EDN: Unterschied zwischen den Versionen

Aus C3D2
Zur Navigation springen Zur Suche springen
KKeine Bearbeitungszusammenfassung
 
(184 dazwischenliegende Versionen von einem anderen Benutzer werden nicht angezeigt)
Zeile 1: Zeile 1:
[[Echt Dezentrales Netz | Deutsch]]
[[Echt Dezentrales Netz | Deutsch]]


: '''We build the new authenticated p2p-based internet'''
[[Datei:EDN-logo-b.svg|thumb|none|200px|alt=EDN logo with the letters EDN looking like a network and toped with two WiFi-symbols, one left and one right]]


'''We develop a new protective Internet'''
<br clear=all>
<br>
= Welcome =
= Welcome =


This is the official wiki of the research and software project '''''[[Echt Dezentrales Netz|EDN]]''''' ([[Echt Dezentrales Netz]] - real decentralized network).
This is the official wiki of the research and software project '''''[[Echt Dezentrales Netz|EDN]]''''' ([[Echt Dezentrales Netz]] - real decentralized network).
Our vision is to provide a more secure and confidentiality preserving communication means to billions of people: individuals, families and organisations of whatever format - a new internet fitted with a set of privacy tuned [[EDN#Services | services]] running on local individual or public infrastructure via copper, WiFi, Bluetooth, etc that meets our [[EDN/Criteria | standard]].
Our vision is to provide a more secure and confidentiality preserving communication means to billions of people: individuals, families and organisations of whatever format - a new internet fitted with a set of privacy tuned [[EDN#Services | services]] running on local individual or public infrastructure and meets our [[EDN/Criteria | standard]].


= News =
= News =


We have presented EDN to the people of [https://www.wauland.de/en/index.php ''Wau Holland Foundation''] recently. Thank you for your invitation!:)
We have a [https://projectedn.wordpress.com/ new website] which addresses potential sponsors.
Recently we have presented EDN to the people of [https://www.wauland.de/en/index.php ''Wau Holland Foundation'']. Thank you for your invitation!


[[Echt Dezentrales Netz/Projekttagebuch | Here]] is our project diary.
[[Echt Dezentrales Netz/Projekttagebuch | Here]] is our project diary.
Zeile 19: Zeile 23:
= Status Quo =
= Status Quo =


== The Internet Is Broken ==
== Centralization, Outdated Protocols ==
[[Datei:Six-pigsccpiotrsiedlecki.jpg|thumb|right|300px| A Single Point Of Failure (SPOF) in a Centralized Communication Infrastructure faciliates censorship, mass spying and intrusion]]


<br>
<br>
<br>
[[Datei:BonehandSocialnetwork4.png|thumb|none|700px| Social graphs can be extracted easily at central points of failure [[EDN#Picture_References | (1)]]]]


Today's communication infrastructure is predominantly centralized. That starts with all digital communication of one country going through one or just a few telecommunication providers' server.
On these metadata are accumulating - the base to derive people's social graphs, movement patterns and even psychological profiles. The contents of their calls are computable since they are not end-to-end-encrypted.
Peoples' wish to reach as many people possible for communication has led to a focus on using certain services that had good usability qualities - known as the [https://en.wikipedia.org/wiki/Network_effect '''Network Effect'''].
This has let grow services like Facebook, Twitter or Youtube significantly and also to big data congregations at relatively few points. Those data congregations awaken greediness, since it has among other market value.
These central points of data flow facilitate:


* '''Censorship''': e.g. [https://en.wikipedia.org/wiki/Blocking_of_YouTube_videos_in_Germany Youtube blocks music] videos for german users or countries [https://www.usenix.org/sites/default/files/conference/protected-files/verkamp_foci12_slides.pdf interfering with the DNS] to prevent people from consuming unwanted contents;
The prevalent digital communication means undermine their users' data integrity and confidentiality starting with
all digital communication of one country going through one or just a few telecommunication providers' servers.
These accumulate data, including metadata, which is the basis to derive people's social graphs, movement patterns and even psychological profiles.
Further centres of data accumulation are services like Facebook, Twitter or Youtube.
They profited by peoples' wish to reach as many people as possible.
This has led them to focus on using certain services - known as the [https://en.wikipedia.org/wiki/Network_effect '''Network Effect'''] - rather than privacy and security aspects.
This not only helped these services grow significantly, but also led
to huge data accumulations in few locations.
These have its own value for several groups and provoke criminal activity to access and misuse it.
When your hardware gets stolen you soon will notice that. It makes a transition from you - the rightful owner - to another one.
Usually data won't be moved just copied. You won't notice the access directly or never if you have entrusted it to another party or let your digital communication flow through a single instance exposing all your meta data.
To make things worse the current internet protocols base on a completely outdated threat model as the Snowden revelations have shown at the very latest.
They are by design vulnerable to a number of attacks.([https://www.w3.org/2014/strint/papers/65.pdf 1], [https://www.usenix.org/sites/default/files/conference/protected-files/verkamp_foci12_slides.pdf 2], [https://www.usenix.org/sites/default/files/conference/protected-files/sec15_slides_sun.pdf 3]).
These open ways to undermine even overlaying structures, such as [https://www.usenix.org/sites/default/files/conference/protected-files/sec15_slides_sun.pdf Tor], deanonymizing its shelter seeking users and hidden services by traffic correlation.
<br clear=all>
<br>
These conditions- the brokeness and centralization- facilitate:
* '''Censorship''': On [https://en.wikipedia.org/wiki/Blocking_of_YouTube_videos_in_Germany plattforms] and by [https://www.usenix.org/sites/default/files/conference/protected-files/verkamp_foci12_slides.pdf countries];
* '''Passive Mass Spying''';
* '''Passive Mass Spying''';
* '''Active Intrusion''' on a global scale;
* '''Active Intrusion''' on a global scale;


