gnunet-handbook

The GNUnet Handbook
Log | Files | Refs

commit b4b11c87c8f470693307da0613f08996414ae0aa
parent ff098dc1335fa073b32e60ea45b8acc41002a323
Author: Martin Schanzenbach <schanzen@gnunet.org>
Date:   Sun, 31 Jul 2022 19:22:17 +0200

fix

Diffstat:
Mabout.md | 2+-
1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/about.md b/about.md @@ -80,7 +80,7 @@ In order to ensure that freeloaders or attackers have a minimal impact on the ne For more information, refer to the following paper: Christian Grothoff. An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik, June 2003. (https://git.gnunet.org/bibliography.git/plain/docs/ebe.pdf) -## Confidentiality +### Confidentiality Adversaries (malicious, bad actors) outside of GNUnet are not supposed to know what kind of actions a peer is involved in. Only the specific neighbor of a peer that is the corresponding sender or recipient of a message may know its contents, and even then application protocols may place further restrictions on that knowledge. In order to ensure confidentiality, GNUnet uses link encryption, that is each message exchanged between two peers is encrypted using a pair of keys only known to these two peers. Encrypting traffic like this makes any kind of traffic analysis much harder. Naturally, for some applications, it may still be desirable if even neighbors cannot determine the concrete contents of a message. In GNUnet, this problem is addressed by the specific application-level protocols. See for example the following sections: [Anonymity](about.md#anonymity), see [How file-sharing achieves Anonymity](about.md#how-file-sharing-achieves-anonymity), and see [Deniability](about.md#deniability).