": "97800b52017acc0c558b090fb61e4bc5a701d656",
|
||||
"branch": "origin/develop",
|
||||
"url": "git@github.com:vacp2p/vac.dev.git"
|
||||
},
|
||||
"build": {
|
||||
"id": "3690",
|
||||
"number": "3690",
|
||||
"id": "3691",
|
||||
"number": "3691",
|
||||
"name": "website/dev.vac.dev",
|
||||
"slave": "linux-02",
|
||||
"url": "https://ci.infra.status.im/job/website/job/dev.vac.dev/3690/"
|
||||
"url": "https://ci.infra.status.im/job/website/job/dev.vac.dev/3691/"
|
||||
}
|
||||
}
|
||||
@@ -3,7 +3,7 @@
|
||||
<head>
|
||||
<meta charset="UTF-8">
|
||||
<meta name="generator" content="Docusaurus v3.7.0">
|
||||
<title data-rh="true">Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research</title><meta data-rh="true" name="viewport" content="width=device-width,initial-scale=1"><meta data-rh="true" name="twitter:card" content="summary_large_image"><meta data-rh="true" property="og:url" content="https://vac.dev/rlog/wakuv2-relay-anon"><meta data-rh="true" property="og:locale" content="en"><meta data-rh="true" name="docusaurus_locale" content="en"><meta data-rh="true" name="docusaurus_tag" content="default"><meta data-rh="true" name="docsearch:language" content="en"><meta data-rh="true" name="docsearch:docusaurus_tag" content="default"><meta data-rh="true" name="image" content="https://vac.dev/_og/5400673e98dcfe9bf2b73ede0a89304cc1ea070b.png"><meta data-rh="true" property="og:title" content="Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research"><meta data-rh="true" name="description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:image" content="https://vac.dev/_og/5400673e98dcfe9bf2b73ede0a89304cc1ea070b.png"><meta data-rh="true" name="twitter:image" content="https://vac.dev/_og/5400673e98dcfe9bf2b73ede0a89304cc1ea070b.png"><meta data-rh="true" property="og:type" content="article"><meta data-rh="true" property="article:published_time" content="2022-07-22T10:00:00.000Z"><link data-rh="true" rel="icon" href="/theme/image/favicon.ico"><link data-rh="true" rel="canonical" href="https://vac.dev/rlog/wakuv2-relay-anon"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="en"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="x-default"><script data-rh="true" type="application/ld+json">{"@context":"https://schema.org","@type":"BlogPosting","@id":"https://vac.dev/rlog/wakuv2-relay-anon","mainEntityOfPage":"https://vac.dev/rlog/wakuv2-relay-anon","url":"https://vac.dev/rlog/wakuv2-relay-anon","headline":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","name":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","description":"Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol.","datePublished":"2022-07-22T10:00:00.000Z","author":{"@type":"Person","name":"Daniel"},"image":{"@type":"ImageObject","@id":"https://vac.dev/img/anonymity_trilemma.svg","url":"https://vac.dev/img/anonymity_trilemma.svg","contentUrl":"https://vac.dev/img/anonymity_trilemma.svg","caption":"title image for the blog post: Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay"},"keywords":[],"isPartOf":{"@type":"Blog","@id":"https://vac.dev/rlog","name":"Research Blog"}}</script><link rel="alternate icon" type="image/png" href="/theme/image/favicon.png">
|
||||
<title data-rh="true">Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research</title><meta data-rh="true" name="viewport" content="width=device-width,initial-scale=1"><meta data-rh="true" name="twitter:card" content="summary_large_image"><meta data-rh="true" property="og:url" content="https://vac.dev/rlog/wakuv2-relay-anon"><meta data-rh="true" property="og:locale" content="en"><meta data-rh="true" name="docusaurus_locale" content="en"><meta data-rh="true" name="docusaurus_tag" content="default"><meta data-rh="true" name="docsearch:language" content="en"><meta data-rh="true" name="docsearch:docusaurus_tag" content="default"><meta data-rh="true" name="image" content="https://vac.dev/_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png"><meta data-rh="true" property="og:title" content="Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research"><meta data-rh="true" name="description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:image" content="https://vac.dev/_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png"><meta data-rh="true" name="twitter:image" content="https://vac.dev/_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png"><meta data-rh="true" property="og:type" content="article"><meta data-rh="true" property="article:published_time" content="2022-07-22T10:00:00.000Z"><link data-rh="true" rel="icon" href="/theme/image/favicon.ico"><link data-rh="true" rel="canonical" href="https://vac.dev/rlog/wakuv2-relay-anon"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="en"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="x-default"><script data-rh="true" type="application/ld+json">{"@context":"https://schema.org","@type":"BlogPosting","@id":"https://vac.dev/rlog/wakuv2-relay-anon","mainEntityOfPage":"https://vac.dev/rlog/wakuv2-relay-anon","url":"https://vac.dev/rlog/wakuv2-relay-anon","headline":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","name":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","description":"Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol.","datePublished":"2022-07-22T10:00:00.000Z","author":{"@type":"Person","name":"Daniel"},"image":{"@type":"ImageObject","@id":"https://vac.dev/img/anonymity_trilemma.svg","url":"https://vac.dev/img/anonymity_trilemma.svg","contentUrl":"https://vac.dev/img/anonymity_trilemma.svg","caption":"title image for the blog post: Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay"},"keywords":[],"isPartOf":{"@type":"Blog","@id":"https://vac.dev/rlog","name":"Research Blog"}}</script><link rel="alternate icon" type="image/png" href="/theme/image/favicon.png">
|
||||
<link rel="icon" type="image/svg+xml" href="/theme/image/favicon.svg">
|
||||
<link rel="alternate" type="application/rss+xml" href="/rlog/rss.xml" title="Vac Research RSS Feed">
|
||||
<link rel="alternate" type="application/atom+xml" href="/rlog/atom.xml" title="Vac Research Atom Feed">
|
||||
|
||||
File diff suppressed because one or more lines are too long
Reference in New Issue
Block a user