diff options
Diffstat (limited to 'doc/documentation/chapters/keyconcepts.texi')
-rw-r--r-- | doc/documentation/chapters/keyconcepts.texi | 37 |
1 files changed, 23 insertions, 14 deletions
diff --git a/doc/documentation/chapters/keyconcepts.texi b/doc/documentation/chapters/keyconcepts.texi index 55f79f1c7..b4a60024c 100644 --- a/doc/documentation/chapters/keyconcepts.texi +++ b/doc/documentation/chapters/keyconcepts.texi | |||
@@ -81,11 +81,14 @@ Binding messages expire after at most a week (the timeout can be | |||
81 | shorter if the user configures the node appropriately). | 81 | shorter if the user configures the node appropriately). |
82 | This expiration ensures that the network will eventually get rid of | 82 | This expiration ensures that the network will eventually get rid of |
83 | outdated advertisements. | 83 | outdated advertisements. |
84 | @footnote{Ronaldo A. Ferreira, Christian Grothoff, and Paul Ruth. | 84 | |
85 | For more information, refer to the following paper: | ||
86 | |||
87 | Ronaldo A. Ferreira, Christian Grothoff, and Paul Ruth. | ||
85 | A Transport Layer Abstraction for Peer-to-Peer Networks | 88 | A Transport Layer Abstraction for Peer-to-Peer Networks |
86 | Proceedings of the 3rd International Symposium on Cluster Computing | 89 | Proceedings of the 3rd International Symposium on Cluster Computing |
87 | and the Grid (GRID 2003), 2003. | 90 | and the Grid (GRID 2003), 2003. |
88 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf, https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf})} | 91 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf, https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf}) |
89 | 92 | ||
90 | @cindex Accounting to Encourage Resource Sharing | 93 | @cindex Accounting to Encourage Resource Sharing |
91 | @node Accounting to Encourage Resource Sharing | 94 | @node Accounting to Encourage Resource Sharing |
@@ -118,10 +121,11 @@ effective priority to satisfy their resource constraints. This way, | |||
118 | GNUnet's economic model ensures that nodes that are not currently | 121 | GNUnet's economic model ensures that nodes that are not currently |
119 | considered to have a surplus in contributions will not be served if | 122 | considered to have a surplus in contributions will not be served if |
120 | the network load is high. | 123 | the network load is high. |
121 | @footnote{Christian Grothoff. An Excess-Based Economic Model for Resource | 124 | |
125 | For more information, refer to the following paper: | ||
126 | Christian Grothoff. An Excess-Based Economic Model for Resource | ||
122 | Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik, June 2003. | 127 | Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik, June 2003. |
123 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf, https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf})} | 128 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf, https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf}) |
124 | @c 2009? | ||
125 | 129 | ||
126 | @cindex Confidentiality | 130 | @cindex Confidentiality |
127 | @node Confidentiality | 131 | @node Confidentiality |
@@ -154,10 +158,11 @@ Providing anonymity for users is the central goal for the anonymous | |||
154 | file-sharing application. Many other design decisions follow in the | 158 | file-sharing application. Many other design decisions follow in the |
155 | footsteps of this requirement. | 159 | footsteps of this requirement. |
156 | Anonymity is never absolute. While there are various | 160 | Anonymity is never absolute. While there are various |
157 | scientific metrics@footnote{Claudia Díaz, Stefaan Seys, Joris Claessens, | 161 | scientific metrics |
162 | (Claudia Díaz, Stefaan Seys, Joris Claessens, | ||
158 | and Bart Preneel. Towards measuring anonymity. | 163 | and Bart Preneel. Towards measuring anonymity. |
159 | 2002. | 164 | 2002. |
160 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf, https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf})} | 165 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf, https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf})) |
161 | that can help quantify the level of anonymity that a given mechanism | 166 | that can help quantify the level of anonymity that a given mechanism |
162 | provides, there is no such thing as "complete anonymity". | 167 | provides, there is no such thing as "complete anonymity". |
163 | GNUnet's file-sharing implementation allows users to select for each | 168 | GNUnet's file-sharing implementation allows users to select for each |
@@ -165,7 +170,7 @@ operation (publish, search, download) the desired level of anonymity. | |||
165 | The metric used is the amount of cover traffic available to hide the | 170 | The metric used is the amount of cover traffic available to hide the |
