Files
simplex-chat/website/src/_data/glossary.json
Evgeny Poberezkin 7213913d51 docs: update privacy policy (#3796)
* docs: update privacy policy

* update glossary

* update

* links

* amend

* update
2024-02-24 21:28:18 +00:00

118 lines
2.7 KiB
JSON

[
{
"term": "Address portability",
"definition": "Address portability"
},
{
"term": "Anonymous credentials",
"definition": "Anonymous credentials"
},
{
"term": "Blockchain",
"definition": "Blockchain"
},
{
"term": "Break-in recovery",
"definition": "Post-compromise security"
},
{
"term": "Centralized network",
"definition": "Centralized network"
},
{
"term": "Content padding",
"definition": "Message padding"
},
{
"term": "Decentralized network",
"definition": "Decentralized network"
},
{
"term": "Defense in depth",
"definition": "Defense in depth"
},
{
"term": "Double ratchet algorithm",
"definition": "Double ratchet algorithm"
},
{
"term": "End-to-end encryption",
"definition": "End-to-end encryption"
},
{
"term": "Federated network",
"definition": "Federated network"
},
{
"term": "Forward secrecy",
"definition": "Forward secrecy"
},
{
"term": "Key agreement protocol",
"definition": "Key agreement protocol"
},
{
"term": "Key exchange",
"definition": "Key agreement protocol"
},
{
"term": "Man-in-the-middle attack",
"definition": "Man-in-the-middle attack"
},
{
"term": "Merkle directed acyclic graph",
"definition": "Merkle directed acyclic graph"
},
{
"term": "Message padding",
"definition": "Message padding"
},
{
"term": "Non-repudiation",
"definition": "Non-repudiation"
},
{
"term": "Onion routing",
"definition": "Onion routing"
},
{
"term": "Overlay network",
"definition": "Overlay network"
},
{
"term": "Pairwise pseudonymous identifier",
"definition": "Pairwise pseudonymous identifier"
},
{
"term": "Peer-to-peer",
"definition": "Peer-to-peer"
},
{
"term": "Perfect forward secrecy",
"definition": "Forward secrecy"
},
{
"term": "Post-compromise security",
"definition": "Post-compromise security"
},
{
"term": "Post-quantum cryptography",
"definition": "Post-quantum cryptography"
},
{
"term": "Proxied peer-to-peer",
"definition": "Proxied peer-to-peer"
},
{
"term": "Recovery from compromise",
"definition": "Post-compromise security"
},
{
"term": "Repudiation",
"definition": "Repudiation"
},
{
"term": "User identity",
"definition": "User identity"
}
]