Echt Dezentrales Netz/en: Unterschied zwischen den Versionen

Aus C3D2
Zur Navigation springen Zur Suche springen
KKeine Bearbeitungszusammenfassung
 
(138 dazwischenliegende Versionen von 4 Benutzern werden nicht angezeigt)
Zeile 1: Zeile 1:
: '''In times of growing surveillance we, who contribute'''
#WEITERLEITUNG [[EDN]]
: '''want to give an adequate technical answer and create by ourselves'''
: '''what we have been waiting for.'''
 
== Welcome ==
 
This is the main page from the research and software project '''''[[Echt Dezentrales Netz|EDN]]''''' ([[Echt Dezentrales Netz]] - really decentralized network).
 
The goal of ''[[Echt Dezentrales Netz|EDN]]'' is to '''verify''' the '''applicability''' of existing technologies and solutions (see [[Echt Dezentrales Netz/Recherche | Recherche]]), and to '''integrate''' them in a comprehensive '''product'''.
 
: An encrypted network as Freifunk, whose complete communication is anonymised against third-parties and can also include smartphones.
 
''Questions and suggestions are very welcome! Please write them down in the [[Diskussion:Echt Dezentrales Netz | discussion page]] ([https://wiki.c3d2.de/w/index.php?title=Diskussion:Echt_Dezentrales_Netz&action=edit&section=new Add a section to the discussion page])'' or send them to the [mailto:edn@schleuder.notraces.net mailinglist].
 
== News ==
 
[[Echt_Dezentrales_Netz/en#short_term | '''Questions''']] that need to be answered.
 
We have a [[Echt Dezentrales Netz/Projekttagebuch | '''project diary''']].
 
'''Mailinglist''': EDN has got a [mailto:edn@schleuder.notraces.net mailing-list]! <br>
If you want to get the mailing-lists public key just [mailto:edn-sendkey@schleuder.notraces.net send] an empty unsigned message.
 
== Background ==
 
Today's communication infrastructure is predominantly centralized.
 
However, this makes surveillance and manipulation of arbitrary digital communications easier.
 
These means can be abused - and were abused - not only by dictatorships but also by democratic countries and international companies.Moreover, this infrastructure does not protect its users from such abuse and breach of privilege.
: There are indeed solutions like Tor or PGP which can partially patch the shortcomings of the infrastructure, but each user has to take care of that it for herself. Anonymisation and encryption are not in the standard configuration.
 
A penal action against these secret processes is nearly impossibly, starting with the problem that they are not even detected by the affected parties.
This status quo endangers our democracy.
However, it can be countered in different ways.
The following is a technical approach:
To repurpose and to extend existing digital communications infrastructure to make surveillance more cumbersome, especially through decentralisation.
 
== Goal ==
 
The communication potential in densely inhabited regions is recognizable in these pictures:
 
* http://motherboard.vice.com/blog/this-is-what-wi-fi-would-look-like-if-we-could-see-it
* http://socialtimes.com/cell-phone-signals-mapping-turns-the-world-into-a-psychedelic-landscape_b194303
 
Our goal is to use these existing resources to form a difficult-to-monitor cellphone/router/computer network. There are plenty of software solutions ([[EDN/Recherche|Recherche]]) with the goal of protecting the privacy of its users. Preexisting structures are to be evaluated and combined into such a network. The communication should run, first and foremost, on top of a combination of WiFi, copper and fibre optics, but we also consider Bluetooth, [http://www.cringely.com/2014/05/15/nsa-help-kill-uwb/  Ultra Wideband (UWB)], [http://ronja.twibright.com/installations.php red light], ukw and satelite uplinks - shortly all allowed frequencies and ways.
 
The following criteria should be met:
 
=== Primary Criteria ===
 
; The communication is:
:; decentralized: there is no server through which the main communication streams have to go through and which could collect data to de-anonymise other nodes. ISPs should be preferentially circumvented
:; encrypted end-to-end: standard, except for emergency calls
:; Using Perfect Forward Secrecy: session keys should be used. Even future Forward Secrecy shall be tested.
:; authenticated: The source is authenticated.
:; anonymised: the nodes know as little as possible about each other. Only neighbouring nodes know each other.
 
=== Secondary Criteria ===
# The infrastructure enables caching and intelligent distribution of public data.
#: -> Knowledge representation and file sharing in P2P networks
# The solution is '''holistic''', which means it encompasses all layers of the OSI model, i.e. from the strongly delay and packet loss tolerant physical layer through an automatically configured, encrypted and anonymising middle layer to services on the upper layer such as social networking, P2P transfer or generic data storage. However it can also be structured in a different way.
# The network is '''open''': that means everyone can easily participate, e.g. by having the network providing the user with the appropriate software to install
# The code must be:
#* logically '''verified'''
#* '''efficient'''
#* '''well documented'''
#* '''well tested'''
#* made public/'''Open Source'''
# The network has to be '''resilient''': stable, adaptable, fault-tolerant (e.g. against jamming)
# '''Robust''' against fluctuating node participation
# The nodes can be mobile
# The infrastructure supports also realtime communication
# It is possible to securely update system components
# The interface(s) of the software are accessible (to people with impairments/disabilities)
# The amount of bandwidth for private usage can be configured
# Routing in smartphones must be energy saving
# [to be continued]
 
