Provides an overview of cloud remote procedure calls and their role in software architecture, covering key concepts, protocols, and practical applications.
Explores unstructured and structured search and routing protocols, emphasizing the importance of network structure assumptions and introducing the 'Bubble Storm' algorithm.
Explores censorship resistance strategies, including mimicry, tunneling, and covert channels, to ensure internet accessibility in the face of censorship.