/* Background Long */
This commit is contained in:
parent
a08f0b8566
commit
933c0e4429
5
EDN.mw
5
EDN.mw
|
@ -46,14 +46,13 @@ By focusing on single purpose solutions and the resulting need for cryptoparties
|
|||
The wild installation means unawareness of the varying privacy assertions made. The tools compete for computing and channel resources.
|
||||
It is very ineffective to teach every single user a various set of tools which in addition often lack convenience.
|
||||
That results in average users to stick to more unsecure solutions though they know about its impact on their privacy.
|
||||
Furthermore the long list of arising privacy projects- we have over 80 in our list - compete for contributors, funding, and users while implementing redundant, now and then mediocre solutions. Even the current internet stack which most projects set on is known to be vulnerable to a list of attacks basing on the stacks need and usage of authorities. That is true for CAs, BGP routing, DNS and the server-client model, which makes the internet to an accumulation of many single points of failures (SPOF) that facilitate censorship, passive spying, and active intrusion on a global scale.
|
||||
Furthermore the long list of arising privacy projects- we have over 80 in our list - compete for contributors, funding, and users while implementing redundant, now and then mediocre solutions. Even the current internet stack which most projects set on is known to be vulnerable to a list of attacks basing on the stacks need and usage of '''central authorities'''. That is true for BGP routing, DNS and the server-client model, which makes the internet to an accumulation of many single points of failures (SPOF) that facilitate censorship, passive spying, and active intrusion on a global scale.
|
||||
|
||||
Yet a sober analysis of the matter reveals that the old internet stack and the wild installation is a bad basis for privacy efforts!
|
||||
Hence, we believe that we need a completely new internet stack that provides high confidentiality, integrity of communication and censorship-resistance natively.
|
||||
Among others we envision the new stack to be free software, decentralized, distributed, end-to-end-encrypted, with meta-data-protection, easy to use, efficient, lightweight wifi mesh-networking capable and well-documented.
|
||||
(all criteria here: (https://wiki.c3d2.de/EDN#I._Privacy_and_Security_Criteria))
|
||||
Additionally we work towards delivering it with a set of privacy and usability tuned services by combining existing solutions.
|
||||
|
||||
Additionally we work towards delivering it with a set of privacy and usability tuned services by combining existing solutions.
|
||||
|
||||
== Threat model ==
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user