Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] CJDNS hype

Mitar mmitar at gmail.com
Sun Jul 14 05:55:37 PDT 2013


Hi!

On Sun, Jul 14, 2013 at 5:01 AM, Ralph Holz <holz at net.in.tum.de> wrote:
> I don't see how "no need to make a decision" should be possible. If you
> don't know any contacts in the network, how are you supposed to trust them?

Ideally, you shouldn't have to trust anybody. :-)

You should be able to turn on your overlay network node, it should
connect to the network, and you should be able to communicate with
anybody, despite somebody trying to censor you.

Sadly, it seems we are not yet there. Or maybe we will never be.

> First of all, they use recursive routing instead of iterative lookups
> (that's important to deal with the attacker on the IP level). Then they
> use a random walk to get around a tactically acting attacker trying to
> occupy important spots in the network, before they switch to the normal
> routing.

It seems CJDNS is using the recursive routing approach? But isn't so
that it is enough that in the whole routing path you get only one
adversary node and this node can black hole your packets?


Mitar

-- 
http://mitar.tnode.com/
https://twitter.com/mitar_m



More information about the liberationtech mailing list