On Wednesday 29 Jun 2011 14:46:06 Anonymous wrote:
> This is sent anonymously, sorry if this message appears more than once. 
> The remailer network is not very reliable.
> 
> I see Matthew Toseland propagating darknet, connection to 'friends' 
> only, in favour of opennet.
> Now since there is no way around the fact that 'friends' must know your 
> IP and it being very easy for them to monitor all you do on Freenet, I 
> think using darknet is by definition making yourself much more 
> vulnerable than opennet, no matter how much more attacks may be 
> possible to the strangers network. Also no matter the visibility of me 
> having a Freenet node up.
> 
> Because it takes just one infiltrant who just has to sit back and 
> follow all connections to know exactly who to pick out.
> 
> As an internet pedophile, I know that there is no worse security than 
> breaking the rule: trust no one.
> I can't possibly seek out 'trusted friends' in real life, that's 
> hopefully obvious.
> But it stretches to say, Chinese dissidents who may find it easier to 
> have real life trustees. Also their darknet can be compromized by 
> government and how many can one infiltrator then catch at once?

On balance I suppose it's best that I answer this, because of the other people 
reading (especially via archives and Google). Legally we can't be seen to be 
providing technical support to pirates, I don't think there is any such issue 
with paedophilia. However, I strongly urge you to refrain from abusing children 
or paying for said abuse. Exchanging second-hand (or nth-hand) pictures of such 
abuse is a far lesser issue, though it is unfortunate that Freenet gets used 
for such things (and it's still illegal, as I'm sure you are aware!).

Basically, you are vulnerable to your peers (those other freenet nodes your 
node connects to). They know your IP address - they have to to connect to you. 
They can identify you. As you rightly point out, your peers can also, with a 
fair bit of work, and on various plausible assumptions, identify much of what 
you are doing on Freenet. There are two consequences for opennet:

1. An attacker could connect to every node on the network, and thus identify 
everything going on. Such an attack would be only moderately expensive, since 
the network is small. The main costs would be bandwidth and hardware, and a 
little software development.

2. If you are inserting files whose contents are predictable in advance, and 
are inserting them as CHKs, or reinserting them, or you are regularly chatting 
on some board or otherwise making many requests which are easily identified, a 
far cheaper attack is possible, which involves the attacker intercepting a few 
requests randomly (depending on how many requests you are sending, i.e. how big 
the file is etc), and then using them to get a rough fix on your location 
(keyspace-wise), which he then uses to get connections closer to his 
guesstimate of where you are. Then he will see more of the request stream, and 
can thus close in increasingly quickly. This is technically feasible on 
darknet, but the different is, on opennet you can quickly get connections at a 
specific keyspace location (via announcement), and on darknet, getting 
connections is (relatively) expensive as you have to either compromise 
somebody's computer, social engineer them, kidnap them, etc, for each hop.

Hence it is not a matter of hiding in the crowd on opennet, on the basis that 
your peers probably aren't the bad guy because there are only a few bad guys, 
because first, the attacker can connect to everyone relatively cheaply, and 
second, he can move around.

I reasonably expect that future versions of Freenet will make the second attack 
harder than it is now. However, the first isn't going away any time soon.

The electronic attacks mentioned above are far cheaper than any scheme to try 
to get people who run Freenet to spy on their friends. You can only spy on your 
direct friends (well, it gets less accurate the more hops away the target, but 
this also makes opennet surveillance much cheaper). Putting 10% of the 
population on the payroll (as in East Germany) is always a rather expensive way 
to gather intelligence!

The hope is that there will be a large enough global darknet that those who 
have a particular need for it (for instance those who publish subversive 
political blogs) will be able to connect to their friends (who the authorities 
already know about from e.g. phone records), who don't.

To answer your X files'ism, even if the second attack is resolved, running 
opennet is equivalent to "trust anyone powerful enough to connect to all peers" 
(and they probably don't even need to do that in practice). Trusting your 
friends is preferable to trusting anyone and everyone.

You could reasonably come back here and say that Tor doesn't require me to have 
any friends, and gives me better security, and so on. The short answer is, Tor 
can be blocked (the Chinese have managed to block even its hidden bridges). 
National blocking infrastructure is coming, even in the West. There are several 
other issues with Tor, for instance hidden sites are generally slow and 
unreliable (even more so than freenet in my experience!), traffic analysis may 
be easier, and there are probably still route selection attacks etc, but none 
of that is really relevant. Anything that can be blocked, and is used by more 
than a few Chinese dissidents, will be blocked. For instance, the Freenet 
website and the Freenet 0.5 protocol are blocked. Also, Tor does something 
different to Freenet anyway: Freenet distributes content, Tor anonymizes 
readers (and sometimes, badly, servers).

More information is available here:
http://freenetproject.org/faq.html#attack

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Reply via email to