is presented Release of the framework Gnunet 0.16 , designed to build protected decentralized P2P networks. The network generated using GNUNET does not have a single point of refusal and are able to guarantee the inviolability of private information users, including eliminating possible abuse from special services and administrators who have access to network nodes.
GNUNET supports the creation of P2P networks over TCP, UDP, HTTP / HTTPS, Bluetooth and WLAN, can operate in F2F mode (Friend-to-Friend). NAT bypass, including UPNP and ICMP, is supported. To address the location of data it is possible to use a distributed table hash (DHT). Means are provided to deploy MESH networks. For selective provision and revocation of access rights, the service of a decentralized exchange of identification attributes reclaimid , Using GNS (GNU Name System) and attribute-based encryption ( attribute-based Encryption ).
The system is characterized by low resource consumption and the use of multiprocessing architecture to ensure isolation between components. Flexible means for logging and statistics accumulation are provided. To develop endpiece applications, GNUNET provides API for the SI and binding languages for other programming languages. To simplify the development, instead of streams, it is proposed to use event loop cycles and processes. The composition includes a test library for automatic deployment of experimental networks covering tens of thousands of peys.
On the basis of GnuNet technology, several ready-made applications are developing:
- domain name system GNS (GNU Name System), acting as a fully decentralized and inaccessible for the censorship of the DNS replacement. GNS can apply side by side with DNS and used in traditional applications, such as Web browsers. Unlike DNS in GNS, a directional graph is used instead of a tree hierarchy of servers. The transformation of the names is similar to DNS, but requests and answers are executed with the preservation of privacy – the processing request node does not know who is given a response, and transit nodes and third-party observers cannot decipher requests and answers. The integrity and invariance of records is ensured by the use of cryptographic mechanisms. The DNS zone in GNS is determined using a bundle from open and private keys ECDSA based on elliptic curves curve25519 .
- Anonymous file sharing service that does not allow you to analyze information due to data transmission only in encrypted form and not allowing to track who posted, I was looking for and downloaded files through the use of the GAP protocol.