mirror of
https://github.com/simplex-chat/simplex-chat.git
synced 2026-04-03 02:45:47 +00:00
118 lines
2.7 KiB
JSON
118 lines
2.7 KiB
JSON
[
|
|
{
|
|
"term": "Address portability",
|
|
"definition": "Address portability"
|
|
},
|
|
{
|
|
"term": "Anonymous credentials",
|
|
"definition": "Anonymous credentials"
|
|
},
|
|
{
|
|
"term": "Blockchain",
|
|
"definition": "Blockchain"
|
|
},
|
|
{
|
|
"term": "Break-in recovery",
|
|
"definition": "Post-compromise security"
|
|
},
|
|
{
|
|
"term": "Centralized network",
|
|
"definition": "Centralized network"
|
|
},
|
|
{
|
|
"term": "Content padding",
|
|
"definition": "Message padding"
|
|
},
|
|
{
|
|
"term": "Decentralized network",
|
|
"definition": "Decentralized network"
|
|
},
|
|
{
|
|
"term": "Defense in depth",
|
|
"definition": "Defense in depth"
|
|
},
|
|
{
|
|
"term": "Double ratchet algorithm",
|
|
"definition": "Double ratchet algorithm"
|
|
},
|
|
{
|
|
"term": "End-to-end encryption",
|
|
"definition": "End-to-end encryption"
|
|
},
|
|
{
|
|
"term": "Federated network",
|
|
"definition": "Federated network"
|
|
},
|
|
{
|
|
"term": "Forward secrecy",
|
|
"definition": "Forward secrecy"
|
|
},
|
|
{
|
|
"term": "Key agreement protocol",
|
|
"definition": "Key agreement protocol"
|
|
},
|
|
{
|
|
"term": "Key exchange",
|
|
"definition": "Key agreement protocol"
|
|
},
|
|
{
|
|
"term": "Man-in-the-middle attack",
|
|
"definition": "Man-in-the-middle attack"
|
|
},
|
|
{
|
|
"term": "Merkle directed acyclic graph",
|
|
"definition": "Merkle directed acyclic graph"
|
|
},
|
|
{
|
|
"term": "Message padding",
|
|
"definition": "Message padding"
|
|
},
|
|
{
|
|
"term": "Non-repudiation",
|
|
"definition": "Non-repudiation"
|
|
},
|
|
{
|
|
"term": "Onion routing",
|
|
"definition": "Onion routing"
|
|
},
|
|
{
|
|
"term": "Overlay network",
|
|
"definition": "Overlay network"
|
|
},
|
|
{
|
|
"term": "Pairwise pseudonymous identifier",
|
|
"definition": "Pairwise pseudonymous identifier"
|
|
},
|
|
{
|
|
"term": "Peer-to-peer",
|
|
"definition": "Peer-to-peer"
|
|
},
|
|
{
|
|
"term": "Perfect forward secrecy",
|
|
"definition": "Forward secrecy"
|
|
},
|
|
{
|
|
"term": "Post-compromise security",
|
|
"definition": "Post-compromise security"
|
|
},
|
|
{
|
|
"term": "Post-quantum cryptography",
|
|
"definition": "Post-quantum cryptography"
|
|
},
|
|
{
|
|
"term": "Proxied peer-to-peer",
|
|
"definition": "Proxied peer-to-peer"
|
|
},
|
|
{
|
|
"term": "Recovery from compromise",
|
|
"definition": "Post-compromise security"
|
|
},
|
|
{
|
|
"term": "Repudiation",
|
|
"definition": "Repudiation"
|
|
},
|
|
{
|
|
"term": "User identity",
|
|
"definition": "User identity"
|
|
}
|
|
] |