In 2000 we said that the internet is at a crossroad between surveillance and freedom. Freenet started to fight for ensuring freedom of the press. Then 9/11 happened. In 2013 Edward Snowden made the general public realize that we are already far past that crossroad. He gave us precious time to turn back the wheel and take the road towards freedom.
*Source - towards the semantic annotation of digital content / Wittgenstein S...Alessio Piccioli
Presenting the semantic digital library based on MURUCA software (http://www.muruca.org). Some info on how to build a semantic LOD DL and how to annotate it using pundit (http://thepund.it)
An introduction to Jupyter notebooks and the Noteable serviceJisc
A presentation at Connect More in Scotland, 4 June 2019.
Speaker: James Slack, e-learning officer for computational notebooks DLAM, University of Edinburgh.
Over the past year, the University of Edinburgh has been developing and piloting the Noteable service to help supporting programming and computational teaching.
The Noteable services provide cloud access to Jupyter notebooks; live editable documents that allow you to run code whilst also containing text, data tables and other rich media items such as images and videos. Jupyter allows students to quickly get hands-on with programming content without having to brave an intimidating IDE (integrated development environment) or grapple with the terminal.
This session will give an overview of what Jupyter notebooks are and why they are becoming popular for introductory programming courses. There'll be a discussion around how Jupyter has been adopted at the University of Edinburgh and how the Noteable service has been developed to support computational education.
SCAPE Webinar: Tools for uncovering preservation risks in large repositoriesSCAPE Project
This presentation origins from a webinar presented by Luís Faria. The webinar presents the SCAPE developed tools Scout and C3PO and demonstrates how to identify preservation risks in your content and, at the same time, share your content profile information with others to open new opportunities.
Scout, the preservation watch system, centralizes all the necessary knowledge on the same platform, cross-referencing this knowledge to uncover all preservation risks. Scout automatically fetches information from several sources to populate its knowledge base. For example, Scout integrates with C3PO to get large-scale characterization profiles of content. Furthermore, Scout aims to be a knowledge exchange platform, to allow the community to bring together all the necessary information into the system. The sharing of information opens new opportunities for joining forces against common problems.
The webinar was held 26 June 2014.
*Source - towards the semantic annotation of digital content / Wittgenstein S...Alessio Piccioli
Presenting the semantic digital library based on MURUCA software (http://www.muruca.org). Some info on how to build a semantic LOD DL and how to annotate it using pundit (http://thepund.it)
An introduction to Jupyter notebooks and the Noteable serviceJisc
A presentation at Connect More in Scotland, 4 June 2019.
Speaker: James Slack, e-learning officer for computational notebooks DLAM, University of Edinburgh.
Over the past year, the University of Edinburgh has been developing and piloting the Noteable service to help supporting programming and computational teaching.
The Noteable services provide cloud access to Jupyter notebooks; live editable documents that allow you to run code whilst also containing text, data tables and other rich media items such as images and videos. Jupyter allows students to quickly get hands-on with programming content without having to brave an intimidating IDE (integrated development environment) or grapple with the terminal.
This session will give an overview of what Jupyter notebooks are and why they are becoming popular for introductory programming courses. There'll be a discussion around how Jupyter has been adopted at the University of Edinburgh and how the Noteable service has been developed to support computational education.
SCAPE Webinar: Tools for uncovering preservation risks in large repositoriesSCAPE Project
This presentation origins from a webinar presented by Luís Faria. The webinar presents the SCAPE developed tools Scout and C3PO and demonstrates how to identify preservation risks in your content and, at the same time, share your content profile information with others to open new opportunities.
Scout, the preservation watch system, centralizes all the necessary knowledge on the same platform, cross-referencing this knowledge to uncover all preservation risks. Scout automatically fetches information from several sources to populate its knowledge base. For example, Scout integrates with C3PO to get large-scale characterization profiles of content. Furthermore, Scout aims to be a knowledge exchange platform, to allow the community to bring together all the necessary information into the system. The sharing of information opens new opportunities for joining forces against common problems.
The webinar was held 26 June 2014.
A series of screenshots of a WattzOn kiosk that is coming together now -- part of that kiosk is a "whole earth simulator" to let people play with variables like the energy mix to understand how those effect the world at large.
2016 Project.
A finger wore device helpful for blind people.
Used to know the color and currency and etc.,
Prepared by Ch.Durga Rao, Naidu.S.Piyadarshini.
Parasitic Computing is a latest concept that challenges the communication protocol used in internet by exploring its loopholes and uses others computer resources without letting them know for very complex computational task. No, its not hacking.. it doesn't harm u, but...
Inspired by science fiction movies such as Star Wars, two FinnishInspired by science fiction movies such as Star Wars, two Finnish virtual reality researchers created the Fog Screen to recreate some virtual reality researchers created the Fog Screen to recreate some of the effects from these movies in real life.of the effects from these movies in real life. Fog Screen is an exciting new projection technology that allows toFog Screen is an exciting new projection technology that allows to project images and video onto a screen of dry fog, creating the project images and video onto a screen of dry fog, creating the illusion that the images are floating in mid air.illusion that the images are floating in mid air. The Fog Screen is an innovative display technology that allows forThe Fog Screen is an innovative display technology that allows for projections on a thin layer of dry fog.projections on a thin layer of dry fog.
Wi-Vi or wireless vision is one of the most modern technologies which use wireless fidelity or Wi-Fi as the core principle. Basically, it deals with tracking and manipulation of Wi-Fi signals.
Wi-Vi is used to image the obstacles or solids behind any wall or obstructions. The most important advantage of this is it is completely wireless and no cables or wires are used. Hence it becomes more suitable for usage in mobile devices and other lightweight technologies. Wireless facility also allows it to use in armed force and other security agencies.
As we know that SOANR and RADAR uses the principle of transmission and reflected waves, the Wi-Vi which uses the same principle can be called as an adaptation of those. But it also posses several differences and simpler apparatus. We will see those modifications on the coming pages of the paper.
ICE2009 - An Architecture for a Extended/Virtual Enterprisephermar
TechIDEAS presents SIRONTA at ICE 2009 Conference, as an extensible application that support the creation of extended/virtual enterprises, based on three simple concepts: rooms, people and documents.
A series of screenshots of a WattzOn kiosk that is coming together now -- part of that kiosk is a "whole earth simulator" to let people play with variables like the energy mix to understand how those effect the world at large.
2016 Project.
A finger wore device helpful for blind people.
Used to know the color and currency and etc.,
Prepared by Ch.Durga Rao, Naidu.S.Piyadarshini.
Parasitic Computing is a latest concept that challenges the communication protocol used in internet by exploring its loopholes and uses others computer resources without letting them know for very complex computational task. No, its not hacking.. it doesn't harm u, but...
Inspired by science fiction movies such as Star Wars, two FinnishInspired by science fiction movies such as Star Wars, two Finnish virtual reality researchers created the Fog Screen to recreate some virtual reality researchers created the Fog Screen to recreate some of the effects from these movies in real life.of the effects from these movies in real life. Fog Screen is an exciting new projection technology that allows toFog Screen is an exciting new projection technology that allows to project images and video onto a screen of dry fog, creating the project images and video onto a screen of dry fog, creating the illusion that the images are floating in mid air.illusion that the images are floating in mid air. The Fog Screen is an innovative display technology that allows forThe Fog Screen is an innovative display technology that allows for projections on a thin layer of dry fog.projections on a thin layer of dry fog.
Wi-Vi or wireless vision is one of the most modern technologies which use wireless fidelity or Wi-Fi as the core principle. Basically, it deals with tracking and manipulation of Wi-Fi signals.
Wi-Vi is used to image the obstacles or solids behind any wall or obstructions. The most important advantage of this is it is completely wireless and no cables or wires are used. Hence it becomes more suitable for usage in mobile devices and other lightweight technologies. Wireless facility also allows it to use in armed force and other security agencies.
As we know that SOANR and RADAR uses the principle of transmission and reflected waves, the Wi-Vi which uses the same principle can be called as an adaptation of those. But it also posses several differences and simpler apparatus. We will see those modifications on the coming pages of the paper.
