Echt Dezentrales Netz/en: Unterschied zwischen den Versionen

Aus C3D2
Zur Navigation springen Zur Suche springen
(link to net2o, correction of project name)
KKeine Bearbeitungszusammenfassung
 
(37 dazwischenliegende Versionen von 2 Benutzern werden nicht angezeigt)
Zeile 1: Zeile 1:
[https://wiki.c3d2.de/Echt_Dezentrales_Netz/ Deutsch]
#WEITERLEITUNG [[EDN]]
 
: '''Secure and private Communication for everyone'''
 
 
== Welcome ==
 
This is the official wiki of the research and software project '''''[[Echt Dezentrales Netz|EDN]]''''' ([[Echt Dezentrales Netz]] - real decentralized network).
 
We verify the applicability of existing technologies (see [[Echt Dezentrales Netz#Recherche | Recherche]]) and aim to integrate them into a comprehensive product.
 
: '''A Software packet for Data protected Free Wireless Meshnets that includes several [[Echt_Dezentrales_Netz#Applications | applications]].<br>
'''
EDN is the way and the goal to a piece of software that is a child of the projects listed [[Echt_Dezentrales_Netz#Recherche | here]].
It inherits its best qualities and learns from them to fullfil its purpose.
 
== News ==
 
* Dear developers add your module infos [[Echt_Dezentrales_Netz/modules |here]]
* Our latest meetings carried the name: [https://wiki.freifunk.net/GNUnet-meets-OpenWRT'''GNUnet-meets-OpenWRT''']. There we aimed to prepare GNUnet for the [http://battlemesh.org/BattleMeshV8 Battlemesh] which took place in early august.
* There has been an EDN- [http://media.ccc.de/browse/conferences/cryptocon/2015/CC15_-_30_-__-_lounge_-_201505091900_-_echt_dezentrales_netz_unleashing_freifunk.html#video lecture] at the [http://sublab.org/cryptocon15 CryptoCon15] recently.
* The videos of the first EDN Geekend are now in high quality [ftp://ftp.c3d2.de/misc/edn/ available].
* The newest[[#Contribute | challenges]].
* We have a [[Echt Dezentrales Netz/Projekttagebuch | project diary]].
 
== Background ==
 
Today's communication infrastructure is predominantly centralized.
 
However, this makes surveillance and manipulation of arbitrary digital communications easier.
 
These means can be abused - and were abused - not only by dictatorships but also by democratic countries and international companies.
: There are indeed solutions like Tor or PGP which can partially patch the shortcomings of the infrastructure, but each user has to take care of that it for herself. Anonymisation and encryption are not in the standard configuration.
 
A penal action against these secret processes is nearly impossible, starting with the problem that they are not even detected by the affected parties.
This status quo endangers our democracy.
However, it can be countered in different ways.
The following is a technical approach:
To repurpose and to extend existing digital communications infrastructure to make surveillance more cumbersome, especially through decentralisation.
 
== Goal ==
 
The communication potential in densely inhabited regions can be guessed watching these pictures:
 
* http://motherboard.vice.com/blog/this-is-what-wi-fi-would-look-like-if-we-could-see-it
* http://socialtimes.com/cell-phone-signals-mapping-turns-the-world-into-a-psychedelic-landscape_b194303
 
'''Our goal is to use the existing resources to form a difficult-to-monitor cellphone/router/computer network.''' There are plenty of software solutions ([[Echt_Dezentrales_Netz#Recherche|Recherche]]) with the goal of protecting the privacy of its users. Preexisting structures are to be evaluated and combined into such a network. The communication should run, first and foremost, on top of a combination of WiFi, copper and fibre optics, but we also consider Bluetooth, [http://www.cringely.com/2014/05/15/nsa-help-kill-uwb/  Ultra Wideband (UWB)], [http://ronja.twibright.com/installations.php red light], ukw and satelite uplinks - shortly all allowed frequencies and ways.
 
The following criteria should be met:
 
=== Primary Criteria ===
 
; The communication is:
:; decentralized: in other words: distributed or p2p. There is no server through which the main communication streams have to go through and which could collect data to de-anonymise other nodes.
:; encrypted end-to-end: standard, except for emergency calls
:; Using Perfect Forward Secrecy: session keys should be used. Even future Forward Secrecy shall be tested.
:; authenticated: The source is authenticated.
:; anonymised: where it is possible. The nodes know as little as possible about each other. Only neighbouring nodes know each other. Alias meta-data-protection.
 