=== Services ===
 
{| class="wikitable"
|-
!  !! public  !! personal/private !!
|-
! Text
| Chat of local (neighbouring) nodes || '''To a single person:''' Chat, Email or SMS || '''To multiple people:''' Chat or mailing list
|-
! Audio/Telephony/Video
| Call among locally restricted nodes || normal call || conference call
|-
! Other formats
| ?
| ?
| ?
|}
 
* + Private communication with embedded devices (?)
* Internet
* Searching in local and other reachable networks
 
== Approach ==
 
=== short term ===
 
the following we need to find out:
 
* hardware and software that we need to install the experimental/testing [https://wiki.c3d2.de/Echt_Dezentrales_Netz/_TestInfrastructure network]'''Experimentelles Netzwerk Dresden'''
* Extra criteria, which result from the [https://wiki.c3d2.de/Echt_Dezentrales_Netz/UseCases use cases]
* [https://wiki.c3d2.de/Echt_Dezentrales_Netz/AttackScenarios attack scenarios] we can/want to cover and which will be excluded
* How we want to structure the project processing (agil, [https://de.wikipedia.org/wiki/Kanban_%28Softwareentwicklung%29 Kanban])
* Which Wiki do we want to use for documentation?
*: [https://wiki.c3d2.de/Echt_Dezentrales_Netz/en Wiki C3D2] or [http://pyl7a4ccwgpxm6rd.onion/w/index.php/Main_Page Code Green Wiki]
 
=== medium-term ===
* get clear about EDN relevant [https://wiki.c3d2.de/Echt_Dezentrales_Netz/Glossary Terms]
* to define programmers [https://wiki.c3d2.de/Echt_Dezentrales_Netz/Programming guideline]
 
=== long term ===
 
# '''Research and analysis:''' [[en:EDN/ResearchAndAnalysis|Research and analysis]]
#* '''Research:''' to list all relevant approaches and technologies
#* '''Analysis:''' to establish (success) criteria (functional specification); to evaluate and compare existing approaches
# '''Concept of the overall system:''' contains the purposeful extension of existing approaches or also new developments, in order to fulfill all criteria
# '''specification:''' formal description of all components from the concept, as well as of the criteria (preferably all quantifiable criteria), where possible and sensible
# '''Evaluation:''' to evaluate the formal model of the specification, whether it fulfills the criteria (e.g. via theorem proof and probabilistic model checking)
# '''Implementation:''' Implementation of the specification for the different platforms
# '''[https://wiki.c3d2.de/Echt_Dezentrales_Netz/_TestInfrastructure Testing] the implementations''' as a '''proof of concept'''
# '''Distribution''' of software and hardware, where needed
 
== Contribute ==
* maintenance of project wiki, networking, testing: demos: https://wiki.c3d2.de/Benutzer:Demos
 
== Links on the topic Surveillance and Democracy ==
Mostly German only:
 
* Einschränkungen der Pressevielfalt und Bedrohung der Demokratie durch Überwachung:
*: https://www.reporter-ohne-grenzen.de/pressemitteilungen/meldung/reporter-ohne-grenzen-veroeffentlicht-aktuelle-rangliste-der-pressefreiheit/
* Offener Brief Schriftsteller zur Verteidigung unserer Demokratie
*: http://www.faz.net/aktuell/feuilleton/debatten/ueberwachung/offener-brief-an-angela-merkel-deutschland-ist-ein-ueberwachungsstaat-12304732.html
* Geheimdienste und Bürgerrechte
*: https://www.boell.de/de/2014/07/21/geheimdienste-und-buergerrechte
* Überwachung/Demokratie
*: https://www.youtube.com/watch?v=1DcC-cMPRJ0
* Sasha Lobo zu Überwachung/Demokratie
*: https://www.youtube.com/watch?v=wxkuRDUfCOw
* Der Ausspähskandal – Weckruf für die Demokratie
*: http://pressefreiheit-in-deutschland.de/der-ausspaehskandal-weckruf-fuer-die-demokratie/
* Mass U.S. Surveillance Targeting Journalists and Lawyers Seen as Threat to American Democracy
*: http://www.democracynow.org/2014/7/29/mass_us_surveillance_targeting_journalists_and
* Geheime Vorgänge
*: https://netzpolitik.org/2014/neue-digitale-ueberwachungsmethoden-von-bka-bfv-bnd-und-mad/
* Bürgerrechte: Oberster Verfassungsrichter warnt vor GAU beim Datenschutz
*: http://www.spiegel.de/politik/deutschland/buergerrechte-oberster-verfassungsrichter-warnt-vor-gau-beim-datenschutz-a-622528.html
 
[[Kategorie:Projekt]]
[[Kategorie:EDN]]

Aktuelle Version vom 17. Januar 2018, 08:04 Uhr

Weiterleitung nach: