Re: [freenet-chat] How many people are using Freenet?

2012-10-17 Thread Matthew Toseland
On Monday 24 Sep 2012 14:01:34 Paul Baade wrote:
 Dear Freenet Project,
 
 I'm currently writing my masters thesis on anonymization networks and
 was not able to find reliable figures of how many users/nodes are using
 Freenet. The only thing I found was:
 http://www.quora.com/How-many-people-are-using-Freenet
 Which did not seem very quotable ;-)
 Do you roughly know how many users you have, and how do you know?
 Thank you very much!

The simple answer is about 10,000 users over a week. Have you tried installing 
it? There are stats published on Freenet. I think they were posted on the web 
too ...
 
 Best Regards,
 Paul


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

[freenet-chat] Designed for Windows 8 = Won't run Linux ever

2011-10-28 Thread Matthew Toseland
New trusted boot feature, supposedly to prevent malware (which unfortunately is 
a legitimate problem), allows the vendor (or more likely Microsoft) to decide 
exactly what operating systems you are allowed to install. This already happens 
with mobile phones, although some vendors (Apple) tend to be fascist about it, 
and some are very lax due to customer pressure (HTC). 

Odds are servers will generally not enable this except where corporates want 
it; cheap laptops and Apple will probably enable it without providing an off 
switch; custom motherboards will leave it to the user, but since you can't 
build a laptop, it's still a worry ... and migrating existing users to linux 
will probably become a lost cause (not that it's easy now). I smell a major 
anti-competition lawsuit, but they have several very plausible excuses re 
security ... This may signal a new push for TPM, which after all is in most 
business laptops nowadays, but this may or may not happen given the apparently 
rather large software development cost (it isn't needed for this bit). The 
conspiracy theorist in me says if this becomes a matter of law or policy there 
will be some major cyber-attacks to prove that such things are needed ...

Bottom line: If it has the Designed for Windows 8 logo (next year), you 
probably can't run Linux on it; another possible outcome is you may only be 
able to run OSs approved by the hardware manufacturer, which could be very 
messy, less likely.

China will be delighted: The cheaper and more widespread this nonsense becomes, 
the more of the expensive development is done by third parties, the easier it 
will be for them to really lock down cyberspace once they have political 
support for doing so (their incompetent, half hearted and illegal effort in 
Green Dam was successfully rejected by the people but that was before the Arab 
Spring, the hardliners are stronger now and economic chaos will likely make 
this worse).

http://linux.slashdot.org/story/11/09/21/062231/how-microsoft-can-lock-linux-off-windows-8-pcs
http://www.networkworld.com/community/node/78727

Note to Freenet folks:
I apologise for not being around much lately. I hope to be able to spend one 
day a week on Freenet consistently soon. I am cooking a small build, which you 
can test (please test it!), and I am hoping to make further tweaks on load 
management soon. However, some reports re performance are very encouraging e.g. 
ArneBab reporting 14KB/sec file insert speeds.


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] [freenet-dev] bitcoinds over freenet

2011-03-14 Thread Matthew Toseland
On Tuesday 08 Mar 2011 14:06:49 folkert wrote:
 Developers of bitcoinds over freenet might like to read into this
 project:
 https://github.com/FellowTraveler/Open-Transactions/wiki
 which also makes transactions untraceable (according to the developer).

Looks like a classic centralised online digicash system. Such things are 
interesting in that they offer more anonymity than Bitcoin does (but IMHO that 
is fixable), but are in no way compatible with Freenet, and the central 
authority (whose main function is to verify that a coin hasn't been spent 
twice) is a highly vulnerable point.

CC'ed to chat, more appropriate there.


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] Project Evergreen: Looking for testers

2011-02-12 Thread Matthew Toseland
On Saturday 01 January 2011 21:34:49 Martin Wehner wrote:
 Happy New Year everyone!
 
 I'm looking for a few alpha testers for a project I've been working on,
 Project Evergreen. It's basically trying to be like Facebook, but
 running on top of Freenet.
 
 Here is the latest USK to its Freesite:
 USK@hD51wZWVvKLLa2Be7fbRz17QhuMRVpSdnSb9~CPey10,8q6UAEEzyforXdRFFwSePvl-wx2HneU6FdffKADK2WU,AQACAAE/evergreen/18/
 
 Evergreen requires a Freenet node and Python 3. More details and
 instructions on how to get started are available at the Freesite above.
 
 If you do get a chance to check it out, I'd love to hear your feedback.
 
 Thanks in advance,
 Martin

Awesome. Don't have time to test it at the moment.

Lots of interesting tradeoffs and decisions w.r.t security.

Plus Freenet itself has arguably two different social networks (they just don't 
look like social networks): darknet and WoT.


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

[freenet-chat] Fwd: [freenet-dev] US government tries to bring back the Clipper Chip - on steroids

2010-09-28 Thread Matthew Toseland
Much of the below is second hand or half-remembered, feel free to correct me, I 
have some URLs at the end. The strategy issues at the end might be interpreted 
as condoning illegal filesharing; my views on copyright are well known, 
filesharing is a legitimate technology, and there are legitimate privacy and 
censorship issues. Besides, we have already discussed this on IRC. And of 
course, IANAL!

Legislation will be introduced in the new year by the obama administration to 
(amongst other things) force peer to peer software developers to redesign their 
systems to allow intercept warrants to be serviced. I don't know what form 
warrants take i.e. whether they can require a pseudonymous identity to be 
traced or whether it is limited to intercepting comms between two known 
pseudonyms and whether that includes downloads etc. The Tea Party scum use the 
constitution in their rhetoric but are unlikely to stand against intercept 
powers to beat terrorists etc. It is highly unlikely that this will get past 
the Supreme Court, based on a previous judgement that crypto export 
restrictions violate freedom of speech (think about it), and there is no need 
to manufacture a test case; as soon as it passes a suit can be filed. At least 
twice a decade congress attempts such a monstrosity and it is generally 
repelled. Having said that, a good deal of legislation that is unconstitutional 
does actually pass, some of it is repealed by the courts and then immediately 
reinstated in a slightly different form. Extrajudicial sanctions against 
casually-provable filesharers are coming in Europe but would likely be 
unconstitutional in the US. There is law to block copyright infringing sites 
going through the process as well; extrajudicial blacklists would almost 
certainly be unconstitutional in the US, whether getting a low court to block 
it and forcing them to appeal would be is unclear. Takedown notices (implement 
or contest in court at your own expense) already exist for content hosted by 
ISPs, and many argue they are unconstitutional, but would be a cheap way to 
block sites, although the current proposed law just allows the attorney general 
to create an optional blacklist (and the courts to create a mandatory one).

In Europe, extrajudicial sanctions are common. They will be implemented some 
time soon here. Blocking of sites has been implemented here, although it may 
need secondary legislation. I don't know exactly how it works, it may require 
involvement of a low court. In some countries there are laws against developing 
p2p software, such as France. The ECHR is even slower than the US Supreme 
Court, and is generally weaker. IMHO we will see big problems in Europe first.

Meanwhile the Anti-Counterfeiting Trade Agreement will introduce blocking and 
probably filesharing sanctions and other things via international treaty. The 
movie industry body recently asked whether they could use it to block 
WikiLeaks! The DMCA, which is widely argued to be unconstitutional but remains 
in force, was also the product of an international treaty, and was emulated in 
europe.

However, there are two key positive areas to consider:

1. The state of the music industry. It still manufactures ridiculous numbers 
based on the assumption that everyone who downloads a track would have bought 
it. These numbers are likely based on assuming they would have bought them off 
iTunes, rather than the much cheaper option of getting a Spotify subscription 
(or listening to them for free but I imagine there are volume limits?). Anyway, 
arguably because of pressure from filesharing as much as anything else, you can 
get cheap all-you-can-eat deals, and because users don't like DRM, the music 
industry has largely given up on it.

2. Even if conventional filesharing is systematically persecuted, this will 
drive users to us - provided that we have a fast, easy to use, adequately 
secure, scalable offering. In the short term, this will likely be by tracing 
users of known illegal content and suing them or taking extrajudicial 
sanctions. This has already had a big effect on the number of French Freenet 
users. At which point Freenet would become the target, but it would be big 
enough to build a real darknet. Assuming freenet is adequately secure (whether 
this can be achieved on opennet is uncertain), there would have to be specific 
legislation (or unilateral action by ISPs), and either blunt blocking of all 
customer-to-customer connections (e.g. via abusing the RBL's), with substantial 
collateral damage, or traffic flow analysis and blocking of everything that 
looks like a peer to peer network (which would cost more and produce somewhat 
less collateral damage). Either way you'd likely snare various legitimate 
peer to peer networks although a licensing scheme might be set up; this would 
of course discourage innovation, but corporatist nonsense favouring big 
corporations and ultimately weakening competition and capitalism 

Re: [freenet-chat] [freenet-dev] US government tries to bring back the Clipper Chip - on steroids

2010-09-28 Thread Matthew Toseland
On Tuesday 28 September 2010 00:38:51 you wrote:
 On Mon, Sep 27, 2010 at 6:22 PM, Matthew Toseland t...@amphibian.dyndns.org
  wrote:
 
  One very bad thing about this, should it pass (which depends mostly on
  whether the Tea Party folk actually defend the constitution, which seems
  unlikely)
 
 I don't agree here - the teabaggers are a relatively small group of angry
 white economic conservatives who only really agree on the fact that they all
 hate Obama.  They only get the air-time that they do because they make for
 good TV.  The teabaggers didn't exist when the Clipper Chip was defeated in
 the 90s.  You are going to have almost every technology company in the US up
 in arms about this, as they were with the Clipper Chip.

They make up ALL of the new Senate candidates.
 
  and be upheld (which is a more plausible battleground) is that we are
  dependant on paypal. Even if we move outside the US, paypal would have to
  kick us, and nobody trusts any other service. Same would be true of Google
  Checkout; we might be able to get credit card handling from some
  non-US-based bank (like WorldPay), but it'd be expensive.
 
 I don't know if its necessarily true that we could no-longer use Paypal, but
 in any case I think this thing passing is actually quite a remote
 possibility.
 
  Plus once it happens in the US it will happen everywhere else... Combined
  with laws in Europe allowing blocking copyright infringing sites (xenu.net?
  wikileaks.org?), things could get very bad.
 
 Ultimately we can move development onto Freenet itself if it came to it, but
 I really think it is unlikely that it will.  There are so many powerful
 groups that will be opposed to this.

Hopefully you are right. And it will reinforce an important precedent - that 
restricting software is very dodgy in the US.


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] [freenet-dev] US government tries to bring back the Clipper Chip - on steroids

2010-09-28 Thread Matthew Toseland
On Tuesday 28 September 2010 20:17:26 Ian Clarke wrote:
 On Tue, Sep 28, 2010 at 1:57 PM, jdavie...@tx.rr.com wrote:
 
  Thanks for that, Joel.  The Taxed Enough Already (TEA) party movement has
  been the unfortunate victim of a very successful smear campaign - partly
  because it's managed to attract a handful of the wrong sorts of people, but
  mostly because it's become a very real threat to the Washington
  establishment.  We scum are Freenet's best hope - as you can see, the
  current, supposedly tech-savvy U.S. political administration hasn't lived
  up to your expectations.
 
 I certainly don't think the tea party are scum, I just think that a lot of
 libertarians, who think that the tea party is about libertarianism, are
 going to get a rude awakening once they get into power, just as they did
 when the Republicans took over the house and congress in the mid-90s.
 
 Also, a lot of their positions are contradictory.  They claim they oppose
 the deficit, yet they want a tax cut for people who don't need it, paid for
 by increasing the deficit.  They oppose spending, yet supported the Bush tax
 cuts and the Iraq war, which together dwarf the combined effect of the
 recovery measures, tarp, and the economic downturn, in terms of their impact
 on the deficit.

I am replying to the two tea party fans off-list since even on chat@ there is 
some expectation that content be vaguely Freenet-related. For the record, if I 
had originally written the mail for wide distribution I wouldn't have called 
the Tea Party scum, but that *is* what I believe, and I will justify this 
position off-list. (I might post it on my blog too).


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] [Forwarded from FMS] 0.8.0, the two big security issues

2010-07-12 Thread Matthew Toseland
I guess I should reply to this...

On Monday 12 July 2010 22:09:12 3BUIb3S50i wrote:
 o...@lkxpu0~cdv6dh0idyw4mbwkusgn~h~bs3qqvxyoxsay wrote :
  The Seeker wrote:
 
  On 7/11/2010 6:21 AM, o...@lkxpu0~cdv6dh0idyw4mbwkusgn~h~bs3qqvxyoxsay
 wrote:
  joh...@6kzjmqcftzffej0wthb29r63t5jkjg2xy5hzsvitg1a wrote:
 
  Matthew Toselandt...@amphibian.dyndns.org
 
  IMHO we should attempt to fix, or at least realistically work around,
 the two
  big known security issues for 0.8.0, and get a paper published at the
 same time
  as the release. These are:
  1. The Pitch Black attack. Oskar has a good idea how to fix it but has
 not yet
  simulated a fix. This blocks publishing a paper, and it also prevents
 use of
  darknet anywhere where there may be internal attackers. As I understand
 it
  implementation should not be particularly difficult - the main work
 needed here
  is to implement it in a simple simulator and tweak it until it works,
 right?
  2. The mobile attacker source tracing attack. What this means is an
 attacker
  knows what is to be inserted (or requested), and he is initially
 distant from
  the inserter. He recognises the blocks, and uses the keys' locations
 (and path
  folding, and possibly announcement) to move towards the originator,
 gaining more
  and more of the stream as he moves closer. This is primarily a problem
 on
  opennet, but it is also feasible on darknet - it's just massively more
  expensive. It can be worked around for inserts by:
  i) Inserting with a random splitfile key. THIS IS IMPLEMENTED AS OF
 1255,
  provided you insert to SSK@, AND
  ii) Providing an easy to use selective reinsert mechanism, AND
  iii) Putting a timestamp on the inserts on any small reinsert, and only
 routing
  to nodes that were connected prior to that timestamp.
  IMHO the second and third items are relatively easy.
 
  At the same time, we can substantially improve data persistence (1255
 already
  does that for big files, but the insert tweaks that are going to be
 tested real
  soon now would probably gain us a lot more), ship Freetalk, WoT and
 FlogHelper
  for improved end-user functionality, a fixed wininstaller, lots of bug
 fixes and
  minor usability tweaks, and everything else we've done since 0.7.5.
 
  And having a paper published at the same time would surely help with
 publicity
  amongst certain kinds of folk.
 
  *lol*
  Is this the same Toad who managed to break all nodes since 1250+?
  Must have been fun for latest users, he will have to publish a lot of
  papers to attract more users than are currently leaving.

As I understand it:
- We had a few relatively simple problems around 1250.
- A few builds later we introduced even segment splitting. This was disruptive 
in that it changed the CHKs resulting from inserts, and it did not introduce 
proper back compatibility code.
- I therefore attempted to make all planned metadata changes at once in 1255, 
resulting in a great many changes at once, including some bad bugs. However it 
did include much improved back compatiblity support.
- I did try to test thoroughly but it is difficult when there are very few 
testers.
- Anyhow, each build since 1255 fixes a bunch of bugs, most but not all of 
which were introduced in 1255.
 
  New, promised features are worthless if the node is broken and resets
 your
  datastore or up- and downloads.

Fortunately we haven't had a datastore resetting bug for a *long* time. 
Arguably the salted hash store is incapable of such a problem short of 
corruption of the metadata files...

As regards resetting uploads and downloads:
- 1255 included a small change that might have resulted in corruption being 
detected when it hadn't before.
- 1255 changed the internal data structures quite a bit, and this combined with 
a long-standing bug related to defragmentation to cause catastrophe for some 
people who had always defrag on startup enabled.
- Fundamentally, *all* databases regularly corrupt themselves when exposed to 
the real world: End users with finite disk space, power cuts, unclean 
shutdowns, overclocked or overheating CPUs, and so on. Hence we need 
auto-backups.
- One of the reasons that we have not yet released 0.8.0 is that there is not 
yet any auto-backup for the downloads database. It has been planned for some 
time, sorry I haven't got around to it.
 
  What is he smoking to call this *improved persistence*?

The biggest change in 1255 was a couple of changes to FEC encoding, to split 
segments more evenly and to use extra cross-segment redundancy for files of 
80MB+. All simulation work (yes we actually simulated this in advance rather 
than just doing things at random, thanks to evanbd) shows that this should 
dramatically increase the retrievability of larger files.

There are also good grounds to think that other changes we are testing in 1255+ 
will eventually lead to significant improvements in block-level persistence. 
But we have to try them to find out (this is stuff that can be turned on 

Re: [freenet-chat] Running freenet off an SD card?

2010-07-10 Thread Matthew Toseland
On Saturday 10 July 2010 08:00:31 Juiceman wrote:
 On Sat, Jul 10, 2010 at 1:56 AM, pineapple pineapplecow...@yahoo.com wrote:
  Has anyone tried running freenet off an SD card or thumb drive?  Is the 
  speed
  sufficient for freenet?
 
 
 
 
  ___
  chat mailing list
  chat@freenetproject.org
  Archived: http://news.gmane.org/gmane.network.freenet.general
  Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
  Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe
 
 
 Emailing this again because I forgot to CC the mailinglist
 
 Freenet's usage pattern does not lend itself to flash SSDs or SD cards
 due to the large number of small, random access writes.
 Freenet is extremely hard on disks, many a regular hard drive has
 succumbed to it.
 
 It *will* wear any flash device out much quicker than normally a user would.
 
 That being said, a very conservative node, configured to use only a
 few max peers and a small datastore, logging turned completely off,
 only used for small downloads, browsing and inserting a few small
 files (for example a thumb drive you could take with you somewhere,
 post a blog or upload some important document and go back offline
 shortly thereafter) might be feasible.  You would want to use one
 with fast specifications and don't expect too much...
 
 If you try this, let us know how it works out.

Also it's good to point out that modern flash disks with proper wear levelling 
will do fine with Freenet. But this is likely not true of cheap, small, slow 
portable storage devices such as SD cards.


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] How would * change Freenet's protocol?

2010-06-28 Thread Matthew Toseland
On Tuesday 29 June 2010 01:04:05 Tom Sparks wrote:
 --- On Tue, 29/6/10, Matthew Toseland t...@amphibian.dyndns.org wrote:
  On Monday 28 June 2010 05:39:23 Tom
  Sparks wrote:
   How would a Delay-tolerant network and a Mobile ad hoc
  network change freenet's protocol?
  
  This is really a question for the tech list.
  
  IMHO delay tolerant darknet is a potentially interesting
  area for Freenet. This would involve sneakernet (exchanging
  USB keys), short range high bandwidth transfers between
  mobile devices etc. It would be routed (allowing access to a
  wider range of data than what is on your direct friends'
  nodes). It would rely heavily on passive requests /
  subscriptions, as well as on requests being relayed over a
  period of days, whenever friends connect.. It would likely
  be rather slow, because each hop might take a day or more.
  It could take advantage of fast links where they are
  available however (e.g. underground wifi). It would be
  deployable in places where the Internet is so locked down
  that Freenet doesn't work. About half the devs think this is
  not something Freenet should ever deal with because e.g. it
  would need larger block sizes. But even if it is not Freenet
  it might reuse a lot of Freenet code. And it would have to
  be darknet: Data is only exchanged between people who have
  been pre-established as Friends. That means it is not ad
  hoc. If you are interested in ad hoc / opennet, have a look
  at Haggle, which essentially relies on mobile devices being
  able to broadcast requests for files to everyone in the
  immediate vicinity, with some opportunistic forwarding iirc.
  IMHO this is rather risky, which is why I suggest a delay
  tolerant darknet Freenet system might be possible.
 
 I am writing a book/game/role-playing game addon about a fictional network 
 and freenet is the closes network to my idea, but there are a few differences
 
 * hash-based IP address

You mean you have an internal, quasi-traceable addressing system? Or that your 
fictional network can relay TCP connections and other traffic to a hash-based 
endpoint? IMHO central but anonymous servers (like tor hidden servers) are a 
bit of advanced functionality that *may* happen eventually on Freenet but will 
be *SLOW* - and you can do a surprisingly large amount without centralised 
anything, just with distributed storage, scalable indexes, distributed revision 
control (git/mercurial), wikis, databases, etc. And they don't make much sense 
with sneakernet/high latency networking; you have to have an end-to-end network 
to have anything real time.

 * gateways between city network and city-to-city network

Agreed this would be needed. In the freenet darknet model, the assumption is 
that there are a lot of short links and a small number of long links. Long 
links in an underground scenario (freenet illegal and the public networks 
heavily restricted e.g. by preventing all p2p connections) might be people 
commuting long distance and taking data with them, or sending data through the 
post / a box of DVDs in a truck etc. So there is no single centralised network 
design - meaning if there are enough of these long connections there is always 
redundancy and it is not too vulnerable to attack. One difficulty is that 
carrying data on planes is becoming increasingly hazardous, with customs people 
having the right to inspect your laptop, force you to give them access, etc, 
and increasingly exercising this right in the name of copyright (I believe ACTA 
talks about this, although historically speaking they could always refuse entry 
if you fail to cooperate).

 * underwater network and surface to air network

Meaning guerilla wifi, ronja's (home-made free space optical data links) etc? 
I.e. fixed, hidden, semi-permanent, directional links, and maybe disposable 
self contained open mesh boxes for mobile stuff - if they are cheap enough; 
depends how much effort it is to lock down commonly available hardware, if you 
have to buy everything black market then disposable doesn't really work ...

Another interesting possibility - some of the network might be real time but 
low bandwidth. Maybe even some over-the-regular-internet stuff e.g. 
steganography faking VoIP calls, games etc. This can be combined with 
non-real-time links which are much higher bandwidth but also much higher 
latency, so the requests get relayed quickly but the data trickles back when 
possible.

If hardware isn't too expensive, there are a lot of possibilities, but 
redeploying stuff even if it's cheap could potentially lead to people being 
busted.

Really it comes down to just how mad the state is. If they are prepared to 
spend 10% of their GDP having half the population spy on the other half (East 
Germany), or boil people in oil on random suspicion (Iraq), there are severe 
limits to what you can do even to keep lines of communication open... But in 
the short term, everyone uses opennet, which is hideously insecure

Re: [freenet-chat] (no subject)

2010-06-17 Thread Matthew Toseland
On Friday 11 June 2010 12:00:32 Abdulla Barajash wrote:
 Im a new member please tell me how to participate

Maybe you could start by installing Freenet?
http://freenetproject.org/


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] Add frost page to Freenet Default Bookmarks

2010-06-08 Thread Matthew Toseland
On Sunday 04 April 2010 23:54:20 artur wrote:
 Hi,
 
 I have noticed that Frost is no longer in the default bookmark list of 
 Freenet.
 
 I think it should be because:
 - Many people are using Frost to communicate.
 - It is much more easy and faster to setup than FMS. Freenet has never 
 been the fastest system, but it takes a long time to setup FMS and get 
 announced. While you can just fire up frost and get started.
 - Frost has been a part of Freenet for a very long time now, it is 
 widely spread and tested. But new users do not know all the alternatives 
 of communication in Freenet. They have a shot look what is there, try 
 it, and if it does not work most of them will leave again. If there is 
 an alternative, they might have a second try...

