On Thu, Jul 28, 2011 at 11:06 AM, Ray Jones <crawlz...@gmail.com> wrote: > On 07/26/2011 06:15 AM, Matthew Toseland wrote >> The electronic attacks mentioned above are far cheaper than any scheme to >> try to get people who run Freenet to spy on their friends. You can only spy >> on your direct friends (well, it gets less accurate the more hops away the >> target, but this also makes opennet surveillance much cheaper). Putting 10% >> of the population on the payroll (as in East Germany) is always a rather >> expensive way to gather intelligence! >> >> The hope is that there will be a large enough global darknet that those who >> have a particular need for it (for instance those who publish subversive >> political blogs) will be able to connect to their friends (who the >> authorities already know about from e.g. phone records), who don't. > > I guess I'm either not understanding darknet, or I'm not understanding > the underlying reason(s) for Freenet as a whole. > > I was under the impression that darknet leaves you wide open to your > friends, so choose your friends carefully.
Darknet leaves you basically exactly as open to your peers as Opennet does. With Darknet, you choose your peers. With Opennet, your peers choose you (or at least, they can, and will if they're attackers that you're worried about). So, on Darknet, you should choose your peers carefully enough to be somewhat confident they aren't actively out to get you, and you'll be doing better than Opennet. If you want, you can be more paranoid about peer selection than that. In which case, Opennet *definitely* isn't for you. To summarize: Lowest security, easiest to set up: run opennet. Marginal improvement: run a hybrid Opennet/Darknet node. Mostly this should be treated as a transition point to full Darknet, or a way to help out your Darknet-only friends. Better security, somewhat harder to set up: run Darknet, and connect to anyone you personally know and don't believe to be cooperating with the Bad Guys. Still better security, even harder to set up: Be more picky about your Darknet peers. Best security: Immolate your computer on a pyre of thermite, and go live in a cave somewhere. Or simply stop doing whatever it is you're worried about getting caught at. Seriously, there is no perfect security; it's just a question of what's good enough, and what your threat model is. > Opennet still left you open > to those who connect with you, but you might have some level of > anonymity when communicating. I also believe I read in one of your posts > here a while back that while Freenet packets are encrypted and can't be > audited for content from outside the Freenet network, it's still fairly > easy to spot Freenet node activity even without knowing the specifics of > what's moving in and out of that node. Depends on your standards of "fairly easy". It requires some amount of traffic analysis, which means significantly more CPU investment. This may be enough to stop snooping ISPs, but won't stop an adversary with a specific target in mind. > > Now in most democratic countries, the government has to jump through > certain legal hoops in order to seize one's equipment, arrest a person, > etc. But if Freenet is built with the goal of allowing dissidents to > communicate below the radar of a totalitarian government, by your > description it seems doomed to failure. I'd call it a work in progress, best suited to countering threats less severe than a dedicated state actor with police-state level powers. And against that threat model, I have no clue what the answer is. > > If a government-controlled ISP can use traffic analysis to spot Freenet > traffic, and if they don't have legal hoops to jump through, can't that > government then easily place one darknet person under house arrest and > keep the darknet node running? Doesn't that give them the packet > contents as well as the packet originator? Certainly. Which is far, far harder than chasing down a target on Opennet -- that doesn't even require warrants, let alone things like house arrest. Like I said, protecting against police-state level adversaries is hard. > > And how would one securely connect to someone in darknet mode unless you > know the operator of that node personally? If that person turned out to > be a spy, doesn't connecting to him in darknet mode leave you with no > anonymity whatsoever? That's precisely the idea behind Darknet. You should know your peers personally. Whether from the Internet, or Real Life. You should know them from somewhere *other* than a board dedicated to finding Darknet peers. Someone you know from conversations on Freenet might work. Choosing people at random will do bad things to the network; choosing people you have a social connection to (regardless of where that connection comes from) should provide the required network properties. Really, it depends on trust levels. If you just want better security than Opennet, all you have to do is make your adversary put some human effort into setting up each connection. Make them convince you they're a real live person who isn't a Bad Guy, and you've probably made yourself a difficult enough target that they'll go after someone easier. Evan Daniel _______________________________________________ Support mailing list Support@freenetproject.org http://news.gmane.org/gmane.network.freenet.support Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support Or mailto:support-requ...@freenetproject.org?subject=unsubscribe