aboutsummaryrefslogtreecommitdiff
path: root/doc/handbook/chapters/keyconcepts.texi
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2019-04-20 21:45:25 +0200
committerChristian Grothoff <christian@grothoff.org>2019-04-20 21:45:25 +0200
commit32485c3b58983ada1943b3fa27eac3b0cff2a9da (patch)
tree1e439c5054194faef2f52a86f16a7c13f5f5aa20 /doc/handbook/chapters/keyconcepts.texi
parent5fab02b10baef639121723aacf3b1351e5db8003 (diff)
downloadgnunet-32485c3b58983ada1943b3fa27eac3b0cff2a9da.tar.gz
gnunet-32485c3b58983ada1943b3fa27eac3b0cff2a9da.zip
try to address #5660:
Diffstat (limited to 'doc/handbook/chapters/keyconcepts.texi')
-rw-r--r--doc/handbook/chapters/keyconcepts.texi26
1 files changed, 15 insertions, 11 deletions
diff --git a/doc/handbook/chapters/keyconcepts.texi b/doc/handbook/chapters/keyconcepts.texi
index 4b49a7ffb..4900ed328 100644
--- a/doc/handbook/chapters/keyconcepts.texi
+++ b/doc/handbook/chapters/keyconcepts.texi
@@ -15,7 +15,7 @@ The second part describes concepts specific to anonymous file-sharing.
15* Accounting to Encourage Resource Sharing:: 15* Accounting to Encourage Resource Sharing::
16* Confidentiality:: 16* Confidentiality::
17* Anonymity:: 17* Anonymity::
18* Deniability:: 18* Deniability::
19* Peer Identities:: 19* Peer Identities::
20* Zones in the GNU Name System (GNS Zones):: 20* Zones in the GNU Name System (GNS Zones)::
21* Egos:: 21* Egos::
@@ -165,16 +165,20 @@ and Bart Preneel. Towards measuring anonymity.
165(@uref{https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf, https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf})) 165(@uref{https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf, https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf}))
166that can help quantify the level of anonymity that a given mechanism 166that can help quantify the level of anonymity that a given mechanism
167provides, there is no such thing as "complete anonymity". 167provides, there is no such thing as "complete anonymity".
168
168GNUnet's file-sharing implementation allows users to select for each 169GNUnet's file-sharing implementation allows users to select for each
169operation (publish, search, download) the desired level of anonymity. 170operation (publish, search, download) the desired level of anonymity.
170The metric used is the amount of cover traffic available to hide the 171The metric used is based on the amount of cover traffic needed to hide
171request. 172the request.
172While this metric is not as good as, for example, the theoretical metric 173
173given in scientific metrics, 174While there is no clear way to relate the amount of available cover
174it is probably the best metric available to a peer with a purely local 175traffic to traditional scientific metrics such as the anonymity set or
175view of the world that does not rely on unreliable external information. 176information leakage, it is probably the best metric available to a
176The default anonymity level is @code{1}, which uses anonymous routing but 177peer with a purely local view of the world, in that it does not rely
177imposes no minimal requirements on cover traffic. It is possible 178on unreliable external information or a particular adversary model.
179
180The default anonymity level is @code{1}, which uses anonymous routing
181but imposes no minimal requirements on cover traffic. It is possible
178to forego anonymity when this is not required. The anonymity level of 182to forego anonymity when this is not required. The anonymity level of
179@code{0} allows GNUnet to use more efficient, non-anonymous routing. 183@code{0} allows GNUnet to use more efficient, non-anonymous routing.
180 184
@@ -192,7 +196,7 @@ In particular, we assume that the adversary can see all the traffic on
192the Internet. And while we assume that the adversary 196the Internet. And while we assume that the adversary
193can not break our encryption, we assume that the adversary has many 197can not break our encryption, we assume that the adversary has many
194participating nodes in the network and that it can thus see many of the 198participating nodes in the network and that it can thus see many of the
195node-to-node interactions since it controls some of the nodes. 199node-to-node interactions since it controls some of the nodes.
196 200
197The system tries to achieve anonymity based on the idea that users can be 201The system tries to achieve anonymity based on the idea that users can be
198anonymous if they can hide their actions in the traffic created by other 202anonymous if they can hide their actions in the traffic created by other
@@ -235,7 +239,7 @@ Even if the user that downloads data and the server that provides data are
235anonymous, the intermediaries may still be targets. In particular, if the 239anonymous, the intermediaries may still be targets. In particular, if the
236intermediaries can find out which queries or which content they are 240intermediaries can find out which queries or which content they are
237processing, a strong adversary could try to force them to censor 241processing, a strong adversary could try to force them to censor
238certain materials. 242certain materials.
239 243
240With the file-encoding used by GNUnet's anonymous file-sharing, this 244With the file-encoding used by GNUnet's anonymous file-sharing, this
241problem does not arise. 245problem does not arise.