ICE2009 - An Architecture for a Extended/Virtual Enterprisephermar
TechIDEAS presents SIRONTA at ICE 2009 Conference, as an extensible application that support the creation of extended/virtual enterprises, based on three simple concepts: rooms, people and documents.
Inria Tech Talk : boostez la performance de vos objets connectés - Mercredi 2...FrenchTechCentral
Vous cherchez une solution IoT clé en main et fiable pour vos applications ? Ce TechTalk est fait pour vous !
Inria, institut national de recherche dédié au numérique, connecte à French Tech Central les entrepreneurs au meilleur de la recherche publiquefrançaise et vous convie à un Tech Talk dédié à l’IoT. Il sera suivi d’un ateliersur ce sujet au TechShop de Station F.
L’équipe EVA du centre de recherche Inria de Paris déploit plus de 1000 capteurs sur 4 continents, dans des applications d’agriculture connectée (www.savethepeaches.com), de ville intelligente (www.smartmarina.org) et de monitoring environnemental (www.snowhow.io).
Thomas Watteyne(membre de l’équipe Eva d’Inria) vous donnera toutes les clés de compréhension de cette technologie pour la ré-utiliser sur vos applications.
Quels bénéfices pour votre business ? c’est une solution IoT clé en main et fiable : elle allie une technologie de réseau mesh qui a fait ses preuves (99.999% de fiabilité bout-en-bout, 10 ans de durée de vie sur batteries), avec une solution cloud et une méthodologie de déploiement et monitoring réseau pour des performances inégalées, utilisable aussi pour l’industrie 4.0. Un must pour vos applications !
February OpenNTF Webinar: Introduction to Ansible for NewbiesHoward Greenberg
This talk is for Domino admins and developers who would like to learn Ansible basics. Ansible is an automation engine to automate deployments. HCL provides a set of Ansible playbooks and roles to deploy a complete HCL Connections 7 environment. Come learn what Ansible is and why you should use it in this webinar.
The speaker will be:
Christoph Stoettener, HCL Ambassador
Scale14x Patterns and Practices for Open Source Project SuccessStephen Walli
There are two parts to the “success” of an open source software project:
Deployment growth: One publishes software to see it used. As the software is used, it reflects the dynamic nature of software, and is used in new ways to solve new problems. This leads to the second part of the success formula -- contributions.
Contribution flow: A free or open source software project is at it’s simplest a discussion in software, and without contributions the conversation fades and fails. From a more complex community perspective, a FOSS project is about the economics of collaborative innovation and development. Without a continuous contribution flow, the dynamic aspect of a software project will become static and brittle and lose its relevancy.
There are three on ramps to be built to drive the success of an open source project: Bringing new users to the project, enabling developers, and encouraging contributors. This talk looks at how these on ramps can be organized to drive growth and adoption, and to grow a successful and vibrant community around an open source project.
The talk was delivered at SCaLE 14x: https://www.socallinuxexpo.org/scale/14x/presentations/patterns-and-practices-open-source-project-success
CoAP for the Web of Things: From Tiny Resource-constrained Devices to the W...Matthias Kovatsch
The Constrained Application Protocol (CoAP) is a new Web protocol standardized by the IETF. It is not a mere compression of HTTP, but a re-design from scratch following the REST architectural style. Thus, its features are tailored for Internet of Things (IoT) applications and machine-to-machine (M2M) scenarios with highly resource-constrained devices. While this makes CoAP very interesting for the Web of Things (WoT) initiative, it is still detached from the Web world of browsers and intuitive user interaction. We present the first attempts to unite these two worlds, so that everyday objects endowed with tiny, low-cost computing devices can become first class citizens of the Web. Our Copper (Cu) project brings CoAP support to the Web browser and has been out in the wild since late 2010. Thus, we were able to conduct a user study among industry and research developers who know both, Web-based CoAP and earlier proprietary protocols for networked embedded systems. The result shows that industry developers and those with longer experience agree even more that Internet protocols and patterns from the Web ease application development for tiny, resource-constrained devices.
