At 09:15 AM 8/21/2009, Evan Daniel wrote:

>On Fri, Aug 21, 2009 at 8:54 AM, Victor Denisov<vdeni...@redline.ru> wrote:
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> >
> > Luke771 wrote:
> >> What you're doing here is catching Opennet users. Pure Darknet users
> >> wont be that easy to catch.
> >
> > No, they'll be extremely easy to catch, along with their friends' IP
> > addresses. Detect local darknet nodes via generic traffic analysis (how
> > many people skype or play online games for 20+ hours a day with constant
> > 80+ KB/sec traffic?) -> Check local port used for conversations -> find
> > local nodes' darknet port -> detect its darknet peers. Trivial.
> >
> > On the other hand, moving just one hop further in the darknet chain
> > requires cooperation with the remote ISP, which is something everyone
> > considers to be relatively difficult to achieve.
>
>Right now, the best defense for darknet nodes is that this sort of
>analysis is computationally expensive on a large network.  For a small
>lan, it probably isn't, making even darknet relatively easy to catch.

Freenet (or whatever) users could just route all of their traffic 
through a proxy via securely-encrypted VPN, such as XeroBank with 
OpenVPN.  Although you'd still know that they were hogging bandwidth, 
you wouldn't have a clue what they were doing with it.

=
Jim Cook <jimc...@panix.com> 

_______________________________________________
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Reply via email to