/* Background Long */

This commit is contained in:
Demos 2016-01-14 13:42:39 +00:00
parent a022895d83
commit d6d5f619cc

4
EDN.mw
View File

@ -39,11 +39,11 @@ The following is a technical approach:
== Background Long ==
When privacy seekers go online to inform themselves about the protection of their communication means, they soon will realize that there is a big variety privacy projects offering one or more services and providing different levels of privacy. We have collected over [[EDN#Privacy_Projects | 80]] in our incomplete list. One can choose beween tools or plugins for different services that provide end-to-end encryption or meta data description or both or none as some tools that call themselves decentralized on the other hand. But having done the effort of installing a various set of tools which weren't installed natively in the first place mostly, does not mean that these people will use it, the few that did. Often because its usage is inconveniant or does not enable the communication with their family and friends that use other, mostly the widely spread and conveniant platforms such as clear text email or Twitter. Second, these tools compete for computing and channel resources, contributors and funding and users while implementing redundant, sometimes mediocre solutions. All this reasons in turn, let average users stick to more insecure but familiar solutions although they know about its impact on their privacy.
When privacy seekers go online to inform themselves about the protection of their communication means, they soon will realize that there is a big variety of privacy projects offering one or more services and providing different levels of confidentiality and integrity. We have collected over [[EDN#Privacy_Projects | 80]] in our incomplete list. One can choose beween tools or plugins for different services that provide end-to-end encryption or meta data protection or both or none as some tools that call themselves decentralized on the other hand. But having done the effort of installing a various set of tools which weren't installed natively in the first place mostly, does not mean that these people will use it, the few that did. Often because its usage is inconveniant or does not enable the communication with their family and friends that use other, mostly the widely spread and conveniant platforms such as clear text email or Twitter. Second, these tools compete for computing and channel resources, contributors and funding and users while implementing redundant, sometimes mediocre solutions. All this reasons in turn, let average users stick to more insecure but familiar solutions although they know about its impact on their privacy.
But the worst thing for privacy is the projects' basis -the current internet stack and its client-server model.
It is known to be vulnerable to a list of attacks due to that model and its dependence on central authorities as for BGP routing and DNS. Consequently, the internet stack can be seen as an accumulation of many single points of failures (SPOF) facilitating censorship, passive spying, and active intrusion on a global scale.
Yet a sober analysis of the matter reveals that the old internet stack and the fragmentation of the privacy software landscape is a bad basis for privacy efforts!
Yet a sober analysis of the matter reveals that the old internet stack is a bad basis for privacy efforts!
Hence, we believe that we need a completely new internet stack that provides high confidentiality, integrity of communication and censorship-resistance natively.
Among others we envision the new stack to be free software, decentralized, distributed, end-to-end-encrypted, with meta-data-protection, easy to use, efficient, lightweight wifi mesh-networking capable and well-documented.
(all criteria here: (https://wiki.c3d2.de/EDN#I._Privacy_and_Security_Criteria))