On Wednesday, January 21, 2015 3:45 AM Michael Rogers wrote:
> The overlay links can use pretty much any transport including TCP,
> Bluetooth, Tor, dialup modems and USB sticks.

Interesting. Thank you, Michael!

Does it mean that currently Briar project has no transport of its
own - i.e. it cannot, say, establish connections between nearby
phones, the way FireChat does? Or two nearby Briar systems will
find each other even in the absence of Internet?

Best wishes -
S.Osokine.
22 |Jan 2015.



-----Original Message-----
From: p2p-hackers [mailto:[email protected]] On Behalf Of 
Michael Rogers
Sent: Wednesday, January 21, 2015 3:45 AM
To: theory and practice of decentralized computer networks
Subject: Re: [p2p-hackers] Mesh networks and DoS

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 19/01/15 21:54, Serguei Osokine wrote:
> Another interesting issue would be a possibility to place a third
> party overlay over the mesh network created by something like this
> FierChat thing (i.e. encrypted private channels, file exchange,
> etc) - but that, of course, is a separate story.

This is more or less what we're doing with Briar. The network is a
social overlay, meaning that devices don't communicate directly unless
their owners know each other. We use a delay-tolerant
publish-subscribe protocol on top of the encrypted overlay to
implement private messaging and forums; other use cases like blogs and
file sharing are planned. The overlay links can use pretty much any
transport including TCP, Bluetooth, Tor, dialup modems and USB sticks.

DoS attacks are dealt with at several levels. At the transport level,
devices don't accept data from strangers, so you can easily limit the
amount of data you accept from each peer without worrying about Sybil
or whitewashing attacks.

At the pub-sub level, forums are invitation-only, which provides some
DoS protection for small, trusted groups; for larger groups we're
planning to implement a distributed moderation mechanism, where
messages only propagate for a limited number of hops and upvoting a
message resets its hop counter.

Hackers welcome! :-) It runs on Android; the core is portable Java.

https://code.briarproject.org/akwizgran/Briar

Cheers,
Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJUv5FOAAoJEBEET9GfxSfMSzoH/1Uh/9YnOJ6C/sgylXuRv4M4
b2y2qsNvLVMqQQl9rKkt9SdsPBLUelirLCLg5z8rSohZP7Sm8UH0t1X7TL/Lalxo
qsDXh8PPku68hOvYwsB7fkH8BdCs3BkImQTBtSOG3xanVoahSLs43H0i79KXRMaW
1afU+h9eCnR5/zDK9BnQNv5ckhq6ajyRiDCkfzU1OEc6JoLcG9gJFjeWhSKAs+qd
xVgLwvrtvzkX0FQce9ojURrCoRO+pv4u9HL57rM5lp8fxI2NKXFquebKK+OudVuh
+ysySCzCfer5dtJQ4k7FUIABkdq1UpyKMOjs7c9KboxFI06LZTd7VAVm01tNS/A=
=BZ1F
-----END PGP SIGNATURE-----
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Confidentiality notice:  This message may contain confidential information.  It 
is intended only for the person to whom it is addressed. If you are not that 
person, you should not use this message.  We request that you notify us by 
replying to this message, and then delete all copies including any contained in 
your reply.  Thank you.
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to