Files
simplex-chat/website/src/_data/glossary.json
M Sarmad Qadeer bbd4e6c8ba website: glossary feature (#2529)
* web: quick fixes in glossary.md

* website: update header tags

* website: add glossary feature

* website: add & style the tooltips & glossary terms

* website: add overlay for glossary definition

* website: add list styling & update links

---------

Co-authored-by: Evgeny Poberezkin <2769109+epoberezkin@users.noreply.github.com>
2023-06-11 07:52:55 +01:00

110 lines
2.6 KiB
JSON

[
{
"term": "Address portability",
"definition": "Address portability"
},
{
"term": "Anonymous credentials",
"definition": "Anonymous credentials"
},
{
"term": "Blockchain",
"definition": "Blockchain"
},
{
"term": "Break-in recovery",
"definition": "Post-compromise security"
},
{
"term": "Centralized network",
"definition": "Centralized network"
},
{
"term": "Content padding",
"definition": "Message padding"
},
{
"term": "Decentralized network",
"definition": "Decentralized network"
},
{
"term": "Defense in depth",
"definition": "Defense in depth"
},
{
"term": "Double ratchet algorithm",
"definition": "Double ratchet algorithm"
},
{
"term": "End-to-end encryption",
"definition": "End-to-end encryption"
},
{
"term": "Federated network",
"definition": "Federated network"
},
{
"term": "Forward secrecy",
"definition": "Forward secrecy"
},
{
"term": "Key agreement protocol",
"definition": "Key agreement protocol"
},
{
"term": "Key exchange",
"definition": "Key agreement protocol"
},
{
"term": "Man-in-the-middle attack",
"definition": "Man-in-the-middle attack"
},
{
"term": "Merkle directed acyclic graph",
"definition": "Merkle directed acyclic graph"
},
{
"term": "Message padding",
"definition": "Message padding"
},
{
"term": "Onion routing",
"definition": "Onion routing"
},
{
"term": "Overlay network",
"definition": "Overlay network"
},
{
"term": "Pairwise pseudonymous identifier",
"definition": "Pairwise pseudonymous identifier"
},
{
"term": "Peer-to-peer",
"definition": "Peer-to-peer"
},
{
"term": "Perfect forward secrecy",
"definition": "Forward secrecy"
},
{
"term": "Post-compromise security",
"definition": "Post-compromise security"
},
{
"term": "Post-quantum cryptography",
"definition": "Post-quantum cryptography"
},
{
"term": "Proxied peer-to-peer",
"definition": "Proxied peer-to-peer"
},
{
"term": "Recovery from compromise",
"definition": "Post-compromise security"
},
{
"term": "User identity",
"definition": "User identity"
}
]