On Sun, 11 Dec 2011 16:36:53 -0500, Chris wrote:
> How many users actually compile it themselves?

Me, and all other Gentoo users :-).

> How many examine the diffs?

I do, rarely :s.


> > [...]
> > How would you propose to differentiate between a bugged node and a
> > normal node?
> 
> This is why you have authentication and checks against any inability
> to connect to nodes.

There is no such authentication that would help here. And you would be
able to connect to any node normally -- except the compromised nodes
would still find a way to become your peers and surround you. (I'm not
sure exactly what criteria need to be met for your node to accept
a stranger's offer, but I'm sure a dedicated adversary can easily meet
them.)

> You are looking at the issue wrong. It doesn't matter which nodes are
> bugged. If a user can't connect to higher than normal percentage of
> nodes it should send up a red flag for one.

They will be able to.

> You can keep track of nodes as well and check out which nodes are new
> and which have been added over time. The number of new nodes coming
> online shouldn't exceed a certain threshold. If there are 5,000 and
> on average the number of nodes increase by 2 a week then 100 new
> nodes coming online should send up a red flag. I don't know what the
> actual numbers are or the range. Maybe some weeks do see 100 nodes
> and others only 2. There is probably a number though that could
> increase the time it takes to pull off such an attack.

There is no such metric -- a slashdot article, for example, could
easily trigger such a gauge. Moreover, you're not understanding the
attack enough -- the bad guys don't need to control too many bugged
nodes -- just a few which they will find a way to peer with you.

By the way, here is one freesite that tries to measure how many nodes
are on the network:
  
USK@85gZTCiQO9IEPDAGvjktO9d-ZMS1lIABR6JB85m4ens,VGDItiCVzCcWAay51faZzcIfAepzeHpzXYvChlueWYE,AQACAAE/stats/1533/


> >> and if is not made apparent that is a problem with freenet (or
> >> whichever project you would be suggesting).
> >
> > Yes it is. And that's why it's in the FAQ :p. You should take a bit
> > more time, and read it more carefully:
> >
> > "Combined with harvesting and adaptive search attacks, [the
> > bootstrapping attack] explains why opennet is regarded by many
> > core developers as hopelessly insecure. If you want good security
> > you need to connect only to friends."
> 
> I don't think you understand how it works that well. I suspect if
> some of your friends are compromised you won't be.

Did you even read the "Correlation attacks" subsection, from
http://freenetproject.org/faq.html#attack ?


> I don't doubt that some developers think opennet mode is hopelessly
> insecure.

It's not that they "think" it's hopelessly insecure. It really is :p. I
mean, it might still be "good enough" -- but there are actual,
well-known, unsolvable problems with the opennet idea. Which that FAQ
should have explained :p.


> I think the best way to organize a revolt or guerrilla war fare in
> todays world would probably be to anonymously organize multiple small
> groups.

I strongly disagree. The battle (no matter which one you pick,
probably) is ultimately in the minds of the boring violence-phobic
masses -- the majorities. If you don't have popular support, you're
doomed no matter what you try to do. The best way to organize a revolt
is to talk to your friends and family and convince them peacefully and
rationally. (And freenet is a great tool for this! :D.)
_______________________________________________
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Reply via email to