=== Secondary Criteria ===
 
# The network shall be as '''performant''' as it can be considering the grade of security for the specific services
# the user interface is '''intuitively usable'''
# '''scalability'''
# The infrastructure enables caching and intelligent distribution of public data.
#: -> Knowledge representation and file sharing in P2P networks
# The solution is '''holistic''', which means it encompasses all layers of the OSI model, i.e. from the strongly delay and packet loss tolerant physical layer through an automatically configured, encrypted and anonymising middle layer to services on the upper layer such as social networking, P2P transfer or generic data storage. However it can also be structured in a different way.
# The network is '''open''': that means everyone can easily participate
# The code must be:
#* logically '''verified'''
#* '''efficient'''
#* '''well documented'''
#* '''well tested'''
#* made public/'''Open Source'''
# The network has to be '''resilient''': stable, adaptable, fault-tolerant (e.g. against jamming)
# '''Robust''' against fluctuating node participation
# the user interface represents in an easy way the functionality that is laying beneath
# The nodes can be mobile
# The infrastructure supports also realtime communication
# It is possible to securely update system components
# The interface(s) of the software are accessible (to people with impairments/disabilities)
# The amount of bandwidth for private usage can be configured
# Routing in smartphones must be energy saving
# the network is open to connect for example a sneakernet(s)
# [to be continued]
 
=== Applications ===
 
{| class="wikitable"
|-
!  !! public  !! personal/private !!
|-
! Text
| Chat of local (neighbouring) nodes || '''To a single person:''' Chat, Email or SMS || '''To multiple people:''' Chat or mailing list
|-
! Audio/Telephony/Video
| Call among locally restricted nodes || normal call || conference call
|-
! Other formats
| ?
| ?
| ?
|}
 
* crypto currency/ pay system
* Searching in local and other reachable networks including the Internet
* filesharing
* blogging
* Private communication with embedded devices
 
== Recherche ==
 
[http://youbroketheinternet.org/map Here] is a helpful overview including a part of the following projects
 
'''Current list of relevant projects'''
 
 
* [http://netsukuku.freaknet.org/ '''Netsukuku''']
* [https://projectmeshnet.org '''cjdns, Hyperboria & the Project Meshnet''']: encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing
* [https://gnunet.org/ '''Gnunet''']: Secure, fully decentralized P2P network, extensible component-oriented framework, a possible future Internet architecture.
* [https://briarproject.org/ '''Briar''']: Delay-tolerant network for secure messaging (one-to-one, one-to-many and many-to-many), capable of operating over a diverse mixture of transports including Tor, Bluetooth, Wi-Fi and portable storage devices
* [http://www.secushare.org/ '''Secushare''']: Distributed pubsub and multicast architecture on top of GNUnet intended to provide advanced communication capabilities and distributed social networking
* [https://www.zerotier.com/ '''ZeroTier One''']: hybrid peer to peer protocol that creates virtual Ethernet networks
* [https://commotionwireless.net/ '''Commotion Wireless''']
* [http://developer.servalproject.org/dokuwiki/doku.php#serval_mesh '''Servalproject''']
* [http://michaelblizek.twilightparadox.com/projects/cor/index.html '''COR''' Connection oriented routing]: a layer 3+4 mesh protocol for zero administration networks, implemented as a linux kernel patch
* [http://qmp.cat/Home<nowiki/> '''Quick Mesh Project''' (qMp)]: Firmware for embedded network devices based on OpenWRT Linux operating system
* [http://maidsafe.net/ '''Maidsafe''']: GNUnet-like Internet replacement stack, focused on distributed data storage, replication and high latency interaction
* [https://ind.ie/about/vision/ '''Ind.ie''']
* [http://www.tribler.org/ '''Tribler''']
* [http://zeromq.org/'''Zyre''']
* [http://qaul.net/text_de.html '''Qaul.net''']: Provider independent, self-configuring, multiplatform communication network that integrates services
* [http://rina.tssg.org/ '''RINA'''] Another internet stack
* [http://invisible.im/ '''Invisible''']: filetransfer and conversation without trace/evidence
* [https://tahoe-lafs.org/trac/tahoe-lafs '''Tahoe-LAFS'''] high latency tool: decentralized cloud storage system. It distributes data across multiple servers. Iff some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly
* [https://github.com/ssbc/secure-scuttlebutt '''Secure Scuttlebutt'''] high latency tool
* [https://github.com/ipfs/ipfs '''ipfs''']
* [http://retroshare.sourceforge.net/index_de.html '''Retroshare''']: Secure communication. Chat, mail, forums,telephony and filesharing based on a Friend-to-Friend(F2F) network
* [https://www.bitmessage.org/wiki/Main_Page '''Bitmessage''']: decentralized, encrypted, peer-to-peer, trustless communications protocol
* [https://www.tox.im/ '''Tox''']: Skype Replacement: encrypted Peer-to-Peer Messenger/Phone and Video
* [http://ball.askemos.org/ '''BALL''']: autonomous, persistent execution environment to realize integrity protection of data and operations, authenticated timestamps, compliance auditing
* [https://www.ethereum.org/ '''ethereum''']:  Programmable blockchain agent framework
* [https://geti2p.net/en/ '''I2P''']
* [https://freenetproject.org/ '''Freenet''']
* [https://wiki.debian.org/FreedomBox '''FreedomBox''']: Project to develop, design and promote personal servers running free software for private, personal, communications.
* [https://www.torproject.org/about/overview.html.en '''TOR''']
* ['''bmx6''']
* ['''olsr2''']
* ['''batman''']
* ['''babel''']
* [http://net2o.de/ '''net2o''']
 
== Threat model ==
 
We presume a global active attacker that does automated intrusion such
as traffic [http://7ywdkxkpi7kk55by.onion/trac/wiki/DeanonymizingTheInternet shaping].
We draw the line before targeted operations.
 
== Contribute ==
 
Everyone can contribute according to his/her skills.
 
You can help
* [http://7ywdkxkpi7kk55by.onion/trac/report/1 Finding hardware] and [http://7ywdkxkpi7kk55by.onion/trac/ticket/39 software] for the EDN testbed
* Doing recherche about EDN relevant projects: filling the [http://7ywdkxkpi7kk55by.onion/trac/wiki/ProjectsFeatureList tables]
* Adding possible [http://7ywdkxkpi7kk55by.onion/trac/wiki/FinancingNotes#ListofPotentialSponsors sponsors]
* developing concept ideas how EDN could be realised using what is [http://7ywdkxkpi7kk55by.onion/trac/wiki/ProjectsFeatureList there]
* accepting another [http://7ywdkxkpi7kk55by.onion/trac/report/1 task-challenge]
 
Developers of [http://7ywdkxkpi7kk55by.onion/trac/wiki/ProjectsFeatureList relevant projects] are kindly invited to help out building EDN.
You know your project best and which parts (maybe the hole) could be helpful and how.<br>
 
'''''Note''': .onion adresses can be accessed via [https://www.torproject.org/projects/torbrowser.html.en TOR Browser Bundle]''
 
=== short term ===
 
Building the EDN-testbed, Recherche, Finding sponsors -> See [[Echt_Dezentrales_Netz/en#Contribute | contribute]].
 
=== medium-term ===
''' Developing a concept of the overall system:''' contains the purposeful extension of existing approaches or also new developments, in order to fulfill all criteria -> done by discussion see [[Echt_Dezentrales_Netz/en#Contact | contact]].
 
=== long term ===
 
# '''specification:''' formal description of all components from the concept, as well as of the criteria (preferably all quantifiable criteria), where possible and sensible
# '''Evaluation:''' to evaluate the formal model of the specification, whether it fulfills the criteria (e.g. via theorem proof and probabilistic model checking)
# '''Implementation:''' Implementation of the specification for the different platforms
# '''Testing the implementation''' as a '''proof of concept'''
# '''Distribution''' of software and hardware, where needed
 
== Federation Network ==
 
http://www.federation.network
 
== Contact ==
 
Subscribe to the ''encrypted'' EDN-mailinglist
* get the list's public key by [mailto:edn-sendkey@schleuder.notraces.net sending] an empty unsigned message
* send your public key to the [mailto:edn@schleuder.notraces.net EDN-mailinglist]
 
'''if you want to add anonymity for meta-data-protection:'''
 
* make sure you have an emailadress that
** is not connected to your name
** never used your name or other identifiers in an unencrypted email
** ''only accessed the mailbox via TOR''
*** per  webinterface: [https://www.torproject.org/projects/torbrowser.html.en TOR Browser Bundle]
*** per mailclient [plugin torbirdy]
*** or at least per proxy
* possible email providers are:
** [https://posteo.de/de Posteo] which does not need your name
** or [https://www.openmailbox.org Openmailbox]
 
[[Kategorie:Projekt]]
[[Kategorie:EDN]]

Aktuelle Version vom 17. Januar 2018, 08:04 Uhr

Weiterleitung nach: