aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2013-10-06 21:05:14 +0000
committerChristian Grothoff <christian@grothoff.org>2013-10-06 21:05:14 +0000
commit660713a1f669063eca6d368b7d627ebedbac319f (patch)
tree4b1382fcf90a84064ef57bdf734e126890c2aec1 /doc
parent36b1c1899dc5907efe60f6318dd7c85cadd951db (diff)
downloadgnunet-660713a1f669063eca6d368b7d627ebedbac319f.tar.gz
gnunet-660713a1f669063eca6d368b7d627ebedbac319f.zip
-more whitespace
Diffstat (limited to 'doc')
-rw-r--r--doc/man/gnunet-arm.12
-rw-r--r--doc/man/gnunet-ats.14
-rw-r--r--doc/man/gnunet-auto-share.110
-rw-r--r--doc/man/gnunet-datastore.12
-rw-r--r--doc/man/gnunet-dns2gns.16
-rw-r--r--doc/man/gnunet-download.112
-rw-r--r--doc/man/gnunet-fs.12
-rw-r--r--doc/man/gnunet-gns.12
-rw-r--r--doc/man/gnunet-namestore.12
-rw-r--r--doc/man/gnunet-peerinfo.12
-rw-r--r--doc/man/gnunet-publish.112
-rw-r--r--doc/man/gnunet-resolver.12
-rw-r--r--doc/man/gnunet-scalarproduct.18
-rw-r--r--doc/man/gnunet-search.114
-rw-r--r--doc/man/gnunet-transport.12
-rw-r--r--doc/man/gnunet-unindex.12
16 files changed, 42 insertions, 42 deletions
diff --git a/doc/man/gnunet-arm.1 b/doc/man/gnunet-arm.1
index 0d144b53f..627a2b553 100644
--- a/doc/man/gnunet-arm.1
+++ b/doc/man/gnunet-arm.1
@@ -9,7 +9,7 @@ gnunet\-arm \- control GNUnet services
9.br 9.br
10 10
11.SH DESCRIPTION 11.SH DESCRIPTION
12\fBgnunet\-arm\fP can be used to start or stop GNUnet services, including the ARM service itself. The ARM service is a supervisor for GNUnet's service processes. ARM starts services on-demand or as configured and re-starts them if they crash. 12\fBgnunet\-arm\fP can be used to start or stop GNUnet services, including the ARM service itself. The ARM service is a supervisor for GNUnet's service processes. ARM starts services on-demand or as configured and re-starts them if they crash.
13 13
14.SH OPTIONS 14.SH OPTIONS
15.B 15.B
diff --git a/doc/man/gnunet-ats.1 b/doc/man/gnunet-ats.1
index c143f7a13..7bb1159da 100644
--- a/doc/man/gnunet-ats.1
+++ b/doc/man/gnunet-ats.1
@@ -9,8 +9,8 @@ gnunet\-ats \- display information about transport resource allocation
9.br 9.br
10 10
11.SH DESCRIPTION 11.SH DESCRIPTION
12\fBgnunet\-ats\fP can be used to display information about the GNUnet's 12\fBgnunet\-ats\fP can be used to display information about the GNUnet's
13transport selection mechanism. It shows information about the 13transport selection mechanism. It shows information about the
14addresses and the assigned input and output bandwidth. 14addresses and the assigned input and output bandwidth.
15 15
16.SH OPTIONS 16.SH OPTIONS
diff --git a/doc/man/gnunet-auto-share.1 b/doc/man/gnunet-auto-share.1
index 6373da26f..267c8e2e1 100644
--- a/doc/man/gnunet-auto-share.1
+++ b/doc/man/gnunet-auto-share.1
@@ -15,7 +15,7 @@ You can use automatic meta\-data extraction (based on libextractor).
15Use alternate config file (if this option is not specified, the default is ~/.gnunet/gnunet.conf). 15Use alternate config file (if this option is not specified, the default is ~/.gnunet/gnunet.conf).
16 16
17.TP 17.TP
18\fB\-D\fR, \fB\-\-disable\-extractor\fR 18\fB\-D\fR, \fB\-\-disable\-extractor\fR
19Disable use of GNU libextractor for finding additional keywords and metadata. 19Disable use of GNU libextractor for finding additional keywords and metadata.
20 20
21.TP 21.TP
@@ -24,8 +24,8 @@ Print a brief help page with all the options.
24 24
25.TP 25.TP
26\fB\-L \fILOGLEVEL\fR, \fB\-\-loglevel=\fILOGLEVEL\fR 26\fB\-L \fILOGLEVEL\fR, \fB\-\-loglevel=\fILOGLEVEL\fR
27Change the loglevel. Possible values for LOGLEVEL are 27Change the loglevel. Possible values for LOGLEVEL are
28ERROR, WARNING, INFO and DEBUG. 28ERROR, WARNING, INFO and DEBUG.