Consequently, the internet can be seen as an accumulation of Single Points Of Failures (SPOF).  
It is most likely that patches like overlay networks can only ease the shortcomings of the current internet but not fix it using this vulnerable basis for confidential communication.
To make things worse DNS and BGP routing - the basic internet structures (!) - are vulnerable to a number of attacks which open ways to undermine even (!) overlaying structures such as [https://www.usenix.org/sites/default/files/conference/protected-files/sec15_slides_sun.pdf Tor], deanomizing its users and hidden services by traffic correlation.  
This may be less critical for high latency networks over the Internet or Sneakernets that do not use the internet at all.
This shows that patches on top of this can most likely only ease the shortcommings of the current internet.  
Alternative networks, however suffer from the following problems.
It is broken by design and therefore a bad basis for integer and confidental communication.
Their network is unlikely to gain enough users, due to shortcomings in their accessibility and usability.
Regarding this it is the privacy projects' responsibility to be clear about the privacy and security they can provide under certain circumstances and not lull endangered groups such as journalists into a (false) sense of security here, which actually can jeopardize them!
Thus, it will not be attractive for most people wanting to communicating with their friends.
 
Moreover, such a small user group might also jeopardize the users [http://freehaven.net/anonbib/cache/usability:weis2006.pdf anonymity] and privacy, as each user is deemed suspicions and errors in the network stack take longer to get fixed.
'''We want to help at this point and evaluate a significant number of Privacy Software Projects' privacy and security qualities by [[EDN/Software_Documentation_Marathon| documentation and analysis]] and [[EDN/Testing |testing based evaluation]].
Finally, this cast doubt on the whole idea of an alternative network.
To break this cycle, we think that multiple well tuned secure solutions must be brought together focusing on accessibility and usability, to combine and increase their small user groups and kick start the required [https://en.wikipedia.org/wiki/Network_effect Network Effect].


== Threat Model ==
== Threat Model ==


We presume a global active attacker that does automated intrusion such as traffic [http://7ywdkxkpi7kk55by.onion/trac/wiki/DeanonymizingTheInternet shaping]. We draw the line before targeted operations.
<br clear=all>
We share our threat model with [http://secushare.org/threats Secushare].
We presume a global active attacker that does automated intrusion such as traffic [http://7ywdkxkpi7kk55by.onion/trac/wiki/DeanonymizingTheInternet shaping].We share our threat model with [http://secushare.org/threats Secushare].


[[Datei:Gingerbread-Puppeteerccby_theyorgre_mask_red.svg|thumb|none|150px|Threat Model|link=http://secushare.org/threats]]
<br>
<br>


== [[EDN/PrivacyProjects | Privacy Software Projects]] ==
<br clear=all>
 


[[Datei:Zettelwirtschaft.jpg|thumb|left|700px|''CC-SA by Leland Francisco''|link=EDN/PrivacyProjects]]
== Competitiveness and Lack of Collaboration ==
[[EDN/PrivacyProjects | Here]] is our list of Privacy Software Projects.


<br clear=all>
[[Datei:Zettelwirtschaft.jpg|thumb|none|700px|Highly fragmented privacy and security software landscape [[EDN#Picture_References | (3)]]|alt=man standing on a field covered with scattered pieces of paper|link=EDN/PrivacyProjects]]


The privacy and security software landscape is highly fragmented.
This has implications for their quality and therefore for their users' privacy and security.
We found over 80 [[EDN/Privacy_Projects | Free Software Privacy Projects]] and this is nowhere near complete
We found over 80 [[EDN/Privacy_Projects | Free Software Privacy Projects]] and this is nowhere near complete
regarding [https://www.schneier.com/cryptography/paperfiles/worldwide-survey-of-encryption-products.pdf that].
regarding [https://www.schneier.com/cryptography/paperfiles/worldwide-survey-of-encryption-products.pdf this survey].
All compete for contributors, funding, users, bandwith while implementing redundant, often mediocre solutions which is no wonder since most of them lack ressources to do it all good.
All compete for contributors, funding, users, bandwidth while implementing redundant, often mediocre solutions which is no wonder since most of them lack resources to do it all good.
This leads to bad code documentation which consequently impedes potential help by new developers or researchers finding vulnerabilities and providing more secure solutions.
This leads to bad code documentation, which consequently impedes potential help by new developers or researchers finding vulnerabilities and providing more secure solutions.
And this maybe of course a crucial reason why there is nearly no collaboration between the projects although (!) they share the same goals. Having the projects share code or even collaborate to reach more than a single project could do, would help saving ressources and enbetter the chances to focus on usability and hard problems such as providing good privacy and security to their users.
These are some reasons why there is almost no collaboration between the projects although they share the same goals and would benefit from these collaborations exceptionally.
Making its usage a comforting experience on the other hand is a crucial point to let a project fly and gain the critical user mass for the Network Effect which on the other hand is [http://freehaven.net/anonbib/cache/usability:weis2006.pdf crucial] for achieving a good amount of anonymity.


