aboutsummaryrefslogtreecommitdiff
path: root/doc/chapters
diff options
context:
space:
mode:
authorng0 <ng0@infotropique.org>2017-10-17 16:50:33 +0000
committerng0 <ng0@infotropique.org>2017-10-17 16:50:33 +0000
commitff4c30d5417e4152db056b00188b63da07f1e4c8 (patch)
tree2fd33a5d31f8961dd60cf7fcf75bbe782c320169 /doc/chapters
parentb95bd7b268372f5ba7fab90194d1c5b16f481a63 (diff)
downloadgnunet-ff4c30d5417e4152db056b00188b63da07f1e4c8.tar.gz
gnunet-ff4c30d5417e4152db056b00188b63da07f1e4c8.zip
philosophy: Add footnotes.
Diffstat (limited to 'doc/chapters')
-rw-r--r--doc/chapters/philosophy.texi30
1 files changed, 18 insertions, 12 deletions
diff --git a/doc/chapters/philosophy.texi b/doc/chapters/philosophy.texi
index 9f4702b49..cb8787672 100644
--- a/doc/chapters/philosophy.texi
+++ b/doc/chapters/philosophy.texi
@@ -158,8 +158,8 @@ active transport services at the same time, and each of these can have a
158different addresses. Binding messages expire after at most a week (the 158different addresses. Binding messages expire after at most a week (the
159timeout can be shorter if the user configures the node appropriately). This 159timeout can be shorter if the user configures the node appropriately). This
160expiration ensures that the network will eventually get rid of outdated 160expiration ensures that the network will eventually get rid of outdated
161advertisements.@ 161advertisements.
162More details can be found in the paper @uref{https://gnunet.org/transports, A Transport Layer Abstraction for Peer-to-Peer Networks}. 162@footnote{More details can be found in @uref{https://gnunet.org/transports, A Transport Layer Abstraction for Peer-to-Peer Networks}}
163 163
164@node Accounting to Encourage Resource Sharing 164@node Accounting to Encourage Resource Sharing
165@subsection Accounting to Encourage Resource Sharing 165@subsection Accounting to Encourage Resource Sharing
@@ -187,7 +187,8 @@ request a (possibly lower) effective priority. Then, they drop the requests
187with the lowest effective priority to satisfy their resource constraints. This 187with the lowest effective priority to satisfy their resource constraints. This
188way, GNUnet's economic model ensures that nodes that are not currently 188way, GNUnet's economic model ensures that nodes that are not currently
189considered to have a surplus in contributions will not be served if the 189considered to have a surplus in contributions will not be served if the
190network load is high. More details can be found in @uref{https://gnunet.org/ebe, this paper}. 190network load is high.
191@footnote{More details can be found in @uref{https://gnunet.org/ebe, this paper}}
191 192
192@node Confidentiality 193@node Confidentiality
193@subsection Confidentiality 194@subsection Confidentiality
@@ -215,16 +216,18 @@ anonymous file sharing).
215Providing anonymity for users is the central goal for the anonymous 216Providing anonymity for users is the central goal for the anonymous
216file-sharing application. Many other design decisions follow in the footsteps 217file-sharing application. Many other design decisions follow in the footsteps
217of this requirement. Anonymity is never absolute. While there are various 218of this requirement. Anonymity is never absolute. While there are various
218@uref{https://gnunet.org/anonymity_metric, scientific metrics} that can help quantify the level of anonymity that a 219@uref{https://gnunet.org/anonymity_metric, scientific metrics} that can
219given mechanism provides, there is no such thing as complete anonymity. 220help quantify the level of anonymity that a given mechanism provides,
221there is no such thing as complete anonymity.
220GNUnet's file-sharing implementation allows users to select for each 222GNUnet's file-sharing implementation allows users to select for each
221operation (publish, search, download) the desired level of anonymity. 223operation (publish, search, download) the desired level of anonymity.
222The metric used is the amount of cover traffic available to hide the request. 224The metric used is the amount of cover traffic available to hide the request.
223While this metric is not as good as, for example, the theoretical metric 225While this metric is not as good as, for example, the theoretical metric
224given in @uref{https://gnunet.org/anonymity_metric, scientific metrics}, it is probably the best metric available to 226given in @uref{https://gnunet.org/anonymity_metric, scientific metrics},
225a peer with a purely local view of the world that does not rely on unreliable 227it is probably the best metric available to a peer with a purely local
226external information. The default anonymity level is 1, which uses anonymous 228view of the world that does not rely on unreliable external information.
227routing but imposes no minimal requirements on cover traffic. It is possible 229The default anonymity level is 1, which uses anonymous routing but
230imposes no minimal requirements on cover traffic. It is possible
228to forego anonymity when this is not required. The anonymity level of 0 231to forego anonymity when this is not required. The anonymity level of 0
229allows GNUnet to use more efficient, non-anonymous routing. 232allows GNUnet to use more efficient, non-anonymous routing.
230 233
@@ -242,7 +245,8 @@ participating nodes in the network and that it can thus see many of the
242node-to-node interactions since it controls some of the nodes. 245node-to-node interactions since it controls some of the nodes.
243 246
244The system tries to achieve anonymity based on the idea that users can be 247The system tries to achieve anonymity based on the idea that users can be
245anonymous if they can hide their actions in the traffic created by other users. 248anonymous if they can hide their actions in the traffic created by other
249users.
246Hiding actions in the traffic of other users requires participating in the 250Hiding actions in the traffic of other users requires participating in the
247traffic, bringing back the traditional technique of using indirection and 251traffic, bringing back the traditional technique of using indirection and
248source rewriting. Source rewriting is required to gain anonymity since 252source rewriting. Source rewriting is required to gain anonymity since
@@ -263,7 +267,8 @@ have to indirect the replies if we don't think we need more traffic to hide
263our own actions.@ 267our own actions.@
264 268
265This increases the efficiency of the network as we can indirect less under 269This increases the efficiency of the network as we can indirect less under
266higher load. More details can be found in @uref{https://gnunet.org/gap, this paper}. 270higher load.
271@footnote{More details can be found in @uref{https://gnunet.org/gap, this paper}}
267 272
268@node Deniability 273@node Deniability
269@subsection Deniability 274@subsection Deniability
@@ -282,7 +287,8 @@ encryption as the link-encryption between the nodes. GNUnet has
282encryption on the network layer (link encryption, confidentiality, 287encryption on the network layer (link encryption, confidentiality,
283authentication) and again on the application layer (provided 288authentication) and again on the application layer (provided
284by @command{gnunet-publish}, @command{gnunet-download}, @command{gnunet-search} 289by @command{gnunet-publish}, @command{gnunet-download}, @command{gnunet-search}
285and @command{gnunet-gtk}). More details can be found @uref{https://gnunet.org/encoding, here}. 290and @command{gnunet-gtk}).
291@footnote{More details can be found @uref{https://gnunet.org/encoding, here}}
286 292
287@node Peer Identities 293@node Peer Identities
288@subsection Peer Identities 294@subsection Peer Identities