1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
|
{% extends "common/base.j2" %}
{% block body_content %}
<article class="container">
<header>
<h1>{{ _("About GNUnet") }}</h1>
</header>
<div class="row">
<div class="col">
<h3>{{ _("What is GNUnet?") }}</h3>
<p>
{% trans %}
GNUnet is an alternative network stack for building secure,
decentralized and privacy-preserving distributed applications.
Our goal is to replace the old insecure Internet protocol stack. Starting
from an application for secure publication of files, it has grown to
include all kinds of basic protocol components and applications
towards the creation of a GNU internet.
{% endtrans %}
</p>
<p>
{% trans %}
Today, the actual use and thus the social requirements for a global
network differs widely from those goals of 1970. While the Internet
remains suitable for military use, where the network equipment is
operated by a command hierarchy and when necessary isolated from the
rest of the world, the situation is less tenable for civil society.
{% endtrans %}
</p>
<p>
{% trans %}
Due to fundamental Internet design choices, Internet traffic can be
misdirected, intercepted, censored and manipulated by hostile routers
on the network. And indeed, the modern Internet has evolved exactly
to the point where, as Matthew Green put it,
<a href="https://blog.cryptographyengineering.com/2015/08/16/the-network-is-hostile/">"the network is hostile"</a>.
{% endtrans %}
</p>
<p>
{% trans %}
We believe liberal societies need a network architecture that uses the
anti-authoritarian decentralized peer-to-peer paradigm and
privacy-preserving cryptographic protocols. The goal of the GNUnet
project is to provide a Free Software realization of this ideal.
{% endtrans %}
</p>
<p>
{% trans %}
Specifically, GNUnet tries to follow the following design principles,
in order of importance:
{% endtrans %}
</p>
<ol>
<li>
{% trans %}
GNUnet must be implemented as <a href="https://www.gnu.org/philosophy/free-sw.html">Free Software</a>.
{% endtrans %}
</li>
<li>{{ _("GNUnet must minimize the amount of personally identifiable information exposed.") }}</li>
<li>{{ _("GNUnet must be fully distributed and resilient to external attacks and rogue participants.") }}</li>
<li>{{ _("GNUnet must be self-organizing and not depend on administrators or centralized infrastructure.") }}</li>
<li>{{ _("GNUnet must inform the user which other participants have to be trusted when establishing private communications.") }}</li>
<li>{{ _("GNUnet must be open and permit new peers to join.") }}</li>
<li>{{ _("GNUnet must support a diverse range of applications and devices.") }}</li>
<li>{{ _("GNUnet must use compartmentalization to protect sensitive information.") }}</li>
<li>{{ _("The GNUnet architecture must be resource efficient.") }}</li>
<li>{{ _("GNUnet must provide incentives for peers to contribute more resources than they consume.") }}</li>
</ol>
</p>
<p>
{% trans %}
To get know and learn more, please check our <a href="https://docs.gnunet.org/handbook/gnunet.html">handbook</a>, especially the <a href="https://docs.gnunet.org/handbook/gnunet.html#Key-Concepts">chapter on "Key Concepts"</a>, explaining the fundamental concepts of GNUnet:
<ul>
<li><a href="https://docs.gnunet.org/handbook/gnunet.html#Authentication">Authentication</a></li>
<li><a href="https://docs.gnunet.org/handbook/gnunet.html#Accounting-to-Encourage-Resource-Sharing">Accounting to Encourage Resource Sharing</a></li>
<li><a href="https://docs.gnunet.org/handbook/gnunet.html#Confidentiality">Confidentiality</a></li>
<li><a href="https://docs.gnunet.org/handbook/gnunet.html#Anonymity">Anonymity</a></li>
<li><a href="https://docs.gnunet.org/handbook/gnunet.html#Deniability">Deniability</a></li>
<li><a href="https://docs.gnunet.org/handbook/gnunet.html#Peer-Identities">Peer Identities</a></li>
<li><a href="https://docs.gnunet.org/handbook/gnunet.html#Zones-in-the-GNU-Name-System-_0028GNS-Zones_0029">Zones in the GNU Name System (GNS Zones)</a></li>
<li><a href="https://docs.gnunet.org/handbook/gnunet.html#Egos">Egos</a></li>
</ul>
{% endtrans %}
</p>
</div>
<div class="col">
<h3>{{ _("More Resources") }}</h3>
<p>
{% trans %}
There are many more resources to learn about GNUnet besides the <a href="https://docs.gnunet.org/handbook/gnunet.html">handbook</a>, such as the <a href="https://bib.gnunet.org/">bibliography</a> with papers covering the various layers, many <a href="https://gnunet.org/en/video.html">videos</a> or a brief <a href="https://gnunet.org/en/glossary.html">glossary</a>.
