README 1.1 KB

123456789101112131415161718192021
  1. # Steps:
  2. - [] By default run shell program. (Always block)
  3. - [] Create program echo and echo2 that can be run in the shell program. Both can be called from the shell program. Shell takes inputs from keyboard and gives output on screen.
  4. - [] Keep a memory register that records datetime.
  5. - [] Program call -> Run program -> Shell
  6. Any interrupt -> Clear all program memory -> Shell
  7. $echo yo
  8. yo
  9. $echo2 yo
  10. yoyo
  11. # Steps2 = Steps ++:
  12. - [] Connect with sd card, write and read to and from sd card and figure out if fs are needed. (Encrypt sd card by default and store the key on flash)
  13. - [] Create key generation, encrypt(with stored public keys) and decrypt programs for strong encryption algos. (ed448)
  14. - [] Transfer all programs to sd card. Keep only shell and a program which fetches a list of all programs from sd card on flash.
  15. # Steps3 = Steps2++:
  16. - [] Create tor connection through lan and mail the encrypted message to a particular email id.
  17. - [] Accept mails of encrypted messages, detect the key used and decrypt if the private key exists.
  18. - [] Programs should not be able to override shell or touch any part of shell and an interrupt should always return to shell.