-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 19/01/15 21:54, Serguei Osokine wrote: > Another interesting issue would be a possibility to place a third > party overlay over the mesh network created by something like this > FierChat thing (i.e. encrypted private channels, file exchange, > etc) - but that, of course, is a separate story.
This is more or less what we're doing with Briar. The network is a social overlay, meaning that devices don't communicate directly unless their owners know each other. We use a delay-tolerant publish-subscribe protocol on top of the encrypted overlay to implement private messaging and forums; other use cases like blogs and file sharing are planned. The overlay links can use pretty much any transport including TCP, Bluetooth, Tor, dialup modems and USB sticks. DoS attacks are dealt with at several levels. At the transport level, devices don't accept data from strangers, so you can easily limit the amount of data you accept from each peer without worrying about Sybil or whitewashing attacks. At the pub-sub level, forums are invitation-only, which provides some DoS protection for small, trusted groups; for larger groups we're planning to implement a distributed moderation mechanism, where messages only propagate for a limited number of hops and upvoting a message resets its hop counter. Hackers welcome! :-) It runs on Android; the core is portable Java. https://code.briarproject.org/akwizgran/Briar Cheers, Michael -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBCAAGBQJUv5FOAAoJEBEET9GfxSfMSzoH/1Uh/9YnOJ6C/sgylXuRv4M4 b2y2qsNvLVMqQQl9rKkt9SdsPBLUelirLCLg5z8rSohZP7Sm8UH0t1X7TL/Lalxo qsDXh8PPku68hOvYwsB7fkH8BdCs3BkImQTBtSOG3xanVoahSLs43H0i79KXRMaW 1afU+h9eCnR5/zDK9BnQNv5ckhq6ajyRiDCkfzU1OEc6JoLcG9gJFjeWhSKAs+qd xVgLwvrtvzkX0FQce9ojURrCoRO+pv4u9HL57rM5lp8fxI2NKXFquebKK+OudVuh +ysySCzCfer5dtJQ4k7FUIABkdq1UpyKMOjs7c9KboxFI06LZTd7VAVm01tNS/A= =BZ1F -----END PGP SIGNATURE----- _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