Frost is broken by design. The only way we could link it would be with a 
warning to the effect that it is known to be broken, and is actively attacked.


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] Publicity for freenet

2010-05-29 Thread Matthew Toseland
On Saturday 29 May 2010 02:42:07 henri godron wrote:
 Hi,
 
 I want to suggest the freenet team to make an IAMA on reddit.com
 This section of reddit (http://www.reddit.com/r/iama) is very very huge, and
 has a lot of attention from the reddit users.
 The thing is, a lot of people on reddit will love freenet, and can
 contribute because plenty of them are nerdy.
 
 Just browse this section (select by most popular since the last month), read
 some IAMA, and you'll get my point.
 
 :)
 Henri
 
Please post this to devl or directly to ian. I don't think he will see it here 
and he is generally in charge of publicity stuff.


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] [freenet-dev] Add frost page to Freenet Default Bookmarks

2010-04-09 Thread Matthew Toseland
On Friday 09 April 2010 09:08:18 artur wrote:
 Hi,
 
 Am 08.04.2010 17:42, schrieb Evan Daniel:
  On Thu, Apr 8, 2010 at 11:27 AM, Matthew Toseland
  t...@amphibian.dyndns.org  wrote:
  On Tuesday 06 April 2010 18:17:33 artur wrote:
 ...
 
  On the other hand, Frost is broken by design, Freetalk will be integrated 
  in the node soon (how soon nobody knows), and if we put it back on the 
  homepage the spammer may come out of the woodwork.
 
  Anyone else have an opinion?
 
 Ok, Frost is spamable (like nearly every other communication system in 
 the internet). So, I would not call this broken by design, but I know 
 which problems the spammer caused for frost.

In Freenet terms, spammable is broken by design. This is not people advertising 
black market pharmaceuticals. This is a deliberate and effective attempt to 
make the system completely unusable, at least on target boards. And it can be 
done anonymously, so the classic countermeasures of blacklisting IP addresses 
etc don't work.
 
  I think if we link to it, we should support it, at least to a point.
  I'd rather we weren't.  But, we seem to be doing that regardless,
  so...  OTOH, I think we should have a messaging system of some sort,
  and that isn't yet Freetalk.  And I don't know whether it's better to
  link to a messaging system that's so spammed it's unusable, or link to
  nothing.
 
 Do you support Freemail? Freesite? FMS?
 Are you in one way or another connected to the content published on the 
 various index pages, linked in the default bookmarks?
 I think the freenet authors do not want to associate them self with what 
 is on that pages. The way a search engine does not account them self 
 responsible for their search results...

We are talking about software here. And no, we don't link directly to 
questionable material - we link to index sites e.g. that make it easy for users 
to find what they want to find.
 
 Frost is a good tool for Freenet. Without Frost, Freenet would have had 
 a lot of less active users, an so it would have today.
 It has been the main communication tool within Freenet for years.
 
 Today there is a strong alternative with FMS, but I could argue that FMS 
 is brogen by design as well. When Freenet is all about anti censorship, 
 FMS is the tool to bring it back. I don't want to say it is bad, but it 
 has its own disadvantages.

Freetalk and FMS both use a distributed reputation system supporting negative 
trust. This makes it possible to block spam very effectively, because a new 
user who posts spam can be blocked by a few people who see it and then nobody 
will see the new user any more. There are alternatives that may be more 
acceptable, and implementing these will not be difficult - it's just not a 
priority for anyone actually working on this stuff at the moment. The main 
alternative is to have a positive trust system. This would mean that new 
users don't show up at all until the user has gained some trust from others, so 
we would need either new users to show up to everyone (meaning if a spammer is 
creating new identities to spam they have to be blocked one at a time by *each 
user*), or that they would show up to some subset of everyone - e.g. maybe the 
people whose captchas they solve and those who trust them.
 
 Frost is also a download manager. 

I was under the impression that the Frost download system was DoS'ed at the 
moment, i.e. out of action due to exploitation of the fact that it is 
fundamentally broken.

 Fuqid might do a better job as a stand  
 alone tool, but it is not cross platform, has never been really Freenet 
 0.7 compatible and its development has been abandoned.

So use Thaw. It's a perfectly good download manager, even if you don't find the 
indexes easy to deal with.

 (Just in comparison: Frost has had 17 Commits last month.)
 And a good download tool is wanted by the community (1)

There is no such thing at the moment, sadly. Frost certainly isn't it. Thaw 
isn't it. Maybe we will have a good download tool based on WoT sometime soon.
 
 Freetalk: Frost will also work as a Freetalk frontend. So, introducing 
 the more spam resistent freetalk will not make Frost obsolete. The 
 integration is not yet complete, but the basics have already been 
 implemented...

Even if we bundle Frost, very few new users will realise it exists and 
therefore very few of them will use it. It is much better to have a chat system 
that is integrated and works out of the box. This is what the uservoice entry 
about one UI for all is about.
 
 (1) 
 http://freenet.uservoice.com/forums/8861-general/suggestions/156393-write-a-killer-file-sharing-application?ref=title
 
 
 Cheers
 
 artur


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat

Re: [freenet-chat] number of people of community Freenet

2010-04-08 Thread Matthew Toseland
On Thursday 08 April 2010 19:03:16 giulia capasso wrote:
 
 Hi, 
 I'm a student, and I'm doing a study on the size of the community around Open 
 Source projects. IS it possible knows the number of people of the Freenet 
 Community??   

Yes. In terms of users, there are 15-20k users, although only 6-8k online at 
any given time. See evanbd's stats page (you will need to install Freenet 
first):
http://127.0.0.1:/u...@gjw6stjzoz4oag-pqoxip5nk11udqzorozd4jld42ac,BYyqgAtc9p0JGbJ~18XU6mtO9ChnBZdf~ttCn48FV7s,AQACAAE/graphs/318
However, the size of the active chatting community on Frost, FMS or Freetalk is 
considerably smaller. See:
http://127.0.0.1:/u...@wojh0rcfhn7o4tgncjsvabwaoxesw43xbp2sg~cutes,hSb98zf-5gOC18Ed4nzTtmvhkktK08phJav63sh04o4,AQACAAE/fmsstats/96
http://127.0.0.1:/u...@bqbl2ozw8vj4niv3aoe8rhk9hwv1huqh4rrnk~gkcoi,C~fzch9vg1vJZW9HJT6zjr2gp~N5NE0Gylc1Q83cMfw,AQACAAE/boardstats/171/
We expect the proportion of Freenet users who use the anonymous chat 
applications, as well as the total number of users, to increase considerably 
when Freetalk is made an official part of Freenet.


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] Freenet news in the web interface

2010-01-11 Thread Matthew Toseland
On Saturday 12 December 2009 15:19:23 alex wrote:
 Hello,
 
 for some time I've been thinking about points that make me disconnect from 
 freenet from time to time. One of them, I think, is that once you manage to 
 connect, you feel quite alone in there.
 
 Freesites are static in nature, there's a feeling that you're in the middle 
 of the night and here and there you stump into unrelated freesites. Index 
 sites mitigate somewhat this feeling, but not much. Frost and FMS, they're 
 not trivial to setup nor in the web interface.
 
 Sure, I lurk in the dev mailing lists. That's great since I see activity 
 and community there. But, putting myself in the shoes of an average user (in 
 the end, I'm a techie), that's only trying freenet via the web interface, I 
 think there's something (that many other projects do) that could do, with 
 little effort, much to diminish the feeling that freenet is a bunch of 
 freesites.
 
 I'm namely proposing to add to the freenet interface (in the welcome page 
 or a dedicated page) an official announcement section, where the freenet 
 team publish news related to the project. Basically, the same updates that 
 go thru dev, could be distilled in a (weekly?) post that the node would 
 present to the user.
 
 This way one feels that things are moving even without having chat yet, nor 
 subscribing to mailing lists. Plain users would have quick access to a 
 minimal but regularly updated what's happening with freenet page, 
 sanctioned by the devs. I'm not talking about entering into conflicting 
 debate or technical detail, just plain understandable updates that show 
 that the project is well alive and moving along.
 
 What do you think? I know that some freesites are sanctioned and linked in 
 the browse freenet page, but I'm aiming at something even more basic: 
 the freenet team news. A latest news section.

Ways to implement this sort of thing (which is probably a good idea):
1. Official Freesite. The problem is people will trust it, so if the private 
key were ever leaked we'd be in deep trouble. The fix for this is Revocable 
SSKs. This will happen eventually. There are easy ways to do RSKs and hard 
ways, but we can do a reasonably easy way which is forward compatible.
2. Per-build update notes. We could either include a file with the build, or 
insert it as a CHK and have the node fetch it. We could display it as a 
dismissable alert or something, and have it come back when the next build comes 
out, unless the user tells it to go away forever.
3. Something in between. An official SSK containing regular updates, for 
example. This has the same revocation problems as an official freesite, 
although there are easier solutions than RSKs, such as just tying it to the 
auto-updater (which has its own revocation mechanism).


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

[freenet-chat] MI5: disconnections will result in darknets

2009-10-28 Thread Matthew Toseland
http://news.bbc.co.uk/1/hi/technology/8328820.stm
http://news.bbc.co.uk/1/hi/technology/8329710.stm

This looks like executive disconnections, most likely the result of a private 
rightsholder-dominated agency, with ISPs paying half the cost if it messes up 
and gets sued... very similar to France. It is a major U-turn in government 
policy as the Digital Britain report explicitly stated that the communications 
and creative industries are about the same size and killing one to save the 
other is not acceptable, and handed the question to ofcom. I haven't found a 
source for the comments about MI5, but they have a point...

Even MI5 disagree with Mr Mandelson - they are convinced we will see a rise of 
a 'Dark Net' of infringers.
- Open Rights Group

In the event we are instructed to impose extra judicial technical measures we 
will challenge the instruction in the courts. 
- TalkTalk


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

[freenet-chat] Freenet on phones, sneakernet/long term

2009-09-04 Thread Matthew Toseland
Some recent discussion about Freenet on phones (and routers, see my other 
message on tech). Clearly running a regular broadband based Freenet node on a 
cracked iPhone is unlikely because of cost and power issues (although it has 
256MB of RAM and at least 8GB of storage). However, a smartphone with some fast 
short range networking would be ideal for 1) Haggle, and 2) Freenet darknet 
rendezvous.

Haggle is, roughly speaking, opennet sneakernet. It was originally conceived 
for phones and is more or less ideal, on certain provisos. The basic operating 
principle is this:
- Shout at the top of your voice Does anyone have a copy of [ censored ] 
wherever you happen to be - on a bus, in a crowd - and if they have it they'll 
send you it.
- Hope that nobody has tracing equipment.
- I believe there is some level of opportunistic relaying of requests, but it's 
not really routed in a scalable sense we would recognise.
- One worry is that phones might not have untraceable wifi. Another is that 
relatively cheap infrastructure or patrols with tracing equipment could bust a 
lot of users, if the law is sufficiently harsh. But really it *is* an 
interesting system, it's just not Freenet.
This may be an out of date view of Haggle, see here:
http://www.haggleproject.org/index.php/Main_Page

Freenet darknet rendezvous is essentially darknet sneakernet, but without 
having to pass around USB keys. 

 Your phone detects when your registered friends are nearby, and does a burst 
transfer over UWB (wireless USB, 480Mbps over very short range) with them. 
Modern phones are built to do the detection phase cheaply, but don't yet have 
UWB; it is likely they will soon however. Host-side USB with a networking cable 
would be another possibility. Thus any time you go for a pint with friends you 
automatically propagate data, requests, etc, without having to do anything. 
When you go home your phone will again automatically sync with your fixed node 
(PC/router), which then forwards stuff over your fixed connections - regular 
Freenet connections (possibly with the same friends, which gives some nice 
optimisations), stego connections over the internet, fixed wifi links, etc. 
Unlike Haggle, it is strictly limited to known friends (hence safer), and has a 
more freenet-like (and therefore probably slower, because less broadcasty) 
routing system. Publish/subscribe is essential, but much of it is organised 
around global (and anonymous) streams. Routing is also possible: although it 
may take days or weeks depending on the transports, popularity, etc, it should 
be possible to obtain a huge variety of content. So what we are talking about 
is a robust, anonymous, often slow meta-internet capable of using whatever 
connectivity is available. 

This is a natural evolution of current Freenet IMHO: Messaging and other 
applications require good publish/subscribe for efficiency in the medium term. 
Even now, Freenet's expectation that nodes will be online 24x7 is unreasonable. 
Darknet (connecting only to friends) was introduced to make it possible to run 
Freenet in places where opennet may be harvested and blocked. Darknet networks 
composed of low-uptime systems are unlikely to have full end-to-end 
connectivity most of the time, which means we will need some form of persistent 
requests. And any competent state trying to eliminate an underground Freenet 
darknet (note Iran's recent communications crackdown) will soon realise that 
looking for long-lived peer to peer UDP connections will bust most nodes. 
Steganography can only go so far, traffic flow analysis will ultimately find 
all nodes - but even good stego will need to not exchange data continually, 
making the uptime issues even worse. Ultimately sneakernet and rendezvous based 
transports become very attractive. And they can have pretty good bandwidth too, 
although latency is poor. All that routing really requires (provided we can 
figure out a way to assign locations), is that there be many short links (e.g. 
meeting up in a pub after work, fixed wireless links), and a few long links 
(LUG/2600 meetings, mailing a box of disks etc).

So I expect *before 1.0*, and largely on the basis of our present network 
behaviour (poor node uptime, messaging) we will have to implement:
- Good publish/subscribe (aka passive requests)
- Bloom filter sharing (awareness of data on friends' nodes, speeds up routing 
considerably but also has some nice impacts when you reconnect)
- Long-term requests (meaning they persist on the network, pick up data as 
nodes come online, and forward it back to the originator)

Both of these tie in reasonably well with existing UI and APIs IMHO. After 1.0, 
we should look very seriously into sneakernet, and non-real-time steganographic 
transports (e.g. faking VoIP calls). With the above feature set, it becomes 
quite plausible. Obviously fetching rare content could take weeks - but popular 
content should be faster, and popular publish/subscribe 

Re: [freenet-chat] freenet for mobile phones?

2009-07-08 Thread Matthew Toseland
On Wednesday 08 July 2009 05:22:31 Alan Grimes wrote:
 Jelbert Holtrop wrote:
  What just happened in Iran made me thinking, would it be possible
  to communicate with others without making use of the IT infrastructure.
  The mobile phones that have wifi could talk to each other without an
  external hub. So i'm imagining a network where users transport the
  mesages by moving around with their phone. When the phone is
  in poximity of other phones with the software they transmit the mesages
  from the network. If a user travels to an other town the mesages will be
  spread to that other town. Maybe it could intergrate with freenet to  
  also have a faster distribution world wide.
 
 way way back in the long long ago, there was a protocol called UUCP, if
 I recall. The internet backbone hadn't yet been built, see, so how it
 had to work was each mainframe/mini/BBS, etc, collected mail from all of
 its users each night at around 2 AM, and then dialed up each of its
 peers. it would then exchange usenet news postings and e-mail. Each
 e-mail address was something like f...@bar!baz!bat!boof etc... This was
 called a bang path. So the first machine would dial boof and send the
 message, the second would dial bat and send the message, and baz would
 dial bar...
 
 fuckit, I have a dusty old book I was about to chuck, lemme see what it
 sez; bleh, why bother
 
 The thing that bothers me the most about using mobile fonez is that
 they're pre-0wn3d by the NSA coming out of the store. I do not own one
 and I do not want one.
 
  What do you guys think of this? It would be complicated to make. I'm
  not a very good programmer, never got the hang of oo. So where to
  start? Are there any other programmers out there interested in this?
 
 When the Shit Hits The Fan (TM), and there is no if, then another thing
 to consider is sneakernet. Portable media these days has huge capacity
 and is very tiny. Every time you meet someone, ask them if they have a
 chip to swap with you. If they do, then take it read it, update the
 files in any way you choose, then swap it with someone else. The
 gubbernment would have to go to absurdly extreme lengths to even try to
 shut down sneakernet! =P Unless they go totally orwellian, there is no
 way to detect it much less stop it more than a small handful of
 participants.

Most of the above points hold. There are 3 different network principles here:

1. Opportunistic networking (assuming phones can be trusted, which IMHO is not 
a valid assumption). Basically the principle is you get on a bus, your phone 
announces I WANT ILLEGAL FILE NUMBER 27, and any phone in the vicinity sends 
you it. This works (you hope) because you spoof the MAC address on the wifi and 
hope it's not practical to trace you before you get off the bus. Work on this 
principle: Haggle, Pocket Switched Networking.

2. Simple Sneakernet: The simplest way to do sneakernet is to assume everyone 
has infinite storage capacity, and/or everyone is interested in more or less 
the same thing. So everything that you receive you rebroadcast. This is fine 
for some emergency situations, and it can be implemented manually - and if the 
latter, it can be filtered manually. Other options include some level of 
automated relay via subscriptions.

3. Freenet with hard stego. IMHO it is perfectly reasonable in the future 
(approx post-1.0), for Freenet to function over both sneakernet and 
opportunistic networking (as well as other non-realtime transports) - but with 
the caveat that it remains darknet i.e. you only communicate with your friends. 
If there is enough light, and the data involved is small enough, that you can 
use the above options, they may be better. After the changes scheduled for 
0.10, Freenet will support long-term (non-realtime) requests, passive requests 
and some form of publish/subscribe, meaning it will be able to efficiently 
propagate the popular data while still allowing for requests to propagate until 
they find a copy of the desired file - our key feature being routing. Another 
interesting point is that in safer environments we can combine sneakernet with 
conventional transports to increase performance - daily swaps of an 8GB USB key 
give bandwidth of 1Mbps per peer each way. In more hostile environments, 
traditional transports just won't work - either internet connectivity is 
illegal, or it is so severely locked down or surveilled that we can't use it.


signature.asc
Description: This is a digitally signed message part.
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] China starts to get serious over cyberspace

2009-06-18 Thread Matthew Toseland
On Tue, Jun 16, 2009 at 03:54:31PM +0100, Matthew Toseland wrote:
 All new PCs shipped in China include a piece of software called Green Dam. 
 This is supposedly to prevent children accessing offensive material. A report 
 by the OpenNet Initiative has found that Green Dam can monitor activities 
 outside of web browsing, and can terminate applications. Professor Jonathan 
 Zittrain of Harvard's Berkman Centre told the BBC that it can be used for 
 broader purposes, such as the filtering of political ideas. Recently it has 
 been in the news because of allegations that it includes pirated code from 
 CyberSitter.
 
 http://news.bbc.co.uk/1/hi/world/asia-pacific/8091044.stm
 http://news.bbc.co.uk/1/hi/technology/8101978.stm
 
 IMHO this is very interesting. It was always going to be necessary for a 
 totalitarian regime to take control of the client side as well as filtering 
 at the network level (which they already do, extensively although not yet 
 with very sophisticated technology, including blocking access to 
 freenetproject.org, and apparently the 0.5 FNP protocol too). According to 
 surveys, 80% of users won't have Green Dam, presumably mostly because they 
 already have computers and have no desire to add it, or are buying second 
 hand hardware. But this will change over time. Currently it only runs on 
 Windows. The next steps are obvious: Provided that Microsoft completes the 
 implementation of TCPA in Windows 7 or some future version, and provided that 
 Intel and AMD start shipping CPUs with the TPM integrated (which given the 
 demand for TCPA from laptops for the corporate market is likely, despite 
 massive opposition from tech enthusiasts resulting in mail order desktop 
 motherboards almost never having a TPM), and once all the old hardware has 
 been retired (which will take a long time), China can lock down cyberspace 
 completely, excluding any realistic long-term possibility of bypassing 
 government filters by requiring a state-approved operating system to connect 
 to the Internet. Whether similar things happen in the west depends on 
 political trends, the power of the entertainment industry, how much consumers 
 care about DRM, how much of a problem spam and malware become, and so on.

After a sustained campaign in the press, a legal challenge and several security 
holes being discovered, China's Ministry of Industry and Information Technology 
has clarified that The use of this software is not compulsory. Those who 
uninstall it will not face prosecution.

http://news.bbc.co.uk/1/hi/technology/8106526.stm
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe


Re: [freenet-chat] Does Freenet qualify for DMCA Safe Harbor?

2009-02-13 Thread Matthew Toseland
On Thursday 12 February 2009 13:12, jimmy90 wrote:
 ? :)

IANAL, but my understanding is that DMCA safe harbour is contingent on your 
accepting DMCA takedown notices, which is rather problematic for Freenet (and 
not very useful either).

Have a look at the EFF's legal advice for (US-based) p2p devs. One important 
thing they say is you can either filter everything or filter nothing; we take 
the latter approach.

http://www.eff.org/wp/iaal-what-peer-peer-developers-need-know-about-copyright-law


pgpDOqBENN3ey.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

[freenet-chat] UK Government plans on filesharing: not as bad as assumed

2009-01-29 Thread Matthew Toseland
The Digital Britain review, and the government's response to the peer to peer 
consultation, result in the following:

ISPs will be obliged to tackle repeated infringement. The emphasis is on 
dealing with specific individuals. ISPs will be obliged to warn individual 
infringers when presented with evidence of infringement. So far, content 
owners have proven extremely bad at identifying repeat offenders, so ISPs are 
to be required to count the number of notices they send to their customers, 
which can then be provided on a court order along with the user's personal 
details, in order to sue serious offenders. It is believed based on 
experience elsewhere that these measures should reduce offending by around 
70%.

Ofcom, with the ISPs and content owners, will develop a Code of Practice 
dealing with appeals, standards of evidence, cost sharing, etc. It is 
strongly implied that ISPs will be required to disconnect users at some 
point, else why the need for appeals? In the original consultation this was 
also to look into technical options such as filtering, but it was generally 
focussed on dealing with repeat offenders; hopefully if it is part of the 
Code of Practice it will be targeted against known offenders, since the 
government has rejected any general requirement for filtering.

So what this means is that the government has no intention of forcing ISPs to 
block peer to peer software, and the intention is to warn offenders, sue the 
most serious offenders, and presumably have disconnection, filtering of the 
offender's connection, or similar sanctions as a middle road, subject to 
appeals and requiring evidence. This is probably the most we could have hoped 
for; under French law, developing peer to peer software is illegal as well as 
there being arbitrary disconnections, apparently without evidence or appeal 
(but I have not investigated this in detail).

Other interesting conclusions from the Digital Britain review:
- The communications sector is roughly the same size as the creative economy.
- The role of legislation is not to prop up old unsustainable business models.
- They may consider taxes on blank media and/or internet connections to 
subsidise content creation in the near future, since these appear to have 
worked well in other countries. (IMHO this is a reasonable measure given the 
alternatives)
- DRM may have a role, but needs to be flexible enough to not limit the 
customer's using content how they like. (IMHO this is a contradiction...)

