On Sat, 16 Feb 2013 12:33:01 -0000, dissiden...@tormail.org wrote:
> > On Sat, 16 Feb 2013 08:18:03 -0000, dissiden...@tormail.org wrote:
> >> Hello, everyone
> >> Thank you for your efforts
> >> I have several questions about freenet's security
> >> First of all i would like to notice that there is a lack of
> >> documentation on the site regarding cryptographic algorithms
> >> implemented in freenet. I wasn't able to find anything about it in
> >> the official FAQ
> >>
> >> What algorithms are in use ? How my traffic is encrypted ? Or it is
> >> not encrypted at all ?
> >> There is an SSL option in Freenet, what it is for ? Is it dangerous
> >> to use freenet without it?
> >>
> >> As far as i understood, freenet using keys to get access to some
> >> information. Each key contains a hash of the file and the
> >> decryption key. So when i'm using freenet i'm requesting some file
> >> by its key. So what will prevent my ISP to spy my keys and then
> >> grab an encrypted file from my traffic ? After that he can use a
> >> key with a file and - viola - he can view my information.
> >> Is it possible or i'm not understand the scheme ?
> >
> > You're not understanding the scheme. Do you have access to
> >   https://freenetproject.org/faq.html#hash
> > or
> >   http://en.wikipedia.org/wiki/Freenet
> > ?
> 
> I have access to this information, but it wasn't helpful for me
> The main thing i would like to know - is my traffic encrypted from
> peer to peer (like in TOR) or it is not. What will see my ISP if he
> decides to monitor my traffic ?
> I wasn't able to find a clear answer in these articles.

The wikipedia clearly answers this :p. And the faq clearly lists the
possible attacks malicious people (statists, bad ISPs, etc) can
perform. Basically, if you're running in opennet mode, you are in
theory very vulnerable, especially if you are already a known target --
they can replace all of your direct peers with their own bad nodes and
figure out our requests -- although all "requests" are for CHKs/SSKs,
which are just encrypted slices of larger files -- so they will also
have to know what those slices belong to, otherwise it's just an
encrypted blob. This would be harder to do in darknet mode, since in
order to replace your direct peers (real friends, hopefully), they will
have to physically do bad things to them, or psychologically turn them
against you.
_______________________________________________
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Reply via email to