To be honest, there should BE NO CONSIDERATION of any
worries for you.

The freenet share space across everyone's machines is
encrypted, can contain nearly anything, randomly
chosen by THE NETWORK ITSELF.

IF my some strange change you find yourself the target
of an investigation, YOU PERSONALLY CANNOT BE POSSIBLY
RESPONSIBLE FOR THE NETWORK CONTENTS that are on the
network share space.

The fellow who finds himself in the investigation
mentioned in the news stories apparently is under
serious suspicion of CHOOSING TO POSSESS ILLEGAL
MATERIAL HE CHOSE TO DOWNLOAD, BUT THEN TRIED TO
"HIDE" WITH AN ENCRYPTED VIRTUAL DRIVE THAT HE COULD
ACCESS.

That being said, that was like keeping illegal
material IN A STORAGE SPACE WITH AN ENCRYPTED KEY.

Freenet is MORE LIKE A CARRIER SERVICE.  One cannot by
definition decide that the Internet as a whole is
illegal because some occasional person may use it
illegally.  One might as well decide that they cannot
use the Postal Service any longer because someone may
send out drugs or something and you do not wish to be
a "part of the system" or something.

As long as you keep in mind that Freenet is a Carrier
Service, and do not choose to do anything illegal then
you should be fine.

Freenet is as the internet should be. 

Undiluted chaos without control of content.

Let the decider of content be each person's
conscience.

The evil-doers will be found out anyways.  For they
will do something else wrong in the Real World, more
than likely.


--- Stephen Walford <stwa4647000 at yahoo.co.uk> wrote:


---------------------------------

As someone who represents certain individuals who are
looking to the Freenet system as a means of securing
private/anonymous communications for their perfectly
legal activities, I am starting this conversation in
order point out a number of apparent, and
interrelating vulnerabilities and shortcomings within
the system which can affect them with their own
particular usage and that also have implications for
the general users/participants.



Firstly, as it is already awares, criminals and
abusers are liable to use the system for trafficking
and/or depositing illegal material, and since each
(legal) participant devotes a portion of his
hard-drive space for the storage of data then that
person may end up with some illegal content on his/her
computer. Now, of course, all such data would be
encrypted and so would on the face of it provide a
safeguard to the user should he/she end up with any
illegal material. But things aren't as clear-cut as
that, and the situation is affected somewhat
differently depending on whether the user is operating
in the USA or the UK. In the UK, a new law has been
brought in which would make it a crime for a suspect
who has encrypted data on his computer to fail to
reveal the password to the police. Now in a system
like Freenet the encryption key would not be known to
any individual user, but without any legal precedent
as yet (nothing like Freenet has been in operation
before) it would be over-optimistic to assume that
just because that user puts his case for not being in
possession of the key that he would be immune from
charges. And in the USA, users with encrypted content
are curently protected by a constitutional right to
privacy which prevents police from compelling them to
disclose their passwords. But right now even that
right is being put into question with an important
test case taking place (see link below)...



http://www.washingtonpost.com/wp-dyn/content/article/2008/01/15/AR2008011503663.html?hpid=topnews



In either case (USA or UK) the question remains if
there would be any reason why any individual users
would a priori be targeted for investigation simply
for having encrypted content and/or for operating a
Freenet server. This is a fuzzy area, and unless the
police use traffic analysis to pinpoint likely nodes
then one can logically see that only new legislation
would enable them to target users at random -
something that cannot be ruled out for the future.



It is also important to point out that at least in the
USA the NSA avails itself to the use of advanced
programs that can carry out advanced 'dictionary
analysis' to permute nearly every possible combination
of letters and numbers for a 'brute force' attack to
discover the password for an encrypted file - a
process that can take years. This is particularly
aimed at file-specific passwords as in personally
available encryption programs, or at cracking
encrypted files as in email attachments. It is not
clear as to whether or not ordinary police forces also
employ this technology.



Secondly, there are government installations in the UK
(for instance a new MI6 building on the London
enbankment, which has the national internet traffic
channeled through it) which carry out surveillance of
communications including internet communications. This
surveillance includes not just keyword profiling but
also several other different kinds of intelligent and
statistical analysis of the traffic itself, even where
encrypted files are involved, and an significant
intelligence perspective can be obtained in this way.
In the face of this, it would be worth knowing what
the file traffic profile of Freenet is since the
aforesaid situation would impinge a great deal on the
privacy and security of such - which is of course
exactly what the system is intended for.



Obviously these are all issues that the Freenet
experts will need to take on board and consider during
the course of development, but can anyone provide any
answers to all these points in the meantime as they
would be greatly appreciated?


---------------------------------
 Sent from Yahoo! - a smarter inbox.>
_______________________________________________
> Support mailing list
> Support at freenetproject.org
> http://news.gmane.org/gmane.network.freenet.support
> Unsubscribe at
>
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
> Or
mailto:support-request at freenetproject.org?subject=unsubscribe



      
____________________________________________________________________________________
Be a better friend, newshound, and 
know-it-all with Yahoo! Mobile.  Try it now.  
http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ 


Reply via email to