📄️ Overview
For cMixx, Node and Gateways pair together; every Node has a Gateway. Their relationship is a Scheduler-Worker design. In the initial design, this will be tiered with a Scheduling server orchestrating Nodes that then orchestrate their Gateways, which then pass schedules onto Clients. The Scheduling server takes its instruction from the blockchain; network participation is defined by staking and consensus. The network will rapidly remove scheduling functions from the scheduling server and move them to adjudication by xx Chain.
🗃️ cMixx Design Specs
12 items
🗃️ xxDK
6 items
📄️ Anonymous Data Retrieval Protocol
The Anonymous Data Retrieval Protocol (ADRP) allows users to request
📄️ Cover Traffic
Cover traffic, also known as dummy traffic or decoy traffic, is used by the xx Messenger application to essentially give us two additional privacy properties known as “sender unobservability” and “receiver unobservability” (see the privacy notions paper https://arxiv.org/abs/1812.05638 ). If cover traffic is enabled, the xx Messenger client will, at random time intervals, send cover messages which are indistinguishable from ordinary messages. Any adversary watching your network traffic will not know when you are sending or receiving an ordinary message or a cover message.
📄️ End-to-End Encrypted Messaging in xx Messenger
[End-to-End Encrypted
📄️ ID Collisions and Notifications
Typically, user IDs are unique identifiers and have the property of
📄️ User Discovery
User Discovery (UD) is an xx Network service that helps users connect