Sprinkle in some AES and public / private keys for verification and you're done.
Sequential list isn't needed.
(well, all the robust & stealthy large systems engineering together with the low level exploit knowledge is probably a little too much for one person to pull it off, but for a Hacking Team or nation sized actor it's quite doable)
There's your discovery layer: https://en.wikipedia.org/wiki/Kademlia
C&C: http://www.reddit.com/r/netsec/comments/2pmmfu/using_the_blo...
Persistence Layer: https://github.com/cockroachdb/cockroach
Dissemination Layer: https://en.wikipedia.org/wiki/Gossip_protocol
Sprinkle in some AES and public / private keys for verification and you're done.
Sequential list isn't needed.
(well, all the robust & stealthy large systems engineering together with the low level exploit knowledge is probably a little too much for one person to pull it off, but for a Hacking Team or nation sized actor it's quite doable)