Echt Dezentrales Netz/en: Unterschied zwischen den Versionen

Aus C3D2
Zur Navigation springen Zur Suche springen
KKeine Bearbeitungszusammenfassung
 
(203 dazwischenliegende Versionen von 5 Benutzern werden nicht angezeigt)
Zeile 1: Zeile 1:
'''Here will be an english version soon.'''
#WEITERLEITUNG [[EDN]]
 
----
 
{{:Echt Dezentrales Netz}}
 
----
 
: '''In times of growing surveillance we, who contribute'''
: '''want to give an adequate technical answer and create by ourselves'''
: '''what we have been waiting for.'''
 
== Welcome ==
 
This is the main page from the research and software project '''''[[Echt Dezentrales Netz|EDN]]''''' ([[Echt Dezentrales Netz]] - really decentralized network).
 
The goal of ''[[Echt Dezentrales Netz|EDN]]'' is to '''verify''' the '''applicability''' of existing technologies and solutions (see [[Echt Dezentrales Netz/Recherche | Recherche]]), and to '''integrate''' them in a comprehensive '''product'''.
 
: An encrypted network as Freifunk, whose complete communication is anonymised against third-parties and can also include smartphones.
 
''Questions and suggestions are very welcome! Please write them down in the [[Diskussion:Echt Dezentrales Netz | discussion page]] ([https://wiki.c3d2.de/w/index.php?title=Diskussion:Echt_Dezentrales_Netz&action=edit&section=new Add a section to the discussion page]).''
 
== News ==
 
On the 16th and 17th of January the theme night and workshop will take place.
 
Please register if you want to come! Thank you!
:: https://dudle.inf.tu-dresden.de/privacy/EDN_Themenabend/
: More infos: [[#Events]]
 
We will also be keeping a [[Echt Dezentrales Netz/Projekttagebuch | '''project diary''']].
 
== Background ==
 
Today's communication infrastructure is predominantly centralised.
 
However, this makes surveillance and manipulation of arbitrary digital communications easier.
 
These means can be abused - and were abused - not only by dictatorships but also by democratic countries and international companies.Moreover, this infrastructure does not protect its users from such abuse and breach of privilege.
: There are indeed solutions like Tor or PGP which can partially patch the shortcomings of the infrastructure, but each user has to take care of that it for herself. Anonymisation and encryption are not in the standard configuration.
 
A penal action against these secret processes is nearly impossibly, starting with the problem that they are not even detected by the affected parties.
This status quo endangers our democracy.
However, it can be countered in different ways.
The following is a technical approach:
To repurpose and to extend existing digital communications infrastructure to make surveillance more cumbersome, especially through decentralisation.
 
== Goal ==
 
The communication potential in densely inhabited regions is recognizable in these pictures:
 
* http://motherboard.vice.com/blog/this-is-what-wi-fi-would-look-like-if-we-could-see-it
* http://socialtimes.com/cell-phone-signals-mapping-turns-the-world-into-a-psychedelic-landscape_b194303
 
Our goal is to use these existing resources to form a difficult-to-monitor cellphone/router/computer network. There are plenty of software solutions ([[EDN/Recherche|Recherche]]) with the goal of protecting the privacy of its users. We have to evaluate the preexisting structures and to combined into such a network. The communication should run, first and foremost, on top of a combination of WiFi, copper (do you say it like this in English?) and fibre optics, but we could also consider Bluetooth and Ultra Wideband (UWB).
 
The following criteria should be met:
 
=== Primary Criteria ===
 
; The communication is:
:; decentralised: there is no server through which the main communication streams have to go through and which could collect data to de-anonymise other nodes. ISPs should be preferentially circumvented.:
:; encrypted end-to-end: it is always encrypted, except in emergency calls.:
:; done via Perfect Forward Secrecy: when distributing (session) keys, Perfect Forward Secrecy should be used.
:; authenticated: changes on data on its way to the recipient are recorded. The source is authenticated.
:; anonymised: the nodes know as little as possible about each other. Only neighbouring nodes know each other.
 
=== Secondary Criteria ===
 
=== Kinds of Communication ===
 
== Approach ==
 
=== short term ===
 
=== long term ===
 
== Contribute ==
 
== Recherche ==
 
[[Kategorie:Projekt]]
[[Kategorie:EDN]]
 
 
== Events ==

Aktuelle Version vom 17. Januar 2018, 08:04 Uhr

Weiterleitung nach: