On Wednesday, January 21, 2015 3:45 AM Michael Rogers wrote: > The overlay links can use pretty much any transport including TCP, > Bluetooth, Tor, dialup modems and USB sticks.
Interesting. Thank you, Michael! Does it mean that currently Briar project has no transport of its own - i.e. it cannot, say, establish connections between nearby phones, the way FireChat does? Or two nearby Briar systems will find each other even in the absence of Internet? Best wishes - S.Osokine. 22 |Jan 2015. -----Original Message----- From: p2p-hackers [mailto:[email protected]] On Behalf Of Michael Rogers Sent: Wednesday, January 21, 2015 3:45 AM To: theory and practice of decentralized computer networks Subject: Re: [p2p-hackers] Mesh networks and DoS -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 19/01/15 21:54, Serguei Osokine wrote: > Another interesting issue would be a possibility to place a third > party overlay over the mesh network created by something like this > FierChat thing (i.e. encrypted private channels, file exchange, > etc) - but that, of course, is a separate story. This is more or less what we're doing with Briar. The network is a social overlay, meaning that devices don't communicate directly unless their owners know each other. We use a delay-tolerant publish-subscribe protocol on top of the encrypted overlay to implement private messaging and forums; other use cases like blogs and file sharing are planned. The overlay links can use pretty much any transport including TCP, Bluetooth, Tor, dialup modems and USB sticks. DoS attacks are dealt with at several levels. At the transport level, devices don't accept data from strangers, so you can easily limit the amount of data you accept from each peer without worrying about Sybil or whitewashing attacks. At the pub-sub level, forums are invitation-only, which provides some DoS protection for small, trusted groups; for larger groups we're planning to implement a distributed moderation mechanism, where messages only propagate for a limited number of hops and upvoting a message resets its hop counter. Hackers welcome! :-) It runs on Android; the core is portable Java. https://code.briarproject.org/akwizgran/Briar Cheers, Michael -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBCAAGBQJUv5FOAAoJEBEET9GfxSfMSzoH/1Uh/9YnOJ6C/sgylXuRv4M4 b2y2qsNvLVMqQQl9rKkt9SdsPBLUelirLCLg5z8rSohZP7Sm8UH0t1X7TL/Lalxo qsDXh8PPku68hOvYwsB7fkH8BdCs3BkImQTBtSOG3xanVoahSLs43H0i79KXRMaW 1afU+h9eCnR5/zDK9BnQNv5ckhq6ajyRiDCkfzU1OEc6JoLcG9gJFjeWhSKAs+qd xVgLwvrtvzkX0FQce9ojURrCoRO+pv4u9HL57rM5lp8fxI2NKXFquebKK+OudVuh +ysySCzCfer5dtJQ4k7FUIABkdq1UpyKMOjs7c9KboxFI06LZTd7VAVm01tNS/A= =BZ1F -----END PGP SIGNATURE----- _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers Confidentiality notice: This message may contain confidential information. It is intended only for the person to whom it is addressed. If you are not that person, you should not use this message. We request that you notify us by replying to this message, and then delete all copies including any contained in your reply. Thank you. _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