29 29
30.TP 30.TP
31\fB\-p \fIPRIORITY\fR, \fB\-\-prio=\fIPRIORITY\fR 31\fB\-p \fIPRIORITY\fR, \fB\-\-prio=\fIPRIORITY\fR
@@ -48,9 +48,9 @@ Be verbose. Using this option causes gnunet\-publish to print progress informat
48 48
49.SH SETTING ANONYMITY LEVEL 49.SH SETTING ANONYMITY LEVEL
50 50
51The \fB\-a\fR option can be used to specify additional anonymity constraints. If set to 0, GNUnet will publish the file non-anonymously and in fact sign the advertisement for the file using your peer's private key. This will allow other users to download the file as fast as possible, including using non-anonymous methods (DHT, direct transfer). If you set it to 1 (default), you use the standard anonymous routing algorithm (which does not explicitly leak your identity). However, a powerful adversary may still be able to perform traffic analysis (statistics) to over time infer data about your identity. You can gain better privacy by specifying a higher level of anonymity, which increases the amount of cover traffic your own traffic will get, at the expense of performance. Note that regardless of the anonymity level you choose, peers that cache content in the network always use anonymity level 1. 51The \fB\-a\fR option can be used to specify additional anonymity constraints. If set to 0, GNUnet will publish the file non-anonymously and in fact sign the advertisement for the file using your peer's private key. This will allow other users to download the file as fast as possible, including using non-anonymous methods (DHT, direct transfer). If you set it to 1 (default), you use the standard anonymous routing algorithm (which does not explicitly leak your identity). However, a powerful adversary may still be able to perform traffic analysis (statistics) to over time infer data about your identity. You can gain better privacy by specifying a higher level of anonymity, which increases the amount of cover traffic your own traffic will get, at the expense of performance. Note that regardless of the anonymity level you choose, peers that cache content in the network always use anonymity level 1.
52 52
53The definition of the ANONYMITY LEVEL is the following. 0 means no anonymity is required. Otherwise a value of 'v' means that 1 out of v bytes of "anonymous" traffic can be from the local user, leaving 'v-1' bytes of cover traffic per byte on the wire. Thus, if GNUnet routes n bytes of messages from foreign peers (using anonymous routing), it may originate n/(v-1) bytes of data in the same time\-period. The time\-period is twice the average delay that GNUnet defers forwarded queries. 53The definition of the ANONYMITY LEVEL is the following. 0 means no anonymity is required. Otherwise a value of 'v' means that 1 out of v bytes of "anonymous" traffic can be from the local user, leaving 'v-1' bytes of cover traffic per byte on the wire. Thus, if GNUnet routes n bytes of messages from foreign peers (using anonymous routing), it may originate n/(v-1) bytes of data in the same time\-period. The time\-period is twice the average delay that GNUnet defers forwarded queries.
54 54
55The default is 1 and this should be fine for most users. Also notice that if you choose very large values, you may end up having no throughput at all, especially if many of your fellow GNUnet\-peers all do the same. 55The default is 1 and this should be fine for most users. Also notice that if you choose very large values, you may end up having no throughput at all, especially if many of your fellow GNUnet\-peers all do the same.
56 56
diff --git a/doc/man/gnunet-datastore.1 b/doc/man/gnunet-datastore.1
index 661b92828..266416a65 100644
--- a/doc/man/gnunet-datastore.1
+++ b/doc/man/gnunet-datastore.1
@@ -3,7 +3,7 @@
3gnunet\-datastore \- merge or convert GNUnet datastore databases 3gnunet\-datastore \- merge or convert GNUnet datastore databases
4 4
5.SH SYNOPSIS 5.SH SYNOPSIS
6.B gnunet\-datastore 6.B gnunet\-datastore
7[\fIOPTIONS\fR] 7[\fIOPTIONS\fR]
8.SH DESCRIPTION 8.SH DESCRIPTION
9.PP 9.PP
diff --git a/doc/man/gnunet-dns2gns.1 b/doc/man/gnunet-dns2gns.1
index f4aa62802..03f471ed8 100644
--- a/doc/man/gnunet-dns2gns.1
+++ b/doc/man/gnunet-dns2gns.1
@@ -11,9 +11,9 @@ gnunet\-dns2gns \- run a DNS-to-GNS proxy
11.SH DESCRIPTION 11.SH DESCRIPTION
12Most users will not want to run an DNS to GADS proxy/gateway and thus will not need this program. 12Most users will not want to run an DNS to GADS proxy/gateway and thus will not need this program.
13 13
14\fBgnunet\-dns2gns\fP runs a DNS resolver which delegates requests to the ".gads" and ".zkey" zones to GADS. All other requests are forwarded to DNS. This DNS proxy is useful for enabling non-personalized GADS\-resolution to an entire network or to offer GADS\-resolution to DNS users. 14\fBgnunet\-dns2gns\fP runs a DNS resolver which delegates requests to the ".gads" and ".zkey" zones to GADS. All other requests are forwarded to DNS. This DNS proxy is useful for enabling non-personalized GADS\-resolution to an entire network or to offer GADS\-resolution to DNS users.
15 15
16A DNS\-to\-GNS proxy using gnunet\-dns2gns is available at ".zkey.eu" 16A DNS\-to\-GNS proxy using gnunet\-dns2gns is available at ".zkey.eu"
17 17
18If you do not want to specify a public key and are the owner of the zone that gnunet\-dns2gns will use for GNS lookups, you need to first create a pseudonym (using "gnunet\-identity \-C NAME"), and then assign it to be used for the "dns2gns" service using "gnunet\-identity \-e NAME \-s dns2gns". After that, you can start the dns2gns service (possibly using gnunet\-arm) without specifying a public key using "\-z". 18If you do not want to specify a public key and are the owner of the zone that gnunet\-dns2gns will use for GNS lookups, you need to first create a pseudonym (using "gnunet\-identity \-C NAME"), and then assign it to be used for the "dns2gns" service using "gnunet\-identity \-e NAME \-s dns2gns". After that, you can start the dns2gns service (possibly using gnunet\-arm) without specifying a public key using "\-z".
