From 85aafc9964a853fcb2aceaf9d79cfb83bd8a8fa9 Mon Sep 17 00:00:00 2001 From: Tyler Perkins Date: Wed, 12 Jan 2022 00:00:01 -0500 Subject: [PATCH] Update for 12-01-22 00:00 --- tech/cia-do-dont.wiki | 17 ++++++++++++++++- 1 file changed, 16 insertions(+), 1 deletion(-) diff --git a/tech/cia-do-dont.wiki b/tech/cia-do-dont.wiki index a360ddd..92376c8 100644 --- a/tech/cia-do-dont.wiki +++ b/tech/cia-do-dont.wiki @@ -24,4 +24,19 @@ This is the CIA list of dos and donts. * DONOT leave dates and times like compile timestamps, access times, etc that relate to your time zone * DONOT leave data in the binary that indactes you -* DONOT leave data that has "dirty words" +* DONOT leave data that has "dirty words" (hacker terms) in binary + +== Network == + +* DO use E2EE for network comms +* NEVER use network protocols that break E2E principle with respect to + encrypted payloads +* DONOT rely soley on SSL/TLS to secure data in transit +* DONOT allow network traffic to be replayable +* DO use ITEF RFC compliant network protocols as a blending layer. The actual + data should be tunneled through a well known, standard protocol like HTTPS +* DONOT break compilance of an RFC protocol being used as a blending layer +* DO use variable size and timing jitter of packets, beacons, and + communications +* DONOT send data with fixed size and timing +* DO properly clean up network connections