/* Background Long */

This commit is contained in:
Demos 2016-01-14 13:46:36 +00:00
parent cbb50065e1
commit 5cabcdc5f5
1 changed files with 1 additions and 1 deletions

2
EDN.mw
View File

@ -39,7 +39,7 @@ The following is a technical approach:
== Background Long ==
When privacy seekers inform themselves about the protection of their communication means, they soon will realize that there is a big variety of privacy projects offering one or more services, what they may overlook however is that these are providing different levels of confidentiality and integrity. We have collected over [[EDN#Privacy_Projects | 80]] in our incomplete list. One can choose beween tools or plugins for different services that provide end-to-end encryption or meta data protection or both or none as some tools that call themselves decentralized on the other hand. But having done the effort of installing a various set of tools which weren't installed natively in the first place mostly, does not mean that these people will use it, the few that did. Often because its usage is inconveniant or does not enable the communication with their family and friends that use other, mostly the widely spread and conveniant platforms such as clear text email or Twitter. Second, these tools compete for computing and channel resources, contributors and funding and users while implementing redundant, sometimes mediocre solutions. All this reasons in turn, let average users stick to more insecure but familiar solutions although they know about its impact on their privacy.
When privacy seekers inform themselves about the protection of their communication, they soon will realize that there is a big variety of privacy projects offering one or more services, what they may overlook however is that these are providing different levels of confidentiality and integrity. We have collected over [[EDN#Privacy_Projects | 80]] in our incomplete list. One can choose beween tools or plugins for different services that provide end-to-end encryption or meta data protection or both or none as some tools that call themselves decentralized on the other hand. But having done the effort of installing a various set of tools which weren't installed natively in the first place mostly, does not mean that these people will use it, the few that did. Often because its usage is inconveniant or does not enable the communication with their family and friends that use other, mostly the widely spread and conveniant platforms such as clear text email or Twitter. Second, these tools compete for computing and channel resources, contributors and funding and users while implementing redundant, sometimes mediocre solutions. All this reasons in turn, let average users stick to more insecure but familiar solutions although they know about its impact on their privacy.
But the worst thing for privacy is the projects' basis -the current internet stack and its client-server model.
It is known to be vulnerable to a list of attacks due to that model and its dependence on central authorities as for BGP routing and DNS. Consequently, the internet stack can be seen as an accumulation of many single points of failures (SPOF) facilitating censorship, passive spying, and active intrusion on a global scale.