EDN: Unterschied zwischen den Versionen

Aus C3D2
Zur Navigation springen Zur Suche springen
Zeile 52: Zeile 52:
<br><br>
<br><br>


[[Datei:Zettelwirtschaft.jpg |thumb|none|800px|''CC-SA by Leland Francisco'']]
[[Datei:Zettelwirtschaft.jpg |thumb|none|700px|''CC-SA by Leland Francisco'']]





Version vom 17. März 2016, 08:07 Uhr

Deutsch

We build the new internet - be with us!

Welcome

This is the official wiki of the research and software project EDN (Echt Dezentrales Netz - real decentralized network). We are stakeholders of GNU consensus.

We cherish privacy as an important aspect of a liberal society. Our vision is to create a space to unfold and guard basic civil rights such as informational self determination, ​​freedom of assembly, ​secrecy of correspondence and free speech. Our final goal is a new wifi mesh-networking capable internet protocol stack that includes a set of services.

News

We have presented EDN to the people of Wau Holland Foundation recently. Thank you for your invitation!:)

Here is our project diary.


Note
.onion addresses can be accessed via Tor Browser Bundle

Status Quo

Centralized Communication Infrastructure

Datei:Pigs.jpeg
Single Point Of Failure (SPOF)


Today's communication infrastructure is predominantly centralized. For a start all communication of one country goes through one or just a few telecommunication providers' server. On these metadata are accumulating - the base to derive people's social graphs, movement patterns and even psychological profiles. Peoples' wish to reach as many people possible for communication has led to a focus on using certain services that had good usability qualities - known as the Network Effect. This has let services like Facebook, Twitter or Youtube grow significantly and also to big data congregations at relatively few points. Those data congregations - symbolized by the food remains on the picture above- awaken greediness, since it has among other market value.

Threat Model

Datei:Gasmask.svg


We presume a global active attacker that does automated intrusion such as traffic shaping. We draw the line before targeted operations. We share our threat model with Secushare.


Privacy Software Projects

Find our list of promising projects here.


Datei:Maidsafe.svgDatei:Briar.pngDatei:Gnunet.pngDatei:Logonet2o.png [...]



CC-SA by Leland Francisco



Many people assume that the wild installation of a bunch of single purpose privacy tools is sufficient to protect their privacy. By focusing on single purpose solutions and the resulting need for cryptoparties, people overlook a significant number of disadvantages: First, the users are unaware of the varying privacy assertions made by these solutions. Second, these tools compete for computing and channel resources. Third, teaching users the various individual tools is very ineffective and inconvenient. This in turn in addition to the Network Effect average users stick to more insecure but familiar and prevalent solutions although they know about its impact on their privacy. Fourth, the long list of existing privacy projects compete for contributors, funding and users while implementing redundant, sometimes mediocre solutions.


This could be better!

Under construction right now.


Yet a sober analysis of the matter reveals that the old internet stack and wild installations are a bad basis for privacy efforts. Hence, we believe that a complete new internet stack providing high confidentiality, integrity of communication and censorship-resistance natively is indispensable. In particular, we envision the new stack to be free software, decentralized, distributed, end-to-end encrypted, meta-data protected, easy to use, efficient, lightweight mesh-networking capable and well-documented. Accordingly, our goal is to evaluate the privacy and security qualities of 72 projects -- including privacy aware internet stacks and find out whether and how we could combine the resources and implementations of the best projects to achieve what none of them could do alone: A new privacy aware internet stack as a powerful means to back up civil rights to billions of people, which is

  • privacy tuned for and delivered with several services
  • convenient and attractive to use
  • able to run on local individual infrastructure

Goal

Datei:VisionQuerformat.svg


Our goal is to use the existing resources to form a difficult-to-monitor cellphone/router/computer network by building bridges between proven projects. There are plenty of software solutions with the goal of protecting the privacy of its users. Preexisting structures are to be evaluated and combined into such a network. The communication should run, first and foremost, on top of a combination of WiFi, copper and fibre optics, but we also consider Bluetooth, Ultra Wideband (UWB), red light, ukw and satellite uplinks - shortly all allowed frequencies and ways.


I. Privacy and Security Criteria

Find all criteria here.

Datei:Castle.svg

Services

public personal/private
Text Chat of local (neighboring) nodes To a single person: Chat, Email or SMS To multiple people: Chat or mailing list
Audio/Telephony/Video Call among locally restricted nodes normal call conference call
Other formats ? ? ?
  • crypto currency/ pay system
  • Searching in local and other reachable networks including the Internet
  • file-sharing
  • blogging
  • Private communication with embedded devices


Datei:Services.png



Beneficiaries of the new internet

In long term Everyone will benefit from the new internet stack. Since it is censorship resistant and provides confidentiality and integrity preserving services, it results in:

  • Average citizens regaining parts of their privacy, informational self determination, ​​freedom of assembly, ​secrecy of correspondence and free speech- basic civil rights that ensure and back up our democracies.
  • Safer government institutions and companies from espionage and "cyber" attacks.


Use cases are for example online banking, government communication with citizens including tax returns, diplomatic, military and business communication and journalism.

Approach

CCO by HebiFot


We aim to unite the different forces and resources that aim for more privacy and security such as the older and upcoming software projects, scientists, activists and others to achieve what none of them could do alone: Provide a free confidential and integer communication means to a significant part of the world-population to backup civil rights and even functions on local individual infrastructure- a new internet- be with us!

We built bridges by creating a better documentation for over 70 privacy projects during our Software Documentation Marathon™ with them having only little effort to get it. Better documentation will lead to better maintainability of code, deployability and usability. It will include a first analysis of the project's security and privacy qualities and a lot more. We will expose intersections for projects to interoperate and make recommendations for good fits which will raise collaborations between projects and make them achieve what they could not do alone without big effort.

After the Software Documentation Marathon™ we preselect a combination of modules that fit best to meet our criteria and do a Prototypical Realisation. This will include generic testing on a virtual and real testbed.


Software Documentation Marathon

Find this chapter here.

Prototyping and Testing

Find this chapter here.

Costs

Find our calculations here.

Contact

Be with us!


Write us in Bitmessage BM-NBqqoMzajZNXQru2Kz4JXqq6RbsEmeuL

Datei:FirstContact.png

Email: demos et posteo dot de, GPG, Fingerprint: 9A0E 7D84 0D22 F15A 3FE3 4756 2DB7 1A63 B093 2843