lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: mikie.simpson at gmail.com (Michael Simpson)
Subject: some interresting project i just stumbled
	across...

so it is basically freenet but running on a different port (8482
rather than 8481)
what's the point

snip

[1] This is only true if the network has reached a sufficient size and
if there is enough traffic to hide the source and destination of
specific packets travelling the network. Only then it will be
impossible to guess the source of data from log files.

/snip

anonymity through obscurity through packet deluge, shurely a script
could be coined that could sort those logs
though i suppose that they are saying that the only direct info that
can be gleaned is through the sideband of traffic analysis which gets
more difficult as the usage of the bandwidth increases. The crypto
literature seems to sugggest that only teh military have enough
resources to be continuously caning their bandwidth in order to hide
any traffic pattern leakage of info

schnip

Entropy supports the Freenet Client Protocol (FCP) so that existing
clients can easily and quickly be used for Entropy. Freenet
(http://freenetproject.org) and Entropy can be used at the same time.

One example for those clients is Frost
(http://jtcfrost.sourceforge.net/), a software originally written for
Freenet. Frost can be used for exchanging news and files (it serves as
messageboard and file-sharing client at the same time) and can be used
for both Freenet and Entropy.

/schnip

have these guys got beef with freenet?

On Wed, 2 Feb 2005 12:57:09 +0100, Oliver Leitner <Shadow333@....at> wrote:
> I was just surfing a bit around and came across this interresting sounding
> project.
> 
> http://entropy.stop1984.com/
> 
> here is a short description of what it is from their page:
> 
> "ENTROPY stands for Emerging Network To Reduce Orwellian Potency Yield and as
> such describes the main goal of the project.
> 
>     * ENTROPY is developed as a response to increasing censorship and
> surveillance in the internet. The program connects your computer to a network
> of machines which all run this software. The ENTROPY network is running
> parallel to the WWW and also other internet services like FTP, email, ICQ.
> etc.
>     * For the user the ENTROPY network looks like a collection of WWW pages.
> The difference to the WWW however is that there are no accesses to central
> servers. And this is why there is no site operator who could log who
> downloaded what and when. Every computer taking part in the ENTROPY network
> (every node) is at the same time server, router for other nodes, caching
> proxy and client for the user: that is You.
>     * After you gained some experience with the ENTROPY network, there are
> command line tools for you to insert whole directory trees into the network
> as a ENTROPY site. So ENTROPY does for you what a webspace provider does for
> you in the WWW - but without the storage and bandwidth costs and without any
> regulation or policy as to what kind of content you are allowed to publish.
> Everyone can contribute his own ENTROPY site for everybody else to browse
> through. The contents is stored in a distributed manner across all available
> and reachable nodes and no one can find out about who put up what contents
> into the network [1]. Even if your node is not actively running, your
> contents can be retrieved by others -- without knowing that it was actually
> you who published the files. Of course this is only true if you do not
> publish your name (or leave your name or other personal data in the files you
> publish)
> 
> Have fun,
> Juergen "
> 
> so i thought i might share the url with you peoples.
> 
> If you have any suggestions for the project, contact em, and not me, i am not
> a developer there)
> 
> Greetings
> Oliver Leitner
> Technical Staff
> http://www.shells.at
> --
> By reading this mail you agree to the following:
> 
> using or giving out the email address and any
> other info of the author of this email is strictly forbidden.
> By acting against this agreement the author of this mail
> will take possible legal actions against the abuse.
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