ghost-link 13.0.0 → 15.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -3
- package/ghost-link.js +4 -2
- package/package.json +4 -2
package/README.md
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
# ◢◤ GHOST-LINK V.
|
|
1
|
+
# ◢◤ GHOST-LINK V.15
|
|
2
2
|
|
|
3
3
|
*Ghost-Link is a decentralized, peer-to-peer (P2P) terminal communication suite designed for secure, ephemeral, and encrypted data exchange. It operates without a central server, utilizing a Distributed Hash Table (DHT) to establish direct connections between nodes.*
|
|
4
4
|
|
|
@@ -65,7 +65,7 @@
|
|
|
65
65
|
# SECURITY ARCHITECTURE
|
|
66
66
|
Ghost-Link utilizes a **Zero-Trust** model to ensure digital sovereignty:
|
|
67
67
|
|
|
68
|
-
**1. Key Derivation:** Room codes are processed via scrypt with a hardened salt (`ghost-link-
|
|
68
|
+
**1. Key Derivation:** Room codes are processed via scrypt with a hardened armor salt (`v2 ghost-link-v15-hardened-armor-salt`). The derivation uses a memory-hard cost factor (`N: 65536`) to effectively neutralize brute-force and hardware-accelerated attacks.
|
|
69
69
|
|
|
70
70
|
**2. Packet Hardening:** Every transmission is a cryptographically signed Buffer containing a 12-byte random IV and a 16-byte Auth Tag. To prevent delayed interception, the system implements a **60-second TTL (Time-To-Live)**; any packets exceeding this age are automatically rejected.
|
|
71
71
|
|
|
@@ -93,4 +93,4 @@ Ghost-Link utilizes a **Zero-Trust** model to ensure digital sovereignty:
|
|
|
93
93
|
**The Future of "Ghost" Connectivity**
|
|
94
94
|
*Ghost-Link is more than a utility; it is a proof-of-concept for the **Decentralized Web (dWeb)**. By leveraging **Distributed Hash Tables (DHT)** and military-grade **authenticated encryption (AES-GCM)**, it provides a level of privacy that was previously only accessible to those with deep technical knowledge of network tunneling.*
|
|
95
95
|
|
|
96
|
-
**Historically, true digital sovereignty was a privilege reserved for the elite few with the technical depth to tunnel through the noise; with Ghost-Link, absolute privacy is no longer a complex pursuit—it is a single command away.**
|
|
96
|
+
**Historically, true digital sovereignty was a privilege reserved for the elite few with the technical depth to tunnel through the noise; with Ghost-Link, absolute privacy is no longer a complex pursuit—it is a single command away.**
|