URLs:

http://news.bbc.co.uk/2/hi/technology/7854494.stm
http://news.bbc.co.uk/2/hi/technology/7858062.stm
http://www.berr.gov.uk/files/file49907.pdf
http://www.berr.gov.uk/files/file47139.pdf
http://www.culture.gov.uk/what_we_do/broadcasting/5631.aspx


pgpOBSWHKHAdx.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:chat-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-chat] [freenet-support] node via XeroBank

2008-08-05 Thread Matthew Toseland
Thread moved to chat@

On Tuesday 05 August 2008 12:39, Chris Burge wrote:
 Sorry, my statement was intended to note that when using a digital
 transaction a credit card was used much more than digital gold carriers.
 Actually, the number one use in transferring terrorist money by Bin Laden is
 something called Hawala Banking.   It has been around in Eastern societies
 for thousands of years so there is no way they are going to nail that
 sucker.  No, this whole Real Id/KYC/grab your ankles and say please forced
 upon Americans is out of the need to control a failing global economy.  They
 know that they are *[EMAIL PROTECTED] with the current state of the global 
 economy
 and the only way to keep it from resulting in riots is to start a gradual
 clamping down on freedoms before it all hits the fans.

I heard they had successfully shut down the major hawala networks... Brute 
force and dubious governments only too eager to please can do a lot.

http://en.wikipedia.org/wiki/Hawala#Hawala_after_September_11.2C_2001
 
 Sigh...Anywho, this discussion has all inspired me to charge up Freenet
 again and try to get on the boards.  For whatever reason, I never got
 invited to be able to get on the message boards (forgot what that program is
 called) when I tried out Freenet a few months ago (I forget how many times I
 filled out the CAPTCHA...LOL).  Maybe my luck will get better this time
 around.  BTW, is there a board there or somewhere where I can get involved
 in discussions like digital gold and such forth.  Most of the ones that I
 see out there are scammers.

Personally my favourite alternative currency system is Ripple:
http://ripple.sf.net/
It doesn't necessarily provide full anonymity ... but it does have many other 
interesting properties.
 
 Thanks and starting up Freenet now!
 
 :)
 
 On Tue, Aug 5, 2008 at 4:09 AM, Volodya 
[EMAIL PROTECTED]wrote:
 
   nevermind that terrorists use credit
   cards in most cases...
 
  I don't have much to add to this thread, but this is a lie (are you
  watching too
  much Fox News by any chance?). Out of all the attackers or even supposed
  attackers on USA or UK there wasn't a single one to my knowledge who has
  purchased a ticket with a credit card. This information was spread to make
  them
  labelled as thieves in the public eyes.
- Volodya
 
  --
  http://freedom.libsyn.com/   Echo of Freedom, Radical Podcast
  http://eng.anarchopedia.org/ Anarchopedia, A Free Knowledge Portal
  http://freenetproject.org/   The Free Network project
 
   None of us are free until all of us are free.~ Mihail Bakunin
  ___
  Support mailing list
  [EMAIL PROTECTED]
  http://news.gmane.org/gmane.network.freenet.support
  Unsubscribe at
  http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
  Or mailto:[EMAIL PROTECTED]
 
 
 
 
 -- 
 Interested in selling your home? Ask me!
 


pgpRYE4EjN4Cd.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Why is freenet so difficult?

2008-05-21 Thread Matthew Toseland
On Wednesday 21 May 2008 02:23, William J Brown wrote:
 I've been trying to use freenet for a week.

   I can't send mail or post a msg using FMS.

   Freenet is going nowhere without without some easy way to get help.

   I set up Outlook's news server for local host 1119, and i get FMS boards, 
but can't send,  it tries to send on port 3025 for freemail i think.  When i 
go to use windows exploder, it won't connect to  the internet, thinks it's 
suppose to use localhost port 1119.  Normally i don't use all this microsoft 
junk, but Freenet put a plugin on my firefox. 

First off, using Internet Explorer with Freenet is *STRONGLY* discouraged, 
because Internet Explorer's behaviour with MIME type detection makes it 
impossible to prevent freesites from breaking your anonymity.

Secondly, what is the problem with using the customised Firefox profile we 
provide exactly? It is optimised for use with Freenet, and you can access it 
by simply clicking on Browse Freenet.

Thirdly, you are confusing the instructions for settings up FMS with those for 
setting up Freenet. FMS is a completely separate application. 

To access Freenet, you need to point your browser to http://127.0.0.1:/ 
(usually), although as I said the customised Firefox is the best option for 
several reasons. 

You have already set up FMS, and you've connected your newsreader to it. You 
can't post messages because you haven't announced your identity yet. You need 
to open http://127.0.0.1:8080/. Then click on Create Identity and make an 
identity (if you haven't already done this). Then click on Announce Identity 
and do 30 or so of the CAPTCHAs. Then wait 24 hours, because it takes a while 
for it to pick it up. When your identity has been successfully announced, 
this will show on the Local Identities page, and you will then be able to 
post messages. Unfortunately the last part of the instructions are neither on 
the FMS site nor on the Freenet Applications Freesite. I will forward your 
complaint, hopefully we can have the documentation mention the need to 
announce. My view is that FMS is much less user friendly than it could be, 
mainly because it doesn't have any proper interface - Frost was much more 
user-friendly, but was vulnerable to massive denial of service attacks, which 
have more or less shut it down now.

   Too damn difficult.  I don't see a simple what you should do type of 
document

Where did you hear about Freemail and FMS? The Freenet Applications Freesite? 
Or from IRC? Or somewhere else?

   1. install freenet
   2. install freemail
   3. d/l some 3rd party mail prog because ms sucks.

   With no guide and now live help, I think the application is worthless.

Live help is available on IRC. I agree the documentation should be improved. 
But Freenet itself consists only of the web interface (allows you to manage 
your node and access anonymous websites) and a couple of bundled applications 
(for filesharing and uploading freesites).


pgpDQuIyXL5CV.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Testing

2008-03-31 Thread Matthew Toseland
I'm not sure whether the mailing lists are working...


pgpUMYb49DJGo.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Yet another test

2008-03-31 Thread Matthew Toseland
Yet another test.


pgpCma4mz40SO.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Testing again.

2008-03-31 Thread Matthew Toseland
Sorry, we're having major problems, and nextgens is asleep. :(


pgpB3MEVrgLED.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] $15M US anti-censorship fund

2008-01-15 Thread Matthew Toseland
From Frost:

- [EMAIL PROTECTED] - 2008.01.14 - 13:09:09GMT -
(Crossposted here because news is DOSed)

Does anyone have any idea which projects receive these $15 million ?
Can freenet also have a share of this ;) ?

http://www.defensenews.com/story.php?F=3286113C=america

The U.S. Congress is funding a modest assault on the great firewall of China.

The newly approved budget for the U.S. State Department includes $15 million 
for developing “anti-censorship tools and services” which could help Internet 
users breach electronic firewalls set up by China, Iran and other “closed 
societies.”
The money is part of the 2008 budget for the State Department’s Bureau of 
Democracy, Human Rights and Labor. It is to be awarded competitively to 
software developers to produce “internet technology programs and protocols” 
that enable “widespread and secure internet use” in countries where the 
Internet is now heavily censored.

The funding bill says the anti-censorship effort is intended “for the 
advancement of information freedom in closed societies, including the Middle 
East and Asia.”

In a report that accompanies the bill, the House Appropriations Committee 
singles out China as a particular target. It cites recent efforts by Chinese 
President Hu Jintao “to ‘purify’ the Internet via further monitoring and 
censorship,” and through punishing Internet users who engage in uncensored 
communications.
The report also decries recent Internet crackdowns by the Cuban and Russian 
governments.

The $15 million for anti-censorship technology is a small part of a $164 
million “Democracy Fund” that the State Department receives to promote 
democracy around the globe, but is a 30-fold increase over the half-million 
dollars provided for that purpose in 2007.
A spokeswoman said the State Department “is engaged globally promoting freedom 
of expression and the free flow of information on the Internet.”
Lawmakers said programs they are funding”should be able to support large 
numbers of users simultaneously in a hostile Internet environment.”
The Internet in China fits the “hostile” description.
The free-press organization Reporters Without Borders labels China “the 
world’s most advanced country in Internet filtering.”
Chinese authorities monitor Web sites, chat forums, blogs and video exchange 
sites, and have imprisoned more than 50 Internet users for postings deemed to 
be anti-government, subversive and otherwise objectionable, Reporters Without 
Borders reports.
The Chinese government has required companies like Google, Yahoo! and 
Microsoft to censor their search engines as a condition for operating in 
China. As a result, Internet searches for terms such as “human rights” 
and “Taiwan independence” have been blocked.
According to some reports, a Chinese Internet search on Google for “Tiananmen 
Square” produces images of buildings and smiling tourists, while the same 
search in the United States generates pictures of the Chinese tanks used to 
crush pro-democracy protestors in 1989.
Internet censorship in North Korea is worse. Government control makes North 
Korea “the world’s worst Internet black hole,” Reporters Without Borders 
says. “Only a few officials are able to access the Web, using connections 
rented from China.”
Cuba is repressive as well. Virtually all Internet connections are 
government-controlled, and “you can get five years just for connecting to the 
Internet illegally,” the organization says.
The Iranian government boasts that it blocks access to 10 million “immoral” 
Web sites, including political and religious sites.
Saudi Arabia, Syria and Egypt also make the Reporters Without Borders list 
of “Internet enemies.”
The new funding for State Department efforts to defeat Internet censorship “is 
a welcome arrow” in a modest arsenal of weapons for defending Internet 
freedom, said Leslie Harris, president of the Center for Democracy and 
Technology.
Protecting the Internet from abusive governments is important to supporting 
democracy, she said. But accomplishing that “will require the free world to 
take much harder positions” against abuses such as censorship. Ultimately, 
the odds may favor technology.
“No matter how many restrictions are written in China, the Internet is a very 
hard technology to control,” Harris said. “The number of users is growing 
exponentially — blogs, e-mail accounts, the magnitude is extraordinary. At 
the end of the day, governments trying to control the Internet are going to 
have a very difficult time.” å


pgpxbpg3kb1rb.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] TorrentFreak: Comcast/Sandvine block bittorrent seeding

2007-09-07 Thread Matthew Toseland
Seems to be on a traffic analysis level as it works on encrypted bittorrent - 
I wonder if this would block Freenet?

http://torrentfreak.com/comcast-throttles-bittorrent-traffic-seeding-impossible/
http://www.dslreports.com/forum/r18323368-Comcast-is-using-Sandvine-to-manage-P2P-Connections

Thanks to whoever originally sent me this URL!


pgpzmVax6TRzO.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] TorrentFreak: Comcast/Sandvine block bittorrent seeding

2007-09-07 Thread Matthew Toseland
On Friday 07 September 2007 15:26, Florent Daignière wrote:
 * Matthew Toseland [EMAIL PROTECTED] [2007-09-07 15:22:06]:
 
  On Friday 07 September 2007 15:13, you wrote:
   * Matthew Toseland [EMAIL PROTECTED] [2007-09-07 13:49:26]:
   
Seems to be on a traffic analysis level as it works on encrypted 
  bittorrent - 
I wonder if this would block Freenet?


  
http://torrentfreak.com/comcast-throttles-bittorrent-traffic-seeding-impossible/

  
http://www.dslreports.com/forum/r18323368-Comcast-is-using-Sandvine-to-manage-P2P-Connections

Thanks to whoever originally sent me this URL!
   
   Nothing new as far as I can see ... killing TCP sessions sending out
   RSTs is what China has been doing for years!
  
  The means of killing them isn't the interesting part. It's the means of 
  detecting them that's of interest.
 
 As far as I know only transport is cyphered using RC4 ... access to
 the tracker isn't (unless ssl is involved)...

Well it's transport they are interfering with here..
 
 by the way preventing seeding when transfert is over is trivial ... flow
 analysis ... when you don't download, prevent uploading. Detect that
 it switches from a symmetrical pattern to an asymetrical one

Exactly, it's traffic flow analysis. Widely deployed, cheap traffic flow 
analysis hardware kills us.


pgpzVONnx8Qhc.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] 0.5 users

2007-05-09 Thread Matthew Toseland
On Wednesday 09 May 2007 00:33, you wrote:
 NOTE: I don't subscribe to this list. Any replies will have to be sent
 to me personally.

 I recently saw an IRC log where Toad claimed 0.5 had less than 300
 nodes. I just wanna comment that that's complete bullshit. I am
 personally connected to well over 1000 at the moment. 0.5 is still as
 healthy as it's always been IMO.

Sorry, this is just a result of 0.5's opennet sucking. A friend installed a 
node and it showed 230 or so peers after a few hours. Because of the 
old assimilation problem, it takes a while to get fully plugged in to the 
network.


pgpOiBgV5EHO8.pgp
Description: PGP signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] [EMAIL PROTECTED]: [ffii] European Parliament Criminalises Businesses, Consumers, Innovators]

2007-04-26 Thread Matthew Toseland
- Forwarded message from FFII Press Center [EMAIL PROTECTED] -

From: FFII Press Center [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ffii] European Parliament Criminalises Businesses, Consumers,
Innovators

PRESS RELEASE -- [ Europe / Economy / Innovation ]


European Parliament Criminalises Businesses, Consumers, Innovators


Strasbourg, 25 April 2007 -- The European Parliament today accepted the 
IP Criminal Measures directive after its first reading in a vote of 374 
to 278, and 17 abstentions. It left several unexamined rights in the 
scope, and threatens to criminalise consumers and incriminate ISPs. 
Recommendations from an alliance of libraries, consumers and innovators 
were not followed, although Parliament was clearly divided on several 
issues.

A summary of the adopted text follows:
* Apart from copyright (piracy) and trademarks (counterfeiting), also 
the unexamined database and design rights are included in the scope, as 
well as trade names (which do not fall under Community Law). Patents and 
utility models (petty patents) are excluded;
* A weak definition of commercial scale was adopted. It does not 
clearly protect consumers and the young generation;
* Inciting an IPR infringement is criminalised. This introduces 
liabilities for software and service providers;
* Abuse of the measures provided by this directive are punishable, 
fair use-like actions such as infringing for the purpose of criticism, 
research and reporting are removed from the scope, and the neutrality of 
the investigations should be safeguarded.

Terrorists illegally copying and selling phone directories will 
probably not sleep very well tonight. Neither will spare parts makers 
who, according to Parliament, should risk criminal penalties if they 
infringe on a part's design right. It is very strange that the 
rapporteur insisted on having these unexamined database and design 
rights included in the scope, said Jonas Maebe, FFII analyst.

Today, 'inciting' is only criminal in some member states, and in 
exceptional cases such as hate speech. Elevating IPRs to the same level 
is a scary development. The inciting clause is also reminiscent of the 
US 'Induce Act', which threatened to make MP3 players such as the iPod 
illegal, Maebe added.

He continued: On the positive side, Parliament did decide that abuse of 
these misguided measures has to be punishable, and that the neutrality 
of investigations should be safeguarded. It also explicitly mentioned 
several statutory exceptions to IPRs, where criminal measures should not 
be applied.

We are also thankful for the strong support our position received from 
the Greens/EFA and GUE/NGL groups, as well as from several Members of 
the EPP, PSE and ALDE groups. A number of Members from the EPP and PSE 
groups afterwards concurred that the directive did not get the time it 
deserved for discussion, and that many Members became aware of its 
dangers too late, Maebe said.

The directive now goes to the Council for its first reading. Several 
Council members, such as the Dutch and UK governments, have already 
expressed serious concerns about the scope and nature of this directive. 
Maebe concluded: We hope that they will take the joint recommendations 
of law experts and civil society into account more fully.



Background information


The Commission introduced the Criminal Measures IP directive, also known 
as IPRED2 or Criminal Enforcement directive, as a way to combat 
organised crime and terrorism. It would do so by turning all 
intentional, commercial scale infringements of all IP rights into a 
criminal offence.

The problem with this logic is that very few infringements have anything 
to do whatsoever with criminal activities, let alone with terrorism. 
Furthermore, the TRIPs treaty already requires criminal measures against 
commercial scale copyright piracy and counterfeiting, and in most other 
cases civil law is more appropriate.

The directive is also controversial because it is the first time that 
the European Parliament is co-legislating criminal law in the EU to such 
an extent. This also means that individual governments lose their veto 
power when the directive will be treated in the Council.



Links


* Examples demonstrating the consequences of the adopted text
http://action.ffii.org/ipred2/Plenary1_Tabled_Amendments/Consequences

* Overview of the tabled amendments
http://action.ffii.org/ipred2/Plenary1_Tabled_Amendments

* Result of the vote

[freenet-chat] IPRED2 passes first reading in EP was [EMAIL PROTECTED]: Legal certainty, the young generation and innovation at stake in the European Union]

2007-04-25 Thread Matthew Toseland
http://www.ipred.org/MainPage (the first block).

Patents are out, so the entire EU software industry will not be
criminalised overnight. However the text about inciting remains, so
presumably also does the aiding and abetting part. The JURI definition
of commercial scale also went through; this may or may not protect
individual consumers using filesharing.

So potentially: (IANAL!)
- Developing freenet is aiding, abetting and/or inciting copyright
  infringement, and will be illegal, and imprisonable.
- Running it likewise.
- Inciting somebody to run a node might conceivably be covered.
- As might providing tools that can be used for copyright infringement
  (e.g. operating systems which don't have all of Vista's crippleware
  may be regarded as inciting infringement, if we are very unlucky).
- The definition of commercial scale is attacked by FFII and libraries
  as weak, so we'll see whether it protects downloaders.
- However existing liability systems allowed for ISPs are preserved:
  Directive 2000/31/EC. For a node operator to hide behind art 12's mere
  conduit status this they would have to a) provide their name, physical
  address and email address to users and competent authorities (art5(1);
  no idea how the latter point is implemented), and b) remove and block
  keys on demand (art 12, 13, 14). Not doing so would presumably remove
  them from this system and subject them to IPRED2's criminal penalties.
  (Incidentally this appears to allow for compelling an ISP to block
  access to a specific website).

  
http://eur-lex.europa.eu/smartapi/cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoclg=ennumdoc=32000L0031model=guichett

Timeline: IPRED2 still has to go through the Council. It might have to
go all three readings, or it might be passed quickly. Once it has
passed there will be 18 months for member states to implement it.

More information:
http://press.ffii.org/Press_releases/Carte_Blanche_criminal_law_a_threat_to_innovation
And links from there. And see the below first.

- Forwarded message from Ante Wessels [EMAIL PROTECTED] -

From: Ante Wessels [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Legal certainty,
the young generation and innovation at stake in the European Union

initial reaction, after the EP vote:

http://www.ipred.org/MainPage

vriendelijke groet,
cordialmente,

Ante

- End forwarded message -


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Taking Freenet Seriously

2007-03-05 Thread Matthew Toseland
- [EMAIL PROTECTED] - 2007.02.28 - 11:46:38GMT -

(Source: http://uchicagolaw.typepad.com/faculty/2005/10/taking_freenet_.html)

Taking Freenet Seriously: A Response to Picker on Peer-to-Peer

Randy raises a fascinating question below about the appropriate uses for 
Peer-to-Peer technologies, and he and Tim Wu have begun an interesting dialogue 
in the comments. Let me suggest an alternative answer to Tim’s.

Peer-to-Peer technologies have substantial utility in those circumstances where 
anonymity or decentralization are desirable.  So, as Ian Clarke has long argued 
with respect to Freenet, peer-to-peer can be an effective mechanism for 
enabling free political speech in those parts of the world that have repressive 
governments.  It is relatively easy for a repressive government to shut down 
one or a dozen central servers, but virtually impossible for them to shut down 
all content-hosting peers, unless they’re willing to turn off Internet access 
altogether.  Similarly, with central severs, it is much easier to compile a 
list of the Internet addresses belonging to content downloaders, but much 
harder to do this effectively when the distribution channels are peer-to-peer.  
There is enormous potential for these kinds of technologies to promote freedom 
and democracy in authoritarian regimes and robust, uninhibited debate in freer 
societies where legal liability concerns and social norms constrain discourse 
unduly.

At the same time, anonymity and decentralization have substantial downsides in 
the speech context.  Darknets facilitate child pornography distribution.  
Peer-to-peer allows privacy-invading MPEG files to spread across the globe in 
hours, well before any court can intervene with injunctive relief.  And 
anonymity and decentralization on P2P can contribute to the rapid spread of 
computer viruses, thwarting efforts to control viruses through the imposition 
of legal liability on content providers and disseminators. 

So we have an environment in which P2P creates substantial speech-related 
benefits and speech-related harms.  In these settings, we can resolve this 
issue in one of two ways: Compare the magnitude of the benefits and harms (This 
is what the Ginsburg concurrence in Grokster seemed to want to do – More people 
want to use Grokster to obtain porn than political theory); or give the benefit 
of the doubt to the “more speech is better” philosophy, and tolerate many less 
savory uses of P2P for the benefit of the occasional blessed use (This seems 
closer to Breyer’s view of Sony in Grokster.).  The former is how the law 
usually handles economic policy questions, and the latter, I think, is how it 
handles many free speech questions.  So doesn’t this all boil down to the 
question of “What is Peer to Peer use: Economic conduct or speech?”


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Freenet source and the GPL

2007-02-01 Thread Matthew Toseland
On Wed, Jan 31, 2007 at 09:10:26PM -, [EMAIL PROTECTED] wrote:
 'Anonymous' on freenet thinks I'm a troll, however My question about 
 freenet source availability is genuinely sincere.  Aside from that, I gotta 
 admit that Boob Routing sure sounds appealing!
 
  - [EMAIL PROTECTED] - 2007.01.30 - 14:22:10GMT -
 
  What I find interesting is that all this backandforth flap about freenet 
  source and it's availability is that I have not yet seen one word about it 
  by Toad or Ian.  Where do they stand on this?
 
  Why can't each release have an accompanying source tarball?  Is not their 
  subversion thingy capable of providing this?  If it is not, then I suggest 
  that it's broken by design (or the lack thereof).

Ummm... It does. If you'd actually read the release announcements, you'd
know that we insert a tarball as of a few releases ago. From the 1008
changelog:

- First build to have its source code inserted along with the binary for
  the auto-updater. You can get the binary and the source, on freenet,
  from the following keys:
Jar file:
[EMAIL 
PROTECTED],CPFqYi95Is3GwzAdAKtAuFMCXDZFFWC3~uPoidCD67s,AQABAAE/update-1008
Source code:
[EMAIL 
PROTECTED],CPFqYi95Is3GwzAdAKtAuFMCXDZFFWC3~uPoidCD67s,AQABAAE/update-1008-source
Revocation key:
[EMAIL PROTECTED],B6EynLhm7QE0se~rMgWWhl7wh3rFWjxJsEUcyohAm8A,AQABAAE/revoked
(If you find this key, the keys are blown)

I might move the above to update-source-1008 for consistency reasons in future
(better compatibility with USKs), but if I do it will be announced with the
build affected.

I didn't reply to the thread because my Frost was broken due to a DDA issue.

 
  - Anonymous - 2007.01.30 - 14:59:13GMT -
 
  Ian (sanity) and Matthew (toad) have better things to do than to read Frost 
  messages written by trolls.
 
  - Anonymous - 2007.01.30 - 20:28:51GMT -
 
  Like nothing.

Ummm, like Christmas? I took some time off for xmas, and that dragged out a
bit because of hardware upgrades, mythtv, and a bug of the biological variety
(which are common during the winter months).
 
  - Anonymous - 2007.01.30 - 21:21:16GMT -
 
  Not true, they are off on sabbatical at the titty bar with Freenet donation 
  money to meticulously plan the 'theoretical foundations' of the 0.7 network 
  between lap dances.
 
  - Anonymous - 2007.01.30 - 22:40:07GMT -
 
  a) It's a new design called Boob Routing.
  b) Ian is gay.

First I've heard of it. Pupok (his girl) would probably like to know too!
 
