Search Mailing List Archives
[liberationtech] CJDNS hype
holz at net.in.tum.de
Sun Jul 14 08:56:15 PDT 2013
> Ideally, you shouldn't have to trust anybody. :-)
> You should be able to turn on your overlay network node, it should
> connect to the network, and you should be able to communicate with
> anybody, despite somebody trying to censor you.
I wasn't talking about the routing - I was referring to just who that
other person might be. If you want to avoid censorship, you also need to
be sure who you're talking to. And there is no way to achieve that
without prior setup of trust.
> It seems CJDNS is using the recursive routing approach? But isn't so
> that it is enough that in the whole routing path you get only one
> adversary node and this node can black hole your packets?
Only if the route is predictable and not in some way randomised. E.g. in
Kad every step through the routing protocol gives you a choice of nodes
to query next. The attacker would need to make sure he occupies all of
those hot spots. Add some random walk during the initial routing phase,
and costs for the attacker rise a lot more.
I8 - Network Architectures and Services
Technische Universität München
PGP: A805 D19C E23E 6BBB E0C4 86DC 520E 0C83 69B0 03EF
More information about the liberationtech