Open Collaboration in New York City DoITTAndrew Hoppin
Presentation about NYC Dept of Information Technology & Telecommunications move towards open-source software collaboration to solve civic software needs.
NET FUTURES wishes to maximize competitiveness
of the European technology industry. The conference
(March 25-26) gathered over 700 attendees,
to form an interconnected community involving
companies, organizations and people.
An Idea Wall was installed to collect thoughts and
ideas.
This document shows the raw data of the Idea
Wall. Reading your handwriting was a challenge
some times. Please get in contact when we missed
content or made a mistake in writing your name or
other data.
From Copycat Codelets to an AI Market Internet ProtocolStefan Ianta
Presentation for the Transformative Code Pile 1 Programming Meetup on Aug 3, 2017 on expanding the Copycat Project into an AI Genetic Internet of Reactive Services
FIAT/IFTA Where are you on the Timeline? 10/2014 ResultsBrecht Declercq
Audiovisual archives throughout the globe are travelling the digital journey. FIAT/IFTA, the world's leading organisation of television archives, yearly asks its members in five short questions which stage they're in when it comes to preservation formats, content management systems, access, metadata creation and connection to the public. The statistical results allow to FIAT/IFTA to identify relevant conference, seminar and course topics, to the members to situate themselves in the landscape and to the industry to see where the market's needs are.
Open Source Software: The Governance Makes the DifferenceOW2
Many research and innovation projects adopt an open source approach from the implicit understanding that making the code of unfinished components freely available keeps open the opportunity for third-party stakeholders and contributors will finally complete the software. This is a possibility on the paper. But is not how open source actually works. This is not how open source communities grow nor how open source software becomes successful. In this presentation we hold that one of the key differences between a success open source project and a failed one is that the successful project implement flawless open source project governance.
TelaSocial Presentation and Lessons Learned with the Pilot Case at ICMC-USPMarcio
This presentation covers the TelaSocial project, how it got started within the ICMC-USP community, part of University of Sao Paulo. It covers the open-based goals of the project and specific scenarios related to the pilot program at the ICMC, the Institute of Mathematics and Computer Science in Sao Carlos, Brazil. While the presentation covers the pilot case the messages within this documentation does not represent messages from ICMC. TelaSocial is a social-aware Web-based solution for kiosks. It uses an open model and aims for display-based system that does not get data from traditional broadcast. Instead, it uses the Web and promotes participation for public spaces. The project started in Brazil and we are looking for partners to move on in the direction of open education and to help communities with a participatory solution.
Python and BIG Data analytics | Python Fundamentals | Python ArchitectureSkillspeed
This Python tutorial will unravel the pro and cons of Python; covering Fundamentals and Advantages of Python. A comprehensive comparison of MapR and Python has been mentioned. At the end, you'll know why Python is a High Level Scripting Tool for BIG Data Analytics
---------
PPT Agenda:
Introduction to Python
Web Scraping Use Case?
Introduction to BIG Data and Hadoop
MapReduce
PyDoop
Word Count Use Case
---------
What is Python? - Introduction Python
Python is a widely used general-purpose, high-level programming language. Its design philosophy emphasizes code readability, and its syntax allows programmers to express concepts in fewer lines of code than would be possible in languages such as C++ or Java.
----------
Why Python? - Python Advantages
Clear Syntax
Good for Text Processing
Extended in C and C++
Generates HTML content
Pre-Defined Libraries – NumPy, SciPy
Interpreted Environment
Automatic Memory Management
Good for Code Steering
Merging Multiple Programs
----------
Skillspeed is a live e-learning company focusing on high-technology courses. We provide live instructor-led training in BIG Data & Hadoop featuring 24/7 Lifetime Support, 100% Placement Assistance & Real-time Projects.
Email: sales@skillspeed.com
Website: www.skillspeed.com
Number: +91-90660-20904
Facebook: https://www.facebook.com/SkillspeedOnline
Linkedin: https://www.linkedin.com/company/skillspeed
Mining Social Web APIs with IPython Notebook - Data Day Texas 2014Matthew Russell
Slides from a 2-hour workshop at Data Day Texas 2014 on how to mine social web APIs. This workshop specifically focused on extracting insight from Twitter data and was partitioned into two hour long segments. The first segment focused on familiarity with Twitter's API, while the latter segment focused on using pandas to extract insight from tweets from the firehose via the Streaming API.