[[Datei:DocumentationCObyOpemIcons_modifiedwithsourceCodeCCbySimpleIcons_Green.svg|thumb|left|150px|Code-Documentation]]
[[Datei:Conjunction2.svg|thumb|none|150px|Share Code]]
[[Datei:Open-innovation-offccbyberteh_orange.svg|thumb|none|150px|Collaborate]]


This is what we aim at by conducting the [[EDN/Software_Documentation_Marathon | Software Documentation Marathon]].
<br>
This will eventually lead to easy usable more secure and privacy preserving communication tools.
<br clear=all>
Since the internet is broken, we want to go even further. The new internet stacks among [[EDN/PrivacyProjects | these projects]] call for having services on top of them running and evaluated. This is what we aim at in the [[EDN/Testing |Prototyping and Testing]] phase.


= Goal =
= Goal =
[[Datei:NetworkWikimediacommonsCCbyInductiveload.svg|thumb|left|300px|City Wide Communication via local infrastructure]]
<br clear=all>
<br clear=all>
[[Datei:NetworkWikimediacommonsCCbyInductiveload.svg|thumb|left|200px|City Wide Communication via local infrastructure]]


Regarding the design flaws of the current internet, we believe that a complete new internet providing confidentiality, integrity of communication and censorship-resistance natively is indispensable.  
Regarding the design flaws of the current internet, we believe that a complete new internet providing confidentiality, integrity of communication and censorship-resistance is indispensable.  
We aim to build it and envision the new stack to be  
We envision the new stack to be  


* privacy tuned for and delivered with several [[EDN#Services | services]]
* Privacy tuned for and delivered with several [[EDN#Services | services]]
* convenient and attractive to use
* Convenient and attractive to use, focusing on accessibility and usability
* able to run on local individual infrastructure
* Able to run on local individual or public infrastructure
* [[EDN/Criteria | Free Software]]


The new internet uses the existing infrastructure to form a difficult-to-monitor cellphone/router/computer network. Its communication runs, first and foremost, on top of a combination of WiFi, copper and fibre optics, but we also consider Bluetooth, [http://www.cringely.com/2014/05/15/nsa-help-kill-uwb/ Ultra Wideband (UWB)], [http://ronja.twibright.com/installations.php red light], ukw and satellite uplinks - shortly all allowed frequencies and ways.
The new internet uses the existing infrastructure to form a difficult-to-monitor cellphone/router/computer network. Its communication runs, first and foremost, on top of a combination of WiFi, copper and fibre optics. Moreover, we consider Bluetooth, [http://www.cringely.com/2014/05/15/nsa-help-kill-uwb/ Ultra Wideband (UWB)], [http://ronja.twibright.com/installations.php red light], UKW and satellite uplinks - shortly all allowed frequencies and means of digital communication.




<br clear=all>
<br clear=all>


== [[EDN/Criteria | I. Privacy and Security Criteria]] ==
== [[EDN/Criteria |Criteria for the New Internet]] ==
 
The new internet should meet the following criteria. The quality of security and privacy might vary between the different exposed services.  [[EDN/Criteria | (...)]].
[[Datei:Castle.svg|thumb|none|200px|link=EDN/Criteria]]
<br>
<br>
<br>


== Services ==
== Services ==
Zeile 111: Zeile 129:
|}
|}


* Crypto Currency/ Pay System
 
* Searching in local and other reachable networks including the Internet
 
* File-sharing
* Social-Networking: Messaging, Micro Blogging, (Video)-Telephony;
* Blogging
* Data Storage (individual, group and public access);
* Private communication with embedded devices
* Searching contents in local and other reachable networks;
* Mirroring contents of the "old" internet;
* Payment system;
* Smart contract (blockchain);
* Collaborative document editing.
 




Zeile 123: Zeile 146:
<br>
<br>


== Beneficiaries of the new internet ==
== Overtaking the Attackers ==


In long term Everyone will benefit from the new internet stack. Since it is censorship resistant and provides confidentiality and integrity preserving services, it results in:
The arms race between attackers and defenders over data security and privacy on the internet is ongoing.
* '''Average citizens''' regaining parts of their privacy, informational self determination, ​​freedom of assembly, ​secrecy of correspondence and free speech- basic civil rights that ensure and back up our democracies.
However the conditions are good to overtake the attackers generously and change the game in favor of the defenders by way of variety replacing the broken internet by a combination of cutting-edge technologies:
 
 
* '''New internet protocol stacks''': There are new internet stacks among the privacy software projects such as [https://gnunet.org/ GNUnet], [http://maidsafe.net/ Maidsafe], [http://net2o.de/ Net2o] and [http://rina.tssg.org/, implementations: http://www.irati.eu/ RINA]. They have developed privacy aware routing and decentral naming systems for over ten years now. They are waiting for having services set and top of them and [https://wiki.c3d2.de/EDN/Testing evaluated].
* '''Matured operating systems for embedded devices and wifi-meshnet-routing''': It increases the effort of espionage if a computer network is decentralized. One important part of this is even to decentralize local communication by using a wireless network in connection with multiple internet accesses. Open Wireless Communities are existing already for some years. Have developed and optimized their routing algorithms and gained experience. They deploy routers and boards using Linux-based firmwares such as [https://openwrt.org/ OpenWRT] and [https://dd-wrt.com/site/ DD-WRT]. GNUnet has already been packet for [https://github.com/dangowrt/gnunet-15.05 OpenWRT] and has potential to [https://www.youtube.com/watch?v=OEBu7u6hZSo revolutionize] Open Wireless communities.
* '''Authority Free Onion Routing''' using [https://gnunet.org/brahms BRAHMS] is [https://events.ccc.de/camp/2015/wiki/Session:Authority-free_Onion_Routing_with_BRAHMS on the way].
* [https://reproducible-builds.org/ '''Reproducible Builds''']:  "to empower anyone to verify that no flaws have been introduced during the build process by reproducing byte-for-byte identical binary packages from a given [https://wiki.debian.org/ReproducibleBuilds/About source]."
<br>
 