19 19
@@ -41,7 +41,7 @@ Authoritative DNS suffix to use. This is the name under which the GADS ".zkey"
41Print GNUnet version number. 41Print GNUnet version number.
42.B 42.B
43.IP "\-z PUBLICKEY, \-\-zone=PUBLICKEY" 43.IP "\-z PUBLICKEY, \-\-zone=PUBLICKEY"
44Use PUBLICKEY for the zone to resolve GNS names in. The PUBLICKEY must be encoded in the text format which can be obtained using gnunet\-ecc, seen in PKEY records and output by gnunet\-identity. If this option is not specified, the default ego associated by gnunet\-identity for the "dns2gns" subsystem will be used. 44Use PUBLICKEY for the zone to resolve GNS names in. The PUBLICKEY must be encoded in the text format which can be obtained using gnunet\-ecc, seen in PKEY records and output by gnunet\-identity. If this option is not specified, the default ego associated by gnunet\-identity for the "dns2gns" subsystem will be used.
45 45
46 46
47.SH BUGS 47.SH BUGS
diff --git a/doc/man/gnunet-download.1 b/doc/man/gnunet-download.1
index a2d1aad44..95925c25d 100644
--- a/doc/man/gnunet-download.1
+++ b/doc/man/gnunet-download.1
@@ -26,8 +26,8 @@ print help page
26 26
27.TP 27.TP
28\fB\-L \fILOGLEVEL\fR, \fB\-\-loglevel=LOGLEVEL\fR 28\fB\-L \fILOGLEVEL\fR, \fB\-\-loglevel=LOGLEVEL\fR
29Change the loglevel. Possible values for LOGLEVEL are 29Change the loglevel. Possible values for LOGLEVEL are
30ERROR, WARNING, INFO and DEBUG. 30ERROR, WARNING, INFO and DEBUG.
31 31
32.TP 32.TP
33\fB\-n\fR, \fB\-\-no-network\fR 33\fB\-n\fR, \fB\-\-no-network\fR
@@ -39,7 +39,7 @@ write the file to FILENAME. Hint: when recursively downloading a directory, app
39 39
40.TP 40.TP
41\fB\-p \fIDOWNLOADS\fR, \fB\-\-parallelism=DOWNLOADS\fR 41\fB\-p \fIDOWNLOADS\fR, \fB\-\-parallelism=DOWNLOADS\fR
42set the maximum number of parallel downloads that is allowed. More parallel downloads can, to some extent, improve the overall time to download content. However, parallel downloads also take more memory (see also option \-r which can be used to limit memory utilization) and more sockets. This option is used to limit the number of files that are downloaded in parallel (\-r can be used to limit the number of blocks that are concurrently requested). As a result, the value only matters for recursive downloads. The default value is 32. 42set the maximum number of parallel downloads that is allowed. More parallel downloads can, to some extent, improve the overall time to download content. However, parallel downloads also take more memory (see also option \-r which can be used to limit memory utilization) and more sockets. This option is used to limit the number of files that are downloaded in parallel (\-r can be used to limit the number of blocks that are concurrently requested). As a result, the value only matters for recursive downloads. The default value is 32.
43 43
44.TP 44.TP
45\fB\-r \fIREQUESTS\fR, \fB\-\-request-parallelism=REQUESTS\fR 45\fB\-r \fIREQUESTS\fR, \fB\-\-request-parallelism=REQUESTS\fR
@@ -59,15 +59,15 @@ print progress information
59 59
60.SH NOTES 60.SH NOTES
61The GNUNET_URI is typically obtained from gnunet\-search. gnunet\-fs\-gtk can also be used instead of gnunet\-download. 61The GNUNET_URI is typically obtained from gnunet\-search. gnunet\-fs\-gtk can also be used instead of gnunet\-download.
62If you ever have to abort a download, you can at any time continue it by re\-issuing gnunet\-download with the same filename. In that case GNUnet will not download blocks again that are already present. GNUnet's file\-encoding will ensure file integrity, even if the existing file was not downloaded from GNUnet in the first place. Temporary information will be appended to the target file until the download is completed. 62If you ever have to abort a download, you can at any time continue it by re\-issuing gnunet\-download with the same filename. In that case GNUnet will not download blocks again that are already present. GNUnet's file\-encoding will ensure file integrity, even if the existing file was not downloaded from GNUnet in the first place. Temporary information will be appended to the target file until the download is completed.
