-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
53 lines (35 loc) · 2.18 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
<!DOCTYPE html>
<head>
<title>hashmatter</title>
<link rel="stylesheet" type="text/css" href="style.css">
</head>
<body>
<h2>hashmatter</h2>
<p>r&d focused on privacy preserving decentralized networks and metadata resistant systems</p>
<h4>current research questions</h4>
<ul>
<li><a href="https://github.com/gpestana/notes/issues/8" target="_blank">how to build privacy preserving distributed hash tables?</a></li>
<li><a href="https://github.com/gpestana/notes/issues/14" target="_blank">how to design and build incentive layers that enforce secure and privacy preserving in P2P networks?</a></li>
<li>advanced cryptography primitives (zkproofs, MPC) for improving privacy in decentralized network </li>
</ul>
<h4>publications</h4>
<ul>
<li><a href="https://github.com/gpestana/p2psec/tree/master/papers/privacy_preserving_dht"><b>[wip]</b> Privacy Preserving Distributed Hash Tables - Reality and Future</a></li>
<li><a href="https://github.com/gpestana/notes/blob/master/research/metadata_resistant_dht/onion_routing_paper/onion_routing_dht.pdf"><b>[wip]</b> Privacy preserving lookups with In-DHT Onion Routing</a></li>
<li><a href="https://github.com/gpestana/notes/issues/3"><b>[wip]</b> Threat model of current implementations of DHT networks</a></li>
</ul>
<h4>projects</h4>
<p>privacy engineering: our main goal is to build privacy preserving primitives that can be easily used by protocol designers and developers.</p>
<ul>
<li><a href="https://github.com/hashmatter/p3lib"> <b>p3lib</b>: privacy preserving primitives and protocols (p3) for routing and messaging in P2P networks</a></li>
<li><a href="https://github.com/hashmatter/privacy-preserving-primitives"><b>ppp</b>: directory listing implementations, designs and research work of primitives and protocols aiming at enhancing privacy of networked systems. </a></li>
<li><a href="https://github.com/gpestana/dht-sneak"><b>dht-sneak</b>: Toolbox for sneaking in DHTs and P2P networks </a></li>
</ul>
<h4>why?</h4>
<ul>
<li><a href="https://www.gpestana.com/blog/in-pursuit-of-private-dhts/">In Pursuit of Private DHTs</a></li>
</ul>
<br><br>
<p>reach us out through mx _at_ hashmatter.com</p>
</body>
</html>