== Beneficiaries of the New Internet ==
 
In the long run everyone will benefit from the new internet, since it is censorship resistant, provides confidentiality and integrity preserving services. It results in:
* '''Average citizens''' regaining parts of their privacy, informational self determination, ​​freedom of assembly, ​secrecy of correspondence and free speech - basic civil rights that ensure and back up our democracies.
* '''Safer government institutions and companies''' from espionage and "cyber" attacks.
* '''Safer government institutions and companies''' from espionage and "cyber" attacks.
<br>Use cases are for example online banking, government communication with citizens including tax returns, diplomatic, military and business communication and journalism.
<br>Use cases are for example online banking, government communication with citizens including tax returns, diplomatic and business communication and journalism.


= Approach =
= Approach =


[[Datei:BuildingBridges_CCOby_HebiFot.jpeg|thumb|none|700px|''CCO by HebiFot'']]
[[Datei:BuildingBridges_CCOby_HebiFot.jpeg|thumb|none|700px|Building Bridges|alt=Bridge being built]]
We aim to unite the different forces and resources of Free Software projects to achieve what none of them could do alone: Kickstart a network effect and provide a more secure and confidentiality preserving communication means to a significant part of the world-population - a new internet fitted with a set of privacy tuned services. To get there we built bridges by creating a better documentation for circa 20 privacy projects during our [[EDN#Software_Documentation_Marathon.E2.84.A2 | Software Documentation Marathon™]]. It will include a first analysis of the project's security and privacy qualities and recommendations for collaborations between interoperable projects.
On this basis we are able to proceed with the testing of different stacks and a [[EDN/Testing | Prototypical Realization]] of a wifi-mesh-able new internet with multiple integrated services.
<br clear=all>
<br>
<br>
== Software Documentation Marathon™ ==


We plan a ''Software Documentation Marathon™'', where we document and analyze circa 20 free software [https://projectedn.wordpress.com/cutting-edge-technologies/ projects]
Key elements of our work will be to assemble '''detailed API descriptions''' of the projects and its modules and to identify and highlight '''Interoperability between projects'''.
<br clear=all>
<br>
[[Datei:Interview_tiny.jpeg|thumb|left|300px| We conduct personal interviews. [[EDN#Software_Documentation_Marathon.E2.84.A2#Picture_References | (2)]]|alt=Two people sitting at a table.]]
We will collect the information needed by personal interviews with the privacy project developers.


All the information will be gathered in a standardized way and collected in a semantic wiki providing us with a set of tools to dynamically interconnect, organize and visualize the information.
Beside graphs and images it enables [https://wikidevi.com/wiki/Atheros dynamically generated tables] or [https://wikidevi.com/wiki/Special:Ask query based searches].
This way our results will be easy to reuse. It will be published under the Creative Commons licence [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA].
The Software Documentation Marathon™ delivers the work base for [[EDN/Testing | Prototyping and Testing]].
<br>
<br>
<br clear=all>
; Note: @Software Documentation Marathon™: We used the ™ just for fun to express that we like the name of this phase very much. Everyone who likes the name too can use it!
<br>
<br>


We aim to '''unite''' the different '''forces''' and resources that aim for more privacy and security such as the older and upcoming software projects, scientists, activists and others to achieve what none of them could do alone:
=== Software Documentation Contents ===
Provide a free confidential and integer communication means to a significant part of the world-population to backup civil rights and even functions on local individual infrastructure- a new internet- be with us!


We built bridges by creating a better documentation for over 70 privacy projects during our [[EDN/Software_Documentation_Marathon | Software Documentation Marathon™]] with them having only little effort to get it.
<gallery mode="nolines" widths=200px heights=200px perrow=3>
Better documentation will lead to better maintainability of code, deployability and usability.
Datei:Prozent1.svg|alt=Percent|'''Status Quo of the Marathon''' (progress bar), total and for every single project [[EDN#Software_Documentation_Marathon.E2.84.A2#Picture_References | (3)]];
It will include a first analysis of the project's security and privacy qualities and a lot [[EDN/Software_Documentation_Marathon#Software_Documentation_Contents | more]].
Datei:Coloredshapesccby10binary-Dmos.svg.png|alt=Colored Shapes|'''Basic Information''': programming-language(s), software-licence(s), etc. [[EDN#Software_Documentation_Marathon.E2.84.A2#Picture_References | (4)]];
We will expose intersections for projects to interoperate and make recommendations for good fits which will
Datei:ColoredbyDemospartsSVG_Richard_Wheeler(Zephyris)2005Converted2SVGbyRyanlerch.svg|alt=Helicopter Anatomy|'''Project Anatomy:''' Visualization of the Projects' Architecture, description of its components, their functionality, its interaction/communication, link to its code base [[EDN#Software_Documentation_Marathon.E2.84.A2#Picture_References | (5)]];
raise collaborations between projects and make them achieve what they could not do alone without big effort.
Datei:DocumentationCObyOpemIcons_modifiedwithsourceCodeCCbySimpleIcons_Green.svg|alt=Documentation|'''Unified API Documentation''' for every project and its modules (we choose one of existing standards) including its privacy, security and performance assertions and preconditions [[EDN#Software_Documentation_Marathon.E2.84.A2#Picture_References | (6)]];
Datei:Open-innovation-offccbyberteh_orange.svg|alt=Connected incandescent bulbs|'''Highlighting Interoperability''': intersections where projects could be connected and therefore collaborate or simply share code[[EDN#Software_Documentation_Marathon.E2.84.A2#Picture_References | (7)]];
Datei:NewHaldi_wikimediaCommonsBluered.svg|alt=New Haldi|'''Known Vulnerabilities and Resistance''' to a list of attacks and more (+ derivable vulnerabilities) [[EDN#Software_Documentation_Marathon.E2.84.A2#Picture_References | (8)]];
Datei:Ccbycarlitos-BikeWheel.svg|alt=Bike-wheel|'''Double Implementations''' of similar functionality [[EDN#Software_Documentation_Marathon.E2.84.A2#Picture_References | (9)]];
Datei:Tanabata-Wish-TreeCCbyuroesch_REcoloredbyDmos.svg|alt=Tanabata-Wish-Tree|'''Top Features''' the projects would like to implement/integrate (that meet hard problems such as anonymity and large scale mesh-networking) [[EDN#Software_Documentation_Marathon.E2.84.A2#Picture_References | (10)]];
Datei:Cycling_CC0.png|'''Tests performed''' : Details about tests that have been already performed by the projects|alt=a person riding a bike;
</gallery>


