aboutsummaryrefslogtreecommitdiff
path: root/doc/documentation/chapters/keyconcepts.texi
diff options
context:
space:
mode:
Diffstat (limited to 'doc/documentation/chapters/keyconcepts.texi')
-rw-r--r--doc/documentation/chapters/keyconcepts.texi37
1 files changed, 23 insertions, 14 deletions
diff --git a/doc/documentation/chapters/keyconcepts.texi b/doc/documentation/chapters/keyconcepts.texi
index 55f79f1c7..b4a60024c 100644
--- a/doc/documentation/chapters/keyconcepts.texi
+++ b/doc/documentation/chapters/keyconcepts.texi
@@ -81,11 +81,14 @@ Binding messages expire after at most a week (the timeout can be
81shorter if the user configures the node appropriately). 81shorter if the user configures the node appropriately).
82This expiration ensures that the network will eventually get rid of 82This expiration ensures that the network will eventually get rid of
83outdated advertisements. 83outdated advertisements.
84@footnote{Ronaldo A. Ferreira, Christian Grothoff, and Paul Ruth. 84
85For more information, refer to the following paper:
86
87Ronaldo A. Ferreira, Christian Grothoff, and Paul Ruth.
85A Transport Layer Abstraction for Peer-to-Peer Networks 88A Transport Layer Abstraction for Peer-to-Peer Networks
86Proceedings of the 3rd International Symposium on Cluster Computing 89Proceedings of the 3rd International Symposium on Cluster Computing
87and the Grid (GRID 2003), 2003. 90and the Grid (GRID 2003), 2003.
88(@uref{https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf, https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf})} 91(@uref{https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf, https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf})
89 92
90@cindex Accounting to Encourage Resource Sharing 93@cindex Accounting to Encourage Resource Sharing
91@node Accounting to Encourage Resource Sharing 94@node Accounting to Encourage Resource Sharing
@@ -118,10 +121,11 @@ effective priority to satisfy their resource constraints. This way,
118GNUnet's economic model ensures that nodes that are not currently 121GNUnet's economic model ensures that nodes that are not currently
119considered to have a surplus in contributions will not be served if 122considered to have a surplus in contributions will not be served if
120the network load is high. 123the network load is high.
121@footnote{Christian Grothoff. An Excess-Based Economic Model for Resource 124
125For more information, refer to the following paper:
126Christian Grothoff. An Excess-Based Economic Model for Resource
122Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik, June 2003. 127Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik, June 2003.
123(@uref{https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf, https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf})} 128(@uref{https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf, https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf})
124@c 2009?
125 129
126@cindex Confidentiality 130@cindex Confidentiality
127@node Confidentiality 131@node Confidentiality
@@ -154,10 +158,11 @@ Providing anonymity for users is the central goal for the anonymous
154file-sharing application. Many other design decisions follow in the 158file-sharing application. Many other design decisions follow in the
155footsteps of this requirement. 159footsteps of this requirement.
156Anonymity is never absolute. While there are various 160Anonymity is never absolute. While there are various
157scientific metrics@footnote{Claudia Díaz, Stefaan Seys, Joris Claessens, 161scientific metrics
162(Claudia Díaz, Stefaan Seys, Joris Claessens,
158and Bart Preneel. Towards measuring anonymity. 163and Bart Preneel. Towards measuring anonymity.
1592002. 1642002.
160(@uref{https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf, https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf})} 165(@uref{https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf, https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf}))
161that can help quantify the level of anonymity that a given mechanism 166that can help quantify the level of anonymity that a given mechanism
162provides, there is no such thing as "complete anonymity". 167provides, there is no such thing as "complete anonymity".
163GNUnet's file-sharing implementation allows users to select for each 168GNUnet's file-sharing implementation allows users to select for each
@@ -165,7 +170,7 @@ operation (publish, search, download) the desired level of anonymity.
165The metric used is the amount of cover traffic available to hide the 170The metric used is the amount of cover traffic available to hide the
166request. 171request.