  - [EMAIL PROTECTED] - 2007.01.31 - 01:39:02GMT -
 
  ROTFLMAO!
 
 
 --
 An evil exists that threatens every man, woman, and child of this great
 nation.  We must take steps to ensure our domestic security and protect our
 homeland.
 
 - Adolf Hitler, proposing the creation of the Gestapo in Nazi Germany.
 - George Bush, Talking about the Homeland Security Act and the Patriot Act.

Source? I can't believe that even George Bush would be so idiotic as to quote
Hitler. Parallel evolution I suppose...
 
 The means of defense against foreign danger historically have become
 the instruments of tyranny at home.
 
 James Madison, fourth president of
 the United States
 
 I may disagree with what you have to say, but I shall defend, to the
 death, your right to say it. - Voltaire
 
 There are four boxes to use in the defense of liberty: soap, ballot, jury, 
 ammo. Use in that order. -Ed Howdershelt

I like this one.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Finding refs

2007-01-15 Thread Matthew Toseland
On Wed, Dec 27, 2006 at 07:09:48PM -0500, vinyl1 wrote:
 While the darknet is what they're testing right now, as I understand it, the
 intent is to have an opennet version eventually.
 
 People in countries where Freenet is legal will be able to connect via
 opennet, while others can use the darknet. 

Hopefully a lot of people in countries where Freenet is legal will also
use the darknet, for several reasons:
1. To help the darknet in places where it is illegal.
2. To build a darknet for the inevitable point when it becomes illegal
in their countries.
3. For privacy's sake; a true darknet (where you only connect to your
friends) is far more secure than an opennet.

 Those using darknet will not be
 detectable by the authorities.
 
 But there are many stages of testing to be gone through before this can
 happen.
 
 I'm sure Matthew and/or Ian will chime in if I'm wrong.
 
 - Original Message -
 From: [EMAIL PROTECTED]
 To: chat@freenetproject.org
 Sent: Saturday, December 23, 2006 4:45 PM
 Subject: [freenet-chat] Finding refs
 
 
  Having to find and install an IRC package just to connect once to the
  freenet channel for refs is a pain in the ass - so hopefully this list
  will prove useful for that purpose (I have also read where others have
  found little luck getting refs using the IRC channel, even when there
  are many people in the channel).
 
  To be honest, this ref system is a rather tricky and cumbersome system,
  and arguably is rather irrelevant.  I mean, is it any more
  secure/safe/better/etc for me to have to put out a mass call for people
  I don't know to ref me, or to simply have the system establish
  connections at random?  I don't see the difference.
 
  In any event -- does anyone want to trade refs?  If so, please email me
  directly at [EMAIL PROTECTED]
 
  P.S.  Any comments on the benefits (if any) of using the freenet system
  over using Tor/Privoxy?
  ___
  chat mailing list
  chat@freenetproject.org
  Archived: http://news.gmane.org/gmane.network.freenet.general
  Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
  Or mailto:[EMAIL PROTECTED]
 
 ___
 chat mailing list
 chat@freenetproject.org
 Archived: http://news.gmane.org/gmane.network.freenet.general
 Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
 Or mailto:[EMAIL PROTECTED]
 


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] [EMAIL PROTECTED]: Research work about your project freenet hosted at Sourceforge.]

2006-08-29 Thread Matthew Toseland
- Forwarded message from [EMAIL PROTECTED] -

From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Research work about your project freenet hosted at Sourceforge.
X-Spam-Checker-Version: SpamAssassin 3.0.3 (2005-04-27) on servalan
X-Spam-Level: 
X-Spam-Status: No, score=0.7 required=5.0 tests=NO_REAL_NAME,WEIRD_PORT 
autolearn=no version=3.0.3


Dear FLOSS developer,

MERIT at the University of Maastricht along with the University Rey Juan
Carlos (Madrid) are studying how developers contribute code to Free /
Libre and Open Source Software (FLOSS) projects. This is an extension of
our previous research projects such as flossproject.org, flosspols.org,
flossworld.org, and libresoft.urjc.es. 

In this study, we are looking for survey respondents like you, who
contribute to at least one of a small number of projects that we have
selected for the study.

About the study, you'll find below more information, but as a summary:

- To fill it will not take more than 10 minutes.
- All personal information will be kept strictly confidential. Only aggregated
and anonymized data will be published, as part of our study. These results
will be publicly available under a open documentation license.
- We need you resend the included message to your development mail list.
We have selected only a few developers to send our message, but we need
the participation of all possible developers in this survey.

In the survey link, please fill in correctly your CVS login and select
your project, that is:

  freenet

Please, follow the survey link:

   http://libresoft.urjc.es:/Survey/

Please, do not hesitate to contact us if you have any question;
you can ask to [EMAIL PROTECTED]

Model of message to be sent to your developer mailing list:



Dear FLOSS developer,

MERIT at the University of Maastricht along with the University Rey Juan
Carlos (Madrid) are studying how developers contribute code to Free /
Libre and Open Source Software (FLOSS) projects. This is an extension of
our previous research projects such as flossproject.org, flosspols.org,
flossworld.org, and libresoft.urjc.es. 

In this study, we are looking for survey respondents like you, who
contribute to at least one of a small number of projects that we have
selected for the study.

Therefore, we would like to ask you to participate in a small survey and
to fill in our questionnaire, which you will find online at 

http://libresoft.urjc.es:/Survey/

To fill in the survey takes not more than 10 minutes of your time. 

Of course, all personal information will be kept strictly confidential,
no personal information will be revealed to third parties, and the
information obtained will be properly aggregated and anonymized so that
no data about named individuals will be published. We also would like to
point out that this study has only academic and no commercial purpose,
and the resulting analysis will be freely available. 


Rishab Ghosh ,MERIT (Board member, Open Source Initiative)
  [EMAIL PROTECTED]
  
Ruediger Glott, MERIT
  [EMAIL PROTECTED]

Gregorio Robles, URJC
  [EMAIL PROTECTED]

Jesus M. Gonzalez-Barahona, URJC
  [EMAIL PROTECTED]
  


- End forwarded message -

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Practical darknet - or where are the chinese?

2006-08-29 Thread Matthew Toseland
On Fri, Aug 25, 2006 at 01:52:21PM +0200, Lean Fuglsang wrote:
 Hi,
 I was wondering what the plan is for practial darknet in china. In the
 west it looks like a practial IP based darknet i possible where a lot of
 legal communication is encrypted and ISP's are not that government
 friendly.

A lot of legal traffic is encrypted in China too. They use SSL for
exactly the same reason that we do; mostly to protect credit card
numbers. And in the west many ISPs are very anxious to prevent
litigation at almost all costs.

 The laws that have been passed have been in the style of ban the
 application, or prosecute the little people. But for now it seems that ISP
 are independent enough that a IP darknet is possible.
 
 But what is the reality in china? What kind of link management is done, I
 don't believe that darknet would be possible using IP, since it is
 possible to see that a node is using it. It is just too easy to see that a
 host have many encrypted udp connection.

That sort of traffic flow analysis is expensive. ISPs don't have one
computer behind each incoming connection, they have a big router behind
hundreds of them. Freenet 0.7 traffic as it is is detectable only by
trying to profile packet sizes, timing etc, or by the fact that it isn't
anything else. Either way it's not that easy to detect, and if you
detect it by it not being anything else you effectively force
registration of protocols with the government. This is not the case in
China now AFAIK and I doubt it will be the case in the near future.
 
 So how is it imagened that freenet should work? Should the steganography
 go through skype, or other messaging services? If it is phone or video,
 how can you connect to multiple host? You first call one, and then you
 call another? Can the network cope with this type of connections?

VoIP (preferably including video) is a promising avenue for future
research into stego. We can use it parasitically, by for example sending
data on the video stream and keeping the voice stream as it is (so the
traffic is only what would have happened anyway but it doesn't include
video), or we can try to fake timings (which is hard!).

 What about instant messaging? Here you can talk to a lot of people, but it
 looks weird if you do it 24/7.

Indeed. You can pass files through IM too...

The network is not *at present* able to deal with very high latency
transports, but I expect that in future we will add such features; I
hope to move in that direction, at least. Long term requests, passive
requests, publish/subscribe, queueing a fetch of a page which isn't
currently available, and so on.

 What about mobile phones, usb keys and the like?

I doubt it's possible with mobile phones. Passing boxes of disks around
is feasible but requires more user involvement than most users will want
to do. One suggestion was to use PDAs with wifi, which automatically
exchange with friends when they come nearby. Of course wifi is another
option; either fixed or transient wifi links.

 What kind of application is it possible to run on each type of network? I
 would think it could be some type of textmessages, without too much info.

This is all far future stuff. Right now freenet 0.7 works in china, if
you can get darknet connections; freenet 0.5 doesn't.
 
 So is there any chinese out there, that can post to this list and tell us
 how the reality look in china (in english ;)?
 
 Are there any frost forums which have chinese activity?

One thing which is important in the nearer future is localisation; even
in europe we will get more users if they can use freenet with the GUI in
their local language. We have translators lined up for many languages;
the bottleneck is implementing translation hooks; if somebody wants to
work on this that would be nice, otherwise I will get around to it some
time in the beta period...
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Re: Migration path, please! (Re: [freenet-support] Freenet 0, 5 and 0, 7

2006-08-29 Thread Matthew Toseland
(Moved to chat)

On Thu, Aug 24, 2006 at 08:52:16PM -0400, [EMAIL PROTECTED] wrote:
 opennets are only bad in certain circumstances. The USA is not yet one
 of them. 

That depends. China, Iran, and arguably France are. The EU may be in the
very near future. And if the network is being actively (electronically)
attacked (flooding etc), which is not yet legal for the RIAA etc in most
countries, a darknet is better.

 With a darknet, it may be harder to get into the network, but
 once your in it's a LOT easier to identify who is sharing and
 inserting what files. 

How so? If you are on opennet, you know your peers' IPs and can run
correlation/timing/etc attacks against them. If you are on darknet, you
know your peers' IPs, and can run correlation/timing/etc attacks against
them. I don't see why darknet is less secure.

 So it could be argued that a darknet is much
 riskier than an opennet. In a darknet, everyone else pretty much knows
 who you are.

Not true. YOUR PEERS know exactly who you are. That's it! Their peers
don't know who you are, nor does the rest of the network.

 As soon as one computer on the net gets compromised or
 one person decides they don't like what you're doing, you're all
 pretty much screwed. 

Still nonsense.

 I mean, I'm no expert on darknets, but it seems
 that if you only have 5 or 10 connections, and you always have the
 same connections, and you have IRC logs swapping node refs and, better
 yet, the actual node ref...it would be pretty easy to figure out what
 nodes host what files. In an opennet, this kind of thing is expected
 and protected against.

How is it protected against on opennet? Correlation and timing attacks
are quite possible on both opennet and darknet, but on opennet you can
identify every node and connect to all of them. Defences against
correlation attacks are hard, and even more so on opennet, because we
have even less chance of knowing which nodes are real.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Re: Migration path, please! (Re: [freenet-support] Freenet 0, 5 and 0, 7

2006-08-29 Thread Matthew Toseland
On Thu, Aug 24, 2006 at 09:08:13PM -0400, Juiceman wrote:
 
 With 10 connections, the data that could intercepted by one attacker
 is roughly 10%.  The problem is the attacker doesn't know how many
 connections you have, so you could just be passing on data from any
 number of connections you have.

He can work it out, and your requests normally are for splitfiles...
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Caching issues was Re: Migration path, please! (Re: [freenet-support] Freenet 0, 5 and 0, 7

2006-08-29 Thread Matthew Toseland
On Fri, Aug 25, 2006 at 08:59:23AM -0400, [EMAIL PROTECTED] wrote:
   
 Juiceman wrote:
 With 10 connections, the data that could intercepted by one attacker
 is roughly 10%. The problem is the attacker doesn't know how many
 connections you have, so you could just be passing on data from any
 number of connections you have.
  
 It's currently trivialy easy to find out if a request of a connected peer was 
 forwarded by that peer or if it was a local request from that peer because 
 local requests aren't stored in the datastore/-cache. 
 (http://wiki.freenetproject.org/FreenetZeroPointSevenSecurity, search for the 
 headline Datastore) Thus you only have to probe the datastore of the 
 requesting peer after sending the data to it and can find out if it was 
 forwarded or originated there. In my opinion this isn't really acceptable on 
 either a dark- or opennet (perhaps on a true darknet but that doesn't exist 
 right now) but it certainly would cause havoc on an opennet.

This is true (for inserts; requests are cached anyway). The problem is that
the alternative, caching local inserts, is equally dire; the attack that
the Register highlighted last year: Anything you insert is 100% in your
datastore, so if it is seized, or if an attacker makes the requests
remotely and times them, they can guess what you've been browsing. (As
on 0.5).

What do you suggest we do? A client cache (temporary cache using
ephemeral keys) would help slightly. Premix routing would seem to be the
ultimate solution, but is difficult, and thus not to be implemented
before 0.8. I have been toying with the idea of some kind of
non-encrypted semi-permanent tunnels to provide some request security; a
tunnel would be a random route taken by a whole bunch of requests, or
even all local requests from a node over a period; it would be randomly
either forwarded or broken up and the requests routed on each hop. While
it is being forwarded, the requests aren't cached, and don't check the
cache. This would provide a small anonymity set, but better than
nothing.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Re: [freenet-support] Freenet 0,5 and 0,7

2006-08-29 Thread Matthew Toseland
(Moved to -chat).

On Sat, Aug 26, 2006 at 11:42:32PM +, [EMAIL PROTECTED] wrote:
 
 How can freenet grow to be a global network unless someone in one group 
 trades connection information with someone in another group?
 
 Hypothetical - A group of people in England, another in France, another in 
 Russia, and another in China have grown individual trusted 0.7 freenets. No 
 one in any of these groups knows someone in the other freenet group, and 
 they don't want to just advertise in IRC chat to find someone to connect to 
 because they don't know and trust this as a way to add people to their 
 freenet. How will these freenet groups become a part of a global network?

These three networks will grow, until people are added who are on more
than one of these networks. A lot of people in england know people in
France or in China. In particular a lot of people in the US know people
in China; according to some this is one of the factors behind China's
recent economic success.

Now, I'm not saying there are no barriers. Plainly there are cultural,
national, language, geographic barriers. It may be that some of these
barriers are so huge that we need to adapt the routing algorithm to
explicitly divide the darknet into subnetworks, and try requests locally
before passing them on to distant networks (networks we have few
connections to). But this isn't necessarily catastrophic. And if it is
the case then it is something we will have to address whether or not we
have opennet, because there are many places where you simply CANNOT USE
OPENNET.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Re: [freenet-support] Freenet 0,5 and 0,7

2006-08-29 Thread Matthew Toseland
On Sun, Aug 27, 2006 at 12:51:32PM -0400, [EMAIL PROTECTED] wrote:
 Exactly. The theory of a darknet is you connect to people that you
 already know and trust. Now, there's a good chance of getting a
 worldwide-net because someone in group A may know and trust someone in
 group B, but chances are that not all of group A knows all of group B.

So what? Not everyone in group A knows everyone in group A. It doesn't
prevent routing from working. A node knows only a small number of other
nodes, but if you travel a few hops you can get to a large number of
other nodes.

 For a real-world analogy...I don't have a problem hanging out with my
 girlfriend and her friends...she has no problem being with me and my
 friends...but my friends and her friends would never meet
 independently. 

If one of her friends has a message for one of your friends, she gives
it to your gf, who gives it to you, who give it to that friend of yours.
Yes, you become a bottleneck here. But there is every reason from the
research to expect that there are other possible intermediaries.

 Perhaps they would become friends with time...and
 perhaps people in group A of the darknet would get to know and trust
 people in group B of the darknetbut that would take time. I mean,
 I know that personally it's gonna take a few years of knowing someone
 before I would trust them well enough to talk about the kinda stuff
 some people do on freenet. I mean, yea, that time might be lowered by
 someone else you trust saying 'they're cool, don't worry about
 it'...but still, by the time you have a global network, freenet 1.0 is
 gonna be out.

You don't have to connect to your girlfriend's friends.
 
 Plus it makes freenet a much better target for government agencies.
 Chances are the people you are connected directly to in freenet you
 know very well. Chances are the people you know very well live in the
 same country as you, if for no other reason than a shared language. So
 chances are, if they bust one freenet node, they can bust all
 connected nodes.

So? If they bust one opennet node, they can bust every opennet node.
Whereas if they bust one darknet node, they can only (easily) bust the
darknet nodes directly connected to it. Spidering outward that way is
far more expensive than harvesting the entire opennet, busting a few
randomly chosen examples, and cutting off internet access for the
rest.
 
 And that actually made me think of one other thing. If you have a
 darknet in, say, Germany, they will most likely all speak German and
 upload German files. So how would they get joined to a darknet that
 mostly spoke English and uploads English files? Only people who speak
 both languages relatively well will bother to connect to both
 networks. 

And there are literally millions of such people across europe.

 But they have to not only speak both languages but also know
 and trust someone else who speaks the other language. Which seems to
 point back to smaller networks connected in few places.

I accept that there may be internal barriers. I don't accept that these
barriers are insurmountable, and I certainly don't expect the constant
implication that the darknets will be really small.
 
 On 8/27/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 Evan,
 
 You are right - there is a lot of data to show that social networks do
 expand in the method being said here, but that data is based on known,
 non-anonymous social networks. In an anonymous network the rule of thumb is
 trust no one.
 
 If an openet is not the solution, neither is posting information with an
 embeded IP number the solution. I don't know how the openet is hackable,
 especially if node connections pr paths through nodes change randomly
 (TOR-like), but with a manually established network it only takes capturing
 1 node and the entire freenet is at risk. I would be more inclined to
 exchange node information with someone if the information were encrypted -
 private/public key. In an anonymous social network I would be more inclined
 to expand that network to others because my node information is encrypted.
 
 
 
 From: Evan Daniel [EMAIL PROTECTED]
 Reply-To: [EMAIL PROTECTED], support@freenetproject.org
 To: [EMAIL PROTECTED] [EMAIL PROTECTED]
 CC: support@freenetproject.org
 Subject: Re: [freenet-support] Freenet 0,5 and 0,7
 Date: Sun, 27 Aug 2006 10:06:37 -0400
 
 Please justify your assumptions.
 
 There is a lot of data on social networks that says that is not how
 they look.  I see no reason to believe the social networks a freenet
 darknet would be built upon would be different.
 
 Evan
 
 On 8/26/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 Yea, but you don't know all the nodes in the network, you just know
 the ones your connected to. So if one of those links between the
 networks goes down, half your downloads stall out and die. And
 wouldn't that put a pretty big strain on certain computers? I mean, if
 you get this global network of small networks...90% of the data you
 

[freenet-chat] Re: [freenet-support] Freenet 0.7

2006-08-29 Thread Matthew Toseland
Freenet 0.5 had opennet, and yet it was a failure.

On Mon, Aug 28, 2006 at 08:44:42PM -, Hartmut Folter wrote:
 Freenet 0.7 is nothing more than yet another in a series of Freenet
 failures-in-waiting until it proves itself, IMHO, by emerging out of alpha
 with open-net.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Re: Campaigning for Open-Net [WAS Re: [freenet-support] Freenet 0, 5 and 0, 7]

2006-08-29 Thread Matthew Toseland
This is not true. A global darknet is feasible, as I have explained:
National barriers, and even language barriers are by no means absolute,
and to the extent that they affect the network they can be dealt with.
If Freenet provides something of value, we can make a large darknet.

AND IF IT ISN'T THERE IS NO POINT IN DOING FREENET BECAUSE IF FREENET
EVER DOES MEET ITS GOALS IT WILL BE ILLEGAL EVERYWHERE.

That is not to say that opennet isn't important. Opennet will be
implemented. But not yet, because it is not time to do it yet. We do not
want to introduce more chaos to an already chaotic situation by
implementing opennet before we have even started to sort out load
balancing, for example.

On Sun, Aug 27, 2006 at 03:53:20AM +0200, somebody wrote:
 
 The answer is simple.  Without open-net and at least some reasonable 
 percentage of nodes
 operating as part of both open and dark nets, 0.7 will NEVER become part of 
 any global
 network.  It will instead be limited, broken into hundreds or thousands of 
 little
 'island netowrks'
 
 Open-net is required to tie these islands into a global network.
 
 I will repeat something I read on frost recently,
 
 We should all start pestering the hell outta both Ian and Toad to get 
 open-net deployed.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Freenet 0,5 or 0,7

2006-08-29 Thread Matthew Toseland
On Tue, Aug 29, 2006 at 06:43:07PM +0200, - wrote:
  
 You stated that you believe computer based attacks on Freenet are much
 easier than social engineering, and therefore support the fact that freenet
 should be an invite only network.
  
 But, I don't think this model's going to work, for several reasons:
  
 First, the guiding principle behind freenet right now is anonymity in the
 numbers of a large number of users doing all sorts of different things. They
 may easily know you're using freenet, but it's extremely difficult to prove
 WHAT you downloaded. In other word it's very difficult to get specific
 evidence against a specific freenet user.

It's not *that* difficult. There are correlation attacks, and there is
the whole caching issue - either your peers can tell what you've
requested for sure (don't cache locally), or your peers *and* anyone who
seizes your store can tell (cache locally).
  
 True, if freenet becomes illegal, the opennet may not work, but what's the
 worse that's going to happen? They put up a national firewall making freenet
 unusable, or freenet users will just get a message from their ISP saying
 they better stop or they'll be kicked off. This may not happen until 3-5
 years from now, even though it may be illegal on paper in France already. 

And if we aren't ready to switch to a pure darknet, what then?
  
 The darknet concept does not provide this sort of anonymity, you are exposed
 to the people you trust, 

Not significantly more than your exposure to people you _don't_ trust on
opennet. It's pretty much the same thing, except on darknet you choose
who to trust; on opennet you have no choice.

 I haven't heard a single response to the
 question: what happens if someone in your darknet gets busted or a spy
 manages to infiltrate by joining? They instantly have reasonable grounds to
 assume that you are engaged in the same activity, since you're part of the
 same ring. This should be enough to bust you as well.

Or they could just check who you've been emailing/SMSing/calling lately.
Which is why they have data retention, wiretapping etc powers.

 They also now have the ability to specifically monitor WHAT you downloaded.

How so?

 Plus your trusted friend could easily rat on you. And that's that.

Sure, treachery is a big problem. Opennet is a bigger problem; treachery
is more expensive than harvesting, it's more expensive even than
harvesting+ubernodes+sybil etc attacks on an opennet.
  
 How can you underestimate the importance of this?
  
 In contrast in opennet if a user gets busted, yes they may get a seedfile of
 hundreds of different users in many different countries all engaged in
 different activities. That's nice, they know all these people are using
 freenet, but it will not give them specific evidence against anyone, unless
 they do some extremely complex traffic analysis, spanning multiple countries
 and ISPs.

The authorities don't need to bust anybody. All they need to do is
download the node, harvest, and they can quickly get a picture of all
nodes worldwide - including those within their jurisdiction.
  
 And your comment about social engineering being more difficult, that doesn't
 really apply to today's situation, since right now all it takes is going on
 IRC to join. When is freenet planning to go underground then? 

#freenet-refs is for bootstrapping and testing. It's a sort of
pseudo-opennet. True darknet underground connections happen through
other means.
  