63 63
64.SH SETTING ANONYMITY LEVEL 64.SH SETTING ANONYMITY LEVEL
65 65
66The \fB\-a\fR option can be used to specify additional anonymity constraints. If set to 0, GNUnet will try to download the file as fast as possible, including using non-anonymous methods. If you set it to 1 (default), you use the standard anonymous routing algorithm (which does not explicitly leak your identity). However, a powerful adversary may still be able to perform traffic analysis (statistics) to over time infer data about your identity. You can gain better privacy by specifying a higher level of anonymity, which increases the amount of cover traffic your own traffic will get, at the expense of performance. Note that your download performance is not only determined by your own anonymity level, but also by the anonymity level of the peers publishing the file. So even if you download with anonymity level 0, the peers publishing the data might be sharing with a higher anonymity level, which in this case will determine performance. Also, peers that cache content in the network always use anonymity level 1. 66The \fB\-a\fR option can be used to specify additional anonymity constraints. If set to 0, GNUnet will try to download the file as fast as possible, including using non-anonymous methods. If you set it to 1 (default), you use the standard anonymous routing algorithm (which does not explicitly leak your identity). However, a powerful adversary may still be able to perform traffic analysis (statistics) to over time infer data about your identity. You can gain better privacy by specifying a higher level of anonymity, which increases the amount of cover traffic your own traffic will get, at the expense of performance. Note that your download performance is not only determined by your own anonymity level, but also by the anonymity level of the peers publishing the file. So even if you download with anonymity level 0, the peers publishing the data might be sharing with a higher anonymity level, which in this case will determine performance. Also, peers that cache content in the network always use anonymity level 1.
67 67
68This option can be used to limit requests further than that. In particular, you can require GNUnet to receive certain amounts of traffic from other peers before sending your queries. This way, you can gain very high levels of anonymity \- at the expense of much more traffic and much higher latency. So set it only if you really believe you need it. 68This option can be used to limit requests further than that. In particular, you can require GNUnet to receive certain amounts of traffic from other peers before sending your queries. This way, you can gain very high levels of anonymity \- at the expense of much more traffic and much higher latency. So set it only if you really believe you need it.
69 69
70The definition of ANONYMITY\-RECEIVE is the following. 0 means no anonymity is required. Otherwise a value of 'v' means that 1 out of v bytes of "anonymous" traffic can be from the local user, leaving 'v-1' bytes of cover traffic per byte on the wire. Thus, if GNUnet routes n bytes of messages from foreign peers (using anonymous routing), it may originate n/(v-1) bytes of queries in the same time\-period. The time\-period is twice the average delay that GNUnet defers forwarded queries. 70The definition of ANONYMITY\-RECEIVE is the following. 0 means no anonymity is required. Otherwise a value of 'v' means that 1 out of v bytes of "anonymous" traffic can be from the local user, leaving 'v-1' bytes of cover traffic per byte on the wire. Thus, if GNUnet routes n bytes of messages from foreign peers (using anonymous routing), it may originate n/(v-1) bytes of queries in the same time\-period. The time\-period is twice the average delay that GNUnet defers forwarded queries.
71 71
72The default is 1 and this should be fine for most users. Also notice that if you choose very large values, you may end up having no throughput at all, especially if many of your fellow GNUnet\-peers all do the same. 72The default is 1 and this should be fine for most users. Also notice that if you choose very large values, you may end up having no throughput at all, especially if many of your fellow GNUnet\-peers all do the same.
73 73
diff --git a/doc/man/gnunet-fs.1 b/doc/man/gnunet-fs.1
index fcf0663f6..53a900b46 100644
--- a/doc/man/gnunet-fs.1
+++ b/doc/man/gnunet-fs.1
@@ -8,7 +8,7 @@ gnunet\-fs \- measure and control the fs subsystem
8.SH DESCRIPTION 8.SH DESCRIPTION
9.PP 9.PP
10 10
11gnunet\-fs is a tool to access various functions of GNUnet's fs subsystem from the command\-line. Most of these are not expected to be useful for end-users. gnunet\-fs can currently only be used to obtain a list of indexed files. Other functions should be added in the near future. 11gnunet\-fs is a tool to access various functions of GNUnet's fs subsystem from the command\-line. Most of these are not expected to be useful for end-users. gnunet\-fs can currently only be used to obtain a list of indexed files. Other functions should be added in the near future.
12 12
13.TP 13.TP
14\fB\-c \fIFILENAME\fR, \fB\-\-config=FILENAME\fR 14\fB\-c \fIFILENAME\fR, \fB\-\-config=FILENAME\fR
diff --git a/doc/man/gnunet-gns.1 b/doc/man/gnunet-gns.1
index 2e45ee065..02eaa9e30 100644
--- a/doc/man/gnunet-gns.1
+++ b/doc/man/gnunet-gns.1
@@ -54,4 +54,4 @@ Report bugs by using Mantis <https://gnunet.org/bugs/> or by sending electronic
54 54
55 55
56.SH "SEE ALSO" 56.SH "SEE ALSO"
57\fBgnunet\-namestore\fP(1), \fBgnunet\-identity\fP(1) 57\fBgnunet\-namestore\fP(1), \fBgnunet\-identity\fP(1)
diff --git a/doc/man/gnunet-namestore.1 b/doc/man/gnunet-namestore.1
index b2bb1b212..18a4091d0 100644
--- a/doc/man/gnunet-namestore.1
+++ b/doc/man/gnunet-namestore.1
@@ -9,7 +9,7 @@ gnunet\-namestore \- manipulate GNUnet zones
9.br 9.br
10 10
11.SH DESCRIPTION 11.SH DESCRIPTION
12\fBgnunet\-namestore\fP can be used to create and manipulate a GNS zone. 12\fBgnunet\-namestore\fP can be used to create and manipulate a GNS zone.