167While this metric is not as good as, for example, the theoretical metric 172While this metric is not as good as, for example, the theoretical metric
168given in scientific metrics@footnote{likewise}, 173given in scientific metrics,
169it is probably the best metric available to a peer with a purely local 174it is probably the best metric available to a peer with a purely local
170view of the world that does not rely on unreliable external information. 175view of the world that does not rely on unreliable external information.
171The default anonymity level is @code{1}, which uses anonymous routing but 176The default anonymity level is @code{1}, which uses anonymous routing but
@@ -215,10 +220,12 @@ GNUnet we do not have to indirect the replies if we don't think we need
215more traffic to hide our own actions. 220more traffic to hide our own actions.
216 221
217This increases the efficiency of the network as we can indirect less under 222This increases the efficiency of the network as we can indirect less under
218higher load.@footnote{Krista Bennett and Christian Grothoff. 223higher load.
224Refer to the following paper for more:
225Krista Bennett and Christian Grothoff.
219GAP --- practical anonymous networking. In Proceedings of 226GAP --- practical anonymous networking. In Proceedings of
220Designing Privacy Enhancing Technologies, 2003. 227Designing Privacy Enhancing Technologies, 2003.
221(@uref{https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf, https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf})} 228(@uref{https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf, https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf})
222 229
223@cindex Deniability 230@cindex Deniability
224@node Deniability 231@node Deniability
@@ -240,11 +247,13 @@ encryption on the network layer (link encryption, confidentiality,
240authentication) and again on the application layer (provided 247authentication) and again on the application layer (provided
241by @command{gnunet-publish}, @command{gnunet-download}, 248by @command{gnunet-publish}, @command{gnunet-download},
242@command{gnunet-search} and @command{gnunet-gtk}). 249@command{gnunet-search} and @command{gnunet-gtk}).
243@footnote{Christian Grothoff, Krista Grothoff, Tzvetan Horozov, 250
251Refer to the following paper for more:
252Christian Grothoff, Krista Grothoff, Tzvetan Horozov,
244and Jussi T. Lindgren. 253and Jussi T. Lindgren.
245An Encoding for Censorship-Resistant Sharing. 254An Encoding for Censorship-Resistant Sharing.
2462009. 2552009.
247(@uref{https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf, https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf})} 256(@uref{https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf, https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf})
248 257
249@cindex Peer Identities 258@cindex Peer Identities
250@node Peer Identities 259@node Peer Identities
@@ -271,11 +280,11 @@ You can find your peer identity by running @command{gnunet-peerinfo -s}.
271@c FIXME: Explain or link to an explanation of the concept of public keys 280@c FIXME: Explain or link to an explanation of the concept of public keys
272@c and private keys. 281@c and private keys.
273@c FIXME: Rewrite for the latest GNS changes. 282@c FIXME: Rewrite for the latest GNS changes.
274GNS@footnote{Matthias Wachs, Martin Schanzenbach, and Christian Grothoff. 283GNS (Matthias Wachs, Martin Schanzenbach, and Christian Grothoff.
275A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name 284A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name
276System. In proceedings of 13th International Conference on Cryptology and 285System. In proceedings of 13th International Conference on Cryptology and
277Network Security (CANS 2014). 2014. 286Network Security (CANS 2014). 2014.
278@uref{https://gnunet.org/git/bibliography.git/plain/docs/gns2014wachs.pdf, https://gnunet.org/git/bibliography.git/plain/docs/gns2014wachs.pdf}} 287@uref{https://gnunet.org/git/bibliography.git/plain/docs/gns2014wachs.pdf, https://gnunet.org/git/bibliography.git/plain/docs/gns2014wachs.pdf})
279zones are similar to those of DNS zones, but instead of a hierarchy of 288zones are similar to those of DNS zones, but instead of a hierarchy of
280authorities to governing their use, GNS zones are controlled by a private 289authorities to governing their use, GNS zones are controlled by a private
281key. 290key.