Update documentation

This commit is contained in:
2026-01-04 17:05:39 +00:00
parent 89dfa2de82
commit 70acbafc39
5 changed files with 6 additions and 6 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 72 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 72 KiB

View File

@@ -1,15 +1,15 @@
{
"timestamp": "2026-01-03T17:05:38Z",
"timestamp": "2026-01-04T17:05:38Z",
"git": {
"commit": "97800b52017acc0c558b090fb61e4bc5a701d656",
"branch": "origin/develop",
"url": "git@github.com:vacp2p/vac.dev.git"
},
"build": {
"id": "3690",
"number": "3690",
"id": "3691",
"number": "3691",
"name": "website/dev.vac.dev",
"slave": "linux-02",
"url": "https://ci.infra.status.im/job/website/job/dev.vac.dev/3690/"
"url": "https://ci.infra.status.im/job/website/job/dev.vac.dev/3691/"
}
}

View File

@@ -3,7 +3,7 @@
<head>
<meta charset="UTF-8">
<meta name="generator" content="Docusaurus v3.7.0">
<title data-rh="true">Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research</title><meta data-rh="true" name="viewport" content="width=device-width,initial-scale=1"><meta data-rh="true" name="twitter:card" content="summary_large_image"><meta data-rh="true" property="og:url" content="https://vac.dev/rlog/wakuv2-relay-anon"><meta data-rh="true" property="og:locale" content="en"><meta data-rh="true" name="docusaurus_locale" content="en"><meta data-rh="true" name="docusaurus_tag" content="default"><meta data-rh="true" name="docsearch:language" content="en"><meta data-rh="true" name="docsearch:docusaurus_tag" content="default"><meta data-rh="true" name="image" content="https://vac.dev/_og/5400673e98dcfe9bf2b73ede0a89304cc1ea070b.png"><meta data-rh="true" property="og:title" content="Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research"><meta data-rh="true" name="description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:image" content="https://vac.dev/_og/5400673e98dcfe9bf2b73ede0a89304cc1ea070b.png"><meta data-rh="true" name="twitter:image" content="https://vac.dev/_og/5400673e98dcfe9bf2b73ede0a89304cc1ea070b.png"><meta data-rh="true" property="og:type" content="article"><meta data-rh="true" property="article:published_time" content="2022-07-22T10:00:00.000Z"><link data-rh="true" rel="icon" href="/theme/image/favicon.ico"><link data-rh="true" rel="canonical" href="https://vac.dev/rlog/wakuv2-relay-anon"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="en"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="x-default"><script data-rh="true" type="application/ld+json">{"@context":"https://schema.org","@type":"BlogPosting","@id":"https://vac.dev/rlog/wakuv2-relay-anon","mainEntityOfPage":"https://vac.dev/rlog/wakuv2-relay-anon","url":"https://vac.dev/rlog/wakuv2-relay-anon","headline":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","name":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","description":"Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol.","datePublished":"2022-07-22T10:00:00.000Z","author":{"@type":"Person","name":"Daniel"},"image":{"@type":"ImageObject","@id":"https://vac.dev/img/anonymity_trilemma.svg","url":"https://vac.dev/img/anonymity_trilemma.svg","contentUrl":"https://vac.dev/img/anonymity_trilemma.svg","caption":"title image for the blog post: Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay"},"keywords":[],"isPartOf":{"@type":"Blog","@id":"https://vac.dev/rlog","name":"Research Blog"}}</script><link rel="alternate icon" type="image/png" href="/theme/image/favicon.png">
<title data-rh="true">Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research</title><meta data-rh="true" name="viewport" content="width=device-width,initial-scale=1"><meta data-rh="true" name="twitter:card" content="summary_large_image"><meta data-rh="true" property="og:url" content="https://vac.dev/rlog/wakuv2-relay-anon"><meta data-rh="true" property="og:locale" content="en"><meta data-rh="true" name="docusaurus_locale" content="en"><meta data-rh="true" name="docusaurus_tag" content="default"><meta data-rh="true" name="docsearch:language" content="en"><meta data-rh="true" name="docsearch:docusaurus_tag" content="default"><meta data-rh="true" name="image" content="https://vac.dev/_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png"><meta data-rh="true" property="og:title" content="Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay | Vac Research"><meta data-rh="true" name="description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:description" content="Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol."><meta data-rh="true" property="og:image" content="https://vac.dev/_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png"><meta data-rh="true" name="twitter:image" content="https://vac.dev/_og/2eaefa509b1537dbc62430b0dc25b8a535d24983.png"><meta data-rh="true" property="og:type" content="article"><meta data-rh="true" property="article:published_time" content="2022-07-22T10:00:00.000Z"><link data-rh="true" rel="icon" href="/theme/image/favicon.ico"><link data-rh="true" rel="canonical" href="https://vac.dev/rlog/wakuv2-relay-anon"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="en"><link data-rh="true" rel="alternate" href="https://vac.dev/rlog/wakuv2-relay-anon" hreflang="x-default"><script data-rh="true" type="application/ld+json">{"@context":"https://schema.org","@type":"BlogPosting","@id":"https://vac.dev/rlog/wakuv2-relay-anon","mainEntityOfPage":"https://vac.dev/rlog/wakuv2-relay-anon","url":"https://vac.dev/rlog/wakuv2-relay-anon","headline":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","name":"Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay","description":"Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol.","datePublished":"2022-07-22T10:00:00.000Z","author":{"@type":"Person","name":"Daniel"},"image":{"@type":"ImageObject","@id":"https://vac.dev/img/anonymity_trilemma.svg","url":"https://vac.dev/img/anonymity_trilemma.svg","contentUrl":"https://vac.dev/img/anonymity_trilemma.svg","caption":"title image for the blog post: Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay"},"keywords":[],"isPartOf":{"@type":"Blog","@id":"https://vac.dev/rlog","name":"Research Blog"}}</script><link rel="alternate icon" type="image/png" href="/theme/image/favicon.png">
<link rel="icon" type="image/svg+xml" href="/theme/image/favicon.svg">
<link rel="alternate" type="application/rss+xml" href="/rlog/rss.xml" title="Vac Research RSS Feed">
<link rel="alternate" type="application/atom+xml" href="/rlog/atom.xml" title="Vac Research Atom Feed">

File diff suppressed because one or more lines are too long