 I guess the entire 0,7 testing group will have to break into groups of
 darknets of 2-3-4 people that trust each other in real life. 

Why must darknets be so small? I see no reason at all to expect them to
be that small. I see every reason to expect true darknets to grow and
amalgamate.

 If it goes
 underground with a few hundred hard core enthusiasts, where's the fresh
 content going to come from?

Relies on the bogus assumption above.
  
 And half will be left outside without a darknet. I personally will have to
 form a one person darknet then.
  
 Van
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Not much point fighting individual patents was Re: [Tech] A potential patent threat to Freenet and other P2P networks

2006-08-28 Thread Matthew Toseland
I'm sure I've seen md5: URIs as examples in some document, I think an
RFC on URNs maybe? I'll have a look sometime if I get around to it, but
it's not really worth fighting individual patents until you really have
to. The top campaigning priority (even higher than the Community Patent,
EPLA and London Agreement) MUST be to fight the IPRED2, because if that
passes, we're in deep camel dung: Freenet would almost certainly be
illegal per se (aiding and abetting copyright infringement), and most
software authors, open source or not, would become criminals
(intentional infringement of a patent on a commercial scale,
punishable by prison time, judicial winding up etc).

http://www.fsfeurope.org/projects/ipred2/ipred2.en.html
http://www.fipr.org/copyright/ipred2.html
http://wiki.ffii.org/Ipred2060510En
http://www.ffii.org.uk/archives/23

Frankly the IPRED2 would greatly reduce my respect for criminal law, not
to mention for the European institutions involved...

Is there an EPO equivalent for the below? I came across the below years
ago but could never find it again when I wanted to...

On Sat, Aug 26, 2006 at 10:17:14AM -0700, Ian Clarke wrote:
 This patent purports to cover the rather obvious idea of using  
 substantially unique identifiers to identify data items, whereby  
 identical data items have the same identifiers:
 
   http://www.patentstorm.us/patents/5978791.html
 
 It was filed in October 1997, and is owned by Altnet, who are  
 currently using it to sue Streamcast (creators of Morpheus), and, if  
 they prevail or of Streamcast caves, could conceivably attack other  
 P2P networks, including Freenet:
 
   http://arstechnica.com/news.ars/post/20060815-7508.html
 
 Now it is hard to believe that prior art wouldn't exist for such an  
 obvious idea, claim one is a text book definition of a hash function  
 which have been around for decades, claim 2 would seem to describe a  
 hashtable, also a notion with clear prior art going back decades,  
 claim 5 seems to describe the operation of a cache, and so on.
 
 But then the claims discuss using this technique to retrieve things  
 over a network.  Now, one might argue that simply applying a common  
 computer science technique to a distributed situation is not novel (I  
 don't believe you can get a valid patent simply by combining two  
 other things you didn't invent), but it would be really useful to  
 find some robust examples of requesting files by their hashes over a  
 network that pre-date October 1997.
 
 I have heard that the Xanadu project may have something in 1990, but  
 haven't got any specific references.  Is anyone aware of anything  
 concrete?
 
 Ian.
 
 ___
 Tech mailing list
 Tech@freenetproject.org
 http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
 

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] new freesites + question

2006-08-28 Thread Matthew Toseland
Best guess sometime around year end.

On Mon, Aug 28, 2006 at 12:26:47AM -0500, Edward Langenback wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Greetings,
 
 As of the current version, Mixminion Message Sender is now also available on 
 freenet 0.5
 (http://freenetproject.org/download-old.html)
 
 The freenet url for it is:
 [EMAIL PROTECTED],ZOJm89bQCLLZw7DJ23i4gw/mmsdev/1//
 
 And another site: Lastdays Watch:
 [EMAIL PROTECTED],ckqhs1YME2xL0Ub3XcWpnA/watch/3//
 
 These are on the 0.5 (stable) version.  (I'm not putting anything on the new
 0.7 (alpha) version until it's out of alpha and open-net is deployed.)
 
 Speaking of open-net, is there a working approximation for when that'll 
 happen?
 
 in Him,
  -Ed
 - --
 The best way to get past my spam filter is to use pgp or
 gnupg to encrypt your Mail to me with
 RSA Key ID: 0x84D46604
 (fingerprint: DA03 1EA4 7F5D DF74 B89F  E871 757E 627C 84D4 6604)
 This key can be found on public keyservers such as
 http://keyserver.kjsl.com:11371/#extract
 - -=-=-=-=-=-=-=-=-=-=-=
 God's Resting Place
 http://lurasbookcase.com/gods-resting-place.shtml
  / \
  \ /   Join the ASCII-Ribbon Campaign to Stamp Out HTML Email !
   X
  / \
 
 -BEGIN PGP SIGNATURE-
 Version: PGPsdk version 1.7.1 (C) 1997-1999 Network Associates, Inc. and its 
 affiliated companies.
 
 iQEVAwUBRPJ+nHV+YnyE1GYEAQJLlQf9GkB2kEWs7MaDz3p25ygGerhgXbP4RgiW
 ifX6qBRtRLKAARTxb7d0o2D3eJ6geEEpTpAtoUIsdzO8jowCUDp+Spe/sz82a0qY
 rh+51pUg0PDZBLJiXsr56gEomgvD50U2zEfz8517Zsr7Q9zlyyyH6xDYNsFUgMAJ
 r4QtmxZ9xePq35IS0b0DmyQWQH2LsxPSzWB4rGTdUpC6IoT93JmyuAmkdyQXkXgm
 NBbw5VbWxj2L2aXjicwJKUsLedWYpLCj2FPEtAh4R1gopmUjLrZTLaAfssxHAbhh
 A/og2/X33XLU6BYw2dBQN92kApkeEia7x2TPBWqqjiDCQjiD7b6klQ==
 =gva+
 -END PGP SIGNATURE-
 
 ___
 chat mailing list
 chat@freenetproject.org
 Archived: http://news.gmane.org/gmane.network.freenet.general
 Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
 Or mailto:[EMAIL PROTECTED]
 

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] EDRI on DADVSI

2006-08-21 Thread Matthew Toseland
More on the DADVSI from EDRI. Interesting that the constitutional
council explicitly states that software can be illegal even if it is
intended for sharing non-copyrighted works; this strongly suggests
that blacklisting is now mandatory in France. (An open question being
whether blacklisting on demand a la DMCA takedown notices is enough,
or whether all P2P apart from the whitelisting varieties is now
illegal).

- Forwarded message from EDRI-gram newsletter [EMAIL PROTECTED] -
From: EDRI-gram newsletter [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: EDRI-gram newsletter - Number 4.15, 2 August 2006
List-Id: edri-news.mailman.edri.org
List-Subscribe: http://mailman.edri.org/cgi-bin/mailman/listinfo/edri-news, 
mailto:[EMAIL PROTECTED]



EDRI-gram

 biweekly newsletter about digital civil rights in Europe

 Number 4.15, 2 August 2006



Contents


EDRI-gram in German
1. Digital Rights Ireland Challenge to Data Retention
2. EU might fingerprint children even before 12 years old
3. End of activities Bits of Freedom
4. Telecom Italia wiretapping scandal
5. EU trying to push again biometrics on national ID cards
6. The French copyright law changed by the Constitutional Council
7. The Schengen Information System II delayed
8. Recommended reading
9. Agenda
10. About


6. The French copyright law changed by the Constitutional Council

The French Constitutional Council ruled on the most controversial copyright
and related rights law, known as DADVSI law, concluding that some
provisions of the law violated the constitutional protections of property.

The Council has considered as unconstitutional several provisions adopted by
the French Parliament that were meant to balance the initial text which was
too much in favour of the industry, thus making the law even stricter.

One of the aspects considered by the Council as against the equality
principle was the gradual system in the application of fines for making
works available on P2P networks, which was ranging from 38 to
150 euros. Under the circumstances, the penalties remain at the level of 3
years of imprisonment and 300,000 euros in fines.

By eliminating the reduced penalties, the council put ordinary people
sharing music back in the same league as criminal counterfeiters, said
Jean-Baptist Soufron, legal director for the Association of Audionautes.

Probably the most severe decision of the Council is related to provisions
related to interoperability. Basically the Council considered the government
did not define interoperability properly and withdrew interoperability from
the DRM circumventions exceptions.

This definitely pleased Apple. Dominique Menard, partner at the Lovells law
firm and a specialist in intellectual property said: The Constitutional
Council has highlighted fundamental protections for intellectual property in
such a way as to put iTunes a little further from risk of the French law.

The Council changed also some of the provisions adopted by the French
Parliament making the creators of file-sharing software and software that
could interact with DRM-protected content to be sued by copyright holders,
even if the software is intended for non-copyrighted contents.

The law, which is now stricter than the initial text, will be either
promulgated and then published in the Official Journal after which it can
enter into force or it can be resubmitted to the Parliament for further
discussions.

DADVSI : The Constitutional Council makes the law tougher ! (27.07.2006)
http://www.ratiatum.com/news3414_DADVSI_Le_Conseil_Constitutionnel_aggrave_la_loi.html

The DADVSI law validated and made stricter by the Constitutional Council
(27.07.2006)
http://www.pcinpact.com/actu/news/30385-La-loi-DADVSI-validee-en-partie-par-le-Conse.htm

EDRI-gram : New French copyright law gives Apple satisfaction (5.06.2006)
http://www.edri.org/edrigram/number4.13/frenchcopyright

Parts of French iPod law ruled unconstitutional (29.07.2006)
http://arstechnica.com/news.ars/post/20060729-7380.html
- End forwarded message -
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Robots.txt

2006-08-16 Thread Matthew Toseland
Yes but the other side of it isn't implemented yet (__CHECKED_HTTP__
i.e. providing for links to the outside world as long as the user clicks
a button for that specific URL to confirm that they really want to go there).

On Wed, Aug 16, 2006 at 02:13:33PM +, NextGen$ wrote:
 * Stefan Grönberg [EMAIL PROTECTED] [2006-08-16 01:49:05]:
 
  you might wanna fix the URL on the webby like
  if someone posts an url make an page that first takes you to a page that 
  tells the user
  that this and that link takes you away from freenet and you cant be 
  responsible for what that
  url contains, or mark it really good as an external link.
 
 There is nothing to fix ... it's to be implemented.
 
 http://localhost:/[EMAIL 
 PROTECTED],~Uxr-jFaQ6T26IWmyK~JpQx7TJWoVbQ6qNOR6KPK94M,AAEA--8?type=text/plain
 http://localhost:/[EMAIL 
 PROTECTED],~Uxr-jFaQ6T26IWmyK~JpQx7TJWoVbQ6qNOR6KPK94M,AAEA--8?type=text/html
 
 The content filter is sanitizing the link : the default safe behaviour.
 
 NextGen$
 
  
  Ian Clarke wrote:
  Oh, and email addresses (if we don't already).
  
  Ian.
  
  On 15 Aug 2006, at 12:43, Matthew Toseland wrote:
  
  On Tue, Aug 15, 2006 at 11:56:49AM -0700, Ian Clarke wrote:
  I don't see why not, its public.
  
  Okay cool lets do it. (My view is that as long as we expunge all IP
  addresses, and make it clear in the channel topic that it is logged,
  then we're fine).
  
  Ian.
  
  On 12 Aug 2006, at 16:12, Florent Daignière (NextGen$) wrote:
  
  Hi,
  
  Shall we let webcrawlers/searchengines index our irc logs ?
  
  NextGen$
  -- 
  Matthew J Toseland - [EMAIL PROTECTED] 
  mailto:[EMAIL PROTECTED]
  Freenet Project Official Codemonkey - http://freenetproject.org/
  ICTHUS - Nothing is impossible. Our Boss says so.
  ___
  chat mailing list
  chat@freenetproject.org mailto:chat@freenetproject.org
  Archived: http://news.gmane.org/gmane.network.freenet.general
  Unsubscribe at 
  http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
  Or mailto:[EMAIL PROTECTED]
  
  *Ian Clarke*: Co-Founder  Chief Scientist Revver, Inc. 
  http://revver.com
  phone: 323.871.2828 | personal blog - http://locut.us/blog 
  http://locut.us/blog/
  
  
  
  ___
  chat mailing list
  chat@freenetproject.org
  Archived: http://news.gmane.org/gmane.network.freenet.general
  Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
  Or mailto:[EMAIL PROTECTED]
 
  ___
  chat mailing list
  chat@freenetproject.org
  Archived: http://news.gmane.org/gmane.network.freenet.general
  Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
  Or mailto:[EMAIL PROTECTED]
 ___
 chat mailing list
 chat@freenetproject.org
 Archived: http://news.gmane.org/gmane.network.freenet.general
 Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
 Or mailto:[EMAIL PROTECTED]
 

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Robots.txt

2006-08-15 Thread Matthew Toseland
On Tue, Aug 15, 2006 at 11:56:49AM -0700, Ian Clarke wrote:
 I don't see why not, its public.

Okay cool lets do it. (My view is that as long as we expunge all IP
addresses, and make it clear in the channel topic that it is logged,
then we're fine).
 
 Ian.
 
 On 12 Aug 2006, at 16:12, Florent Daignière (NextGen$) wrote:
 
 Hi,
 
  Shall we let webcrawlers/searchengines index our irc logs ?
 
 NextGen$
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-support] Re: [freenet-chat] Re: [Tech] Open-net

2006-08-09 Thread Matthew Toseland
On Wed, Aug 09, 2006 at 09:15:13AM -, anonymous freenet user wrote:
 On Tue, 8 Aug 2006, Ian Clarke [EMAIL PROTECTED] wrote:
 
 Opennet is a high priority, but there are a few things we must do  
 first (such as sort out our load balancing issues, and decide on  
 exactly how opennet should be implemented).
 
 Ian.
 
 Ok, That's understandable.
 Is there any kind of roughly-hoped-for-date for deploying open-net?
 I realize you can't nail down a date and say on x/y/z open-net will
 activate.
 I'm looking for some idea of how long it's expected to take in real-time.

We'll probably start seriously looking into it around the end of this
year. We need to sort out a number of serious issues first.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Several items of news

2006-07-27 Thread Matthew Toseland
http://yro.slashdot.org/yro/06/07/27/1315203.shtml

In no way does my posting this link mean that my employer endorses illegal
sharing of music or other copyrighted materials.
(Okay, I'm a little paranoid. Read below for why!)

Oh and the DADVSI has passed its constitutional challenge, and is now
even worse. But it's all in French so nobody has noticed! (In particular
/. hasn't noticed). Accurate translations and analysis, in English,
especially of the differences between the EUCD's strict requirements and
the DADVSI's implementation, and of the precise wording/meaning of the
Vivendi amendment, would be appreciated:
http://maitre.eolas.free.fr/journal/index.php?2006/07/27/408-loi-dadvsi-le-conseil-constitutionnel-a-rendu-sa-decision
http://linuxfr.org/journal/
The distribution of software obviously intended for the unauthorized
provision to the public of protected works or content would be
criminalized, according to the babelfished first page. This might
include Freenet; see http://freenetproject.org/index.php?page=philosophy
Nextgens is of the view that it would include all P2P software that
doesn't enforce strong DRM.

Finally, the FFII (the group which fought the software patents campaign
in Europe, including many of the world's largest IT litigation
companies, to a standstill last year) is up to its eyeballs right now.
There is a big push for the EPLA, which would both legalize software
patents and make it easier to enforce them, and might not require
approval from the European Parliament. For the uninitiate, software
patents are patents on often trivial techniques used in computer
software; they are generally only of value to large corporations who can
afford vast numbers of them and thus force cross-licensing, or to patent
parasites who don't ship any code. In particular, they present a major
threat to open source software, since we cannot pay royalties. Freenet
is open source. Arguing we can hide behind IBM is dubious, as IBM has
been pushing for software patents, and filing them, for a long time.

Apart from that, the IPRED2 rolls on; the IPRED2 makes the intentional
(this word may be meaningless) infringement of intellectual property on
a commercial scale (this may not mean much either), or attempting,
aiding, abetting, or inciting such infringement, a criminal offence
punishable by a wide range of sanctions including prison time. This would
very likely make it illegal to distribute Freenet in France, and it
might have wider effects; the FFII argues that it is impossible to avoid
infringing on software patents if you write software, and therefore that
all software devs who don't work for megacorps would be criminalized.
Open source would again probably be hardest hit. FIPR argues that it
would probably result in ISPs blocking sites alleged to infringe
intellectual property as well as child porn sites, and if it was
interpreted this widely then IMHO it could very well lead to mandatory
TCPA as well.

http://www.ffii.org/
http://www.fipr.org/copyright/ipred2.html
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Skype cracked

2006-07-14 Thread Matthew Toseland
Surely it is patented, and therefore cannot be used in western
countries...?

On Sat, Jul 15, 2006 at 12:14:43AM +0200, Magnus Eriksson wrote:
 
 I thought this might be interesting:
 
 
 Chinese Company: Skype Protocol Cracked
 http://www.cio.com/blog_view.html?CID=22974
 
  The 10-person Chinese company, which has received venture capital 
 funding, is planning to release in two weeks three software components 
 based on the Skype protocol that would allow developers to create 
 compatible applications ...
 
  By cracking the Skype protocol, the company claims it can also block 
 Skype voice traffic ...
 
 
 Original source:
 
 Skype Protocol Has Been Cracked
 http://www.voipwiki.com/blog/?p=16
 
 
 So..
 
  Software components that would allow developers to create compatible 
 applications
 
 Fantastic!  So we have great stego for Freenet.  And it might even be 
 possible to bounce traffic off Skype nodes (or, Freenet nodes using that 
 component).
 
 But...
 
  the company claims it can also block Skype voice traffic
 
 We're screwed.  :-)
 
 
   But I suppose it might be useful.  Another option, if nothing else.  And 
 maybe I even can have a client that doesn't automatically report my whole 
 social network to an easily subpoenaed server.
 
 
 MAgnus
 
 ___
 chat mailing list
 chat@freenetproject.org
 Archived: http://news.gmane.org/gmane.network.freenet.general
 Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
 Or mailto:[EMAIL PROTECTED]
 

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Skype cracked

2006-07-14 Thread Matthew Toseland
Is there any evidence of reasonable crypto in skype? I have heard that
it is encrypted, but no other VOIP is...?

On Sat, Jul 15, 2006 at 12:14:43AM +0200, Magnus Eriksson wrote:
 
 I thought this might be interesting:
 
 
 Chinese Company: Skype Protocol Cracked
 http://www.cio.com/blog_view.html?CID=22974
 
  The 10-person Chinese company, which has received venture capital 
 funding, is planning to release in two weeks three software components 
 based on the Skype protocol that would allow developers to create 
 compatible applications ...
 
  By cracking the Skype protocol, the company claims it can also block 
 Skype voice traffic ...
 
 
 Original source:
 
 Skype Protocol Has Been Cracked
 http://www.voipwiki.com/blog/?p=16
 
 
 So..
 
  Software components that would allow developers to create compatible 
 applications
 
 Fantastic!  So we have great stego for Freenet.  And it might even be 
 possible to bounce traffic off Skype nodes (or, Freenet nodes using that 
 component).
 
 But...
 
  the company claims it can also block Skype voice traffic
 
 We're screwed.  :-)
 
 
   But I suppose it might be useful.  Another option, if nothing else.  And 
 maybe I even can have a client that doesn't automatically report my whole 
 social network to an easily subpoenaed server.
 
 
 MAgnus
 
 ___
 chat mailing list
 chat@freenetproject.org
 Archived: http://news.gmane.org/gmane.network.freenet.general
 Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
 Or mailto:[EMAIL PROTECTED]
 

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Skype cracked

2006-07-14 Thread Matthew Toseland
On Fri, Jul 14, 2006 at 07:27:25PM -0300, Caco Patane wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 On 7/14/06, Matthew Toseland [EMAIL PROTECTED] wrote:
 Is there any evidence of reasonable crypto in skype? I have heard that
 it is encrypted, but no other VOIP is...?

I mean no other widely deployed or standards compliant VOIP. :) SIP
isn't.
 
 http://www.philzimmermann.com/EN/zfone/zfone.html
 
 Saludos,
 Caco_Patane !
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Interesting news from Iran

2006-07-04 Thread Matthew Toseland
Apparently Iran blocks all HTTP proxies... China doesn't do this yet.

abcdef all tor routers are blocked in iran
abcdef is there any web-censorship-circumvention net which operates
like freenet?
abcdef I got a technical question
abcdef u c when u try to connect to a proxy in Iran, no matter what
port you're using
abcdef when you try to load a webpage, it time-outs
FuriousRage use an anonymous proxy then it should work
abcdef I told my brother who lives in the uk to set up a proxy on his
machine
abcdef I can access his webpages (apache)
abcdef but nomatter what port he sets, it doesnt work
abcdef what could the ISP have done?
abcdef and that's the reason why tor does not work in Iran
abcdef the whole idea behind tor was so stupid it's unbelievable
abcdef by unbelievable i mean UNNNbelievable
Bludapoto In what way abcdef?
Bludapoto I mean, it's just an automatic proxy chain for socks traffic
abcdef it uses proxy to connect, uses certain routers which are
blocked by all filtering products
FuriousRage abcdef: i belive you can use *any* port for tor
abcdef it could have been a distributed net like freenet
FuriousRage try use port 80 and see if it works
abcdef already tried that
FuriousRage abcdef: ask in #tor they should have more indept knowledge
abcdef for tor and other proxies
abcdef on my bro's machine in the uk
Bludapoto abcdef, TOR is distributed. You can run your node as an
accessor, or as a router
abcdef hmmm
abcdef thanks for info Bludapoto
Bludapoto welcome - but definitely check in #tor
Bludapoto They've also got a TON of docs online, very helpful overall.
Tor's kind of .. small, anyway.
abcdef I'm jest a little frustrated by this fuckin' taliban censorship
FuriousRage abcdef: cant you just use an anonymous http proxy?
Bludapoto By which I mean the Tor community/userbase. Hidden Services
are usually slower than freenet, and it's pretty much just a bunch of
people celebrating the fact that they're circumventing. It got kind of
boring after a few days.
Caco_Patane put you eforts on freenet in order to transform that
frustration into happiness, proud and joy =D
abcdef like cgi-proxy?
abcdef I cannot use any proxy set on the user agent
abcdef no matter socks,SSL, regular anything
FuriousRage you should be able to set an http proxy in your browser
abcdef I know they used to work up until 2004
FuriousRage Bludapoto: i got fed up with tor over irc, keep d/c me,
now i got hold of an oper here to set me an cloak
Caco_Patane what about a SSH tunnel, do you have any server outside?
abcdef but the ministry of IT which is the exclusive ICP, found a way
to prevent browsers from using proxies
Bludapoto Furious: nice
FuriousRage abcdef: they can tprevent your browser to use proxy on
your computer unless you install some software they provide to fuck you
your box
abcdef nah, they have blocked proxy access on their fuckin' servers
FuriousRage abcdef: althought, if you got a friend outside iran, and
he got an 24/7 computer using linux(most likly) you could ask him to
give you an anonymous proxy acces of somesort, like http tunneling, or
over vpn or something
abcdef my bro's IP was not blocked, I could view his webpages (he uses
apache) , but couldn't
abcdef use his proxy
abcdef VPN works
FuriousRage abcdef: there's many ways to tunnel http traffic afaik,
just cant get many to mind atm ;
sich then you need to connect with vpn outside iran, and then use some
proxy inside the vpn
Bludapoto Furious: Thanks for the help.
sich but you need to find someone who give you access on is proxy
FuriousRage np
FuriousRage sich: there is tons of free working 100%(?) anonymous
proxies, i have used many sometimes ;
abcdef well, I want all those stupid fuckin' muslims be able to
abcdef bypass censorship
abcdef not everybody has a friend/family overseas
sich FuriousRage: yes, but apparently he can't connect to any proxy
abcdef and proxy and tor work neither
abcdef that's why I say the idea behind tor was stupid
FuriousRage sich: not directly, but thru someones other box he should
be since vpn works..
abcdef coz it's based on socks
sich yes, exact, but the problem is not to be anonymous, but to bypass
control
sich then there is no need to use anonymous proxy
abcdef the anonimity is not an issue here
abcdef (Iran)
FuriousRage could tunnel the http traffic over ssh afaik too
abcdef the only accessible websites are piles upon piles of islamic
shit
abcdef all free hosts are blocked
abcdef most blogspot blogs are blocked
abcdef geocities got blocked in 2004
sich they block http traffic but not irc ?
abcdef not yet
abcdef the other side of the problem is that there are thousands of
free american hosts out there
FuriousRage tunnel http traffic over ssh on port 80 or 8080, should
work perhaps
sich on my opinion the only real way to bypass all this problems, is
to find some friends
sich and use vpn + proxy
abcdef but one can't register and upload phProxy coz they block IPs
from Iran and North Korea due to stupid US sanctions
sich hum, yes

[freenet-chat] DADVSI passes

2006-06-30 Thread Matthew Toseland
http://www.eucd.info/index.php?2006/06/30/333-french-parliament-approves-the-worst-copyright-law-in-europe

There might be one last chance in the Constitutional Court. But it looks
like we won't be taking any French SoC students next summer! (The DADVSI
as passed includes the Vivendi amendments which make authors of
filesharing tools criminals punishable by jail and large fines).
--
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] IWF Cleanfeed ISP-level censoring legitimate sites from UK users

2006-06-28 Thread Matthew Toseland
At the time at which I visited the site it appeared at first glance to
be as I described.