13 13
14.SH OPTIONS 14.SH OPTIONS
15.B 15.B
diff --git a/doc/man/gnunet-peerinfo.1 b/doc/man/gnunet-peerinfo.1
index bbb57b518..eb63d454b 100644
--- a/doc/man/gnunet-peerinfo.1
+++ b/doc/man/gnunet-peerinfo.1
@@ -10,7 +10,7 @@ gnunet\-peerinfo \- Display information about other peers.
10 10
11.SH DESCRIPTION 11.SH DESCRIPTION
12.PP 12.PP
13\fBgnunet\-peerinfo\fP display the known addresses and trust of known peers. 13\fBgnunet\-peerinfo\fP display the known addresses and trust of known peers.
14 14
15.SH OPTIONS 15.SH OPTIONS
16.B 16.B
diff --git a/doc/man/gnunet-publish.1 b/doc/man/gnunet-publish.1
index 2f2055074..ff37610ff 100644
--- a/doc/man/gnunet-publish.1
+++ b/doc/man/gnunet-publish.1
@@ -18,7 +18,7 @@ With gnunet\-publish, it is easy to create new directories simultaneously when a
18.PP 18.PP
19Since keywords can be spammed (any user can add any content under any keyword), GNUnet supports namespaces. A namespace is a subset of the searchspace into which only the holder of a certain pseudonym can add content. Any GNUnet user can create any number of pseudonyms using \fBgnunet\-pseudonym\fR. Pseudonyms are stored in the user's GNUnet directory. While pseudonyms are locally identified with an arbitrary string that the user selects when the pseudonym is created, the namespace is globally known only under the hash of the public key of the pseudonym. Since only the owner of the pseudonym can add content to the namespace, it is impossible for other users to pollute the namespace. gnunet\-publish automatically publishes the top\-directory (or the only file if only one file is specified) into the namespace if a pseudonym is specified. 19Since keywords can be spammed (any user can add any content under any keyword), GNUnet supports namespaces. A namespace is a subset of the searchspace into which only the holder of a certain pseudonym can add content. Any GNUnet user can create any number of pseudonyms using \fBgnunet\-pseudonym\fR. Pseudonyms are stored in the user's GNUnet directory. While pseudonyms are locally identified with an arbitrary string that the user selects when the pseudonym is created, the namespace is globally known only under the hash of the public key of the pseudonym. Since only the owner of the pseudonym can add content to the namespace, it is impossible for other users to pollute the namespace. gnunet\-publish automatically publishes the top\-directory (or the only file if only one file is specified) into the namespace if a pseudonym is specified.
20.PP 20.PP
21It is possible to update content in GNUnet if that content was placed and obtained from a particular namespace. Updates are only possible for content in namespaces since this is the only way to assure that a malicious party can not supply counterfeited updates. Note that an update with GNUnet does not make the old content unavailable, GNUnet merely allows the publisher to point users to more recent versions. You can use the \-N option to specify the future identifier of an update. When using this option, a GNUnet client that finds the current (\-t) identifier will automatically begin a search for the update (\-N) identifier. If you later publish an update under the (\-N) identifier, both results will be given to the user. 21It is possible to update content in GNUnet if that content was placed and obtained from a particular namespace. Updates are only possible for content in namespaces since this is the only way to assure that a malicious party can not supply counterfeited updates. Note that an update with GNUnet does not make the old content unavailable, GNUnet merely allows the publisher to point users to more recent versions. You can use the \-N option to specify the future identifier of an update. When using this option, a GNUnet client that finds the current (\-t) identifier will automatically begin a search for the update (\-N) identifier. If you later publish an update under the (\-N) identifier, both results will be given to the user.
22.PP 22.PP
23You can use automatic meta\-data extraction (based on libextractor) or the command\-line option \-m to specify meta-data. For the \-m option you need to use the form keyword\-type:value. For example, use "\-m os:Linux" to specify that the operating system is Linux. Common meta\-data types are "author", "title" , "mimetype", "filename", "language", "subject" and "keywords". A full list can be obtained from the extract tool using the option \-\-list. The meta\-data is used to help users in searching for files on the network. The keywords are case\-sensitive. 23You can use automatic meta\-data extraction (based on libextractor) or the command\-line option \-m to specify meta-data. For the \-m option you need to use the form keyword\-type:value. For example, use "\-m os:Linux" to specify that the operating system is Linux. Common meta\-data types are "author", "title" , "mimetype", "filename", "language", "subject" and "keywords". A full list can be obtained from the extract tool using the option \-\-list. The meta\-data is used to help users in searching for files on the network. The keywords are case\-sensitive.
24.PP 24.PP
@@ -28,7 +28,7 @@ GNUnet supports two styles of publishing files on the network. Publishing a file
28Use alternate config file (if this option is not specified, the default is ~/.gnunet/gnunet.conf). 28Use alternate config file (if this option is not specified, the default is ~/.gnunet/gnunet.conf).
29 29
30.TP 30.TP
31\fB\-D\fR, \fB\-\-disable\-extractor\fR 31\fB\-D\fR, \fB\-\-disable\-extractor\fR
32Disable use of GNU libextractor for finding additional keywords and metadata. 32Disable use of GNU libextractor for finding additional keywords and metadata.
