You may want read the configuration document (
https://tahoe-lafs.org/trac/tahoe-lafs/browser/git/docs/configuration.rst)
where it describes the file <tahoe home>/private/convergence which contains
a convergence secret. This secret is used by the client node to construct
the URI when uploading a file and is by default randomly generated for each
new client node when you first start it up. If you want to enable
convergent encryption, you have to set this convergence secret for each
node that is uploading a file. I believe that this means in order to
determine whether you have already uploaded content by checking whether the
convergent encryption short-circuits the upload can only occur if the other
party obtains the convergence secret. Of note is that the empty string is
considered a valid string, so if you set the string to empty in the file,
then anybody else who sets that string to empty will have the same
convergence secret and thus be able to notice if the upload need not occur
due to the contents having already been uploaded by you or another party.


On Thu, Jan 24, 2013 at 6:38 PM, Tony Arcieri <tony.arci...@gmail.com>wrote:

> Something I've thought about along these lines: (optionally) including a
> convergence secret within the capability itself. Excluding it would give
> you dedup and shorter capabilities. Including it would prevent the
> confirmation of file/learn the remaining data attacks but make the
> capability longer.
>
>
> On Thu, Jan 24, 2013 at 4:51 PM, Uncle Zzzen <unclezz...@gmail.com> wrote:
>
>> Hi.
>> I've been looking at https://www.filerock.com/ and although I have some
>> reservations (server isn't open source, reasons to believe they collect
>> statistics - e.g. web interface has google analytics, etc.) it's still
>> interesting as something I could tell granny: "use this, it's pretty safe"
>> (tried this with LAE and she's still recovering :) ), so any insight about
>> them is welcome.
>>
>> Anyway - I was reading the slides about "dedupable crypto" zooko has
>> mentioned (don't remember where, can't find url now, but here's what I
>> think is the paper <http://eprint.iacr.org/2012/631>), and my main
>> concern is an attacker's ability to prove I'm storing known plaintext
>> (censored, copyrighted, etc.). The estimate of what you save from this is
>> 50% (just charge the customers twice, case closed). What you *risk* may
>> be jail or worse :(
>>
>> Now filerock has a very trivial approach: there's a folder called
>> "encrypted" and the rest *isn't* (and can be easily deduped).
>>
>> At the moment - everything in Tahoe-LAFS is encrypted (ain't
>> complainin'). In future Tahoe-LAFS releases I'd rather see a choice per
>> file between "encrypted (default)" and "plaintext (cheaper)" than having to
>> use "dedupable crypto", exposing myself to censorship/copyright/etc.
>> attacks.
>>
>> Just my .002BTC worth
>>
>> _______________________________________________
>> tahoe-dev mailing list
>> tahoe-dev@tahoe-lafs.org
>> https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev
>>
>>
>
>
> --
> Tony Arcieri
>
> _______________________________________________
> tahoe-dev mailing list
> tahoe-dev@tahoe-lafs.org
> https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev
>
>
_______________________________________________
tahoe-dev mailing list
tahoe-dev@tahoe-lafs.org
https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev

Reply via email to