On Wed, Jun 28, 2006 at 01:35:35AM +0100, Bob wrote:
 --- Matthew Toseland [EMAIL PROTECTED] wrote:
 
  Hmmm, I would dispute your assessment actually, having visited the
  site.
  It's all porn, and a lot of it is hentai - drawn pictures of nude
  girls.
 
 all porn? It is rare for /b/ to have more than a couple of porn
 threads. 4chan does have dedicated porn and hentai boards, /s/ /d/ and
 /h/, but these have not been blocked. Also 4chan hosts numerous forums
 definetely non-porn in nature like /g/, /co/, /k/, /po/, /v/, all the
 world4ch text boards etc. Many of these are quite heavilly moderated
 and 'safe for work' even.
 
 /b/ is frequently compared to the somethingawful.com FYAD forum
 (http://forums.somethingawful.com/forumdisplay.php?forumid=115), it's
 more anarchic due to the lack of accounts but otherwise fairly similar,
 i.e. stupid discussions / invasions / trolling and meme floods. Not
 exactly the cream of internet discourse, but often amusing just the
 same. /b/ is easily 4chan's most popular board, and 4chan itself is
 *very* popular - the 2,320th most visited site on the internet no
 less. 
 See http://en.wikipedia.org/wiki/4chan .
 It's not exactly a shadowy underground legally dubious site.
 
  While it is not entirely clear what their age is, *simulated* child
  porn is illegal in most countries.
 
 Including the US where 4chan has been hosted for years, and accordingly
 anything meeting such criteria is deleted/permabanned. If the ban were
 so broad as to ban all hentai just in case then logically /h/ and /d/
 would be blocked, amongst many many other sites, but they aren't.
 
 I would *speculate* therefore that this block *may* be the result of a
 malicious report timed to coincide with a deliberate scripted flood of
 actual cp. No-account imageboards like 4chan are particularly
 vulnerable to such an attack, and it is not especially difficult to
 gather enough anonymous proxies and/or compromised PCs to conduct one
 with little risk. If this is the case any forum which allows image
 posting (most of them) is theoretically now at risk from being secretly
 censored from (at least) UK citizens, with questionable comeback at
 best, by similar snap judgements of people not familiar with the site
 or how it works. I maintain that this is a serious problem.
 
 Just for the record, I don't like hentai of any description or even
 care about anime in general. 4chan /b/ is just somewhere I like(d?) to
 waste time participating in idiocy. Too much time actually, so it being
 censored does have an upside, but that's not the point.
 
  On Mon, Jun 19, 2006 at 01:19:13AM +0100, Bob wrote:
   
   However, it appears they have now blocked 4chan.org's /b/ -
  Random
   imageboard :
   http://img.4chan.org/b/imgboard.html
 -- snip --
 
 Bob
 
 
   
 ___ 
 Try the all-new Yahoo! Mail. The New Version is radically easier to use ? 
 The Wall Street Journal 
 http://uk.docs.yahoo.com/nowyoucan.html
 

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] End of days was [EMAIL PROTECTED]: [ffii] EU Commission proposes to criminalise European software industry]

2006-06-28 Thread Matthew Toseland
Anyone in Europe, please write to your MEPs, or I'll have to move to the
USA when this gets implemented!

Member States shall ensure that all intentional infringements of an
intellectual property right on a commercial scale, and attempting, aiding
or abetting and inciting such infringements, are treated as criminal
offences.

It then goes on to outline a range of penalties from imprisonment to
winding up of businesses, bans on commercial activity, denial of future
state aid etc.

Given that commercial scale is not defined, it can be assumed to mean
depriving someone of potential income. And intentional does not
necessarily mean that the person is aware of the software patents he is
infringing (for example); it could be interpreted to mean that they are
simply writing software intentionally.

It goes on to require that rightsholders can be involved in criminal
investigations, and that the police are required to investigate even if
they don't receive a complaint from the rightsholder.

This would criminalize filesharing by the back door. It would also
criminalize software development in general by forcing every software
developer (apart from the really large companies who have patent
thickets) to on demand fight all the trivial software patents their
software infringes on. The effect of this would be the 'judicial winding
up' of the European software industry.

Worse even than that, the task of eliminating all software SMEs would be
given to the police, who generally speaking don't care about such
matters. They would have to set up dedicated agencies for this, whose
task is largely to eliminate honest businessmen trying to make an honest
living, drive down employment, and generally undermine a large part of
the economy. This would discredit criminal law and the police, and make
major IP owners effectively a part of the criminal process.

The Commission's justifications for the legislation have very little to
do with its actual effect: copyright infringement (piracy) and trademark
infringement (counterfeiting) are already criminal matters. Selling
unlicensed drugs/toys/tools are also criminal matters. The 'health and
safety' angle is simply a smokescreen.

Finally, yes it would criminalize my work on Freenet. Freenet is an
anonymous filesharing system designed to resist censorship. It is
intended to provide freedom of speech in despotic regimes where the
internet is filtered and monitored. It is however developed in the West
for obvious reasons. Since it is designed to resist censorship, it will
inevitably be used for violating intellectual property rights. This is
aiding and abetting, and possibly inciting, certainly on a commercial
scale, and probably 'intentional' by the reasoning above. Given this
nonsense, and given the recent moves towards internet censorship at a
national level [1], it seems that Freenet will be needed, and will be
illegal, in the west in the next few years! I am happy to pass on the
torch when this occurs, to those who will have to develop and use it
without the benefit of operating in the light - being able to employ
developers, have public beta tests etc. And I will have to go find a new
career. Because I'm not going to work for the parasites who were behind
the whole software patents mess, who will be the only IT players to
survive the latest round!

[1] Italy requires ISPs to block access to a proscribed list of gambling
websites. The situation in the UK is more subversive: The government has
a target that all UK ISPs will block Cleanfeed's list of child porn sites
by the end of 2007. This means they are no longer common carriers, since
this is not a legally binding obligation and since the IWF is a private
company. This further means that ISPs will be liable to block any and
all illegal websites - including those which are illegal because of
libel, copyright infringement, and so on. Sites such as xenu.org, which
while they are in the clear public interest are visited by few of the
ISP's customers and therefore will not be defended in an expensive legal
battle by the ISP - and which have been the subject of threatening
letters and sometimes litigation on many occasions in the past. I have
written to my MP about this and expect a reply from the junior minister
at some point.

- Forwarded message from Jonas Maebe [EMAIL PROTECTED] -

From: Jonas Maebe [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ffii] EU Commission proposes to criminalise European software
industry

PRESS RELEASE -- [ Europe / Economy / ICT ]

=
EU Commission proposes to criminalise European software industry
=

Brussels, 12 May 2005. The Commission's recently relaunched Enforcement
Directive (IPRED2, 2005/0127 (COD)) proposal aims to criminalise all
intentional and commercial IP infringements in order to combat
organised crime and to protect national 

[freenet-chat] Betting websites blocked in Italy

2006-06-27 Thread Matthew Toseland
http://www.edri.org/edrigram/number4.12/italybetting

Italian ISPs are now required to block access to a number of betting
websites (the measures used are very primitive at present). One
interesting thing about this is that the list of blocked sites is
public.

I told you so, etc etc.

It seems increasingly likely that all illegal websites will be blocked
by ISPs in many countries in the near future. Of course they won't be
able to get all illegal websites, but if the process is mediated by such
unaccountable but state backed private companies as the Internet Watch
Foundation, then it won't even take a court order - it will probably
only take a threatening letter once we have a judgement to the effect
that the IWF is liable for not blocking copyrighted material on demand.

Material copyrighted by such as the Church of Scientology. Or the state.
Or for which there is any other obvious public interest. Or which is
libellous. Or which violates IPRED2 (aids, abets, incites infringement
of copyrights/patents/trademarks on a commercial scale; anonymous
censorship resistant filesharing may fall into this broad bucket)! The
best that can be hoped for is that legal or political supervision is
required for a block to be put in place...

--

Following a fierce battle between an authority of the Italian State and
private european online betting companies over their activity in Italy,
a big number of betting websites are officialy blocked for Italian
Internet users.

Everything began with the 2006 financial law (Law 266/2005) voted by the
Parliament under the outgoing Berlusconi government. The law included
four provisions - namely paragraph 535-58 of art.1 - which gave the
Amministrazione Autonoma dei Monopoli di Stato  (AAMS or Autonomous
Administration of State Monopolies, a part of the Ministry of Economy
and Finances) the power to bring to the attention of:
(a) providers of Internet services, or
(b) providers of other data or telecommunication networks, or
(c) entities that offer networks or telecommunication services in
relationship to (a) or (b), all those instances in which someone offers
games or bets where money can be lost or won without having the proper
authorization that is usually granted by AAMS itself.

Upon receiving such communication from the AAMS, the subjects from (a)
to (c) have the legal obligation to inhibit usage of the networks that
they manage or for which they provide betting and gaming services by
adopting appropriate technical measures to this end.

The AAMS proceeded on 13 February 2006 to compile and publish a first
list of websites that should not be accessed from Italian networks.
Compliant ISPs generally implemented the restriction by hijacking DNS
communication and redirecting it to the DNS server of the AAMS. The end
result is that users trying to access such websites are instead getting
a notice saying that pursuant to the decree of the AAMS of 7 February
2006 the requested website is not accessible because it does not have
the necessary authorizations for collecting bets in Italy.

Of course, reactions flocked in by all sides. Several betting companies,
including UK-based William Hill (which is included on the list of
blocked websites) announced they would recur to the European Court of
Justice for what they claim is blatant violation of the basic principles
of the European internal market.

The Remote Gambling Association immediately started to negotiate a
compromise with the Italian government, but until now no agreement seems
to have been reached.

Moreover, several Italian commentators noticed how poor the employed
system is from a technical point of view.  It is in fact sufficient in
most cases to remove the leading www prefix to access the blocked
websites. Other strategies, including the usage of web proxies, are
also possible.

The Italian chapter of ISOC (Internet Society) took a firm technical
position, considering that the proposed measures were ineffective and
in any case were far away from the best practices in the sector -
while at the same time noticing that the outcries of censorship
seemed misplaced because of the subject matter under discussion.

While ISOC explicitly chose to avoid the censorship argument, other
commentators argued that by blocking entire websites the proposed
solution ment in fact severely limiting the right of all Italian
citizens to access information, as granted by the Italian Constitution
and several international instruments. If the goal was to impede the
act of gambling then any measure should have been proportionate to
this specific goal. Impeding Italian citizens to access a website and
the information contained therein arguably is not.

One company, Malta-based Astrabet Bookmaker Ltd., went further and
requested the Second Section of the Civil Tribunal of Rome to declare
the measure illegitimate, insofar as it cut off Astrabet's website from
the Italian network.

On 

Re: [freenet-chat] IWF Cleanfeed ISP-level censoring legitimate sites from UK users

2006-06-27 Thread Matthew Toseland
Hmmm, I would dispute your assessment actually, having visited the site.
It's all porn, and a lot of it is hentai - drawn pictures of nude girls.
While it is not entirely clear what their age is, *simulated* child porn
is illegal in most countries.

On Mon, Jun 19, 2006 at 01:19:13AM +0100, Bob wrote:
 
 However, it appears they have now blocked 4chan.org's /b/ - Random
 imageboard :
 http://img.4chan.org/b/imgboard.html
 It must be admitted that /b/ is psuedononymous, anarchic and populated
 mostly by stupid memes, trolling and deliberately tasteless / offensive
 content. In many ways /b/ is a giant deliberately stupid in-joke not
 meant to be taken seriously, aside from an occassional thread where
 people use /b/'s anonymity to ask questions about private matters they
 feel they cannot discuss elsewhere.
 
 In any case, /b/ is most definetely a legitimate and legal forum which
 has been running for years, is moderated, and is in full compliance
 with United States law since that's where it's hosted.
 (4chan itself is essentially a western clone of the Japanese 2ch.net /
 2chan.net, amongst the most popular sites in Japan. 4chan is therefore
 very well known by anime fans etc.)
 
 It seems that the IWF have blocked /b/ on the basis that it is a child
 porn site. This is clearly not the case. Yes, *very occasionally* some
 moron posts CP  on /b/ ... which typically lasts about 30 seconds
 before it's deleted and they're permabanned. 4chan is no different from
 any other public forum which allows image posting in this regard, it
 does not condone such activity and obviously if there was any evidence
 that it did the US authorities would shut it down instantly.
 
 At present the blocking, which is being done by URL, is not very well
 implemented and there are ways around it. Furthermore not all UK ISPs
 use Cleanfeed ... yet. However, I hope you will agree that it is very
 worrying that legitimate internet forums appear to be being censored in
 the UK secretly and pretty much unaccountably *right now*. I have to
 wonder how long it will be before our authoritarian government decides
 we should standardise on this industry best-practice for its own
 ends.
 
 Further references :
 http://dis.4chan.org/read.php/newpol/1150560346/1-40
 http://dis.4chan.org/read.php/img/1149953763/1-40
 http://www.4chan.org/banned.php  -- some BT users redirected here
 
 I suppose all this at least serves as inspiration to continue work on
 freenet :(
 
 Bob
 
 
 
   
 ___ 
 Try the all-new Yahoo! Mail. The New Version is radically easier to use ? 
 The Wall Street Journal 
 http://uk.docs.yahoo.com/nowyoucan.html
 ___
 chat mailing list
 chat@freenetproject.org
 Archived: http://news.gmane.org/gmane.network.freenet.general
 Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
 Or mailto:[EMAIL PROTECTED]
 

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] freenode compromized

2006-06-27 Thread Matthew Toseland
http://it.slashdot.org/article.pl?sid=06/06/25/1440236from=rss

The world's largest FOSS IRC network, FreeNode, was hijacked (for lack
of a better term) by someone who somehow got a hold of the privileges of
Robert Levin, AKA lilo, the head honcho of FreeNode and its parent
organization, PDPC. To make matters worse, the passwords of many users
may have been compromised by someone posing as NickServ, the service
that most clients are configured to send a password to upon connecting,
while they reconnected to the servers that hadn't been killed. Of
course, if someone was able to nab lilo's password, every user password
may have been ripe for the taking. The details are still unknown, but
these events raise scary questions about the actual security of FreeNode
and other organizations like it.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] How to circumvent China's firewall

2006-06-27 Thread Matthew Toseland
Very cool. So they don't actually run enormous transparent proxies? If
so, how come mention of the blacklisted word 'freenet' on IRC is
permitted?

Obviously the firewall will be improved in the future, and the TTL fix
will not permanently fix the problem, as the TTL can be stolen from the
packet containing the forbidden term. (It would help with more general
DoSs of course).

On Tue, Jun 27, 2006 at 09:51:57PM +0200, David 'Bombe' Roden wrote:
 Bruce Schneier recently posted this:
 
 http://www.schneier.com/blog/archives/2006/06/ignoring_the_gr.html
 
 Richard Clayton is presenting a paper (blog post here) that discusses 
 how to defeat China's national firewall:
 
 ...the keyword detection is not actually being done in large routers 
 on the borders of the Chinese networks, but in nearby subsidiary 
 machines. When these machines detect the keyword, they do not actually 
 prevent the packet containing the keyword from passing through the main 
 router (this would be horribly complicated to achieve and still allow 
 the router to run at the necessary speed). Instead, these subsiduary 
 machines generate a series of TCP reset packets, which are sent to each 
 end of the connection. When the resets arrive, the end-points assume 
 they are genuine requests from the other end to close the connection -- 
 and obey. Hence the censorship occurs.
 
 However, because the original packets are passed through the 
 firewall unscathed, if both of the endpoints were to completely ignore 
 the firewall's reset packets, then the connection will proceed 
 unhindered! We've done some real experiments on this -- and it works 
 just fine!! Think of it as the Harry Potter approach to the Great 
 Firewall -- just shut your eyes and walk onto Platform 9??.
 
 Ignoring resets is trivial to achieve by applying simple firewall 
 rules??? and has no significant effect on ordinary working. If you want 
 to be a little more clever you can examine the hop count (TTL) in the 
 reset packets and determine whether the values are consistent with them 
 arriving from the far end, or if the value indicates they have come 
 from the intervening censorship device. We would argue that there is 
 much to commend examining TTL values when considering defences against 
 denial-of-service attacks using reset packets. Having operating system 
 vendors provide this new functionality as standard would also be of 
 practical use because Chinese citizens would not need to run special 
 firewall-busting code (which the authorities might attempt to outlaw) 
 but just off-the-shelf software (which they would necessarily 
 tolerate).
 
 ---
 
 Interesting.
 
   David



 ___
 chat mailing list
 chat@freenetproject.org
 Archived: http://news.gmane.org/gmane.network.freenet.general
 Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
 Or mailto:[EMAIL PROTECTED]

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Arguments against the Darknet

2006-06-26 Thread Matthew Toseland
On Sat, Jun 24, 2006 at 10:22:31AM -0400, Colin Davis wrote:
 I'd like to use this opportunity to disagree with the current .7  
 strategy of the darknet- I've done it before, but this is the Chat  
 list, so It's not Off-topic to have a discussion about it.
 
 I'd like to start of by admitting that I probably know the least  
 about the subject, compared with anyone else in the room. This isn't  
 a pissing match, I just want freenet to be the best it can be.
 We all do. That's why we're here.
 
 The darknet model should be supplemented with an opennet SOON- I  
 personally know 4 friends of mine who I have spoken with in person,  
 who have not wanted to use freenet in it's current state. I'll  
 attempt to discuss some concerns below.

in its current state

We've been getting these stories ever since freenet began. There isn't
enough warez, there isn't enough straight/gay/whatever porn, there just
isn't any original content, there's too much child porn, it's too slow...
What exactly were his reasons?
 
 I've tried to intend my thoughts below, for ease of reading.
 
 
 
 The first is the idea of trust in Freenet .7 is complete- You argue  
 that you should only join with your real life friends,
 That your peers are people that you trust, but this breaks down for a  
 few reasons.
   1) The first is that it doesn't fit the Social networking model that 
 we're looking to model after.
   In Milgrim's experiments (which, btw, were seldom as successful as  
 his first attempt), he found that the best results came from the
   occasional long distance link.

Best results come from many short links and the **occasional** long link.
If it was all long links then it wouldn't work. We know this because it
has been simulated, and mathematically modelled.

   a) In real life we often have these- For example, I 
   am  4 steps  from Bill Gates- My Pastor knows a friend 
 of a friend, etc.

Right. I have a shortish path to the president of any country in the
world. :) But this is not necessarily a high capacity path! So yes, some
traffic might be routed through your pastor - but most of it would be
routed around him rather than through him.

Freenet does NOT rely on hubs. Watch oskar and ian's presentation
again. If you cut the hubs out of the orkut data, the network is still
navigable - in fact the probability of success increases, although the
path length increases slightly too. Freenet can use hubs - but because
of load issues, we may have to ensure that it doesn't in general use
hubs more than absolutely necessary.

   The problem is, these long distance links, 
   such as My Pastor,  aren't necessarily people I 
 trust on a deep level.

Well, I do trust my pastor, though I disagree with him on many things.
If I go through some of my other church friends to him then there is a
high trust path.

   b) These weak links are often Largely grouped- 
   Again, My Pastor-  There are several hundred people in 
 his congregation.
   If each of these people linked to him, we'd 
   get ubernodes, which  you disagree with (See my 
 other e-mail).

Well, he probably doesn't have the sort of internet connection he'd
need to sustain that sort of ubernode, and he'd become a Big Fat Target
by attempting to do so. This is the problem with scale free networks -
networks which are navigable precisely because they have a power law
distribution of node degrees - they are extremely vulnerable. Whereas
small world networks (with triangle property/kleinberg clustering) are
very resilient.

   2) Trust isn't universal
   a) The freenet .7 model gives them complete trust- I 

At present. We will improve on the current rather low level of security
against treachery, but you will always be far more vulnerable to your
direct peers than to somebody you're not connected to.

   trust my  flatmate not to download CP, but I don't 
 trust him not to 
 download an
   illegial MP3 file. Do I link with him? Do I 
   need to find people  with whom I agree about 
 everything?

Not necessarily; you have to make your own judgement, just as you would
if you were offering to share your internet connection with him over
wifi.

   b) People are desperate- Think about our chinese 
   dissident- He  wants to learn more about the Western 
 world, and to write 
 and publish
   about democracy. So he links with other 
   people who are writing  about democracy.. He 
 wants the information. But he 
 knows that a  number of them
   are otherwise untrustworthy people. Even 
   though they all share a  love of democracy, 

Re: [freenet-chat] Arguments against the Darknet

2006-06-26 Thread Matthew Toseland
On Sat, Jun 24, 2006 at 05:50:34PM +0100, Roger Hayter wrote:
 
 FWIW, I agree with all your points. And I would add that no-one is more 
 than 2 steps away from a police spy - I find random connection *adds* 
 plausible deniability:  although not (and this is a valid point that has 
 been made by the developers) if running Freenet is itself a crime.  But 
 if every friend has at least one friend who is a police spy, they are 
 going to know you are running Freenet anyway.  The only defence is to 
 have so many people running Freenet that they don't bother to prosecute 
 unless they already suspect you of something, in which case they will 
 always find something to prosecute you for if they want to anyway.

Having a network of informers is several orders of magnitude more
expensive than harvesting, or than compromizing the network with cancer
nodes, which would pretend to be thousands of nodes, and get connected
to everyone without having to lay out for a network of informants. This
is how security works: you make it expensive, not impossible, to get in.
The more expensive it is the less likely it is that they will try or
succeed.
 