Similar to Freenet: The technical part of the solution for Freedom of the Press in the Internet (20)
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Freenet: The technical part of the solution for Freedom of the Press in the Internet
1. Freenet Project: Leap over Censorship
The technical part of the solution for freedom of the press in the internet
Arne Babenhauserheide | 28. Juni 2015
Freenet Project
www.freenetproject.org
2. Outline
1 Why?
2 About
3 Applications
4 Tech
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 2/41
3. Why Freenet?
I worry about my child and the Internet all the time, even though
she’s too young to have logged on yet. Here’s what I worry
about. I worry that 10 or 15 years from now, she will come to me
and say ’Daddy, where were you when they took freedom of the
press away from the Internet?’ –Mike Godwin, Electronic
Frontier Foundation, “Fear of Freedom” (1995)
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 3/41
4. Why now? Dark Times
“There is now no shield from forced exposure. . . The foundation
of Groklaw is over. . . the Internet is over” –Groklaw, Forced
Exposure (2013-08-20)
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 4/41
5. Why now? A New Old Hope
1995: At a Crossroad: Surveillance or Freedom.
1999: Freenet starts.
2001: 9/11. The war on terror starts.
2013: Snowden. Precious time to turn back the wheel.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 5/41
6. What is Freenet?
Freenet is the technical part of the solution for freedom of the
press in the internet.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 6/41
7. THE technical part? Other projects
Pure Transport
e.g. Tor, I2P
No offline hosting
vulnerable to DoS
correlation attacks
This killed the Black Goblin Market
Hosting with cost
e.g. TAHOE-LAFS, MaidSafe
Fixed storage: When it is
full, it is full
DoS-resistance?
Spam-resistance? Cost?
Good content often comes from
small publishers.
Pure messaging
e.g. bitmessage, invisible.im
No publishing
No offline hosting
Server-based
e.g. SecureDrop
Requires powerful
infrastructure
DoS-able
Timing attacks (correlation)
GNUnet? Retroshare?
Good, but more filesharing than
publishing.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 7/41
8. THE technical part? Freenet
Communication
persistent pseudonyms
spam resistance via WoT
multiple applications (Sone,
FMS, Freemail, FlogHelper,
. . . )
Publishing
offline hosting
Join, drop content, leave.
decaying storage
lifetime depends on user
demand
Proven track record of providing censorship resistant publishing and
communication since 2000.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 8/41
9. The TECHNICAL part?
Tech alone is not enough
Complete blocking and
surveillance is possible.
Politics alone is not enough
If surveillance and censorship
are trivial, they will be done.
Tech and Politics
Privacy technology provides the background on which politics can work:
Making surveillance and censorship expensive and hard enough that
we can win the political battle.
The NSA surveillance doesn’t scale.
– Constanze Kurz (EuroPython 2014)
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 9/41
10. Now Concrete
127.0.0.1:8888
ssh -NL 8888:localhost:8888 <host>
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 10/41
11. Who are we?
2 donation-funded part time
developers: toad and xor.
About a dozen free time developers.
Some anonymous contributors.
Communication mostly over IRC
(#freenet @ irc.freenode.net)
and FMS (in Freenet).
Abbildung: Some Freenet
developers at CTS4. From
left to right: ArneBab, toad,
leuchtkaefer and digger3.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 11/41
12. Current State
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 12/41
13. Current Stats
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 13/41
14. Project Summary
Freenet provides essential features for freedom of press.
Tech creates the background needed to win the political battle.
