For WebRTC I am talking about http://lists.w3.org/Archives/Public/public-webcrypto/2013Nov/0057.html and http://tools.ietf.org/html/draft-ietf-rtcweb-security-arch-07, a third party where you have an account is used to make sure the one you have established the DTLS connection with is the expected one, and it can be google, twitter, fb, etc

What was meant then by "-- logins, reputation, social network connectivity, etc"?

The facilitators are a "detail" in Peersm concepts, they are there to bridge with clearnets such as bt or eventually the web (for bt once the content is inside the Peersm network they are not used any longer for this given content of course, for the web, I already said it, the browsers can connect directly to the Tor network, the OP is inside the browser so it's as secure as the usual Tor, people can use the Tor bundle on top of it if they like, but this is in practice completely useless) but their main use is to behave like headless browsers running in background in order to continue sharing the contents if the peers close their browser, they are exactly like browser peers and there is no story of clearnet for them too inside peersm network.

So they are there to "bootstrap" the content from other networks and keep the content alive in the meantime there are enough peers, I still don't see very well why you find them "uncool" compared for example to traditional Tor exit nodes.

The slides apparently are not self explainatory, you are misunderstanding the project, there are no concepts of clearnet and centralization inside peersm.

You should take a look at https://github.com/Ayms/node-Tor#anonymous-serverless-p2p-inside-browsers---peersm-specs, and if you find something "old", "insecure" or related to clearnet then please let me know.

That's based on myself + many p2p/anonymity papers and discussion with different experts.

I think it does solve the takedown issue too because it might become well known that taking down a peersm peer based for example on some search in the DHT, you don't take down the good one that has the content, you are taking down one peer that is relaying the data, might not know it is doing it, does not know what it is, from whom, to whom, so there are no legitimate reasons to take it down.

Now since we are there, there is still an open question if people around the table here have some ideas: the "Data validation" section, given the size of the chunks it seems unlikely to perform a usual verify operation for each one, as I see it the validation should not make 100% sure the chunk is correct but should make sure it might be a good one.

Regards

Aymeric

Le 15/05/2014 02:07, grarpamp a écrit :
Using your google or twitter account to secure you communications (like
webRTC is planning to do to secure the DTLS self-signed certificates) seems
not appopriate at all to me, you are increasing unnecessarly the (already huge)
influence of these entities which can become the attackers.
No idea what you're talking about. No one is suggesting using goog/twit
for anything. We're saying run legacy p2p and other apps over secure
anonymous networks.

Maybe http://www.peersm.com
No. The slides show use of clearnet interface to BT/web so those
RTC exit 'browsers/people' running it there are still at risk. Quite
uncool for peersm users to offload their content risk onto such
gateways via tor protocol.
What is uncool compared to a Tor exit node? The facilitators are bridging to
bt/web, until the bt clients can talk the browser's language (WebSocket,
WebRTC), they are not really necessary for the web since you can access the
Tor network via WebSockets.
It is uncool for the consumers on the left of the 'principles' slide
to offload their risk of 'filesharing' behaviour onto the 'facilitators
that run bt/web over clearnet' on the right half of the slide.

While such 'facilitators' may wish to take on that risk for the users
on the left, it's all still a waste of a clearnet game. There's no reason
p2p filesharing has to talk to clearnet when all peers can just move
themselves safely and entirely onto and within anonymous networks
forevermore.

p2p is by definition without need to centralized corporate clearnet
hubs. It is peers talking to peers, they make up their own network
base. So this insistence people have on building insecure non-anon
p2p protocols in the clear over clearnet is old. Yes p2p/dht is often
necessary to distribute load over anonymous nodes in slower anon
nets. That p2p/dht/anonet technology does in fact need development
help in scaling up to millions of users.

But even if bt clients could talk with peersm users this does not solve the
issues of bt protocol, really too transparent.
"they're not solveable with clearnet solutions. ... BT is and will be
insufficient until you [run it entirely within] an anonymous net, or it
becomes one itself"
That's what we are trying to propose with peersm protocol.
No, that peersm slide seems to protect the users at the left over
their torlike circuits at the expense of the facilitators exposure
on the right. This is not a solution to the 'takedown' issue since
the facilitators will still get 'takedown'.
If you put both left and right sides, and far right side of 'bittorrent
network' and 'web sites' all under anonymous networks you would
have no problem. Peersm does not do that so it is an incomplete
solution to takedown issue, particularly with bidirectional bt protocol.
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

--
Peersm : http://www.peersm.com
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to