After the[[EDN/Software_Documentation_Marathon | Software Documentation Marathon™]] we preselect
a combination of modules that fit best to meet our [[EDN/Criteria | criteria]] and do a [[EDN/Testing | Prototypical Realisation]] of new internet stacks and services on top of them.
This will include generic testing on a virtual and real testbed.




== [[EDN/Software_Documentation_Marathon | Software Documentation Marathon]] ==
'''Some properties could be organized like this:'''


[[Datei:RUN_mirroredCCbyClkerFreeVectorImages.svg|thumb|none|200px|Software Documentation Marathon™|link=EDN/Software_Documentation_Marathon]]
* Claims to provide (list of [[EDN#I._Privacy_and_Security_Criteria | criteria]])
* (Actually provides (list of [[EDN#I._Privacy_and_Security_Criteria | criteria]])-> checked by testing phase)
* Enables (list of [[EDN#Services | services]])
* Replaces (list of proprietary software)
* Prevents (list of attacks under (list of conditions))-> threat model (type)-TRIKE
* Interfaces with (ecosystem): ?
* Interconnects with (list of OSI-layers, list of software projects, list of [[Echt_Dezentrales_Netz/modules#Rawlist_of_existing_modules.2Fpatterns | modules]])
* Implements (list of [[Echt_Dezentrales_Netz/modules#Rawlist_of_existing_modules.2Fpatterns | modules]])
* Is component or standalone (full app) or runs on bare metal
* Runs on Unix like operating systems


== [[EDN/Testing | Prototyping and Testing]] ==
=== Benefits ===
The documentation leads to:


Find this chapter [[EDN/Testing | here]].
* '''Better maintainability of code''', deployability without big effort by the projects;
* '''Saving ressources''' ((wom-)men-power, in best case bandwidth and computational cost;
* '''Faciliate collaboration between projects in order to solve hard problems such as anonymity but also provide other desired features and better usability;
* '''Ensuring security more easy''' by using proven modules;
* '''A thorough Knowledge-base''' for researchers and developers that spares valuable time to get to know other projects without reading tons of code;
* '''A thorough Knowledge-base''' for foundations in this field;


= Best Current Practice Recommendation =
<br>
<br>


The following is an essence of a [http://secushare.org/comparison Best Current Practice Recommendation].
== Combination-Prototyping and Testing ==
[[Datei:Maxresdefault_.jpg|thumb|none|700px|alt=a set of mechanic tools]]
The [[EDN#Software_Documentation_Marathon | Software Documentation Marathon™]] delivers our working basis to preselect a combination of projects or modules that are interoperable and meet our [[EDN/Criteria | standard]].
In this phase our objective will be to create prototypes and test them in a generic manner on a virtual and a real testbed.


[[Datei:Ricochet.png|thumb|left|70px|''Instant Messaging: Ricochet''|link=https://ricochet.im/]]
<br clear=all>
[[Datei:Tribler-logo.png|thumb|none|70px|''Filesharing:  Tribler''|link=http://www.tribler.org/]]
[[Datei:Bitmessage.png|thumb|left|70px|''Asynchronous Messaging: Bitmessage''|link=https://www.bitmessage.org/wiki/Main_Page]]


'''Testing Objectives:'''


* Deployability and Configurability
* Scalability
* Reliability: Under normal conditions, hard conditions, attacks: Percentage of completed/successful processes.
* Performance: How does a complete process take in worst case?
* Lightweight: Payload and program size
* Security and Privacy : Resists a list of attacks in percentage.


