SECUSHARE

(versione italiana)

Disclaimer: secushare is a research project that hasn't reached prototype status, yet. Consider that it basically consists of a new Internet stack combined with a full-fledged distributed scalability alternative to cloud technology. The challenge is so big, please be patient that we're not done quite yet. If you think you can contribute competence, time or attention to us, don't stop reading.

Imagine Facebook, Whatsapp, Gmail and Skype rolled into one, without the centralized surveillance and control. Crazy? Well, it hasn't been tried before, at least not our way. So let's give it a try.

secushare employs GNUnet for end-to-end encryption and anonymizing mesh routing (because it has a more suitable architecture than Tor or I2P) and applies PSYC on top (because it performs better than XMPP, JSON or OStatus) to create a distributed social graph. Together, these technologies allow for distributed private social networking including more straightforward and secure e-mail, chat, exchange of content and a private web. It could even work out as a safer choice for the Internet of Things.

The resulting new Internet enjoys the speed of servers that help without knowing much about us, the authenticity of social relationships between users without becoming transparent, the privacy of advanced obfuscation without becoming cumbersome or a threat to society. This way, we can become independent of centralized infrastructure and expect that only the designated recipients can read our communications. Read more about it in the introduction.

Happening Now at Onionspace: We would like to invite you after 36C3, to Berlin, to discuss and hack our notion of "Next Generation Internet" technologies. The kind that actually replaces parts of the existing Internet, not just adds complexity to it. Start: Thursday, 2nd of January, 2020 End: Sunday, 5th of January, 2020 Location: Onionspace, Gottschedstraße 4, Aufgang 4, 13347 Berlin Things that happened recently: An implementation of GNUnet GNS in Go is underway

An IoT systems and server administration tool package is in development at https://box.secushare.org At our New Year meeting, we'd like to talk about some social, technical, and infrastructural topics including: Understanding how PolderCast works and if it fits secushare.

The usual progress with GNUnet and secushare box.

Social graph implementation.

Radical Privacy is barely enough We call this secushare, an attempt at providing at least one platform for safe social interaction aside from the uncivilized and surveilled Internet. It arose after realizing that there is no satisfying technology to address the issues we outlined in the FSW 2011 paper entitled "Scalability & Paranoia in a Decentralized Social Network." And there still is no such technology. At the time we assumed to be paranoid, but Snowden has taught us we weren't paranoid enough. Here's what we mean by safe: updates, comments, postings, messages, files and chat are only visible to the intended recipients (not the administrators of any servers or routers); the type and content of a message cannot be guessed at by looking at its size; communication between parties cannot be measured as they may have none to several routing hops in-between. an observer never knows if a communication came where it came from and ends where it is going to; automatic responses and forwarded messages can intentionally be delayed so that an observer cannot tell two communications are related; communications cannot be decrypted weeks later, just because the attacker gained access to one of the involved private keys (forward secrecy); even if an attacker gains access to a cleartext log, there is no proof the material was actually ever transmitted by anyone (for a case in court mere data would not suffice, you need actual testimonies); the list of contacts is never managed on potentially unsafe servers, it is only visible to those it should be visible to; the infrastructure is robust and resilient against attacks. in fact by using the GNUnet we are independent from the traditional insecure Internet and can operate in a censorship-resistant wireless mesh architecture. And if you are happy with less than that, we want you to just pull that slider from 'safety' towards 'convenience' on your own responsibility. Read the introduction page for more.

Getting Started Go to the GNUnet installation manual to get started using GNUnet tools. There are various repositories with prototype implementations that aren't up to date and would probably confuse you, so we don't list them here for now. But what you can play around with is the secushare BOX which is an administration tool for IoT systems and servers in general. For now it allows to log into such devices via GNUnet, so you do not depend on whichever IP number and NAT they may be having at any given time. As long as they can reach out for the GNUnet network, you can log in and do remote administration. It will provide more features in that sense as the project progresses. As the architecture page explains in detail, we don't use GNUnet for file sharing – so you don't need neither a particularely large hard disk nor a lot of bandwidth to participate in secushare.

Source Code Currently most components of secushare are integrated with GNUnet. The design is described on the protocol page. git clone https://gnunet.org/git/gnunet.git

Questions? Here are some answers. Have you read the introduction page? Try also our welcome chatroom: psyc://loupsycedyglgamf.onion/@welcome

irc://loupsycedyglgamf.onion:67/welcome

psyc://psyced.org/@welcome (another web interface)

irc://psyced.org/welcome

xmpp:*welcome@psyced.org Be patient, we may reply hours later!