Freenet was created 14 years ago and improved constantly.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 14/41
15. Applications
File Hosting
Site hosting
Confidential Messaging
DVCS
Email
Microblogging
Spam resistance
Forums
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 15/41
16. File Hosting
pastebin, file hoster, encrypted chunks, redundancy.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 16/41
18. Site creation
jSite (GUI) freesitemgr (pyFreenet)
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 18/41
19. Easier sites: Sharewiki
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 19/41
20. Blogging: Flog Helper
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 20/41
21. Confidential Messaging
Darknet messaging
Talk to friends who run
Freenet
Hide metadata in Freenet
traffic
with file hosting
confidential pastebin
invisible and encrypted
like all file uploads
before sharing the key
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 21/41
22. Email with hidden metadata
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 22/41
23. DVCS
$ cd /tmp
$ hg clone freenet://USK@j2Mfv0b81MNSslh3Qg9gs1vgQj36whsuosP8ydZq158,Xb~vh8XEXmdwG
Current USK version: 17
Fetching bundles...
...
Pulled bundle: (-1, 0, 1)
...
Pulled bundle: (0, 9, 0)
...
Pulled bundle: (9, 16, 0)
As basic protection, infocalypse automatically set the username
’anonymous’ for commits in this repo, changed the commands
‘commit‘ and ‘ci‘ to fake UTC time and added ‘clt‘ which commits
in the local timezone. To change this, edit
/tmp/freenet-funding/.hg/hgrc
Mercurial
infocalypse
pyFreenetHg (old)
Git
egit-freenet
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 23/41
24. Microblogging: Sone
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 24/41
25. Spam resistance
Web of Trust
Propagating trust
Generalized
Used by plugins (i.e. Sone)
FMS
Explicit Trust Lists
One Shot IDs
Shared Properties
CAPTCHAs for introduction
Take a while to find existing People
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 25/41
26. Web of Trust
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 26/41
27. Forums: FMS
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 27/41
28. Comments on the Clearweb
See draketo.de/proj/freecom and
draketo.de/english/freenet/spam-resistant-decentral-comments
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 28/41
29. Language Bindings
Java - in core
https://github.com/freenet/fred
Plugin Writing:
wiki.freenetproject.org/Plugin_development_tutorial
Freenet Client Protocol:
wiki.freenetproject.org/FCPv2
Python - pyFreenet
https://github.com/freenet/lib-pyFreenet
Perl*: https://github.com/freenet/lib-perlFreenet
Ruby*: https://github.com/freenet/lib-rubyFreenet
Ada*: https://github.com/freenet/lib-AdaFN/
*: I did not test these, yet. I don’t know whether they actually work.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 29/41
30. Application Summary
Do you miss anything?
Join us and create it!
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 30/41
31. Why not as big as Tor?
Focus
⇒
Hard problems solved, but
not polished
Lots of low hanging fruit
Money
Freenet: 2 part time
developers, a dozen
volunteers
Tor: 20 full time developers
Fundraising
We try to get more focus and money.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 31/41
33. About the tech
Datastore
decentralized
on the computers of users
encrypted chunks of files
key (URL) to assemble,
decrypt and identify
anonymous pseudonyms
public/private key publishing
lifetime by demand
Routing
small world
optional friend-to-friend
(Darknet)
location: [0..1) for each file
chunk and node
find route: from node to file
chunk
forward data: travels along
the route
Applications
subscribe to keys: 30s to 30 min round trip time.
base for applications: Websites, Forums, Microblogging, Chat.
spam resistance: Web of Trust (2 implementations).
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 33/41
34. Small World Routing
Abbildung: Finding the route to a chunk of
data. Greedy Routing on Small World
structure.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 34/41
35. Network structure optimization
Opennet
Optimize peer-connections
via success-metric
Distance Constraint
maximum number of long
connections
Darknet (friend-to-friend)
Assume small world
connections to people
known in real life
Reconstruct
the structure by swapping
locations
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 35/41
36. Routing Simulation
Random Routing
Abbildung: 10 paths between
locations on a random network with
1000 nodes. Average path length:
105.
Small World Routing
Abbildung: 10 paths between
locations on a small world network
with 1000 nodes. Average path
length: 5.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 36/41
37. Link lengths in the Simulations
Abbildung: Link length distribution in the simulated small world and random
networks.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 37/41
38. Measured Network Structure
Abbildung: Link length distribution in Freenet. The green line would be an ideal
network. Blue would be a random network. Red is the measured distribution.
Randomization from local requests, churn and inhomogenity in the network skew
the distribution.
