On Thu, Jun 23, 2016 at 2:19 AM, Ian Clarke <i...@trystacks.com> wrote:
> I remember years ago people were running BitTorrent over Tor, and the Tor guys
> considered this a form of denial-of-service attack on the Tor network,
> because it is so bandwidth intensive and bandwidth is a scarce resource given 
> Tor's
> limited number of server nodes.
> I think they would have a similar issue with a lot of people running Freenet
> over Tor.

I think this issue was regards to the limited number of exit nodes.
Bittorrent over tor uses exit nodes. The approach outlined by the
original email uses Tor hidden services and doesn't impact the limited
exit node bandwidth. A few advantages for using Tor:

1) A lot of people already run it and trust it.
2) A user would never need to disclose their IP address to the Freenet network.
3) It gains the benefit of Tor's pluggable transports to avoid blocking

ZeroNet for example uses Tor for anonymity and the ability to act as a
server behind a firewall. They use the Tor controller to create
ephemeral hidden services on demand.

I believe there to be some demand for this in Freenet since the
publicity of the ability of some organisations to track the IP address
of users requesting specific keys in Freenet. I agree with nextgens
however that there are issues related to latency and node backoff.
Something built into freenet itself would be great too but I don't
think there is the developer availability for it based on the large
amount of other work that people want done too.

 > I don't mean to be discouraging, this is an interesting experiment and worth
> trying.

It's not discouraging at all - I appreciate the feedback and I do put
this into the "I'm interested in experimenting with" basket for me
rather than taking developer time to implement at this time.

-- 
http://bluishcoder.co.nz
_______________________________________________
Devl mailing list
Devl@freenetproject.org
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to