33 33
34.TP 34.TP
@@ -45,8 +45,8 @@ additional key to index the content with (to add multiple keys, specify multiple
45 45
46.TP 46.TP
47\fB\-L \fILOGLEVEL\fR, \fB\-\-loglevel=\fILOGLEVEL\fR 47\fB\-L \fILOGLEVEL\fR, \fB\-\-loglevel=\fILOGLEVEL\fR
48Change the loglevel. Possible values for LOGLEVEL are 48Change the loglevel. Possible values for LOGLEVEL are
49ERROR, WARNING, INFO and DEBUG. 49ERROR, WARNING, INFO and DEBUG.
50 50
51.TP 51.TP
52\fB\-m \fITYPE:VALUE\fR, \fB\-\-meta=\fITYPE:VALUE\fR 52\fB\-m \fITYPE:VALUE\fR, \fB\-\-meta=\fITYPE:VALUE\fR
@@ -99,9 +99,9 @@ Be verbose. Using this option causes gnunet\-publish to print progress informat
99 99
100.SH SETTING ANONYMITY LEVEL 100.SH SETTING ANONYMITY LEVEL
101 101
102The \fB\-a\fR option can be used to specify additional anonymity constraints. If set to 0, GNUnet will publish the file non-anonymously and in fact sign the advertisement for the file using your peer's private key. This will allow other users to download the file as fast as possible, including using non-anonymous methods (DHT, direct transfer). If you set it to 1 (default), you use the standard anonymous routing algorithm (which does not explicitly leak your identity). However, a powerful adversary may still be able to perform traffic analysis (statistics) to over time infer data about your identity. You can gain better privacy by specifying a higher level of anonymity, which increases the amount of cover traffic your own traffic will get, at the expense of performance. Note that regardless of the anonymity level you choose, peers that cache content in the network always use anonymity level 1. 102The \fB\-a\fR option can be used to specify additional anonymity constraints. If set to 0, GNUnet will publish the file non-anonymously and in fact sign the advertisement for the file using your peer's private key. This will allow other users to download the file as fast as possible, including using non-anonymous methods (DHT, direct transfer). If you set it to 1 (default), you use the standard anonymous routing algorithm (which does not explicitly leak your identity). However, a powerful adversary may still be able to perform traffic analysis (statistics) to over time infer data about your identity. You can gain better privacy by specifying a higher level of anonymity, which increases the amount of cover traffic your own traffic will get, at the expense of performance. Note that regardless of the anonymity level you choose, peers that cache content in the network always use anonymity level 1.
103 103
104The definition of the ANONYMITY LEVEL is the following. 0 means no anonymity is required. Otherwise a value of 'v' means that 1 out of v bytes of "anonymous" traffic can be from the local user, leaving 'v-1' bytes of cover traffic per byte on the wire. Thus, if GNUnet routes n bytes of messages from foreign peers (using anonymous routing), it may originate n/(v-1) bytes of data in the same time\-period. The time\-period is twice the average delay that GNUnet defers forwarded queries. 104The definition of the ANONYMITY LEVEL is the following. 0 means no anonymity is required. Otherwise a value of 'v' means that 1 out of v bytes of "anonymous" traffic can be from the local user, leaving 'v-1' bytes of cover traffic per byte on the wire. Thus, if GNUnet routes n bytes of messages from foreign peers (using anonymous routing), it may originate n/(v-1) bytes of data in the same time\-period. The time\-period is twice the average delay that GNUnet defers forwarded queries.
105 105
106The default is 1 and this should be fine for most users. Also notice that if you choose very large values, you may end up having no throughput at all, especially if many of your fellow GNUnet\-peers all do the same. 106The default is 1 and this should be fine for most users. Also notice that if you choose very large values, you may end up having no throughput at all, especially if many of your fellow GNUnet\-peers all do the same.
107 107
diff --git a/doc/man/gnunet-resolver.1 b/doc/man/gnunet-resolver.1
index 6766979f4..0666f65df 100644
--- a/doc/man/gnunet-resolver.1
+++ b/doc/man/gnunet-resolver.1
@@ -9,7 +9,7 @@ gnunet\-resolver \- perform DNS resolution using GNUnet resolver service
9.br 9.br
10 10
11.SH DESCRIPTION 11.SH DESCRIPTION
12\fBgnunet\-resolver\fP can be used to lookup the IP address(es) for a hostname or the hostname for an IP address. gnunet\-resolver uses the GNUnet service infrastructure to do this, but otherwise does nothing special. 12\fBgnunet\-resolver\fP can be used to lookup the IP address(es) for a hostname or the hostname for an IP address. gnunet\-resolver uses the GNUnet service infrastructure to do this, but otherwise does nothing special.
13 13
14.SH OPTIONS 14.SH OPTIONS
15.B 15.B
diff --git a/doc/man/gnunet-scalarproduct.1 b/doc/man/gnunet-scalarproduct.1
index 6852694b6..73081e2ed 100644
--- a/doc/man/gnunet-scalarproduct.1
+++ b/doc/man/gnunet-scalarproduct.1
@@ -16,10 +16,10 @@ A client can issue one of two messages to its service:
16tab (@); 16tab (@);
17l lx. 17l lx.
181@T{ 181@T{
19A request to compute a vectorproduct with another peer (\fBAlice\fP) 19A request to compute a vectorproduct with another peer (\fBAlice\fP)
20T} 20T}
212@T{ 212@T{
22Elements to support a peer in computing a vectorproduct (\fBBob\fP) 22Elements to support a peer in computing a vectorproduct (\fBBob\fP)
23T} 23T}
24.TE 24.TE
25 25
@@ -27,9 +27,9 @@ Both requests must share the same SID, which can be an arbitrary string identify
27 27
28\fBAlice\fP\'s client must supply the ASCII encoded peer ID of bob\'s service, it will internally be checked by the client for validity. Invalid values here result in the client or the service failing the session. 28\fBAlice\fP\'s client must supply the ASCII encoded peer ID of bob\'s service, it will internally be checked by the client for validity. Invalid values here result in the client or the service failing the session.
