> On Sat, 16 Feb 2013 13:59:26 -0000,
> dissiden...@tormail.org wrote:
>
> > On Sat, 16 Feb 2013 12:33:01 -0000, dissiden...@tormail.org wrote:
> >> > On Sat, 16 Feb 2013 08:18:03 -0000, dissiden...@tormail.org
> >> > wrote:
> >> >> Hello, everyone
> >> >> Thank you for your efforts
> >> >> I have several questions about freenet's security
> >> >> First of all i would like to notice that there is a lack of
> >> >> documentation on the site regarding cryptographic algorithms
> >> >> implemented in freenet. I wasn't able to find anything about it
> >> >> in the official FAQ
> >> >>
> >> >> What algorithms are in use ? How my traffic is encrypted ? Or
> >> >> it is not encrypted at all ?
> >> >> There is an SSL option in Freenet, what it is for ? Is it
> >> >> dangerous to use freenet without it?
> >> >>
> >> >> As far as i understood, freenet using keys to get access to some
> >> >> information. Each key contains a hash of the file and the
> >> >> decryption key. So when i'm using freenet i'm requesting some
> >> >> file by its key. So what will prevent my ISP to spy my keys and
> >> >> then grab an encrypted file from my traffic ? After that he can
> >> >> use a key with a file and - viola - he can view my information.
> >> >> Is it possible or i'm not understand the scheme ?
> >> >
> >> > You're not understanding the scheme. Do you have access to
> >> >   https://freenetproject.org/faq.html#hash
> >> > or
> >> >   http://en.wikipedia.org/wiki/Freenet
> >> > ?
> >>
> >> I have access to this information, but it wasn't helpful for me
> >> The main thing i would like to know - is my traffic encrypted from
> >> peer to peer (like in TOR) or it is not. What will see my ISP if he
> >> decides to monitor my traffic ?
> >> I wasn't able to find a clear answer in these articles.
> >
> > The wikipedia clearly answers this :p. And the faq clearly lists the
> > possible attacks malicious people (statists, bad ISPs, etc) can
> > perform. Basically, if you're running in opennet mode, you are in
> > theory very vulnerable, especially if you are already a known
> > target -- they can replace all of your direct peers with their own
> > bad nodes and figure out our requests -- although all "requests"
> > are for CHKs/SSKs, which are just encrypted slices of larger files
> > -- so they will also have to know what those slices belong to,
> > otherwise it's just an encrypted blob. This would be harder to do
> > in darknet mode, since in order to replace your direct peers (real
> > friends, hopefully), they will have to physically do bad things to
> > them, or psychologically turn them against you.
> 
> So, if there is no malicious servers (in the case of the darknet), the
> participants are relatively save and the ISP will not be able to
> decrypt their traffic ?

Yep. Traffic is encrypted between you and your peers:
  https://freenetproject.org/connect.html

Otherwise, it would be trivial for your ISP to figure out what you're
doing.
_______________________________________________
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Reply via email to