<br clear=all>
<br clear=all>
We add this one:
Browsing: [https://www.torproject.org/projects/torbrowser.html.en Tor-Browser-Bundle]


= Costs =
<gallery widths=100px heights=100px>
Find our calculations [https://libreplanet.org/wiki/File:EDNprojectCalculationFebruar2016.ods here].
Datei:Taekwondo_CC0.png|Resilience|alt=Two figures fighting Taekwondo
Datei:Cycling_CC0.png|Performance|alt=Cycling person
Datei:Weightlifting_CC0.png|Networking overhead and size of program|alt=Weightlifting Person
</gallery>
 
 
'''Testing:'''
 
* One or two services on different stacks
* New combinations of modules for the stacks
* Multiple network configurations with respect to specific situations (e.g., attack scenarios, dense and distant mesh, internet connected nodes)
* Multiple services on one stack
 
 
'''Test Results Reveal'''
 
* Best stack for given service and situation
* Optimal network configuration for the different use cases
* Sweet spots between scalability, performance, and privacy and security
 
<br>
<br>
= Best Current Practice Recommendation =
The following is an essence of a [http://secushare.org/comparison Best Current Practice Recommendation].
<gallery widths=100px heights=100px>
Datei:Ricochet.png|''Instant Messaging: [https://ricochet.im/ Ricochet]''|alt=Logo Ricochet
Datei:Tribler-logo.png|''Filesharing:  [http://www.tribler.org/ Tribler]''
Datei:Bitmessage.png|''Asynchronous Messaging: [https://www.bitmessage.org/wiki/Main_Page Bitmessage]''
Datei:306px-Tor-logo-2011-flat.svg.png|We add this one for Browsing: [https://www.torproject.org/projects/torbrowser.html.en Tor-Browser-Bundle]
</gallery>
<br clear=all>


= Community and Crew =
= Community and Crew =


We are [https://libreplanet.org/wiki/GNU/consensus/stakeholders#EDN stakeholders] of [https://gnu.org/consensus/manifesto.html GNU consensus] and allies of [http://youbroketheinternet.org/ #youbroketheinternet project].  
We are [https://libreplanet.org/wiki/GNU/consensus/stakeholders#EDN stakeholders] of [https://gnu.org/consensus/manifesto.html GNU consensus] and allies of the [http://youbroketheinternet.org/ #youbroketheinternet] project.  
To our crew belong software architects, a student of Fine Arts, Privacy Project developers and Privacy and Security researchers.
To our crew belong software architects, a student of Fine Arts, Privacy Project developers and Privacy and Security researchers.


Zeile 184: Zeile 296:
Be with us!
Be with us!


[[Datei:Team.jpeg|thumb|none|300px]]
<div><ul>
<li style="display: inline-block;"> [[Datei:Team.jpeg|thumb|none|300px]] </li>
First contact:  demos et posteo dot de
 
Public key via: [http://pgp.mit.edu/pks/lookup?op=get&search=0xF4B0EE66407332D8 keyserver]
 
Fingerprint:  8B64 374A C01A 69E1 0BF2 0955 F4B0 EE66 4073 32D8
 
= Picture References =
 
# [https://creativecommons.org/publicdomain/zero/1.0/deed.en CCO] "Six pigs" by [http://www.publicdomainpictures.net/view-image.php?image=127443&picture=six-pigs piotr siedlecki]
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] "Gingerbread Puppeteer" by [https://openclipart.org/detail/195086/gingerbread-puppeteer theyogre], decolored by dmos
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] "Paper Trails"'' by [https://www.flickr.com/photos/lel4nd/5397107357/in/photolist-9dVzZ8 Leland Francisco]''
# [https://creativecommons.org/publicdomain/zero/1.0/deed.en CCO] "Delaunay Triangulation" by [https://commons.wikimedia.org/wiki/File:Delaunay_Triangulation_%28100_Points%29.svg Inductiveload]
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] by [http://picol.org/ Picol], arranged images by dmos with filsharing image extracted from a batch by [https://www.fsf.org/resources/badges FSF]
# [https://creativecommons.org/publicdomain/zero/1.0/deed.en CCO], [https://pixabay.com/en/mountains-bridge-bridge-building-1033979/ "Bridge"]


= Picture References SDM =


Write us in [https://www.bitmessage.org/wiki/Main_Page Bitmessage]
# [https://creativecommons.org/publicdomain/zero/1.0/deed.en CC0] "player-running-black-and-white" by [https://pixabay.com/en/player-running-black-and-white-34370/ Clker FreeVectorImages]
BM-NBqqoMzajZNXQru2Kz4JXqq6RbsEmeuL
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] "Interview Without Speech Bubbles" by [https://openclipart.org/detail/233854/interview-without-speech-bubbles GSJ]
[[Datei:FirstContact.png|thumb|none|150px]]
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] Dmos
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] "Supreme Shapes" by [https://openclipart.org/detail/116905/supreme-shapes 10binary], colored by Dmos
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] "Helicopter Anatomy" by [https://en.wikipedia.org/wiki/File:Helicopter_AnatomySVG.svg Richard Wheeler(Zephyris)], colored by Dmos
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] "documentation" by [https://pixabay.com/en/manual-docs-documentation-help-98728/ OpenIcons], modified by Dmos with "sourceCode" by [https://openclipart.org/detail/213242/source-code-icon SimpleIcons]
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] "Open Innovation - off" by [https://openclipart.org/detail/175356/open-innovation-off berteh], colored by Dmos
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] "New Haldi" by [https://commons.wikimedia.org/wiki/File:NewHaldi.jpg EvgenyGenkin], colored by Dmos
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] "BikeWheel" by [https://openclipart.org/detail/7902/bikewheel carlitos]
# [https://creativecommons.org/licenses/by-sa/2.0/ CC-BY-SA] "Tanabata-Wish-Tree"by [https://openclipart.org/detail/179912/tanabata-wish-tree uroesch], recolored by Dmos


