Why Freenet is Complicated (or not) 153
JohnBE writes "'This article is primarily a friendly rebuttal to Steven Hazel's CodeCon 2002 talk entitled "libfreenet: a case study in horrors incomprehensible to the mind of man, and other secure protocol design mistakes". Hazel presents the Freenet protocol as an overly complicated, self designed crypto layer. In fact, though somewhat complicated, literally every step in the protocol was carefully thought out to resist certain attacks and to increase certain properties desirable for Freenet operators and the network as a whole.' Interesting in light of Peek-a-booty, this article covers many of the issues involved with creating a anonymous P2P system."
Oh the joys of cross-posting (Score:2, Informative)
An Overview of Freenet (Score:5, Informative)
Kuro5hin artical as well. (Score:4, Informative)
For those of you who care, Ian Clark also commented on the story himself(1 [kuro5hin.org] 2 [kuro5hin.org] 3 [kuro5hin.org] 4 [kuro5hin.org] 5 [kuro5hin.org])
Re:I could have sworn I read this verbatim before (Score:2, Informative)
Re:I could have sworn I read this verbatim before (Score:2, Informative)
Anonymous P2P systems (Score:2, Informative)
Anonymity has many more uses: censorship resistant systems often use anonymity. See, for example Free Haven or the following article on a new design
http://www.cl.cam.ac.uk/~aas23/Anon_p2p2.ps
Re:Freenet is not complicated (Score:4, Informative)
I wrote a gnutella client in one night, when gnutella first hit the net people had already figured out the protocol and we're writing clients for it within days. There are only about 5 different commands in Gnutella, i have no idea how many freenet is. But i have attempted to understand more then just a high level concept and found the details to be confusing as all hell.
anyway,
-Jon
Re:GnuPG??? (Score:3, Informative)
Yes, you could use GPG to encrypt with a symmetric key and just not sign it, but you'd still need to build an infrastructure around it. Freenet wants "plausible deniability" for the hosting server, making it impossible for anyone to decrypt the data as its stored on the disk. A symmetric key with GPG would be immediately decryptable.
Re:Until... (Score:1, Informative)
I gave it a spin a while back (a week ago), and even pulling down the pages from the proxy home page (which are presumably quite popular, ie the site of good and site of evil, etc) took a good few minutes. I gave the thing a couple of hours to get some connections established, and, well, no improvement. My machine certainly had no lack of cpu power, or diskspace, or bandwidth. Pathetic.
Speaking of disk space, I initially allocated 10gb to my node, and boy, is that a mistake! I now know why the default is 100kb! Because it takes roughly half hour to initialize the storage for 1gb I ended up giving it. Hey, no one said Java was an IO champ...