166 | request. | 171 | request. |
167 | While this metric is not as good as, for example, the theoretical metric | 172 | While this metric is not as good as, for example, the theoretical metric |
168 | given in scientific metrics@footnote{likewise}, | 173 | given in scientific metrics, |
169 | it is probably the best metric available to a peer with a purely local | 174 | it is probably the best metric available to a peer with a purely local |
170 | view of the world that does not rely on unreliable external information. | 175 | view of the world that does not rely on unreliable external information. |
171 | The default anonymity level is @code{1}, which uses anonymous routing but | 176 | The default anonymity level is @code{1}, which uses anonymous routing but |
@@ -215,10 +220,12 @@ GNUnet we do not have to indirect the replies if we don't think we need | |||
215 | more traffic to hide our own actions. | 220 | more traffic to hide our own actions. |
216 | 221 | ||
217 | This increases the efficiency of the network as we can indirect less under | 222 | This increases the efficiency of the network as we can indirect less under |
218 | higher load.@footnote{Krista Bennett and Christian Grothoff. | 223 | higher load. |
224 | Refer to the following paper for more: | ||
225 | Krista Bennett and Christian Grothoff. | ||
219 | GAP --- practical anonymous networking. In Proceedings of | 226 | GAP --- practical anonymous networking. In Proceedings of |
220 | Designing Privacy Enhancing Technologies, 2003. | 227 | Designing Privacy Enhancing Technologies, 2003. |
221 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf, https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf})} | 228 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf, https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf}) |
222 | 229 | ||
223 | @cindex Deniability | 230 | @cindex Deniability |
224 | @node Deniability | 231 | @node Deniability |
@@ -240,11 +247,13 @@ encryption on the network layer (link encryption, confidentiality, | |||
240 | authentication) and again on the application layer (provided | 247 | authentication) and again on the application layer (provided |
241 | by @command{gnunet-publish}, @command{gnunet-download}, | 248 | by @command{gnunet-publish}, @command{gnunet-download}, |
242 | @command{gnunet-search} and @command{gnunet-gtk}). | 249 | @command{gnunet-search} and @command{gnunet-gtk}). |
243 | @footnote{Christian Grothoff, Krista Grothoff, Tzvetan Horozov, | 250 | |
251 | Refer to the following paper for more: | ||
252 | Christian Grothoff, Krista Grothoff, Tzvetan Horozov, | ||
244 | and Jussi T. Lindgren. | 253 | and Jussi T. Lindgren. |
245 | An Encoding for Censorship-Resistant Sharing. | 254 | An Encoding for Censorship-Resistant Sharing. |
246 | 2009. | 255 | 2009. |
247 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf, https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf})} | 256 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf, https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf}) |
248 | 257 | ||
249 | @cindex Peer Identities | 258 | @cindex Peer Identities |
250 | @node Peer Identities | 259 | @node Peer Identities |
@@ -271,11 +280,11 @@ You can find your peer identity by running @command{gnunet-peerinfo -s}. | |||
271 | @c FIXME: Explain or link to an explanation of the concept of public keys | 280 | @c FIXME: Explain or link to an explanation of the concept of public keys |
272 | @c and private keys. | 281 | @c and private keys. |
273 | @c FIXME: Rewrite for the latest GNS changes. | 282 | @c FIXME: Rewrite for the latest GNS changes. |
274 | GNS@footnote{Matthias Wachs, Martin Schanzenbach, and Christian Grothoff. | 283 | GNS (Matthias Wachs, Martin Schanzenbach, and Christian Grothoff. |
275 | A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name | 284 | A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name |
276 | System. In proceedings of 13th International Conference on Cryptology and | 285 | System. In proceedings of 13th International Conference on Cryptology and |
277 | Network Security (CANS 2014). 2014. | 286 | Network Security (CANS 2014). 2014. |
278 | @uref{https://gnunet.org/git/bibliography.git/plain/docs/gns2014wachs.pdf, https://gnunet.org/git/bibliography.git/plain/docs/gns2014wachs.pdf}} | 287 | @uref{https://gnunet.org/git/bibliography.git/plain/docs/gns2014wachs.pdf, https://gnunet.org/git/bibliography.git/plain/docs/gns2014wachs.pdf}) |
279 | zones are similar to those of DNS zones, but instead of a hierarchy of | 288 | zones are similar to those of DNS zones, but instead of a hierarchy of |
280 | authorities to governing their use, GNS zones are controlled by a private | 289 | authorities to governing their use, GNS zones are controlled by a private |
281 | key. | 290 | key. |