-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hello,
I think GNUnet is a very valuable effort in "fixing" the internet and I would like to thank everyone involved with it. I really enjoyed reading the CADET paper and I'm not sure if GNUnet is a direct implementation of CADET, but here are some thoughts about CADET that I would like to throw in for discussion. Please do tell me if I'm wrong. I understand that there's link encryption between participants to maintain message integrity and anonymity on the basic layer. Then there's end-to-end encryption and connection redundancy (leaving aside the multiplexing layer for now). However, it seems to me a relaying node can still intercept a fair amount of meta data through path information that's being sent along with messages. I understand that this is intentional since the protocol is designed for restricted route scenarios and nodes are able to learn the network topology very quickly this way, but I believe that using these connectivity paths for direct (albeit encrypted) communication is a privacy flaw and invites censorship, because any relaying node can learn who you're communicating with. What I've been thinking about is the role a mix network layer reminiscent of Tor could play in GNUnet. What do you think? cheers, Marcel -----BEGIN PGP SIGNATURE----- iQEVAwUBU9JIp1csPFejv68xAQqiswgAjZ5O6n0DcgCC84IK40Eo7hU3EavLK8rm 8dWw0pPqo5KO/a00dr0rsFGstp6HVxClDy4oBuPj+dG2TEVAKENka5ppEDcVEMyD crKHoEavvsfeQ9jxOEEsBjKBrWyFyevGg01m81OBQLNkvuvsU5Ed8kMHmtINJ/1N HWOkB2X6ObP9RR/qWsKvpDKUj0orJRoRoFN486QSfeBkcirwkyxndpkbm5Dhq0Rb MbypPKL1tJHlz2mjzhlXrtQw4D94xes7KdUndpx8xDGP8+PA/WdR/089ZHZ66WNH 6/mU4YEOXZyjqrmFHfiFFTNAv+IEJdrCU7z0CZubnugLQ3x+cQxQLg== =osI2 -----END PGP SIGNATURE-----
0xA3BFAF31.asc
Description: application/pgp-keys
_______________________________________________ GNUnet-developers mailing list [email protected] https://lists.gnu.org/mailman/listinfo/gnunet-developers
