This is the main page from the research and software project '''''[[Echt Dezentrales Netz|EDN]]''''' ([[Echt Dezentrales Netz]] - really decentralized network).
The goal of ''[[Echt Dezentrales Netz|EDN]]'' is to '''verify''' the '''applicability''' of existing technologies and solutions (see [[Echt Dezentrales Netz/Recherche | Recherche]]), and to '''integrate''' them in a comprehensive '''product'''.
: An encrypted network as Freifunk, whose complete communication is anonymised against third-parties and can also include smartphones.
''Questions and suggestions are very welcome! Please write them down in the [[Diskussion:Echt Dezentrales Netz | discussion page]] ([https://wiki.c3d2.de/w/index.php?title=Diskussion:Echt_Dezentrales_Netz&action=edit§ion=new Add a section to the discussion page]).''
These means can be abused - and were abused - not only by dictatorships but also by democratic countries and international companies.Moreover, this infrastructure does not protect its users from such abuse and breach of privilege.
: There are indeed solutions like Tor or PGP which can partially patch the shortcomings of the infrastructure, but each user has to take care of that it for herself. Anonymisation and encryption are not in the standard configuration.
A penal action against these secret processes is nearly impossibly, starting with the problem that they are not even detected by the affected parties.
Our goal is to use these existing resources to form a difficult-to-monitor cellphone/router/computer network. There are plenty of software solutions ([[EDN/Recherche|Recherche]]) with the goal of protecting the privacy of its users. Preexisting structures are to be evaluated and combined into such a network. The communication should run, first and foremost, on top of a combination of WiFi, copper (do you say it like this in English?) and fibre optics, but we could also consider Bluetooth and Ultra Wideband (UWB).
:; decentralised: there is no server through which the main communication streams have to go through and which could collect data to de-anonymise other nodes. ISPs should be preferentially circumvented.:
:; encrypted end-to-end: it is always encrypted, except in emergency calls.:
:; done via Perfect Forward Secrecy: when distributing (session) keys, Perfect Forward Secrecy should be used.
:; authenticated: changes on data on its way to the recipient are recorded. The source is authenticated.
:; anonymised: the nodes know as little as possible about each other. Only neighbouring nodes know each other.