diff --git a/README.md b/README.md index d9c0c96..3921b4b 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,7 @@ Utilizing public key infrastructure patterns, deadrop uses AES (with GCM) and Eliptical Curve (ECDH) cryptographic methods to generate keys and obfuscate payloads then SHA-256 is used after handoff for verifying data integrity. All keys are exchanged through peer-to-peer connections over WebRTC allowing all key and payload communications to remain solely between the two peers ("dropper" and "grabber") and are not logged or tracked by any server-side functionality. An opaque drop ID, the dropper's peer ID, and a nonce for the drop session are stored in a redis instance. The dropper's peer ID and nonce are then retrieved for the grabber by sending GET request to the `/api/drop` endpoint. -![deadrop diagram](assets/deadrop.jpeg) +![deadrop diagram](assets/deadrop_diagram.jpg) ## Features diff --git a/assets/deadrop.jpeg b/assets/deadrop.jpeg deleted file mode 100644 index fbac254..0000000 Binary files a/assets/deadrop.jpeg and /dev/null differ diff --git a/assets/deadrop_diagram.jpg b/assets/deadrop_diagram.jpg new file mode 100644 index 0000000..83b1af4 Binary files /dev/null and b/assets/deadrop_diagram.jpg differ