/* Background Long */

This commit is contained in:
Demos 2016-01-12 11:30:27 +00:00
parent a08f0b8566
commit 933c0e4429

5
EDN.mw
View File

@ -46,14 +46,13 @@ By focusing on single purpose solutions and the resulting need for cryptoparties
The wild installation means unawareness of the varying privacy assertions made. The tools compete for computing and channel resources.
It is very ineffective to teach every single user a various set of tools which in addition often lack convenience.
That results in average users to stick to more unsecure solutions though they know about its impact on their privacy.
Furthermore the long list of arising privacy projects- we have over 80 in our list - compete for contributors, funding, and users while implementing redundant, now and then mediocre solutions. Even the current internet stack which most projects set on is known to be vulnerable to a list of attacks basing on the stacks need and usage of authorities. That is true for CAs, BGP routing, DNS and the server-client model, which makes the internet to an accumulation of many single points of failures (SPOF) that facilitate censorship, passive spying, and active intrusion on a global scale.
Furthermore the long list of arising privacy projects- we have over 80 in our list - compete for contributors, funding, and users while implementing redundant, now and then mediocre solutions. Even the current internet stack which most projects set on is known to be vulnerable to a list of attacks basing on the stacks need and usage of '''central authorities'''. That is true for BGP routing, DNS and the server-client model, which makes the internet to an accumulation of many single points of failures (SPOF) that facilitate censorship, passive spying, and active intrusion on a global scale.
Yet a sober analysis of the matter reveals that the old internet stack and the wild installation is a bad basis for privacy efforts!
Hence, we believe that we need a completely new internet stack that provides high confidentiality, integrity of communication and censorship-resistance natively.
Among others we envision the new stack to be free software, decentralized, distributed, end-to-end-encrypted, with meta-data-protection, easy to use, efficient, lightweight wifi mesh-networking capable and well-documented.
(all criteria here: (https://wiki.c3d2.de/EDN#I._Privacy_and_Security_Criteria))
Additionally we work towards delivering it with a set of privacy and usability tuned services by combining existing solutions.
Additionally we work towards delivering it with a set of privacy and usability tuned services by combining existing solutions.
== Threat model ==