Email: demos et posteo dot de, [https://pgp.mit.edu/pks/lookup?op=get&search=0x2DB71A63B0932843 GPG], Fingerprint: 9A0E 7D84 0D22 F15A 3FE3 4756 2DB7 1A63 B093 2843
[[Kategorie:Projekt]]
[[Kategorie:Projekt]]
[[Kategorie:EDN]]
[[Kategorie:EDN]]
[[Kategorie:Abkürzung]]

Aktuelle Version vom 17. Januar 2018, 08:05 Uhr

Deutsch

EDN logo with the letters EDN looking like a network and toped with two WiFi-symbols, one left and one right

We develop a new protective Internet

Welcome

This is the official wiki of the research and software project EDN (Echt Dezentrales Netz - real decentralized network). Our vision is to provide a more secure and confidentiality preserving communication means to billions of people: individuals, families and organisations of whatever format - a new internet fitted with a set of privacy tuned services running on local individual or public infrastructure and meets our standard.

News

We have a new website which addresses potential sponsors. Recently we have presented EDN to the people of Wau Holland Foundation. Thank you for your invitation!

Here is our project diary.


Note
.onion addresses can be accessed via Tor Browser Bundle

Status Quo

Centralization, Outdated Protocols




Social graphs can be extracted easily at central points of failure (1)


The prevalent digital communication means undermine their users' data integrity and confidentiality starting with all digital communication of one country going through one or just a few telecommunication providers' servers. These accumulate data, including metadata, which is the basis to derive people's social graphs, movement patterns and even psychological profiles. Further centres of data accumulation are services like Facebook, Twitter or Youtube. They profited by peoples' wish to reach as many people as possible. This has led them to focus on using certain services - known as the Network Effect - rather than privacy and security aspects. This not only helped these services grow significantly, but also led to huge data accumulations in few locations. These have its own value for several groups and provoke criminal activity to access and misuse it. When your hardware gets stolen you soon will notice that. It makes a transition from you - the rightful owner - to another one. Usually data won't be moved just copied. You won't notice the access directly or never if you have entrusted it to another party or let your digital communication flow through a single instance exposing all your meta data. To make things worse the current internet protocols base on a completely outdated threat model as the Snowden revelations have shown at the very latest. They are by design vulnerable to a number of attacks.(1, 2, 3). These open ways to undermine even overlaying structures, such as Tor, deanonymizing its shelter seeking users and hidden services by traffic correlation.

These conditions- the brokeness and centralization- facilitate:

  • Censorship: On plattforms and by countries;
  • Passive Mass Spying;
  • Active Intrusion on a global scale;

It is most likely that patches like overlay networks can only ease the shortcomings of the current internet but not fix it using this vulnerable basis for confidential communication. This may be less critical for high latency networks over the Internet or Sneakernets that do not use the internet at all. Alternative networks, however suffer from the following problems. Their network is unlikely to gain enough users, due to shortcomings in their accessibility and usability. Thus, it will not be attractive for most people wanting to communicating with their friends. Moreover, such a small user group might also jeopardize the users anonymity and privacy, as each user is deemed suspicions and errors in the network stack take longer to get fixed. Finally, this cast doubt on the whole idea of an alternative network. To break this cycle, we think that multiple well tuned secure solutions must be brought together focusing on accessibility and usability, to combine and increase their small user groups and kick start the required Network Effect.

Threat Model


We presume a global active attacker that does automated intrusion such as traffic shaping.We share our threat model with Secushare.



Competitiveness and Lack of Collaboration

Here is our list of Privacy Software Projects.

man standing on a field covered with scattered pieces of paper
Highly fragmented privacy and security software landscape (3)

The privacy and security software landscape is highly fragmented. This has implications for their quality and therefore for their users' privacy and security. We found over 80 Free Software Privacy Projects and this is nowhere near complete regarding this survey. All compete for contributors, funding, users, bandwidth while implementing redundant, often mediocre solutions which is no wonder since most of them lack resources to do it all good. This leads to bad code documentation, which consequently impedes potential help by new developers or researchers finding vulnerabilities and providing more secure solutions. These are some reasons why there is almost no collaboration between the projects although they share the same goals and would benefit from these collaborations exceptionally.




Goal


City Wide Communication via local infrastructure

Regarding the design flaws of the current internet, we believe that a complete new internet providing confidentiality, integrity of communication and censorship-resistance is indispensable. We envision the new stack to be

  • Privacy tuned for and delivered with several services
  • Convenient and attractive to use, focusing on accessibility and usability
  • Able to run on local individual or public infrastructure
  • Free Software

The new internet uses the existing infrastructure to form a difficult-to-monitor cellphone/router/computer network. Its communication runs, first and foremost, on top of a combination of WiFi, copper and fibre optics. Moreover, we consider Bluetooth, Ultra Wideband (UWB), red light, UKW and satellite uplinks - shortly all allowed frequencies and means of digital communication.



Criteria for the New Internet

The new internet should meet the following criteria. The quality of security and privacy might vary between the different exposed services. (...).


Services

public personal/private
Text Chat of local (neighboring) nodes To a single person: Chat, Email or SMS To multiple people: Chat or mailing list
Audio/Telephony/Video Call among locally restricted nodes normal call conference call
Other formats ? ? ?


  • Social-Networking: Messaging, Micro Blogging, (Video)-Telephony;
  • Data Storage (individual, group and public access);
  • Searching contents in local and other reachable networks;
  • Mirroring contents of the "old" internet;
  • Payment system;
  • Smart contract (blockchain);
  • Collaborative document editing.




