2008-01-31 20:38:37 +00:00
|
|
|
{% extends "_layout.html" %}
|
2008-02-03 02:46:04 +00:00
|
|
|
{% block title %}How Does It Work{% endblock %}
|
|
|
|
{% block content %}
|
|
|
|
Warning - many of the following documents are out of date and
|
|
|
|
need to be fixed up to correctly document the current network.
|
2009-06-12 20:09:21 +00:00
|
|
|
<ul class="helplist">
|
2004-07-12 16:22:18 +00:00
|
|
|
<li><a href="how_intro">Intro</a></li>
|
|
|
|
<li><a href="how_threatmodel">Threat model</a></li>
|
2004-07-15 20:14:44 +00:00
|
|
|
<li><a href="how_tunnelrouting">Tunnel routing</a></li>
|
|
|
|
<li><a href="how_garlicrouting">Garlic routing</a></li>
|
2004-08-06 07:22:47 +00:00
|
|
|
<li><a href="how_networkdatabase">Network database</a></li>
|
2004-07-19 20:09:44 +00:00
|
|
|
<li><a href="how_peerselection">Peer selection</a></li>
|
2004-07-12 04:19:12 +00:00
|
|
|
<li>
|
2009-06-12 20:09:21 +00:00
|
|
|
<a href="how_cryptography.html">Cryptography</a> » <a href="how_elgamalaes.html">ElGamal / AES+SessionTag</a>
|
2004-07-12 04:19:12 +00:00
|
|
|
</li>
|
2004-07-12 16:22:18 +00:00
|
|
|
<li><a href="how_networkcomparisons">Network comparisons</a></li>
|
2004-07-06 23:46:37 +00:00
|
|
|
</ul>
|
2008-02-03 02:46:04 +00:00
|
|
|
{% endblock %}
|