 But is not the routing model for Freenet 0.7 dependent on some sort of 
 affinity network rather than the old open/random connection model?

No, opennet is technically feasible, but it is technically difficult.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Arguments against the Darknet

2006-06-26 Thread Matthew Toseland
On Sun, Jun 25, 2006 at 06:15:04PM -0400, Colin Davis wrote:
 
 If/when we do opennet people will use that instead till it gets
 blocked(it will happen eventually), then we're back to trying to get
 the darknet working for everyone again. If most people will use the
 opennet till it's impossible to do anymore there will be very few and
 probably small seperate darknets, a lot of data will be lost and time
 will need to be spent building up the net again as a darknet.
 
 I disagree- For one, Freenet .5 isn't blocked-

Freenet 0.5 *is* blocked _today_ in China. It has been since August last
year. The firewalls being erected by people such as BT and initiatives
such as Cleanfeed will make enforcement easy, and legislation such as
the DADVSI and quite possibly IPRED2 will make it illegal to build or
distribute filesharing tools which don't provide a central blacklist.

 For another, If  
 they're blocking freenet, they can block a darknet almost as easily.

Absolutely not true. Freenet 0.5 was blocked in China because it has
predictable connection setup bytes. Freenet 0.7 doesn't, and darknet
makes steganographic transports much easier and more useful. Opennet can
be blocked regardless of steganography by simple harvesting and then
blocking on the firewall.

 Keep in mind, you do NOT need to expose network topography for a  
 darknet.
 
 -Colin
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Arguments against not utilizing Ubernodes

2006-06-26 Thread Matthew Toseland
On Sat, Jun 24, 2006 at 10:34:41AM -0400, Colin Davis wrote:
 
 1) Users tend to prefer Speed to Anonymity-

Then they can use bittorrent. For the most popular files, bittorrent
will always be faster than Freenet. For medium popularit files it is
possible that they will be findable, and downloadable, considerably
faster than on bittorrent, because of its being a distributed datastore.

   a) Look at the Success of networks like Bittorrent- All the peers  
 downloading a file are completely exposed, but people enjoy using it  
 because they can get a file quickly.

Until the RIAA busts the tracker.

   b) While the focus of Freenet is different, we can still let USERS  
 make that tradeoff.

We do ! We can't stop people from connecting to ubernodes. And whatever
measures we impose for the user's and the network's protection can be
overridden by the user, as he has the source code. However, it is
entirely legitimate for us to advise against users using ubernodes, and
even to design the load balancing system in such a way as to not accept
more requests than we can actually *route*, as opposed to dumbly forward
to our one and only ubernode.

   I) There are a lot of tweaks that could be made, to make 
   things  faster.
   * Increasing the check for new editions 
   exponentially, for instance
   * Or fully utilizing ubernodes
   II) As it is, there are people, such as SinnerG, Apophis, 
   and  myself, who are BEGGING to make freenet faster!
 
 2) Freenet is about giving the users control.
   a) The project should give users control whenever possible, assuming 
 it doesn't remove significant security from others
   I) If a user wants to route their data through a fast 
   server,  shouldn't we give them that option?

We do. There is nothing stopping you from connecting to an ubernode as
of now.
   
   b) Trust levels, as mentioned by Toad on the Devl mailing list are a 
 good start, but there are more trusts that can be done.
   I) Lets say I trust my friend quite a bit, and set him to a 
   high  trust level.. Why not fully utilize his connection to me, 
 if it's  
 otherwise empty?

What do you mean by fully utilize ? The amount of traffic going
through the link is limited by several factors:
- The capacity of the link (when you factor in all the other users of
  that path).
- The capacity of downstream nodes.
- The number of requests which are answered locally by the node.
- The current routing situation.

   II) If I've set him to a high trust level, I'm presumably OK 
 routing more requests through his node.
   * As it is, requests are more or less random among 
   non-backed off  peers.

This is absolutely not true. Requests are forwarded to the node closest
to the target (which isn't backed off), period. We have seen what
happens when performance is the primary criterion for routing in 0.5. It
sucks. It is vital that the network has real routing. That is the only
way it can scale beyond the capacity of a single ubernode (a few
terabytes at most, and on a big network it won't have enough bandwidth
either), and into more interesting realms.

   * If I trust my friend, I'd be OK preferring to send 
   through him

Routing your requests to him, even though they are supposed to go
somewhere else, would be misrouting. This would cause the request to
either not find the data it was looking for (or on inserts to send it
completely the wrong place so it isn't findable later), or at the very
least to travel more hops than it has to. The result is that the whole
network has to handle more load. The result of that is that the whole
network becomes overloaded.

   c) Implementing a NG-style, stochastic modeling system ensures that  
 users are properly utilizing resources.

See above. Performance isn't everything. You also have to distribute
load, and especially storage, and the way to do that is through routing.
 
   
 
 3) The current strategy is fighting a symptom, not the problem.
   
   a)  We can already achieve Ubernode-like results using bands of  
 smaller nodes.
   I) If I set up 10 mini-nodes, all inner linked, and each 
   connected  to 10-15 peers, I could harvest just as much data on 
 net network
   II) The network would see these as different nodes, and 
   fully  utilize them.
   III ) Multiple IP addresses to run on are cheap ;)

Sure, you can exploit #freenet-refs just as you can exploit any other
harvestable channel. So what?
 
   b) The problems with Ubernodes are mitigated if the data is stored  
 other places as well.
   I) If freenet used proper NG-style modeling, it would always 
   draw  from the fastest source, 

Re: [freenet-chat] Arguments against the Darknet

2006-06-26 Thread Matthew Toseland
On Mon, Jun 26, 2006 at 04:06:50PM -0400, [EMAIL PROTECTED] wrote:
 
  in its current state
 
 Sure- I can only look at the present. I'm usre that hte project has plans
 for fixing things, but I'm just trying to express the way I see it.
 
  What exactly were his reasons?
 
 I talked to two physical friends of mine- I tried to outline their answers
 below- One said that he didn't want to make manual connections, because he
 didn't like the inconvienience, and the potential security risk of linking
 with someone bad. The other said that he didn't want to use it because
 even thought it was anonymous, he'd rather stick to faster connections.

In the latter case, those people won't join until we either have really
compelling content, all the alternatives are shut down, or freenet is
really really fast. This is a problem even with opennet, although
opennet may be a bit faster in terms of large file transfer rates due to
more connections (or it may not).
 
  Best results come from many short links and the **occasional** long link.
  If it was all long links then it wouldn't work. We know this because it
  has been simulated, and mathematically modelled.
 
 Sure- I'm not advocating all long links!
 I think that's the difference in the way we're looking at this.
 
 I think it's possible to create an opennet ON TOP of the darknet
 infrastructure.
 Essentially, have nodes connect to one another in small groups, with the
 Occasional long link, rather than a .5 style free for all.

How would that work? As far as I know the only proposals for opennet are
to build one into the node based on LRU and destination sampling, or to
hack something up based on rendezvous sites (and IRC channels!).
 
  Not necessarily; you have to make your own judgement, just as you would
  if you were offering to share your internet connection with him over
  wifi.
 
 The problem is, There's a lot fewer people I'm willing to share my
 internet connection with, than I'm willing to peer with. If everyone was
 held to the share-the-internet connection standard, there would be very
 few links.

Legally you are not held responsible for content downloaded over your
internet link if you can show that somebody else downloaded it without
your knowledge or encouragement. You can be asked to do a wiretap of
course. In practice this may not always be the case on the ground, but
that's more a matter of the court of public opinion than the law. And
here we are talking about encrypted connections, with much less
possibility of finding out what your neighbours are looking at, and
therefore much less liability for it - and also fewer opportunities for
monitoring by outsiders such as the police.
 
  Well, what's the alternative? There isn't one in a hostile regime.
  Either you connect to people you trust, or you don't connect to anyone.
  Because an opennet is harvestable, and with a national firewall (coming
  soon to a seemingly democratic country near you), it is very easy to
  take sanctions against known opennet nodes - blocking foreign ones
  completely, and suspending the internet access of domestic ones (or
  worse).
 
 I think a split model is the right way to go- We keep the existing
 darknet, and we still use it as the basis for routing, but we set up ways
 to create clustered groups without user interaction.
 So a darknet group would still be able to talk to an opennet group-
 They're still part of the same network, it's just a matter of establishing
 relationships individually or automatically.

Ummm, I don't see what you are proposing here. Either there is free
exchange of references or there isn't... are you talking about
connecting to nodes a few darknet hops away? That might be a
possibility, without opening up the network to global harvesting; it's
been discussed before... Anyway you'd need some darknet refs first...
 
 The beniefit of doing it this way, is that it adds some level of plausible
 deniablity WRT establishing connections- If connections in the darknet can
 be established automatically, then you can say No, Mr. Evil bad guy, I
 didn't connect to him intentionally, I turned Opennet=on, and so did he,
 and we connected to eachother automatically.

Alternatively, Mallory can just pretend to be 10,000 nodes (with 10,000
cheap IP addresses), and not only harvest but actually connect to every
node. Then he can do all sorts of fun things.

No Mr Evil Bad Guy, I only knew him through the local church / golf
club. I had no idea he was a chicken lover / dissident / whatever.

If they want to villify you they'll find some way to do it. Read Kevin
Mitnick's story sometime. There are very good reasons to expect freenet
to be banned and/or blocked in more countries in future, and there are
not unreasonable grounds to expect some first world countries to be
amongst the list.
 
 In truth, you could have both connected manually, or connected manually
 WHILE Opennet=on.

Darknet peers are added manually and will not be removed by opennet.
Also 

Re: [freenet-chat] Scientology strikes again

2006-06-24 Thread Matthew Toseland
It used to be a takedown notice. Somebody probably has a copy of before
(from google) and after saved somewhere.

On Sat, Jun 24, 2006 at 10:29:28AM -0700, Josh Steiner wrote:
 what was this?  it just redirects to http://www.scientology.org/
 
 Matthew Toseland wrote:
 http://codebot.org/notice.html
 
 Thanks to ian for finding this.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Scientology strikes again

2006-06-24 Thread Matthew Toseland
On Sat, Jun 24, 2006 at 11:34:55AM -0700, Ian Clarke wrote:
 
 On 24 Jun 2006, at 10:29, Josh Steiner wrote:
 what was this?  it just redirects to http://www.scientology.org/
 
 Taking a website critical of you, and redirecting it to your own  
 website these guys have no sense of shame at their blatant  
 censorship effort, but I guess believing in intergalactic aliens does  
 weird things to your sense of right and wrong.

I don't think their beliefs have that much to do with it actually. :|

I wonder if advocating mirroring xenu.org, or the fishman papers, to
freenet is a violation of IPRED2... :)
 
 Ian.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] IWF Cleanfeed ISP-level censoring legitimate sites from UK users

2006-06-23 Thread Matthew Toseland
Ugh. I'm going to have to write to my MP about that...

On Fri, Jun 23, 2006 at 04:05:31PM +0100, Bob wrote:
 --- Matthew Toseland [EMAIL PROTECTED] wrote:
 
  Wait till they start getting court orders from the Church of
  Scientology! You can block this illegal content; you block this other
  illegal content, therefore you must block all illegal content and in
  particular you must block copyright infringing, libellous, state
  secret
  (look at the d-notices site that had to move outside the UK), and so
  on
  sites. Slippery slope: the road to hell is paved with good (and
  uninformed) intentions.
 
 Indeed, they don't seem too concerned about retaining their 'common
 carrier' status for some reason do they?
 
 Although the IWF is nominally an industry group, its existence and
 policy appear to be very much driven by the Home Office - i.e. filter
 yourselves or we'll legislate it. Consider the implications of this
 Commons answer from last Monday (19th June 2006) :
 
 http://www.publications.parliament.uk/pa/cm200506/cmhansrd/cm060619/debtext/60619-0540.htm#column_1052
 
 I have recently set the UK internet industry a target to ensure that
 by the end of 2007, all internet service providers offering broadband
 internet connectivity to the UK public prevent their customers from
 accessing those websites (...) We expect 90 per cent. of internet
 service providers to have blocked access to sites abroad by the end of
 2006. The target is that by the end of 2007 that will be 100 per cent.
 We believe that working with the industry offers us the best way
 forward, but we will keep that under review if it looks likely that the
 targets will not be met.
 
 In other words, it would appear that secret, known-to-be-fallible and
 largely unaccountable internet censorship is going to become
 *compulsory* for all UK 'broadband' access, either psudeo-voluntarily
 or via legislation as formal state internet censorship. In either case
 the end result is much the same of course, and the potential for
 slippery-slope extension very real, particularly given this
 government's poor track record on civil liberties.
 
 
  On Mon, Jun 19, 2006 at 01:19:13AM +0100, Bob wrote:
   You may have heard of the UK's Internet Watch Foundation, a jolly
  UK
   ISP industry group that operates Cleanfeed. This is a UK internet
   censorship system that blocks arbitrary sites at ISP level by
  returning
   fake errors (404 etc), much like China's great firewall. Their
  blocking
   database is secret; it's unobtainable unless you're an ISP and pay
  to
   subscribe to them, which requires signing a legally binding NDA.
  Major
   UK ISPs such as BT and NTL use Cleanfeed. As a private industry
  group
   they are essentially unaccountable.
   
   They claim that their database is for blocking child abuse
  websites
   only :
   http://www.iwf.org.uk/media/news.archive-2004.39.htm
   
   However, it appears they have now blocked 4chan.org's /b/ -
  Random
   imageboard :
   http://img.4chan.org/b/imgboard.html
   It must be admitted that /b/ is psuedononymous, anarchic and
  populated
   mostly by stupid memes, trolling and deliberately tasteless /
  offensive
   content. In many ways /b/ is a giant deliberately stupid in-joke
  not
   meant to be taken seriously, aside from an occassional thread where
   people use /b/'s anonymity to ask questions about private matters
  they
   feel they cannot discuss elsewhere.
   
   In any case, /b/ is most definetely a legitimate and legal forum
  which
   has been running for years, is moderated, and is in full compliance
   with United States law since that's where it's hosted.
   (4chan itself is essentially a western clone of the Japanese
  2ch.net /
   2chan.net, amongst the most popular sites in Japan. 4chan is
  therefore
   very well known by anime fans etc.)
   
   It seems that the IWF have blocked /b/ on the basis that it is a
  child
   porn site. This is clearly not the case. Yes, *very occasionally*
  some
   moron posts CP  on /b/ ... which typically lasts about 30 seconds
   before it's deleted and they're permabanned. 4chan is no different
  from
   any other public forum which allows image posting in this regard,
  it
   does not condone such activity and obviously if there was any
  evidence
   that it did the US authorities would shut it down instantly.
   
   At present the blocking, which is being done by URL, is not very
  well
   implemented and there are ways around it. Furthermore not all UK
  ISPs
   use Cleanfeed ... yet. However, I hope you will agree that it is
  very
   worrying that legitimate internet forums appear to be being
  censored in
   the UK secretly and pretty much unaccountably *right now*. I have
  to
   wonder how long it will be before our authoritarian government
  decides
   we should standardise on this industry best-practice for its
  own
   ends.
   
   Further references :
   http://dis.4chan.org/read.php/newpol/1150560346/1-40
   http://dis

[freenet-chat] New mailing list: darknet-tools

2006-06-21 Thread Matthew Toseland
We have created a new mailing list, the darknet-tools list. This is for
discussion of tools for reference exchange. Primarily by this I mean:
- Plugins for IRC clients, IM clients, etc to make it easy to exchange
  node references - generally with people you already know.
- Functionality needed by the node to support such plugins.
- Standards for such plugins (e.g. there may be 10 different IRC
  plugins).
- Anything else related to expanding the darknet.

I have two volunteers to write IRC plugins. What would be really nice
would be some plugins for instant messaging systems, as these are a
close match to what we are trying to do; AIM, GAIM, etc, have plugin
APIs, we just need people to write them. Anyone interested in getting
involved - you don't have to know java! - subscribe to the list and
explain your interest. People who have prior experience of writing
plugins for these things are especially welcome, but if you are
interested in the topic then please subscribe to darknet-tools.

http://emu.freenetproject.org/cgi-bin/mailman/listinfo/darknet-tools/
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Scientology strikes again

2006-06-20 Thread Matthew Toseland
http://codebot.org/notice.html

Thanks to ian for finding this.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Scientology strikes again

2006-06-20 Thread Matthew Toseland
On Wed, Jun 21, 2006 at 11:36:29AM +1200, David McNab wrote:
 Matthew Toseland wrote:
  http://codebot.org/notice.html
  
  Thanks to ian for finding this.
 
 Time for an updated scientology freesite in 0.7, including the 'South
 Park' episode Trapped In The Closet.

I wonder if that comes under fair use...?
 
 Let the thetan-bots try to take *that* down!

:)
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] New Scientist article on harvesting social network sites (analysis)

2006-06-08 Thread Matthew Toseland
by knowing about a darknet link.

On Thu, Jun 08, 2006 at 01:40:40PM +0100, Matthew Toseland wrote:
 Page 30-31, New Scientist issue 2555, 10 June 2006.
 Keep out of MySpace: Social networking websites could be the latest
 target of the US National Security Agency
 
 New Scientist has discovered that the Pentagon's National Security
 Agency, which specializes in eavesdropping and code-breaking, is funding
 research into the mass harvesting of the information that people post
 about themselves on social networks. And it could harness advances in
 internet technology - specifically the forthcoming semantic web
 championed by the web standards organization W3C - to combine data
 from social networking websites with details such as banking, retail and
 property records, allowing the NSA to build extensive, all-embracing
 personal profiles of individuals.
 ...
 Meanwhile, the NSA is pursuing its plans to tap the web, since phone
 logs have limited scope. They can only be used to build a very basic
 picture of someone's contact network, a process sometimes called
 connecting the dots. Clusters of people in highly connected groups
 become apparent, as do people with few connections who appear to be
 intermediaries between such groups. The idea is to see by how many links
 of degrees separate people from, say, a member of a blacklisted
 organization.
 
 By adding the online social networking data to its phone analyses, the
 NSA could connect people at deeper levels, such as taking flying
 lessons. Typically online social networking sites ask members to enter
 details of their immediate and extended circles of friends, whose blogs
 they might follow. People often list other facets of their personality,
 including political, sexual, entertainment, media and sporting
 preferences too. Some go much further, and a few have lost their jobs by
 publicly descibing drinking and drug-taking exploits...
 
 You should always assume anything you write online is stapled to your
 resume. People don't realise you get Googled just to get a job interview
 these days,, says [ PGP chief security officer ] Callas.
 
 Other data the NSA could combine with social networking details includes
 information on purchases, where we go (available from cellphone
 records...) and what major financial transactions we make, such as
 buying a house.
 
 Right now this is difficult to do, because today's web is stuffed with
 data in incompatible formats. Enter the semantic web, which aims to iron
 out these incompatibilities over the next few years via a common data
 structure called the Resource Definition Framework...
 
 RDF turns the web into a kind of universal spreadsheet that is readable
 by computers as well as people, says David de Roure at the University
 of Southampton, UK, who is an adviser to the W3C. It means you will be
 able to ask a website questions you couldn't ask before, or perform
 calculations on the data it contains
 
 [the NSA]'s interest in [harvesting the semantic web] is evident in a
 funding footnote to a research paper delivered at the W3C's WWW2006
 conference in Edinburgh, UK, in late May.
 
 That paper, entitled Semantic Analytics on Social Networks, by a
 research team lead by Amrit Sheth of the University of Georgia in Athens
 and Anupam Joshi of the University of Maryland in Baltimore reveals how
 data from online social networks and other databases can be combined to
 uncover facts about people. The footnote said the work was part-funded
 by an organization called ARDA.
 
 ... Chief among ARDA's aims is to make sense of the massive amounts of
 data the NSA collects - some of its sources grow by around 4 million
 gigabytes a month.
 ...
 So the team developed software that combined data from the RDF tags of
 online social network Friend of a Friend (www.foaf-project.org), where
 people simply outline who is in their circle of friends, and a
 semantically tagged commercial bibliographic database called DBLP, which
 lists the authors of computer science papers.
 
 Joshi says their system found conflicts of interest between potential
 reviewers and authors pitching papers for an internet conference. It
 certainly made relationship finding between people much easier, Joshi
 says. It picked up softer [ non-obvious ] conflicts we would not have
 seen before.
 
 The technology will work in exactly the same way for intelligence and
 national security services and for financial dealings, such as detecting
 insider trading, the authors say. Linking who knows who with
 purchasing or bank records could highlight groups of terrorists, money
 launderers of blacklisted groups, says Sheth.
 
 ... [ ARDA renamed to Disruptive Technologies Office ... ]
 ... [ references to the Total Information Awareness project, which was
 shelved, but elements continue in the September 2003 Defence
 Appropriations Act ] ...
 
 Privacy groups worry that automated intelligence profiling could sully
 people's reputations or even lead ot miscarriages

[freenet-chat] My GPG key has changed

2006-05-29 Thread Matthew Toseland
My GPG key has changed. I apologize if you see this as spam. :) The new
one, and the signature from the old one, are attached.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


keys
Description: Binary data


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Towards a Freenet Filesystem

2006-05-23 Thread Matthew Toseland
On Mon, May 22, 2006 at 08:03:29PM -0400, Joel Salomon wrote:
 On 5/22/06, Matthew Toseland [EMAIL PROTECTED] wrote:
 On Mon, May 22, 2006 at 06:12:04PM -0400, Joel Salomon wrote:
  I don't like the idea of the MIME type being the first line of the
  file; it's something that will have to be stripped when the file is
  moved to the rest of the system or worked on by standard programs.
 
 It can be an extended attribute, no? Doesn't FUSE support these now?
 
 If the MIME type is essential to Freenet's handling of the file, have
 it in a separate file so the concept is portable to OSes beyond
 Linux/FUSE.  If it's just a frill, put it in an extended attitbute if
 you like, but not in the file text itself.

It's essential _to fproxy_ for safe handling of files. For many other
uses it's not essential.
 
 Oh and you shouldn't have to mkdir for a get!
 
 Why not?  The directory is just an abstraction in memory; no disc
 directory is being created.  (Unless FUSE has some fundamental design
 flaws.)

Well sure but it's more intuitive if you are able to just do
/freenet/[EMAIL PROTECTED] - or at least /freenet/quick/[EMAIL PROTECTED] (I 
accept
that some files will take *ages* to fetch and so need a different API).
 
  The influence of Plan 9 (the original source of user-space
  filesystems) may be visible here.

Of course. :)
 
 --Joel
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] [EMAIL PROTECTED]: Moving irc.debian.org to OFTC]

2006-05-23 Thread Matthew Toseland
This is likely relevant to many here.

- Forwarded message from Steve McIntyre [EMAIL PROTECTED] -

From: Steve McIntyre [EMAIL PROTECTED]
To: debian-devel-announce@lists.debian.org
Subject: Moving irc.debian.org to OFTC

For a long time, irc.debian.org has been provided as a service by
Freenode [1], the well-known Free Software friendly IRC network.
However, as time has passed, more and more of our discussions have
instead been taking place on OFTC, the Open and Free Technology
Community [2]. In recognition of that, we have decided to move the
irc.debian.org alias over to use OFTC. OFTC is also a sister
organisation of Debian, as both are supported and represented by
Software in the Public Interest, Inc. [3]

We wish to thank Freenode for their support over the years, and wish
them every success in the future.

