presented release of the framework Gnunet 0.17 designed to build protected decentralized P2P networks. The networks created using Gnunet do not have a single refusal point and are able to guarantee the inviolability of private information of users, including excluding possible abuses by special services and administrators who have access to the network nodes.
Gnunet supports the creation of P2P networks over TCP, UDP, UDP HTTP/HTTPS, Bluetooth and WLAN can operate in F2F (Friend-to-Fried) mode. NAT bypass is supported, including using UPNP and ICMP. To address data placement, it is possible to use a distributed shash table (DHT). Means for deploying MESH networks are provided. For selective provision and recall of access rights, a decentralized exchange of attributes of identification attributes is used reclaimid , Using GNS (GNU NAME SYSTEM) and encryption based on attributes ( attribute-based enterption ).
The system is characterized by low resource consumption and the use of multiprocess architecture to ensure isolation between components. Flexible means for conducting logs and accumulation of statistics are provided. To develop the final applications, Gnunet provides an API for the SI and Binding language for other programming languages. To simplify development, instead of flows, it is proposed to use events processing cycles and processes. The composition includes a test library for automatic deployment of experimental networks covering tens of thousands of feasts.
, on the basis of GNUNET technology, several ready -made applications are developing:
- Delivery system gns (GNU Name System), which acts as fully decentralized and inaccessible to the censorship of the replacement of DNS. GNS can be used side by side with DNS and used in traditional applications such as Web browsers. Unlike DNS in GNS, instead of the tree hierarchy of servers, a directed graph is used. The transformation of the names is similar to the DNS, but the requests and answers are performed with the preservation of confidentiality – the processing request node does not know who the answer is given, and transit nodes and third -party observers cannot decipher requests and answers. The integrity and immutability of records is ensured by the use of cryptographic mechanisms. The DNS zone in the GNS is determined using a ligament from open and closed keys ecdsa based on elliptical curves curve25519 .
- Service for anonymous file exchange, which does not allow to analyze information through data transfer only in an encrypted form and preventing him from tracking who posted, searched and downloaded files thanks to the use of the GAP protocol.