EDN: Unterschied zwischen den Versionen

Aus C3D2
Zur Navigation springen Zur Suche springen
Zeile 36: Zeile 36:
* Instant Messaging [https://ricochet.im/ ''Ricochet'']
* Instant Messaging [https://ricochet.im/ ''Ricochet'']
* Filesharing  [http://www.tribler.org/ Tribler]
* Filesharing  [http://www.tribler.org/ Tribler]
* Asynchronous messaging [https://www.bitmessage.org/wiki/Main_Page Bitmessage].
* Asynchronous Messaging [https://www.bitmessage.org/wiki/Main_Page Bitmessage].


If we want to have '''better privacy and integrity for our digital communication''', we need a new internet, that carries these qualites by design.
If we want to have '''better privacy and integrity for our digital communication''', we need a new internet, that carries these qualites by design.

Version vom 14. März 2016, 18:42 Uhr

Deutsch

We build the new internet - be with us!

Welcome

This is the official wiki of the research and software project EDN (Echt Dezentrales Netz - real decentralized network). We are stakeholders of GNU consensus.

We cherish privacy as an important aspect of a liberal society. Our vision is to create a space to unfold and guard basic civil rights such as informational self determination, ​​freedom of assembly, ​secrecy of correspondence and free speech. Our final goal is a new wifi mesh-networking capable internet protocol stack that includes a set of services.

News

We have presented EDN to the people of Wau Holland Foundation recently. Thank you for your invitation!:)

Here is our project diary.


Note
.onion addresses can be accessed via Tor Browser Bundle

Status Quo

Centralized Communication Infrastructure

Datei:Pigs.jpeg


Today's communication infrastructure is predominantly centralized. This leads to big data congregations at relatively few points which awaken greediness, since these have among other market value. Also the centralization facilitates espionage and manipulation of arbitrary digital communication be it censorship or attacks.

Patches on top of this stack can only ease the shortcommings of the old internet. One must be very careful to not lull endangered groups such as journalists into a (false) sense of security here, which actually can jeopardize them! However best current practice recommendation for

If we want to have better privacy and integrity for our digital communication, we need a new internet, that carries these qualites by design.

Threat model

Datei:Gasmask.svg


We presume a global active attacker that does automated intrusion such as traffic shaping. We draw the line before targeted operations. We share our threat model with Secushare.


Privacy Software Projects

Find our list of promising projects here.


Datei:Maidsafe.svgDatei:Briar.pngDatei:Gnunet.pngDatei:Logonet2o.png [...]



CC-SA by Leland Francisco


Many people assume that the wild installation of a bunch of single purpose privacy tools is sufficient to protect their privacy and that cryptoparties teaching the usage of GPG, Tor or decentralized Social Networking is the solution for our problem. By focusing on single purpose solutions and the resulting need for cryptoparties, people overlook a significant number of disadvantages: First, their users are unaware of the varying privacy assertions made by these solutions. Second, these tools compete for computing and channel resources. Third, teaching users the various individual tools is very ineffective and inconvenient. This in turn, average users stick to more insecure but familiar and prevalent solutions although they know about its impact on their privacy. Fourth, the long list of existing privacy projects compete for contributors, funding and users while implementing redundant, sometimes mediocre solutions.

Under construction right now.


Finally, even the current internet stack most projects utilize is known to be vulnerable to a list of attacks based on the stacks dependence on central authorities. This is true for BGP routing, DNS, and all client-server applications. Consequently, the internet stack can be seen as an accumulation of many single points of failures (SPOF) facilitating censorship, passive spying, and active intrusion on a global scale.

Yet a sober analysis of the matter reveals that the old internet stack and wild installations are a bad basis for privacy efforts. Hence, we believe that a complete new internet stack providing high confidentiality, integrity of communication and censorship-resistance natively is indispensable. In particular, we envision the new stack to be free software, decentralized, distributed, end-to-end encrypted, meta-data protected, easy to use, efficient, lightweight mesh-networking capable and well-documented. Accordingly, our goal is to evaluate the privacy and security qualities of 72 projects -- including privacy aware internet stacks and find out whether and how we could combine the resources and implementations of the best projects to achieve what none of them could do alone: A new privacy aware internet stack as a powerful means to back up civil rights to billions of people, which is

  • privacy tuned for and delivered with several services
  • convenient and attractive to use
  • able to run on local individual infrastructure

Goal

Datei:VisionQuerformat.svg


Our goal is to use the existing resources to form a difficult-to-monitor cellphone/router/computer network by building bridges between proven projects. There are plenty of software solutions with the goal of protecting the privacy of its users. Preexisting structures are to be evaluated and combined into such a network. The communication should run, first and foremost, on top of a combination of WiFi, copper and fibre optics, but we also consider Bluetooth, Ultra Wideband (UWB), red light, ukw and satellite uplinks - shortly all allowed frequencies and ways.


I. Privacy and Security Criteria

Find all criteria here.

Datei:Castle.svg

Services

public personal/private
Text Chat of local (neighboring) nodes To a single person: Chat, Email or SMS To multiple people: Chat or mailing list
Audio/Telephony/Video Call among locally restricted nodes normal call conference call
Other formats ? ? ?
  • crypto currency/ pay system
  • Searching in local and other reachable networks including the Internet
  • file-sharing
  • blogging
  • Private communication with embedded devices


Datei:Services.png



Beneficiaries of the new internet

In long term Everyone will benefit from the new internet stack. Since it is censorship resistant and provides confidentiality and integrity preserving services, it results in:

  • Average citizens regaining parts of their privacy, informational self determination, ​​freedom of assembly, ​secrecy of correspondence and free speech- basic civil rights that ensure and back up our democracies.
  • Safer government institutions and companies from espionage and "cyber" attacks.


Use cases are for example online banking, government communication with citizens including tax returns, diplomatic, military and business communication and journalism.

Approach

caption

CCO by HebiFot


We aim to unite the different forces and resources that aim for more privacy and security such as the older and upcoming software projects, scientists, activists and others to achieve what none of them could do alone: Provide a free confidential and integer communication means to a significant part of the world-population to backup civil rights and even functions on local individual infrastructure- a new internet- be with us!

We built bridges by creating a better documentation for over 70 privacy projects during our Software Documentation Marathon™ with them having only little effort to get it. Better documentation will lead to better maintainability of code, deployability and usability. It will include a first analysis of the project's security and privacy qualities and a lot more. We will expose intersections for projects to interoperate and make recommendations for good fits which will raise collaborations between projects and make them achieve what they could not do alone without big effort.

After the Software Documentation Marathon™ we preselect a combination of modules that fit best to meet our criteria and do a Prototypical Realisation. This will include generic testing on a virtual and real testbed.


Software Documentation Marathon

Find this chapter here.

Prototyping and Testing

Find this chapter here.


Costs

Find our calculations here.

Contact

Be with us!


Write us in Bitmessage BM-NBqqoMzajZNXQru2Kz4JXqq6RbsEmeuL Datei:FirstContact.png

--Demos