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 38/41
39. Additional notes
Performance
Upload 150 MiB in 1 day
Download 1 GiB in 1 day
With max bandwidth set to
80kBps and average 50-60kBps.
Optimizations
FOAF routing
Caching
. . .
Missing in the simulation.
Capacity
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 39/41
40. Tech Summary
Small World Structure
Measured fits simulated
It scales
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 40/41
41. Summary
Freenet is the technical part of the solution for freedom of the
press in the internet.
Decentral, anonymous datastore.
Many applications.
Started in 2000.
Scales.
Fundraising
We want to raise money to make Freenet perfect for Journalists.
Info: draketo.de/proj/freenet-funding
Why? About Applications Tech
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 41/41
42. Get Freenet!
freenetproject.org
This presentation: github.com/ArneBab/freenet-fundraising
Donate: freenetproject.org/donate.html
Bitcoin: 1966U1pjj15tLxPXZ19U48c99EJDkdXeqb
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 42/41
43. Contribute
Write Code
Run a Node
Build the Darknet
Spread the Word
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 43/41
45. Run a node
Running a Node
wget https://freenetproject.org/jnlp/freenet_installer.jar -O installer.jar
java -jar installer.jar -console
# (follow the prompts)
# info: https://freenetproject.org/download.html
./run.sh # { console | start | stop | restart | status | dump }
As Seednode
simple howto found on
https://piratenpad.de/p/pirates4freenet
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 45/41
46. Build the Darknet
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 46/41
47. Spread the Word
Because we are crappy at PR.
These slides:
draketo.de/proj/freenet-funding/slides.pdf
github.com/ArneBab/freenet-fundraising
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 47/41
48. Summary
Write Code
Run a Node
Build the Darknet
Spread the Word
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 48/41
49. Fundraising
Goal
What we need
2 year vision
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 49/41
50. Goal: Journalists and Whistleblowers
maintain journalist site
contact a journalist via the site
traceless persistent pseudonym (QR or written key)
Freenet-stick, preseeded
invisible darknet (steganography)
grow the darknet over mobile
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 50/41
51. What we need
Minimal
2 coders
one part time
1 outreach
1 coordinator
and coder
2 years
620k Euro
Good
2 coders
1 UX
1 outreach
1 coordinator
3 years
1.5M Euro
Ideal
3 coders
2 UX
2 outreach
1 coordinator
5 years
3.8M Euro
If you are in contact with human rights groups who might want to fund us,
please get in touch!
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 51/41
52. 2 year vision
Nick, Journalist
Republish on Freenet
Email from Janice
Ask to verify the leak
Help her keep out of trouble
Run the story
Janice, Whistleblower
Use Freenet in cafés
Select Nick by site
Send leaked documents
Reply to questions
Lie Low
Leak again
All already possible, but not easy.
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 52/41
53. Going further
publication and collaboration:
platform for political
bloggers
social network with privacy
by design
programming platform
backend for the web:
comment system for
websites
exchanging files with friends
harder to detect and block:
hide data in VoIP stream
hiding data in email attachments
pre-filled USB-sticks to exchange with collegues and friends
. . . and many more - see Steganography
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 53/41
54. What is in it for me?
Secure Environment
If it’s safe enough for
whistleblowers, it’s safe enough
to give you privacy.
Hide in the Forest
The more people use Freenet,
the safer it gets for everyone.
Bigger anonymity set.
Privacy by Default
Easy enough for everyday communication. Journalists need that.
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 54/41
55. Fundraising Summary
Freenet for Journalists and Whistleblowers
Already possible but not easy
Finance a group of full time Freenet hackers
3-8 people, 2-5 years
620k Euro to 3.8M Euro
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 55/41
56. Get Freenet!
freenetproject.org
This presentation: github.com/ArneBab/freenet-fundraising
Donate: freenetproject.org/donate.html
Bitcoin: 1966U1pjj15tLxPXZ19U48c99EJDkdXeqb
Appendix Contribute Fundraising
Arne Babenhauserheide – Freenet Project: Leap over Censorship 28. Juni 2015 56/41