Luna Network Concept


This is a prototype website for thumb drive blogging. This will eventually evolve into a networking protocol over mountable mediums, such as currently the thumb drive. Although the concept can be transferred over to other means of network development. Right now I've figured out how to write a basic blog in pure HTML formatting.


I need to find a way to integrate cryptography in IPvUSB. Right now it currently works by using "this thumb drive" as the local host, and starting the server on a different computer for each user that wants to browse to the web page. This way, no MAC address or IP address is actually given out. You can wear the thumb drive as an earring, and act as a human courier for showing your friends your web page.

This is based on a similar concept to the dead drop, only that instead of being embedded into a wall, the thumb drive is embedded into you as the dead drop. This way the only person stall a USB killer is yourself. But then generally, friends don't generally trust friends that install USB killers into themselves.

Small Corporate Networks

This protocol functions as a method of exchanging html web pages offline through a text web browser, without having to worry about various non-free attachments in Firefox, being built around the GNU w3m text based web browser. This will eventually be modified to also include a way of checking the date/time format, see who is the corporate internet, and temperature of the laptop.

IP v Paper Plates

Paper plates are one of the few things that can glide, that is able to carry thumb drive. While memory chips are smaller and carry more data, there isn't yet a reliable method of turning them into earrings. Testing needs to be done to see if memory chips can break wind enough to be stable on paper carriers. But for the time being, plastic bags will carry thumb drives.

IP v Remote Viewers

Internet protocol by remote viewers. This process is still in the experimental stages. It requires a more complicated form of cryptography than simply public key usage. For example, because you're having to encrypt multiple sessions, you can't use the same key to encrypt all the sessions, as this is bad practice in terms of forward secrecy. Such sessions include:

Name, date, time, Lower gestalt, dimensional details, and historical details. Opening of the TOR browser into Google maps

Each elements would be their own internet packet sent across the psychic network. It would be far less complicated to use a random permuted autokey table, and a non repeating cipher key to encrypt individual packets of remote viewing data, and only rely on the public key architecture already in place in the TOR browser.





Social Media