gnunet-handbook

The GNUnet Handbook
Log | Files | Refs

commit ff098dc1335fa073b32e60ea45b8acc41002a323
parent 148f1284c325b0f2d519187cef62263434be60f0
Author: Martin Schanzenbach <schanzen@gnunet.org>
Date:   Sun, 31 Jul 2022 18:55:01 +0200

fix

Diffstat:
Mabout.md | 2+-
1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/about.md b/about.md @@ -94,7 +94,7 @@ While there is no clear way to relate the amount of available cover traffic to t The default anonymity level is 1, which uses anonymous routing but imposes no minimal requirements on cover traffic. It is possible to forego anonymity when this is not required. The anonymity level of 0 allows GNUnet to use more efficient, non-anonymous routing. -### How file-sharing achieves Anonymity +#### How file-sharing achieves Anonymity Contrary to other designs, we do not believe that users achieve strong anonymity just because their requests are obfuscated by a couple of indirections. This is not sufficient if the adversary uses traffic analysis. The threat model used for anonymous file sharing in GNUnet assumes that the adversary is quite powerful. In particular, we assume that the adversary can see all the traffic on the Internet. And while we assume that the adversary can not break our encryption, we assume that the adversary has many participating nodes in the network and that it can thus see many of the node-to-node interactions since it controls some of the nodes.