29 29
30Elements are handed over as signed decimal integers, the element count supplied by \fBAlice\fP and \fBBob\fP must match. \fBAlice\fP can also supply a mask for these values to her service, which allows partial vector products to be computed across the vector. Elements can be masked by setting their the corresponding mask element to zero, any other value means the element will not be masked. \fBAlice\fP\'s client will also mask all 0-values to avoid information leakage to \fBBob\fP. 30Elements are handed over as signed decimal integers, the element count supplied by \fBAlice\fP and \fBBob\fP must match. \fBAlice\fP can also supply a mask for these values to her service, which allows partial vector products to be computed across the vector. Elements can be masked by setting their the corresponding mask element to zero, any other value means the element will not be masked. \fBAlice\fP\'s client will also mask all 0-values to avoid information leakage to \fBBob\fP.
31 31
32The protocol by definition relies on \fBAlice\fP and \fBBob\fP being benign, thus \fBBob\fP can arbitrarily falsify his information. Both peers collaborate to achieve a correct result. 32The protocol by definition relies on \fBAlice\fP and \fBBob\fP being benign, thus \fBBob\fP can arbitrarily falsify his information. Both peers collaborate to achieve a correct result.
33 33
34.SH OPTIONS 34.SH OPTIONS
35.B 35.B
diff --git a/doc/man/gnunet-search.1 b/doc/man/gnunet-search.1
index 2c9af6397..137125967 100644
--- a/doc/man/gnunet-search.1
+++ b/doc/man/gnunet-search.1
@@ -13,11 +13,11 @@ Search for content on GNUnet. The keywords are case\-sensitive. gnunet\-search
13.TP 13.TP
14\fB\-a \fILEVEL\fR, \fB\-\-anonymity=\fILEVEL\fR 14\fB\-a \fILEVEL\fR, \fB\-\-anonymity=\fILEVEL\fR
15 15
16The \fB\-a\fR option can be used to specify additional anonymity constraints. If set to 0, GNUnet will try to download the file as fast as possible, including using non-anonymous methods. If you set it to 1 (default), you use the standard anonymous routing algorithm (which does not explicitly leak your identity). However, a powerful adversary may still be able to perform traffic analysis (statistics) to over time infer data about your identity. You can gain better privacy by specifying a higher level of anonymity, which increases the amount of cover traffic your own traffic will get, at the expense of performance. Note that your download performance is not only determined by your own anonymity level, but also by the anonymity level of the peers publishing the file. So even if you download with anonymity level 0, the peers publishing the data might be sharing with a higher anonymity level, which in this case will determine performance. Also, peers that cache content in the network always use anonymity level 1. 16The \fB\-a\fR option can be used to specify additional anonymity constraints. If set to 0, GNUnet will try to download the file as fast as possible, including using non-anonymous methods. If you set it to 1 (default), you use the standard anonymous routing algorithm (which does not explicitly leak your identity). However, a powerful adversary may still be able to perform traffic analysis (statistics) to over time infer data about your identity. You can gain better privacy by specifying a higher level of anonymity, which increases the amount of cover traffic your own traffic will get, at the expense of performance. Note that your download performance is not only determined by your own anonymity level, but also by the anonymity level of the peers publishing the file. So even if you download with anonymity level 0, the peers publishing the data might be sharing with a higher anonymity level, which in this case will determine performance. Also, peers that cache content in the network always use anonymity level 1.
17 17
18This option can be used to limit requests further than that. In particular, you can require GNUnet to receive certain amounts of traffic from other peers before sending your queries. This way, you can gain very high levels of anonymity \- at the expense of much more traffic and much higher latency. So set it only if you really believe you need it. 18This option can be used to limit requests further than that. In particular, you can require GNUnet to receive certain amounts of traffic from other peers before sending your queries. This way, you can gain very high levels of anonymity \- at the expense of much more traffic and much higher latency. So set it only if you really believe you need it.
19 19
20The definition of ANONYMITY\-RECEIVE is the following. 0 means no anonymity is required. Otherwise a value of 'v' means that 1 out of v bytes of "anonymous" traffic can be from the local user, leaving 'v-1' bytes of cover traffic per byte on the wire. Thus, if GNUnet routes n bytes of messages from foreign peers (using anonymous routing), it may originate n/(v-1) bytes of queries in the same time\-period. The time\-period is twice the average delay that GNUnet defers forwarded queries. 20The definition of ANONYMITY\-RECEIVE is the following. 0 means no anonymity is required. Otherwise a value of 'v' means that 1 out of v bytes of "anonymous" traffic can be from the local user, leaving 'v-1' bytes of cover traffic per byte on the wire. Thus, if GNUnet routes n bytes of messages from foreign peers (using anonymous routing), it may originate n/(v-1) bytes of queries in the same time\-period. The time\-period is twice the average delay that GNUnet defers forwarded queries.
