diff options
author | Christian Grothoff <christian@grothoff.org> | 2019-04-20 21:45:25 +0200 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2019-04-20 21:45:25 +0200 |
commit | 32485c3b58983ada1943b3fa27eac3b0cff2a9da (patch) | |
tree | 1e439c5054194faef2f52a86f16a7c13f5f5aa20 /doc/man/gnunet-auto-share.1 | |
parent | 5fab02b10baef639121723aacf3b1351e5db8003 (diff) | |
download | gnunet-32485c3b58983ada1943b3fa27eac3b0cff2a9da.tar.gz gnunet-32485c3b58983ada1943b3fa27eac3b0cff2a9da.zip |
try to address #5660:
Diffstat (limited to 'doc/man/gnunet-auto-share.1')
-rw-r--r-- | doc/man/gnunet-auto-share.1 | 29 |
1 files changed, 15 insertions, 14 deletions
diff --git a/doc/man/gnunet-auto-share.1 b/doc/man/gnunet-auto-share.1 index 19cb998fa..e68ecdc08 100644 --- a/doc/man/gnunet-auto-share.1 +++ b/doc/man/gnunet-auto-share.1 | |||
@@ -28,24 +28,25 @@ You can run the tool by hand or automatically by adding the respective options t | |||
28 | gnunet-auto-share has many options in common with gnunet-publish, but can only be used to index files. | 28 | gnunet-auto-share has many options in common with gnunet-publish, but can only be used to index files. |
29 | .Pp | 29 | .Pp |
30 | You can use automatic meta-data extraction (based on libextractor). | 30 | You can use automatic meta-data extraction (based on libextractor). |
31 | .Sh OPTIONS | ||
31 | .Bl -tag -width Ds | 32 | .Bl -tag -width Ds |
32 | .It Fl a Ar LEVEL | Fl \-anonymity= Ns Ar LEVEL | 33 | .It Fl a Ar LEVEL | Fl \-anonymity= Ns Ar LEVEL |
33 | This option can be used to specify additional anonymity constraints. | 34 | This option can be used to specify additional anonymity constraints. The default is 1. |
34 | If set to 0, GNUnet will publish the file non-anonymously and in fact sign the advertisement for the file using your peer's private key. | 35 | If set to 0, GNUnet will publish the file non-anonymously and in fact sign the advertisement for the file using your peer's private key. |
35 | This will allow other users to download the file as fast as possible, including using non-anonymous methods (DHT, direct transfer). | 36 | This will allow other users to download the file as fast as possible, including using non-anonymous methods (discovery via DHT and CADET transfer). |
36 | If you set it to 1 (default), you use the standard anonymous routing algorithm (which does not explicitly leak your identity). | 37 | If you set it to 1 (default), you use the standard anonymous routing algorithm (which does not explicitly leak your identity). |
37 | However, a powerful adversary may still be able to perform traffic analysis (statistics) to over time infer data about your identity. | 38 | However, a powerful adversary may still be able to perform traffic analysis (statistics) to over time discovery your identity. |
38 | You can gain better privacy by specifying a higher level of anonymity, which increases the amount of cover traffic your own traffic will get, at the expense of performance. | 39 | You can gain better privacy by specifying a higher level of anonymity (using values above 1). |
39 | Note that regardless of the anonymity level you choose, peers that cache content in the network always use anonymity level 1. | 40 | This tells FS that it must hide your own requests in equivalent\-looking cover traffic. |
40 | .Pp | 41 | This should confound an adversaries traffic analysis, increasing the time and effort it would |
41 | The definition of the ANONYMITY LEVEL is the following. | 42 | take to discover your identity. However, it also can significantly reduce performance, as |
42 | 0 means no anonymity is required. | 43 | your requests will be delayed until sufficient cover traffic is available. The specific |
43 | Otherwise a value of 'v' means that 1 out of v bytes of "anonymous" traffic can be from the local user, leaving 'v-1' bytes of cover traffic per byte on the wire. | 44 | numeric value (for anonymity levels above 1) is simple: |
44 | Thus, if GNUnet routes n bytes of messages from foreign peers (using anonymous routing), it may originate n/(v-1) bytes of data in the same time-period. | 45 | Given an anonymity level L (above 1), each request FS makes on your behalf must be hidden in L\-1 equivalent |
45 | The time-period is twice the average delay that GNUnet defers forwarded queries. | 46 | requests of cover traffic (traffic your peer routes for others) in the same time\-period. |
46 | .Pp | 47 | The time\-period is twice the average delay by which GNUnet artificially delays traffic. |
47 | The default is 1 and this should be fine for most users. | 48 | Note that regardless of the anonymity level you choose, peers that cache content in the |
48 | Also notice that if you choose very large values, you may end up having no throughput at all, especially if many of your fellow GNUnet-peers all do the same. | 49 | network always use anonymity level 1. |
49 | .It Fl c Ar FILENAME | Fl \-config= Ns Ar FILENAME | 50 | .It Fl c Ar FILENAME | Fl \-config= Ns Ar FILENAME |
50 | Use alternate config file (if this option is not specified, the default is | 51 | Use alternate config file (if this option is not specified, the default is |
51 | .Pa ~/.config/gnunet.conf Ns ). | 52 | .Pa ~/.config/gnunet.conf Ns ). |