An absolutely secure, stateless system to communicate without middlemen eavesdropping.

Sagar Acharya 72fb842564 Moved towards Riscy-SoC based on rv64 and added some datasheets 1 рік тому
datasheets 72fb842564 Moved towards Riscy-SoC based on rv64 and added some datasheets 1 рік тому
eink 72fb842564 Moved towards Riscy-SoC based on rv64 and added some datasheets 1 рік тому
hdl_to_hx8k 72fb842564 Moved towards Riscy-SoC based on rv64 and added some datasheets 1 рік тому
LICENSE.md 72fb842564 Moved towards Riscy-SoC based on rv64 and added some datasheets 1 рік тому
README 72fb842564 Moved towards Riscy-SoC based on rv64 and added some datasheets 1 рік тому
notes 0d3eb161eb added incomplete vt52, removed olimex ps2 and vga based codes 2 роки тому
spirit.txt 72fb842564 Moved towards Riscy-SoC based on rv64 and added some datasheets 1 рік тому

README

# Steps:
- [] By default run shell program. (Always block)
- [] Create program echo and echo2 that can be run in the shell program. Both can be called from the shell program. Shell takes inputs from keyboard and gives output on screen.
- [] Keep a memory register that records datetime.
- [] Program call -> Run program -> Shell
Any interrupt -> Clear all program memory -> Shell

$echo yo
yo
$echo2 yo
yoyo

# Steps2 = Steps ++:
- [] Connect with sd card, write and read to and from sd card and figure out if fs are needed. (Encrypt sd card by default and store the key on flash)
- [] Create key generation, encrypt(with stored public keys) and decrypt programs for strong encryption algos. (ed448)
- [] Transfer all programs to sd card. Keep only shell and a program which fetches a list of all programs from sd card on flash.

# Steps3 = Steps2++:
- [] Create tor connection through lan and mail the encrypted message to a particular email id.
- [] Accept mails of encrypted messages, detect the key used and decrypt if the private key exists.
- [] Programs should not be able to override shell or touch any part of shell and an interrupt should always return to shell.