aboutsummaryrefslogtreecommitdiff
path: root/doc/handbook
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2019-04-20 21:45:25 +0200
committerChristian Grothoff <christian@grothoff.org>2019-04-20 21:45:25 +0200
commit32485c3b58983ada1943b3fa27eac3b0cff2a9da (patch)
tree1e439c5054194faef2f52a86f16a7c13f5f5aa20 /doc/handbook
parent5fab02b10baef639121723aacf3b1351e5db8003 (diff)
downloadgnunet-32485c3b58983ada1943b3fa27eac3b0cff2a9da.tar.gz
gnunet-32485c3b58983ada1943b3fa27eac3b0cff2a9da.zip
try to address #5660:
Diffstat (limited to 'doc/handbook')
-rw-r--r--doc/handbook/chapters/keyconcepts.texi26
-rw-r--r--doc/handbook/chapters/user.texi16
2 files changed, 26 insertions, 16 deletions
diff --git a/doc/handbook/chapters/keyconcepts.texi b/doc/handbook/chapters/keyconcepts.texi
index 4b49a7ffb..4900ed328 100644
--- a/doc/handbook/chapters/keyconcepts.texi
+++ b/doc/handbook/chapters/keyconcepts.texi
@@ -15,7 +15,7 @@ The second part describes concepts specific to anonymous file-sharing.
15* Accounting to Encourage Resource Sharing:: 15* Accounting to Encourage Resource Sharing::
16* Confidentiality:: 16* Confidentiality::
17* Anonymity:: 17* Anonymity::
18* Deniability:: 18* Deniability::
19* Peer Identities:: 19* Peer Identities::
20* Zones in the GNU Name System (GNS Zones):: 20* Zones in the GNU Name System (GNS Zones)::
21* Egos:: 21* Egos::
@@ -165,16 +165,20 @@ and Bart Preneel. Towards measuring anonymity.
165(@uref{https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf, https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf})) 165(@uref{https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf, https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf}))
166that can help quantify the level of anonymity that a given mechanism 166that can help quantify the level of anonymity that a given mechanism
167provides, there is no such thing as "complete anonymity". 167provides, there is no such thing as "complete anonymity".
168
168GNUnet's file-sharing implementation allows users to select for each 169GNUnet's file-sharing implementation allows users to select for each
169operation (publish, search, download) the desired level of anonymity. 170operation (publish, search, download) the desired level of anonymity.
170The metric used is the amount of cover traffic available to hide the 171The metric used is based on the amount of cover traffic needed to hide
171request. 172the request.
172While this metric is not as good as, for example, the theoretical metric 173
173given in scientific metrics, 174While there is no clear way to relate the amount of available cover
174it is probably the best metric available to a peer with a purely local 175traffic to traditional scientific metrics such as the anonymity set or
175view of the world that does not rely on unreliable external information. 176information leakage, it is probably the best metric available to a
176The default anonymity level is @code{1}, which uses anonymous routing but 177peer with a purely local view of the world, in that it does not rely
177imposes no minimal requirements on cover traffic. It is possible 178on unreliable external information or a particular adversary model.
179
180The default anonymity level is @code{1}, which uses anonymous routing
181but imposes no minimal requirements on cover traffic. It is possible
178to forego anonymity when this is not required. The anonymity level of 182to forego anonymity when this is not required. The anonymity level of
179@code{0} allows GNUnet to use more efficient, non-anonymous routing. 183@code{0} allows GNUnet to use more efficient, non-anonymous routing.
180 184
@@ -192,7 +196,7 @@ In particular, we assume that the adversary can see all the traffic on
192the Internet. And while we assume that the adversary 196the Internet. And while we assume that the adversary
193can not break our encryption, we assume that the adversary has many 197can not break our encryption, we assume that the adversary has many
194participating nodes in the network and that it can thus see many of the 198participating nodes in the network and that it can thus see many of the
195node-to-node interactions since it controls some of the nodes. 199node-to-node interactions since it controls some of the nodes.
196 200
197The system tries to achieve anonymity based on the idea that users can be 201The system tries to achieve anonymity based on the idea that users can be
198anonymous if they can hide their actions in the traffic created by other 202anonymous if they can hide their actions in the traffic created by other
@@ -235,7 +239,7 @@ Even if the user that downloads data and the server that provides data are
235anonymous, the intermediaries may still be targets. In particular, if the 239anonymous, the intermediaries may still be targets. In particular, if the
236intermediaries can find out which queries or which content they are 240intermediaries can find out which queries or which content they are
237processing, a strong adversary could try to force them to censor 241processing, a strong adversary could try to force them to censor
238certain materials. 242certain materials.
239 243
240With the file-encoding used by GNUnet's anonymous file-sharing, this 244With the file-encoding used by GNUnet's anonymous file-sharing, this
241problem does not arise. 245problem does not arise.
diff --git a/doc/handbook/chapters/user.texi b/doc/handbook/chapters/user.texi
index 37c5849ab..55518bc34 100644
--- a/doc/handbook/chapters/user.texi
+++ b/doc/handbook/chapters/user.texi
@@ -1054,8 +1054,17 @@ anonymity level of "1" means that anonymous routing is desired, but no
1054particular amount of cover traffic is necessary. A powerful adversary 1054particular amount of cover traffic is necessary. A powerful adversary
1055might thus still be able to deduce the origin of the traffic using 1055might thus still be able to deduce the origin of the traffic using
1056traffic analysis. Specifying higher anonymity levels increases the 1056traffic analysis. Specifying higher anonymity levels increases the
1057amount of cover traffic required. While this offers better privacy, 1057amount of cover traffic required.
1058it can also significantly hurt performance. 1058
1059The specific numeric value (for anonymity levels above 1) is simple:
1060Given an anonymity level L (above 1), each request FS makes on your
1061behalf must be hidden in L-1 equivalent requests of cover traffic
1062(traffic your peer routes for others) in the same time-period. The
1063time-period is twice the average delay by which GNUnet artificially
1064delays traffic.
1065
1066While higher anonymity levels may offer better privacy, they can also
1067significantly hurt performance.
1059 1068
1060@node Content Priority 1069@node Content Priority
1061@subsubsection Content Priority 1070@subsubsection Content Priority
@@ -2324,6 +2333,3 @@ service offered by that peer, you can create an IP tunnel to
2324that peer by specifying the peer's identity, service name and 2333that peer by specifying the peer's identity, service name and
2325protocol (--tcp or --udp) and you will again receive an IP address 2334protocol (--tcp or --udp) and you will again receive an IP address
2326that will terminate at the respective peer's service. 2335that will terminate at the respective peer's service.
2327
2328
2329