Overtaking the Attackers

The arms race between attackers and defenders over data security and privacy on the internet is ongoing. However the conditions are good to overtake the attackers generously and change the game in favor of the defenders by way of variety replacing the broken internet by a combination of cutting-edge technologies:


  • New internet protocol stacks: There are new internet stacks among the privacy software projects such as GNUnet, Maidsafe, Net2o and implementations: http://www.irati.eu/ RINA. They have developed privacy aware routing and decentral naming systems for over ten years now. They are waiting for having services set and top of them and evaluated.
  • Matured operating systems for embedded devices and wifi-meshnet-routing: It increases the effort of espionage if a computer network is decentralized. One important part of this is even to decentralize local communication by using a wireless network in connection with multiple internet accesses. Open Wireless Communities are existing already for some years. Have developed and optimized their routing algorithms and gained experience. They deploy routers and boards using Linux-based firmwares such as OpenWRT and DD-WRT. GNUnet has already been packet for OpenWRT and has potential to revolutionize Open Wireless communities.
  • Authority Free Onion Routing using BRAHMS is on the way.
  • Reproducible Builds: "to empower anyone to verify that no flaws have been introduced during the build process by reproducing byte-for-byte identical binary packages from a given source."


Beneficiaries of the New Internet

In the long run everyone will benefit from the new internet, since it is censorship resistant, provides confidentiality and integrity preserving services. It results in:

  • Average citizens regaining parts of their privacy, informational self determination, ​​freedom of assembly, ​secrecy of correspondence and free speech - basic civil rights that ensure and back up our democracies.
  • Safer government institutions and companies from espionage and "cyber" attacks.


Use cases are for example online banking, government communication with citizens including tax returns, diplomatic and business communication and journalism.

Approach

Bridge being built
Building Bridges

We aim to unite the different forces and resources of Free Software projects to achieve what none of them could do alone: Kickstart a network effect and provide a more secure and confidentiality preserving communication means to a significant part of the world-population - a new internet fitted with a set of privacy tuned services. To get there we built bridges by creating a better documentation for circa 20 privacy projects during our Software Documentation Marathon™. It will include a first analysis of the project's security and privacy qualities and recommendations for collaborations between interoperable projects. On this basis we are able to proceed with the testing of different stacks and a Prototypical Realization of a wifi-mesh-able new internet with multiple integrated services.


Software Documentation Marathon™

We plan a Software Documentation Marathon™, where we document and analyze circa 20 free software projects Key elements of our work will be to assemble detailed API descriptions of the projects and its modules and to identify and highlight Interoperability between projects.

Two people sitting at a table.
We conduct personal interviews. (2)

We will collect the information needed by personal interviews with the privacy project developers.

All the information will be gathered in a standardized way and collected in a semantic wiki providing us with a set of tools to dynamically interconnect, organize and visualize the information. Beside graphs and images it enables dynamically generated tables or query based searches. This way our results will be easy to reuse. It will be published under the Creative Commons licence CC-BY-SA. The Software Documentation Marathon™ delivers the work base for Prototyping and Testing.


Note
@Software Documentation Marathon™: We used the ™ just for fun to express that we like the name of this phase very much. Everyone who likes the name too can use it!



Software Documentation Contents


Some properties could be organized like this:

  • Claims to provide (list of criteria)
  • (Actually provides (list of criteria)-> checked by testing phase)
  • Enables (list of services)
  • Replaces (list of proprietary software)
  • Prevents (list of attacks under (list of conditions))-> threat model (type)-TRIKE
  • Interfaces with (ecosystem): ?
  • Interconnects with (list of OSI-layers, list of software projects, list of modules)
  • Implements (list of modules)
  • Is component or standalone (full app) or runs on bare metal
  • Runs on Unix like operating systems

Benefits

The documentation leads to:

  • Better maintainability of code, deployability without big effort by the projects;
  • Saving ressources ((wom-)men-power, in best case bandwidth and computational cost;
  • Faciliate collaboration between projects in order to solve hard problems such as anonymity but also provide other desired features and better usability;
  • Ensuring security more easy by using proven modules;
  • A thorough Knowledge-base for researchers and developers that spares valuable time to get to know other projects without reading tons of code;
  • A thorough Knowledge-base for foundations in this field;



Combination-Prototyping and Testing

a set of mechanic tools

The Software Documentation Marathon™ delivers our working basis to preselect a combination of projects or modules that are interoperable and meet our standard. In this phase our objective will be to create prototypes and test them in a generic manner on a virtual and a real testbed.


Testing Objectives:

  • Deployability and Configurability
  • Scalability
  • Reliability: Under normal conditions, hard conditions, attacks: Percentage of completed/successful processes.
  • Performance: How does a complete process take in worst case?
  • Lightweight: Payload and program size
  • Security and Privacy : Resists a list of attacks in percentage.



Testing:

  • One or two services on different stacks
  • New combinations of modules for the stacks
  • Multiple network configurations with respect to specific situations (e.g., attack scenarios, dense and distant mesh, internet connected nodes)
  • Multiple services on one stack


Test Results Reveal

  • Best stack for given service and situation
  • Optimal network configuration for the different use cases
  • Sweet spots between scalability, performance, and privacy and security


Best Current Practice Recommendation

The following is an essence of a Best Current Practice Recommendation.


Community and Crew

We are stakeholders of GNU consensus and allies of the #youbroketheinternet project. To our crew belong software architects, a student of Fine Arts, Privacy Project developers and Privacy and Security researchers.

Contact

Be with us!