*Empty MediaWiki Message*

This commit is contained in:
Demos 2016-01-18 19:31:31 +00:00
parent fdd687ebff
commit eb2d05afc4
1 changed files with 14 additions and 5 deletions

19
EDN.mw
View File

@ -10,11 +10,7 @@ We cherish privacy as an important aspect of a liberal society. Our vision is to
== News ==
Currently we are working for getting funded so we need help in improving our internet presence.
If you like our approach you can help us by:
* check for incentives to fund us and [http://7ywdkxkpi7kk55by.onion/trac/wiki/ToOpenTechFund descriptions] you feel are missing
* Especially we aim to transfer our previous collected information ([http://7ywdkxkpi7kk55by.onion/trac/wiki/ProjectsFeatureList 1], [http://7ywdkxkpi7kk55by.onion/trac/wiki/ModuleComparison 2]) of projects to the libreplanet semantic wiki. So when the stone is set for the semantic wiki, help is welcome to do so.
We aim to transfer our previous collected information ([http://7ywdkxkpi7kk55by.onion/trac/wiki/ProjectsFeatureList 1], [http://7ywdkxkpi7kk55by.onion/trac/wiki/ModuleComparison 2]) of projects to the libreplanet semantic wiki. So when the stone is set for the semantic wiki, help is welcome to do so.
Furthermore we will publish a job posting soon for people to do evaluation of projects.<br>
[[Echt Dezentrales Netz/Projekttagebuch | Here]] is our project diary.
@ -37,6 +33,19 @@ However, it can be countered in different ways.
The following is a technical approach:
: To repurpose and to extend existing digital communications infrastructure to make surveillance more cumbersome, especially through decentralization.
== Background Long ==
When it comes to the topic of mass spying and "cyber" attacks, most of us will readily agree, that it's performed on large scale by an ecosystem of well equipped adversaries (Snowden revelations, botnets) Furthermore that the first is a threat to a list of basic civil rights which back up our democracies. Where this agreement usually ends, however is the question of how to deal with it adequately.
Many people assume that the wild installation of a bunch of single purpose privacy tools is sufficient to protect their privacy and that cryptoparties teaching the usage of GPG, Tor or decentralized Social Networking is the solution for our problem. By focusing on single purpose solutions and the resulting need for cryptoparties, people overlook a significant number of disadvantages: First, their users are unaware of the varying privacy assertions made by these solutions. Second, these tools compete for computing and channel resources. Third, teaching users the various individual tools is very ineffective and inconvenient. This in turn, average users stick to more insecure but familiar and prevalent solutions although they know about its impact on their privacy. Fourth, the long list of existing privacy projects (https://wiki.c3d2.de/EDN#Privacy_Projects) compete for contributors, funding and users while implementing redundant, sometimes mediocre solutions. Finally, even the current internet stack most projects utilize is known to be vulnerable to a list of attacks based on the stacks dependence on central authorities. This is true for BGP routing, DNS, and all client-server applications. Consequently, the internet stack can be seen as an accumulation of many single points of failures (SPOF) facilitating censorship, passive spying, and active intrusion on a global scale.
Yet a sober analysis of the matter reveals that the old internet stack and wild installations are a bad basis for privacy efforts. Hence, we believe that a complete new internet stack providing high confidentiality, integrity of communication and censorship-resistance natively is indispensable. In particular, we envision the new stack to be free software, decentralized, distributed, end-to-end encrypted, meta-data protected, easy to use, efficient, lightweight mesh-networking capable and well-documented.
Accordingly, our goal is to evaluate the privacy and security qualities of 72 projects -- including privacy aware internet stacks and find out whether and how we could combine the resources and implementations of the best projects to achieve what none of them could do alone: A new privacy aware internet stack as a powerful means to back up civil rights to billions of people, which is
* privacy tuned for and delivered with several services
* convenient and attractive to use
* able to run on local individual infrastructures
== Threat model ==
We presume a global active attacker that does automated intrusion such as traffic [http://7ywdkxkpi7kk55by.onion/trac/wiki/DeanonymizingTheInternet shaping]. We draw the line before targeted operations.