21 21
22The default is 1 and this should be fine for most users. Also notice that if you choose very large values, you may end up having no throughput at all, especially if many of your fellow GNUnet\-peers all do the same. 22The default is 1 and this should be fine for most users. Also notice that if you choose very large values, you may end up having no throughput at all, especially if many of your fellow GNUnet\-peers all do the same.
23 23
@@ -31,8 +31,8 @@ print help page
31 31
32.TP 32.TP
33\fB\-L \fILOGLEVEL\fR, \fB\-\-loglevel=\fILOGLEVEL\fR 33\fB\-L \fILOGLEVEL\fR, \fB\-\-loglevel=\fILOGLEVEL\fR
34Change the loglevel. Possible values for LOGLEVEL are 34Change the loglevel. Possible values for LOGLEVEL are
35ERROR, WARNING, INFO and DEBUG. 35ERROR, WARNING, INFO and DEBUG.
36 36
37.TP 37.TP
38\fB\-o \fIFILENAME\fR, \fB\-\-output=\fIFILENAME\fR 38\fB\-o \fIFILENAME\fR, \fB\-\-output=\fIFILENAME\fR
@@ -59,9 +59,9 @@ print the version number
59print meta data from search results as well 59print meta data from search results as well
60.SH NOTES 60.SH NOTES
61 61
62You can run gnunet\-search with an URI instead of a keyword. The URI can have the format for a namespace search or for a keyword search. For a namespace search, the format is gnunet://fs/sks/NAMESPACE/IDENTIFIER. For a keyword search, use gnunet://fs/ksk/KEYWORD[+KEYWORD]*. If the format does not correspond to a GNUnet URI, GNUnet will automatically assume that keywords are supplied directly. 62You can run gnunet\-search with an URI instead of a keyword. The URI can have the format for a namespace search or for a keyword search. For a namespace search, the format is gnunet://fs/sks/NAMESPACE/IDENTIFIER. For a keyword search, use gnunet://fs/ksk/KEYWORD[+KEYWORD]*. If the format does not correspond to a GNUnet URI, GNUnet will automatically assume that keywords are supplied directly.
63 63
64If multiple keywords are passed, gnunet-search will look for content matching any of the keywords. The prefix "+" makes a keyword mandatory. 64If multiple keywords are passed, gnunet-search will look for content matching any of the keywords. The prefix "+" makes a keyword mandatory.
65 65
66# gnunet\-search "Das Kapital" 66# gnunet\-search "Das Kapital"
67 67
@@ -90,4 +90,4 @@ GNUnet configuration file; specifies the default value for the timeout
90.SH "REPORTING BUGS" 90.SH "REPORTING BUGS"
91Report bugs to <https://gnunet.org/bugs/> or by sending electronic mail to <gnunet\-developers@gnu.org> 91Report bugs to <https://gnunet.org/bugs/> or by sending electronic mail to <gnunet\-developers@gnu.org>
92.SH "SEE ALSO" 92.SH "SEE ALSO"
93\fBgnunet\-fs\-gtk\fP(1), \fBgnunet\-publish\fP(1), \fBgnunet\-download\fP(1), \fBgnunet.conf\fP(5), 93\fBgnunet\-fs\-gtk\fP(1), \fBgnunet\-publish\fP(1), \fBgnunet\-download\fP(1), \fBgnunet.conf\fP(5),
diff --git a/doc/man/gnunet-transport.1 b/doc/man/gnunet-transport.1
index 45fd70600..63c3163b2 100644
--- a/doc/man/gnunet-transport.1
+++ b/doc/man/gnunet-transport.1
@@ -8,7 +8,7 @@ gnunet\-transport \- measure and control the transport subsystem
8.SH DESCRIPTION 8.SH DESCRIPTION
9.PP 9.PP
10 10
11gnunet\-transport is a tool to access various functions of GNUnet's transport subsystem from the command\-line. Most of these are not expected to be useful for end-users. gnunet\-transport can be used to evaluate the performance of the transports, force a peer to connect to another peer (if possible). Other functions should be added in the near future. 11gnunet\-transport is a tool to access various functions of GNUnet's transport subsystem from the command\-line. Most of these are not expected to be useful for end-users. gnunet\-transport can be used to evaluate the performance of the transports, force a peer to connect to another peer (if possible). Other functions should be added in the near future.
12 12
13.TP 13.TP
14\fB\-b\fR, \fB\-\-benchmark\fR 14\fB\-b\fR, \fB\-\-benchmark\fR
diff --git a/doc/man/gnunet-unindex.1 b/doc/man/gnunet-unindex.1
index 9cbb7aa57..907c26f13 100644
--- a/doc/man/gnunet-unindex.1
+++ b/doc/man/gnunet-unindex.1
@@ -16,7 +16,7 @@ print help page
16.TP 16.TP
17\fB\-L \fILOGLEVEL\fR, \fB\-\-loglevel=LOGLEVEL\fR 17\fB\-L \fILOGLEVEL\fR, \fB\-\-loglevel=LOGLEVEL\fR
18Change the loglevel. Possible values for LOGLEVEL are NOTHING, 18Change the loglevel. Possible values for LOGLEVEL are NOTHING,
19ERROR, WARNING, INFO and DEBUG. 19ERROR, WARNING, INFO and DEBUG.
20 20
21.TP 21.TP
22\fB\-v\fR, \fB\-\-version\fR 22\fB\-v\fR, \fB\-\-version\fR