Implementation
The development of Vepjulilja to the finished product shall be financed through the crowdfunding.
- Acquisition of scientific papers about relevant attacks, unless these are available for free, and integration of the thereout obtained findings into Vepjulilja
- Development of the detail procedure and elaboration of the model for the implementation
- Acquisition and test of hardware for the secure environment Compulilja and Anonlilja
- Test and refining of existing operating- and application software for Kryptanolilja, Systemlilja and Anonlilja
- Programming of new application software for Kryptanolilja und Systemlilja
- Acquisition of the hardware, necessary for the Vepjulilja infrastructure
- Construction development
- Prototyping
- Functional and security tests
- Completion of the method for anonymous contract relationship
- Completion of diverse protecting measures for Diverslilja
- Completion of open source software
- Setup of the Vepjulilja infrastructure
- Manufacturing development and acquisition of production machinery
- Production of the first privacy and company information protecting products
Financial Requirements
How much funding we'll need for the development of Vepjulilja is currently being calculated.