On Sunday 11 October 2009 14:11:08 SmallSister development wrote:
> VolodyA! V Anarhist wrote:
> > This point has already been answered, but i feel that there is a
> > point that can be made here by answering it again.
> > 
> > When you fetch something from the regular internet, the request is
> > easily traceable back to you. The warning that you see tells you that
> > for that reason. The question is how did you get Freenet to run? If
> > you have downloaded the installer from the official freenet site, or
> > even if you have just visited the site without the use of Tor,
> > somebody can potentially see that. It's the same with plug-ins.
> 
> > Anyhow, back to my original point. When you download plugin (or
> > anything else Freenet-related) from the Web, you identify yourself as
> > a user of Freenet. That (in and of itself) does not tell anybody
> > exactly what you say on Freenet (although may identify how you say
> > that... downloading Freemail says that you will be sending Freemail
> > messages, downloading Frost says you will be a frost user, etc.)
> 
> When you run Freenet, it will generate a specific pattern of network
> usage and it would not be too hard for an ISP to map a large part of the
> Freenet nodes if it has a few nodes on its network. (It is also possible
> to map the network by adding a monitoring node, no real privacy leak
> here for Opennet nodes.)
> Assume "The Internet" knows you are running a Freenet node. And your ISP
> (and relevant uplinks) are able to detect that you're running a Darknet
> node!
> ISPs should not know what you're reading over Freenet, but I would not
> be surprised if they could do traffic analysis and determine whether
> you're downloading or uploading large files. (Has someone tried and
> published before?)

It depends on how big the ISP is, how determined it is, what sort of hardware 
is available, etc. It is true that there may be some recognisable patterns in 
our current traffic: there aren't fixed signature bytes as in 0.5 and as in 
most protocols, but there may be other possibilities for fingerprinting at that 
level. Eventually we will support steganographic transports ("make it look like 
HTTP/VoIP/whatever"), at which point it is rather more difficult, but traffic 
flow analysis will probably still allow identifying nodes with reasonable 
accuracy - assuming you have the hardware for it - just like any peer to peer 
network can be identified. Of course, the ultimate sanction would be to simply 
block all communications between IPs listed by the RBLs as domestic! Long term 
I would like to see non-internet transports e.g. wifi, sneakernet, etc, which 
might enable Freenet to survive even in a very hostile network environment. 
However, so far most countries with national firewalls have not been very 
sophisticated...

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Reply via email to