{% endtrans %}
</p>
<p>
{% trans %}
You are most welcome to <a href="engage.html">get engaged into the conversation</a>, <a href="install.html">install GNUnet</a>, <a href="use.html">use it</a> and <a href="engage.html">contribute and get engaged</a> in various ways.
{% endtrans %}
</p>
<p>
{% trans %}
Please be aware that this project is (despite of it's age) still in an early alpha stage when it comes to software – its not an easy task to rewrite the whole Internet!
{% endtrans %}
<br>
</p>
<h3>{{ _("Current funding") }}</h3>
<p>
<ul>
<li>
<p>
{% trans %}
We're receiving funding from NLnet's Next Generation Internet
funding line to document and implement
the GNU Name System protocol in a way suitable for the
IETF standardization process.
{% endtrans %}
<br>
<a href="https://nlnet.nl/">NLnet Foundation</a><br>
<img src="{{ url('static/images/nlnet_logo.gif') }}" alt="NLnet logo">
</p>
</li>
<li>
<p>
{% trans %}
This project has received funding from the European Union’s Horizon
2020 research and innovation programme under the NGI_TRUST grant
agreement no 825618.
The project aims to integrate re:claimID with the GNU Taler payment
system in a pilot in order to demonstrate the practical feasibility
and benefits of privacy enhancing technologies for users and
commercial service providers. The project is called "Decentralized
Identities for Self-Sovereign End-users" (DISSENS).
{% endtrans %}
<br>
<a href="https://wiki.geant.org/display/NGITrust/">GEANT NGI TRUST</a><br>
<img style="width: 35%" src="{{ url('static/images/ngi_trust.png') }}" alt="NGI TRUST logo">
</p>
</li>
</ul>
<br>
{% trans %}
We are grateful for free hosting offered by the following organizations:
{% endtrans %}
<ul>
<li><a href="https://www.tum.de/">Technische Universität München</a></li>
<li><a href="https://www.bfh.ch/">Berner Fachhochschule</a></li>
<li><a href="https://www.gnu.org/">The GNU Project</a></li>
</ul>
</p>
<h3>{{ _("Past funding") }}</h3>
<p>
{% trans %}
We are grateful for past funding from the following organizations:
{% endtrans %}
<ul>
<li>
<p>
<a href="https://renewablefreedom.org/">Renewable Freedom Foundation / Stiftung Erneuerbare Freiheit</a><br>
<img src="{{ url('static/images/rff_logo.png') }}" alt="RFF logo">
</p>
</li>
<li>
<p>
<a href="https://cordis.europa.eu/fp7/">European Commission (FP7)</a><br>
<img src="{{ url('static/images/fp7_logo.jpg') }}" alt="FP7 logo">
</p>
</li>
<li>
<p>
<a href="http://www.dfg.de/">Deutsche Forschungsgemeinschaft</a><br>
<img src="{{ url('static/images/dfg_logo.gif') }}" alt="DFG logo">
</p>
</li>
<li>
<p>
<a href="https://nlnet.nl/">NLnet Foundation</a><br>
<img src="{{ url('static/images/nlnet_logo.gif') }}" alt="NLnet logo">
</p>
</li>
</ul>
</p>
</div><!-- END:col -->
</div><!-- END:row -->
</div><!-- END:container -->
{% endblock body_content %}
|