Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] CJDNS hype

Ralph Holz holz at
Sun Jul 14 08:56:15 PDT 2013


> Ideally, you shouldn't have to trust anybody. :-)
> You should be able to turn on your overlay network node, it should
> connect to the network, and you should be able to communicate with
> anybody, despite somebody trying to censor you.

I wasn't talking about the routing - I was referring to just who that
other person might be. If you want to avoid censorship, you also need to
be sure who you're talking to. And there is no way to achieve that
without prior setup of trust.

> It seems CJDNS is using the recursive routing approach? But isn't so
> that it is enough that in the whole routing path you get only one
> adversary node and this node can black hole your packets?

Only if the route is predictable and not in some way randomised. E.g. in
Kad every step through the routing protocol gives you a choice of nodes
to query next. The attacker would need to make sure he occupies all of
those hot spots. Add some random walk during the initial routing phase,
and costs for the attacker rise a lot more.


Ralph Holz
I8 - Network Architectures and Services
Technische Universität München
Phone +
PGP: A805 D19C E23E 6BBB E0C4  86DC 520E 0C83 69B0 03EF

More information about the liberationtech mailing list