/* Goal */ huge restructuring

This commit is contained in:
Demos 2015-11-28 20:25:01 +00:00
parent 0ff57ecab6
commit 45f3dc5494

94
EDN.mw
View File

@ -45,44 +45,72 @@ The communication potential in densely inhabited regions can be guessed watching
The following criteria should be met:
=== Primary Criteria ===
; The communication is:
:; decentralized: in other words: distributed or p2p. There is no server through which the main communication streams have to go through and which could collect data to de-anonymize other nodes.
:; encrypted end-to-end: standard, except for emergency calls
:; Using Perfect Forward Secrecy: session keys should be used. Even future Forward Secrecy shall be tested.
:; authenticated: The source is authenticated.
:; anonymized: The nodes know as little as possible about each other. Only neighboring nodes know each other. Alias meta-data-protection.
== I. Privacy and Security Criteria ==
; Where it can be achieved for the specific services to function properly.
Data security is at the core of our technical approach. It is not sufficient to only secure the
contents of communications. We also want to prevent the systematic collection of
communication profiles (metadata), as the analysis of the social graph of a population
poses a particular threat to democracy.
# '''Free Software''': consistent use of free and open software, putting the system under permanent public scrutiny and giving users control over their computation;
# '''Encryption''':
## '''End-to-end-encryption''': ubiquitous end-to-end encryption, removing the necessity to trust any third parties that might access our data while it is being transmitted or stored. No intermediate actors gain access to the exchanged content.
## '''Perfect Forward Secrecy''': encryption is regularly renewed in such a way that past communications cannot be retroactively be decrypted upon access to key material.
## '''Link Encryption'''
# '''Meta data protection''': obfuscation of transmission patterns, preventing the analysis of social relations, behaviour patterns and topical interests of the participants in a network;
# '''Authentication''': by direct interaction or by common social contacts, no trust delegation to external third party authorities. When interacting among private persons, the counterpart is directly or socially authenticated by default. When interacting with businesses, customers choose whether to stay fully anonymous, to adopt a long-term pseudonymity (equivalent to accepting a web cookie) or to authenticate themselves as a physical person. An integrated payment system enables an economy where the customer can remain anonymous.
# '''Decentralization''': Essential to removing single points of failures and highly concentrated data flow from the calculation. Without distribution it is not enough: Whenever there is a fixed server in charge of a certain person it will gain access to all of that person's metadata. Even worse if that server is operating in a [http://about.psyc.eu/Federation Federation] kind of style or the application [http://secushare.org/2011-FSW-Scalability-Paranoia assumes its server to be in any way a safe place to store private data];
# '''Distributed data flow and storage''': making bulk collection of data economically unattractive. No traditional server nodes may gain access to either content or metadata of communications, therefore only a distributed system of agnostic relay nodes can provide scalability, intermediate storage and anonymity from third parties all at once;
== II. Performance, Reliability and Usability criteria ==
Beyond the application of cutting-edge security standards, our concept emphasizes
scalability and usability. We want to establish an attractive technological platform for
applications that can be used by large user bases and businesses worldwide.
Using a modular approach, we are integrating existing best practises and results from the
scientific community to build a coherent system.
# ''' Easy to install'''
# '''Usage''': the user interface is '''intuitively usable''';
# '''Accessibility''': The interface(s) of the software are accessible (to people with impairments/disabilities);
# '''Functionality representation''': the user interface represents in an easy way the functionality that is laying beneath;
# '''Efficient distribution''': heterogeneous distribution trees, because we need to interconnect billions of users without resorting to cloud technology
# '''Security vs. Performance''': The network shall be as '''performing''' as it can be, considering the grade of security for the specific services;
# '''Available public data''': The infrastructure enables caching and intelligent distribution of public data, yet provides anonymous access to it (Examples known to fulfil this requirement: Maidsafe, secushare, freenet) -> Knowledge representation and file sharing in P2P networks;
# '''Resilience''': The network has to be '''resilient''': stable, adaptable, fault-tolerant (e.g. against jamming);
# '''Robust against fluctuating node participation''';
# '''Real-time communication''': The infrastructure supports also real-time communication;
# '''Partial ressource souveranity''': The amount of bandwidth for private usage can be configured;
# '''Energy consumption restrictions''': The nodes can be mobile, but technology in mobile devices must be aware of energy consumption restrictions;
# '''Sneakernet''': Whenever necessary, data exchange may also happen by taking a storage device physically from one place to another (Briar, GNUnet transports etc.);
# '''Ressource contribution incentives''': The network provides incentives for peers to contribute more resources than they consume;
== III. Software Criteria ==
# '''Free software''' with free as in liberty
# '''Code Criteria''', The code providing the GNU Internet protocol stack must be:
## logically '''verified''',
## '''efficient''',
## '''well documented''',
##'''well tested''',
# '''Secure Updating''': It is possible to securely update system components;
# '''Reproducible Builds''': Available as reproducible builds
# '''Holistic solution''': which means it encompasses all layers of the OSI model and beyond, i.e. from the strongly delay and packet loss tolerant physical layer through an automatically configured, encrypted and anonymizing middle layer to services on the upper layer such as social networking, P2P transfer or generic data storage;
== IV. Society and Legal Criteria ==
# '''Public support''': ethically, politically and financially supported by public entities;
# '''Restrictions to proprietary applications''': they may use the new Internet protocol stack unter the conditions that:
## they run in a securely sandboxed environment;
## they do not gain access to any data of constitutional relevance, in particular not the social graph which the user is not entitled to share with external third parties as other people are affected by such gesture;
# '''Participation''': The network is '''open''': that means everyone can easily participate (after installation of the protocol stack);
=== Secondary Criteria ===
# The network shall be as '''performing''' as it can be considering the grade of security for the specific services
# the user interface is '''intuitively usable'''
# '''scalability'''
# The infrastructure enables caching and intelligent distribution of public data.
#: -> Knowledge representation and file sharing in P2P networks
# The solution is '''holistic''', which means it encompasses all layers of the OSI model, i.e. from the strongly delay and packet loss tolerant physical layer through an automatically configured, encrypted and anonymizing middle layer to services on the upper layer such as social networking, P2P transfer or generic data storage. However it can also be structured in a different way.
# The network is '''open''': that means everyone can easily participate
# The code must be:
#* logically '''verified'''
#* '''efficient'''
#* '''well documented'''
#* '''well tested'''
#* made public/'''Open Source'''
# The network has to be '''resilient''': stable, adaptable, fault-tolerant (e.g. against jamming)
# '''Robust''' against fluctuating node participation
# the user interface represents in an easy way the functionality that is laying beneath
# The nodes can be mobile
# The infrastructure supports also realtime communication
# It is possible to securely update system components
# The interface(s) of the software are accessible (to people with impairments/disabilities)
# The amount of bandwidth for private usage can be configured
# Routing in smartphones must be energy saving
# the network is open to connect for example a sneakernet(s)
# [to be continued]
=== Services ===