aboutsummaryrefslogtreecommitdiff
path: root/doc/handbook/chapters/keyconcepts.texi
diff options
context:
space:
mode:
Diffstat (limited to 'doc/handbook/chapters/keyconcepts.texi')
-rw-r--r--doc/handbook/chapters/keyconcepts.texi25
1 files changed, 25 insertions, 0 deletions
diff --git a/doc/handbook/chapters/keyconcepts.texi b/doc/handbook/chapters/keyconcepts.texi
index eb95dbf78..f429997bf 100644
--- a/doc/handbook/chapters/keyconcepts.texi
+++ b/doc/handbook/chapters/keyconcepts.texi
@@ -152,6 +152,7 @@ and @pxref{Deniability}.
152 152
153@menu 153@menu
154* How file-sharing achieves Anonymity:: 154* How file-sharing achieves Anonymity::
155* How messaging provides Anonymity::
155@end menu 156@end menu
156 157
157Providing anonymity for users is the central goal for the anonymous 158Providing anonymity for users is the central goal for the anonymous
@@ -231,6 +232,30 @@ GAP --- practical anonymous networking. In Proceedings of
231Designing Privacy Enhancing Technologies, 2003. 232Designing Privacy Enhancing Technologies, 2003.
232(@uref{https://git.gnunet.org/bibliography.git/plain/docs/aff.pdf, https://git.gnunet.org/bibliography.git/plain/docs/aff.pdf}) 233(@uref{https://git.gnunet.org/bibliography.git/plain/docs/aff.pdf, https://git.gnunet.org/bibliography.git/plain/docs/aff.pdf})
233 234
235@cindex How messaging provides Anonymity
236@node How messaging provides Anonymity
237@subsection How messaging provides Anonymity
238
239While the file-sharing tries to achieve anonymity through hiding actions in
240other traffic, the messaging service provides a weaker form of protection
241against identification.
242
243The messaging service allows the use of an anonymous ego for the signing and
244verification process of messages instead of a unique ego. This anonymous ego is
245a publically known key pair which is shared between all peers in GNUnet.
246
247Using this ego only ensures that individual messages alone can't identify its
248sender inside of a messenger room. It should be clarified that the route of
249the traffic for each message can still be tracked to identify the senders peer
250inside of a messenger room if the threat agent controls certain peers hosting
251the room.
252
253Also opening a room in the messenger service will potentially match your peer
254identity with the internal member identity from the messenger service. So
255despite using the anonymous ego you can reveal your peer identity. This means
256to decrease the chance of being identified, it is recommended to enter rooms but
257you should not open them for others.
258
234@cindex Deniability 259@cindex Deniability
235@node Deniability 260@node Deniability
236@section Deniability 261@section Deniability