IRC clients configured to connect to irc.debian.org (as with most IRC
clients packaged in Debian) should need no changes by users wishing to
follow the changeover, but long-running clients may need to be
reconnected or restarted. Developers will be on hand in most of the
common development channels on both networks in case any help is
needed.

The date of this network changeover will be Sunday the 4th of
June. The change may take a few hours to propagate through the DNS
system on that day.

[1] http://freenode.net/
[2] http://www.oftc.net/oftc/
[3] http://www.spi-inc.org/

-- 
Steve McIntyre, Cambridge, UK.[EMAIL PROTECTED]
Further comment on how I feel about IBM will appear once I've worked out
 whether they're being malicious or incompetent. Capital letters are forecast.
 Matthew Garrett, http://www.livejournal.com/users/mjg59/30675.html



- End forwarded message -

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Towards a Freenet Filesystem

2006-05-22 Thread Matthew Toseland
On Mon, May 22, 2006 at 06:12:04PM -0400, Joel Salomon wrote:
 On 5/22/06, David McNab [EMAIL PROTECTED] wrote:
   /keys/[EMAIL PROTECTED]
  - performs a GET of the given key from freenet, and allows it
to be read like a file. First line is mimetype\n
   /privatekeys/[EMAIL PROTECTED]/name
  - the filename '[EMAIL PROTECTED]' is the private key
corresponding to /keys/[EMAIL PROTECTED]/name
  - reading from this file produces a single line, the equivalent
public key
  - writing to this file performs a freenet PUT. First line written
should be mimetype\n, then the raw key data
 
 I don't like the idea of the MIME type being the first line of the
 file; it's something that will have to be stripped when the file is
 moved to the rest of the system or worked on by standard programs.

It can be an extended attribute, no? Doesn't FUSE support these now?

I believe there are some problems with Reiser4-style file-as-directory,
otherwise that would be perfect.

Oh and you shouldn't have to mkdir for a get!
 
 The influence of Plan 9 (the original source of user-space
 filesystems) may be visible here.
 
 --Joel
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Web-of-trust questions

2006-05-19 Thread Matthew Toseland
On Fri, May 19, 2006 at 09:36:13PM +0200, Helge Preuss wrote:
 
 One, can't everybody discover you run freenet by doing a portscan on
 your computer? I assume that would be a more efficient way to
 mass-detect freenet nodes than smuggling hostile nodes into freenet -
 especially if you're a government agency with broad resources.

No. They can't.
 
 Two, they mentioned that a major aim is to get many people to run
 freenet. That is obvious. But how would you achieve this goal if
 people are forced to *personally know* other people connected to the
 network? What do I do if I'm, say, a dissident with no special
 knowledge of computers and no hacker friends either?

You're in trouble in any case in that situation, because opennet *will
be harvested and blocked*. Last year the chinese blocked freenet 0.5, not
by harvesting, but by its protocol signature (that shouldn't be possible
with 0.7); they will harvest and block if they have to.

 Do I just give up
 and sit on my single freenet node? Or do I turn to a centralized
 service, thus rendering the web of trust obsolete?

The centralized service will be blocked.
 
 Maybe (probably) I misunderstood something. But I don't see how the
 two goals - trusted connections and wide coverage - go together. And
 given that you can be detected with a portscan anyway, isn't it
 practical just to forget about the web of trust and maximize coverage
 instead?

No, *you cannot be detected with a portscan*. And if we were *only*
interested in numbers, we'd be building Kazaa, not Freenet.
 
 Regards
 
 Helge
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] is frost killing freenet?

2006-05-16 Thread Matthew Toseland
On Wed, May 17, 2006 at 12:17:54AM +1200, David McNab wrote:
 Could it be that the intense query traffic generated by the n running
 frost instances is flooding freenet?

I don't think so. I don't think that Frost generates that much traffic.
 
 Is freenet really suited to frost (or vice versa)?

How exactly do you propose to eliminate Frost? Without eliminating 75%
of the freenet users community?

Just because it's not elegant doesn't mean it's not useful.
 
 Cheers
 David
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Re: [Tech] Tagging on mailing lists

2006-05-04 Thread Matthew Toseland
I think this would be too disruptive at this point; likely to result in
mass unsubscribes.

On Wed, May 03, 2006 at 03:47:48PM -0700, Ian Clarke wrote:
 This makes a pretty persuasive argument for ditching the [freenet- 
 devl] subject tags on mailing list emails:
 
   http://www.andrew.cmu.edu/user/qralston/writing/tagging-harmful/
 
 If nobody can come up with a good argument against this, I suggest we  
 follow its advice and remove the Subject tags.
 
 Ian.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Freenet code in Winny and Share

2006-05-04 Thread Matthew Toseland
On Thu, May 04, 2006 at 01:24:11PM -0300, Caco Patane wrote:
 All,
 
 Thanks to Michael Ingram, on the frontpage of http://www.slyck.com/
 there is an update about the article:
 
 The original version of this article stated that Winny and Share
 contained code from Freenet. As pointed out to Slyck.com by Freenet
 developers, this is not true. It is thought that Winny and Share were
 inspired by the design principles of Freenet, but do not contain any
 actual code and are both written in different programming languages.
 This article has been changed accordingly.
 
 He was very polite and friendly in our mail exchange. Also, he's now
 on the mailing list (anounce i think) to see news about Freenet.

Excellent... it will be some time before we can put alpha 2 out, but
good relations with journo's are always good.
 
 Saludos,
 Caco_Patane !
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Freenet code in Winny and Share

2006-05-03 Thread Matthew Toseland
Does somebody want to write to them? Once a fallacy is in the press it
will tend to get circulated ad infinitum...

On Tue, May 02, 2006 at 11:27:10PM -0300, Caco Patane wrote:
 Andlook at it here...
 
 http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1186169,00.html
 
 Both Winny and Share use code from the amorphous Freenet network to
 help obscure he link between IP addresses and shared folders, Slyck
 noted, offering a certain level of anonymity.
 
 Amorphous...
 
 Saludos,
 Caco_Patane !
 
 On 5/1/06, Florent Daigni?re (NextGen$) [EMAIL PROTECTED] wrote:
 * Ian Clarke [EMAIL PROTECTED] [2006-05-01 08:48:39]:
 
 
  On 1 May 2006, at 06:40, Caco Patane wrote:
 
  Look at this article were Freenet is named:
  http://www.slyck.com/news.php?story=1169
  
  Both Winny and Share use Freenet code to help obscure the link
  between IP addresses and shared folders, offering a certain level of
  anonymity.
  
  It's about leaked data to a P2P network.
  
  Cheers,
 
  Someone should correct that, to the best of my knowledge, neither of
  these applications reuse Freenet code.
 
  Ian.
 
 It's not even possible that they do as they are written in c++ and we use
 java ;)
 
 http://en.wikipedia.org/wiki/Winny
 http://en.wikipedia.org/wiki/Share_%28P2P%29
 
 NextGen$
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Freenet code in Winny and Share

2006-05-03 Thread Matthew Toseland
On Wed, May 03, 2006 at 01:23:23PM -0300, Caco Patane wrote:
 Does somebody want to write to them? Once a fallacy is in the press it
 will tend to get circulated ad infinitum...
 
 I've mailed the guy from 'slyck' telling him about the error in the
 articule. I let him know that if he want to ask something about
 Freenet, go to the IRC channel. Also, to let me know when the
 errata/correction is made.

Probably they use freenet-like algorithms, or did once... I think I've
heard that too...
 
 Saludos,
 Caco_Patane !
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] ressource utilization

2006-04-24 Thread Matthew Toseland
Check your freenet.ini. The default store size maximum is 1G, but you
can increase it. With regards to bandwidth usage, load balancing is
being worked on...

On Sat, Apr 22, 2006 at 03:04:42PM +0200, Lean Fuglsang wrote:
 Hi,
 I was wondering why freenet 0.7 doesn't use my bandwidth fully all the
 time (or fully utilise cpu/ram/hd). Also my store does not seem
 to be able to grow past 1GB.
 Shouldn't Freenet just send arbitrary packets around when it is
 'idling', e.g. when htl is reached on inserts? What is the plan for better
 utilizing ressources in the future?
 
 --Lean
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Will this work on a Mac powerbook G4?

2006-04-21 Thread Matthew Toseland
Yes, it should, although there may be some complications. Please try it,
and if you have problems, ask on [EMAIL PROTECTED] Oh and it's
polite to have some text in your messages as well as your subject line.
:)
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Re: Growing pains

2006-04-05 Thread Matthew Toseland
On Wed, Apr 05, 2006 at 03:31:42AM -0400, Joel Salomon wrote:
 
 If there's a security/anonymity hole in the plan I've laid out, please
 tell me.  The alpha darknet is not too early to start thinking about
 realistic connection procedures.

If you trust somebody on Frost, that doesn't automatically mean you want
to connect to them. Firstly, they get your IP address; they need to be
very trustworthy for this; far more than other connections, as they know
who you are on Frost. Secondly, it's possible that the connection will
be exposed by e.g. traffic analysis (although obviously this is very bad,
and we want to avoid it by means of alternate transports).
 
 --Joel
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Re: Growing pains

2006-04-04 Thread Matthew Toseland
On Tue, Apr 04, 2006 at 01:01:35PM -0400, Joel Salomon wrote:
 On 4/4/06, Joel Salomon [EMAIL PROTECTED] wrote:
  Does anyone see a problem with this idea?  Are encrypted Frost
  messages secure enough even while the darknet isn't quite dark?
 
 On IRC, Terrasque responded:
  Horovits, im paranoid :) and have a personal interest in security. I'd
  rather swap with random people over irc than with trusted people
  over freenet
 
 For those who have done the math and security calculations:  Whose
 risk is greater here?  Ought we to move to floppy disc and hidden drop
 exchange of refs?

The problem is people on Frost know what you've been doing on the
network, and can connect all your illegal libellous remarks with your IP
address.
 
 --Joel
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Re: Questions

2006-03-23 Thread Matthew Toseland
On Thu, Mar 23, 2006 at 11:27:52AM +0100, Martin Ottehall wrote:
 Thanks.
  
 Do you have to have alot of knowledge in Codes and such to be able to use 
 Freenet? I get the feeling that its a rather complicated system wich you have 
 to (partly) setup yourself.

No, 0.5 is reasonably easy to use. Even 0.7 doesn't have too steep a
learning curve, though some key apps are missing. Which are you attempting
to use?
  
 Re bandwidth, and fairness.. the main constraint is that if your node is
 really slow, e.g. because you have a low bandwidth limit, then nodes
 connected to your node will disconnect it in favour of better nodes.
 So if no nodes are connected to my node, i will not be able to Download?

Right.
  
 I havent installed it yet, so i have alot of quiestions since I dont know 
 much about it then. But Ill try it out soon.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] P2Pedia

2006-03-23 Thread Matthew Toseland
On Thu, Mar 23, 2006 at 09:30:02AM +0100, Gilbert R. R?hrbein wrote:
 Hi all.
 Look at this... 
 http://meta.wikimedia.org/wiki/P2P
 
 What do you think of that?

Torrent is fast for big files, it's not designed for webby stuff.
Freenet should be a good match, and would allow read-only access in
regimes which might block or filter wikipedia. Hopefully it will be a
bit faster in 0.7 than it is now. OTOH it's unreliable. :) It may be
useful to bundle files together...

There would not be a links problem with Freenet, at least not for the
latest version of the articles themselves.

IMHO it will eventually be possible to provide something like a Wiki
which has write support over Freenet... either with some sort of central
server maintaining the absolute latest up to date version (only really
needed for modifications), or with some more complex merging system a la
distributed RCS.

Volunteers are appreciated, and should contact the authors of the page.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Questions

2006-03-20 Thread Matthew Toseland
Hi! We cannot enforce a limit, since people can always edit the source
code, but Freenet 0.5 requires at least 101MB of disk space, and
defaults to 256MB. The limit may be a bit lower in 0.7 because of
smaller keys, or it may be quite a bit bigger (the test nodes had a
hard-coded datastore size of 1GB for a while; now it is configurable).

Re bandwidth, and fairness.. the main constraint is that if your node is
really slow, e.g. because you have a low bandwidth limit, then nodes
connected to your node will disconnect it in favour of better nodes.

On Mon, Mar 20, 2006 at 02:28:46PM +0100, Martin Ottehall wrote:
 Hi!
  
 Im doing a school thing about freenet and have some quiestions.
  
 Is there a minimum req. on how much space and bandwith you have to share?
 Whats the connection between share and recive? (I share X and can then only 
 recive X, or what?)
 More questions are to come.
  
 Thanks in Forehand!
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] frenet-fr.info is looking for a non-french owner

2006-03-16 Thread Matthew Toseland
On Thu, Mar 16, 2006 at 11:13:21PM +0100, Julien Cornuwel wrote:
 Hi there,
 
 http://www.freenet-fr.info is a french site that gives a lot of 
 documentation an help about Freenet.
 
 As you maybe know, French government is changing the copyright laws in a 
 quite drastic way :
 - DRMs are now protected by the law.

This is the case in the US and across the EU. It is not really a big
deal.

 - Avoiding them or giving a way to avoid them leads to 3 years of prison 
 and 300,000?.
 - P2P softwares could be considerated as forbidden by a conservative 
 judge because they permit the copy of copyrighted materials.

The problem is not that DRM is protected. It is that it is MANDATORY.
This may very well prohibit Freenet - but it could also prohibit Apache!
 
 Because of that, I'm looking for someone that doesn't live in France and 
 who would accept to become the official owner of the site. Of course, 
 I'd keep working on it and he would have nothing to do about it.
 
 Maybe Ian could accept to own freenet-fr.info as he already owns 
 freenetproject.org ?
 Anyway, I need help about that, I don't that site to disapear because 
 the majors achieved the corruption of a few law-bastards (I don't know 
 if it is correct english, but it is my feeling...).
 
 Regards
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] Talking in Berlin tomorrow about Freenet 0.7

2005-12-30 Thread Matthew Toseland
On Fri, Dec 30, 2005 at 01:11:23AM +0100, Ian Clarke wrote:
 Oskar and I are giving a talk at 2pm tomorrow in Berlin at the
 Berliner Conference Center, as part of the 22nd Chaos Communication
 Congress.  Unfortunately its a bit pricey, a day pass costs ?25, or
 ?10 for students, but there are plenty of interesting talks going on.

That's pretty cheap for a conference. Actually, because of certain
complications relating to eurostar tickets, it would have been
considerably cheaper for me to go to CCC than to go to FOSDEM. That is,
assuming I'd known a couple of months in advance.
 
 We spent today putting together quite a nice visual demo of the new
 Darknet stuff in Freenet 0.7 so hopefully it should be interesting and
 fun.  If anyone from these lists can make it, it would be good to see
 you so if you can attend, definitely find us and say hi afterwards
 ;)

I look forward to the slides/video. :)
 
 Ian.
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] France attempts to ban free software and non-DRM p2p

2005-12-21 Thread Matthew Toseland
Rough outline:
http://www.boingboing.net/2005/12/02/france_about_to_get_.html
FSF Europe, more detail:
http://www.fsffrance.org/news/article2005-11-25.en.html
Petition, if you are a french citizen:
http://eucd.info/petitions/index.php?petition=2
Send an open letter to the PM and President, if you are not:
http://www.eucd.info/index.php?2005/12/15/218-sending-an-open-letter-to-the-president-and-prime-minister-of-the-french-republic
(This may need some work)
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

[freenet-chat] Useful utility I just found

2005-12-13 Thread Matthew Toseland
NTP for windows: http://www.arachnoid.com/abouttime/
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] what you did as

2005-11-14 Thread Matthew Toseland
WTF?

On Mon, Nov 14, 2005 at 03:09:58PM +, sun moon wrote:
 
   ~
   
   what you did as 
   
   
   they throw bombs in london
paris burns
internet gets a dentist

   
we made you
   
   (  :-) i think on that  )
   
   ~
   
   
 
 
 sk
 [EMAIL PROTECTED]
   
 -
 To help you stay safe and secure online, we've developed the all new Yahoo! 
 Security Centre.
 ___
 chat mailing list
 chat@freenetproject.org
 Archived: http://news.gmane.org/gmane.network.freenet.general
 Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
 Or mailto:[EMAIL PROTECTED]

-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Re: [freenet-chat] deniable p2p

2005-11-07 Thread Matthew Toseland
On Mon, Nov 07, 2005 at 03:24:12PM +, Henry Gomersall wrote:
 I have been thinking for a while now about a method of creating 
 a deniable p2p network, that is still (of the order of) the 
 same speed as conventional open p2p networks. What follows is 
 the result of this thought process.

Most things have been suggested before... but lets have a look.
 
 Apologies if this is obviously trivial and pointless ;)
 
 This network would allow a user to upload a file. The file is converted 
 to pieces and these pieces are what reside on peers' machines. Any 
 given piece on a users machine can be a component in ANY file in the 
 network. That is, it can be a component in an arbitrary number of files.

Okay, so if I upload a 660MB file, I FEC it into a 1GB file, then I find
1GB of pre-existing content, put that in the manifest, then XOR the real
data with it and put that in as well, and insert that. That's what you
are talking about here, correct?

Lets ignore the issues with finding random content to XOR with, for now
(this might be a problem).

 This is where the deniability comes in. If a data chunk can be a 
 component in hundreds of entirely different files, then how can the 
 uploader be liable. Not only that, but the data is random. It has no 
 meaning by itself. Only when combined as part of a chain can it be 
 rendered into the original file. The only draw back of the whole system
 is that the user is required to download twice the total data. This is
 possibly offset by the potential gains in total file availability, 
 allowing users to host pieces that can be part of many files.

I'm not convinced. The reason: Half the files you use will be already
extant on the network. BUT the other half, the half which you actually
insert, will be the XOR of the data to be inserted and the preexisting
data. Now, given enough time, these will themselves be reused. It does
give some robustness, in that you can't attack a single key without it
causing collateral damage, but that is not going to be a very strong
effect as the files are distributed randomly.

You can make arguments on deniability... but basically as far as I can
see there are three options:
1. You are liable by running Freenet, which can be and is used to
distribute illegal content. Solution: darknet.
2. You are liable by caching illegal content, despite the fact that it
would be very difficult for you to determine this; impossible in many
cases. Solution: darknet, or better defence lawyers! Generally posession
requires knowledge; if there's a bag of drugs in my car, which I just
bought from a shady second hand dealer, left by the previous owner, it's
not legally my fault - unless I discover it and do nothing about it.
3. You are liable because you fetched illegal content, and it is cached
in your datastore because you fetched it. Solution: Don't cache locally
fetched content. This is an option in 0.7. The problem is that if a node
sees you fetch illegal content, and then probes your store and sees you
didn't catch it, it knows it was a local request. This may not be an
immediate problem on darknets though. Ultimately the solution is premix
routing (freenet 0.8/0.9), but there are some stop-gaps (e.g. random,
fixed routing paths with no caching for the first N hops) which offer
relatively small anonymity sets.
 
 The operation of this network is described as follows:
 1) Alice wishes to place a file on the network (file A). This is the 
   first file to be added to the network:
   a) Firstly she splits the file into many equisized pieces.
   b) She then generates random blocks of data, the same size
  as the pieces of the original file, these are called 
  r1, r2, ..., rn

I thought she was going to re-use random already-inserted blocks from
the network?

   c) She then logically places alternately a random piece and
  a file piece in order as follows:
r1|A1|r2|A2|...|rn|An
   d) Using a random start piece (C), a chain is built up by performing
  a one time pad on the next data chunk and the result of the
  previous one time pad as follows (there appears to be no ascii xor
  symbol, so I used a + instead):
 
C - + - S1 - + - Q1 - + - S2 - + - Q2 - + ... + - Qn
 ^  ^  ^  ^  ^ ^
 r1 A1 r2 A2 r3An

Hmmm, I see:

For the first block, you need r1 ^ A1.
For the second block, you need r1 ^ A1 ^ r2 ^ A2.

Okay, this is a nice addition to what I was thinking of, but you still
need a manifest file.
  
   e) r and Q are now the data chunks that are shared on the network
   f) Each data chunk points to the next but one data chunk in the chain
  resulting in the inability of a holder of any arbitrary chunk to
  reconstruct the whole chain. C points to the first 2 chunks 
  resulting in both offset chains being available (perhaps 2 random
  start pieces are required - C1 and C2 - so that they look 

Re: [freenet-chat] questions about freenet/i2p/entropy

2005-11-03 Thread Matthew Toseland
Historically Freenet has focussed on document storage and retrieval,
whereas I2P has focussed on real time connections between nodes. That's
the obvious difference. I2P implements a form of onion routing to
protect these connections; in I2P, you construct a 3 hop tunnel from
your node to somewhere, using nodes from all over the network. Whereas
freenet's routing is more heuristic, often taking 7 or more hops, and
exclusively uses the routing table, pre-established connections,
although it is important for new connections to be established from time
to time. Both approaches have advantages, in both security and
performance; they are complementary, for the time being.

In terms of security, I2P and Freenet are completely different; I2P is a
scalable mixnet, which is inherently harvestable, meaning that an
attacker can quickly find all nodes, but in which it should be very hard
to find the originator of a connection (this is however a topic of some
dispute!). For Freenet to have really good anonymity, we will have to
add a layer of premix routing, meaning onion routing, a la I2P, but
probably over our existing connections; this does not mean that
Freenet's anonymity right now is rubbish, but various attacks are
possible which we would like to prevent. It has been suggested to use
I2P to do this, but there are some major problems with that for example
harvestability. Freenet's anonymity as-is is probably worse than I2P's,
but Freenet is known to scale in practice to at least 10,000 nodes,
whereas I2P has maybe 300. Freenet 0.7 will have a scalable darknet F2F
option, where each node only connects to those which are explicitly added
as belonging to friends of the node operator; this can scale, because
although I only connect to my friends, they connect to theirs, and you
can span the globe pretty fast. The upshot of this is that it is not
harvestable any more, and a whole variety of attacks become much harder
and much less useful. This is intended for use in hostile environments,
such as China, Saudi Arabia, and Iran, where the internet is heavily
filtered. China does not yet do harvesting of Freenet or I2P nodes, but
it does block Freenet by other means (which rely on a misfeature which
will also be eliminated in 0.7).

Entropy, as far as I know, was a rip-off of Freenet. It even used FCP.
:) It had more or less the same goals, but used home-grown crypto
algorithms (which is *ALWAYS* a bad thing), and had a primitive routing
algorithm which suggests it probably wouldn't have scaled.

On Mon, Oct 31, 2005 at 08:20:41PM -0800, none none wrote:
 Function-wise is I2P different from Freenet and
 Entropy? If so how is it different? What are the pros
 and cons of using either Freenet and entropy? (any
 difference speed-wise?) Can I2P be used in conjuction
 with Freenet or Entropy? If so how do I set it up? I
 have done a little readingbut it was information
 over-load. And please put it in layman terms.Is
 entropy still in development? Because according to
 this link:
 http://www.absoluteastronomy.com/encyclopedia/a/an/anonymous_p2p1.htm
 Entropy is no longer in development. thank you to all
 that replies to this. 
-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.


signature.asc
Description: Digital signature
___
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

  1   2   3   >