Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not too far off.

There's your discovery layer: https://en.wikipedia.org/wiki/Kademlia

C&C: http://www.reddit.com/r/netsec/comments/2pmmfu/using_the_blo...

Persistence Layer: https://github.com/cockroachdb/cockroach

Dissemination Layer: https://en.wikipedia.org/wiki/Gossip_protocol

Sprinkle in some AES and public / private keys for verification and you're done.

Sequential list isn't needed.

(well, all the robust & stealthy large systems engineering together with the low level exploit knowledge is probably a little too much for one person to pull it off, but for a Hacking Team or nation sized actor it's quite doable)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: