The recent Tor announcement is interesting. Some points:

1. Real Sybil attacks often do use a single IP range.
=> It's worth detecting and/or deterring this sort of thing, i.e. using
IP scarcity on some level. Provided that it's not ridiculously hard.
Here there is significant interaction between current opennet
bootstrapping (seednodes), somewhat complicated proposals to harden it,
and ShadowWalker (opennet tunneling, requires each node to be assigned a
"shadow node" on creation to make sure it doesn't lie about its peers).
2. They are interested in socially-aware tunnel setup.
So are we. We don't have a tunnel network. IMHO PISCES requires some
level of decentralisation, and they'll probably go for one of the
less-decentralised published proposals, but at the very least we need to
investigate how Tor works before implementing our own tunnel layer, and
maybe have some discussions about architecture.
3. We should really use their transport layer.
Granted it's written in C, but we need our connection level crypto to be
written in C, because you can't eliminate side-channels if you're doing
encryption in Java. Plus they have a number of working transport
plugins. I believe it's all stream based, so we may want to keep UDP as
well, which leads back to getting Chetan's work finished/merged ...

Thoughts?

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Devl mailing list
Devl@freenetproject.org
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to