WCM - Das österreichische Computer Magazin Forenübersicht
 

Zurück   WCM Forum > Meinung & Community > News & Branchengeflüster

News & Branchengeflüster aktuelle News von Lesern, sowie Tratsch und Insiderinformationen aus der Computerbranche

Microsoft KARRIERECAMPUS

 
 
Themen-Optionen Ansicht
Alt 22.03.2003, 19:18   #1
parasew
Senior Member
 
Registriert seit: 02.07.2000
Beiträge: 158


Standard privacy! neues tool fuer verschluesselte TCP/UDP von "cult of the dead cow"

http://www.hacktivismo.com/news/modu...howpage&pid=20
http://www.hacktivismo.com/news/modu...howpage&pid=19
http://cultdeadcow.com
http://www.theopencd.org/forum/viewt...hp?p=1315#1315

The Six/Four System takes its name from June 4th, the date thousands of peaceful demonstrators were massacred in Tiananmen Square in China by the People's Liberation Army. The Six/Four System is a new protocol standard for decentralized peer-to-peer networks. Data between Trusted Peers and clients is tunneled using a trusted public key for data encryption and authentication. Together with the decentralized, Gnutella-like, but anonymous mode of routing in the Six/Four Network, this makes state-sponsored censorship based on either host-based access controls or content filtering ultimately impossible.

The goal of The Six/Four System is to provide access to any information that is available through a public Internet service, especially HTTP, but also any other TCP or UDP protocol (SMTP, POP, DNS, FTP, etc.). Equipped with Six/Four library calls replacing socket calls, and Six/Four config- and host files, many network applications will be able to transparently link into the Six/Four Network. This enables users to make anonymous, securely encrypted (RSA/AES-256bit) connections to their desired destination. Internally, such connections are tunneled through Trusted Peers within the network residing on host machines in the liberal democracies.

The Six/Four System will be released with a set of simple proxying applications. Users may run them in the background and let applications, including existing browsers, use these proxies: '64webproxy' acts as an anonymizing/content-encrypting HTTP proxy 'T64' (tunnel64) allows users to connect to a port on local host and get redirected to another port on a remote host anywhere else -- while anonymizing and encrypting his encryption transparently 'rcat' can be used as replacement of the tools netcat and telnet, while transparently forwarding any usual Internet connection to anywhere through the Six/Four network

FEATURE SET INCLUDES

· Mandatory, transparent military-strength two-layer encryption
· Generic Application-/Protocol-independent secure tunneling protocol
· Anonymous information retrieval and communication network
· Transparent communication with TCP or UDP services in real-timev · Transparent and easy communication tunnels for the end user
· Easy and well documented API and concept for developers
· Anonymizing routing algorithms via random paths and history-based paths
· A Trusted Peer can never know who initiated a request
· A middle-man peer routing packets through can never know or prove if any given packet sent by his neighbor originated by that neighbor or was only routed through by that neighbor
· Mandatory use of Trusted Peers with Hacktivismo-approved Public Keys
· Tunnels to trusted peers through an untrusted peer-to-peer network
· Information subversion attacks by middlemen are impossible
· Routes to trusted peers are discovered randomly, making DoS impossible
· Leads to long-term effort to create anonymous applications, network infrastructure and performant, feature-enhanced implementations
· Modular Link Layer (for peer-to-peer connections) can be adapted to new transport-level techniques for making Six/Four traffic hard to detect
· The default Link Layer implementation uses strong SSL based on variable TCP ports, indistinguishable from HTTPS and TLS-enhanced protocols
· Access controls/Blacklists for clients can prevent from having potential hostile peers connected directly as neighbors
· Access controls for Trusted Peers can prevent network abuse by passively limiting the kinds of services/protocol available for anonymous tunneling
parasew ist offline   Mit Zitat antworten
 


Aktive Benutzer in diesem Thema: 1 (Registrierte Benutzer: 0, Gäste: 1)
 

Forumregeln
Es ist Ihnen nicht erlaubt, neue Themen zu verfassen.
Es ist Ihnen nicht erlaubt, auf Beiträge zu antworten.
Es ist Ihnen nicht erlaubt, Anhänge hochzuladen.
Es ist Ihnen nicht erlaubt, Ihre Beiträge zu bearbeiten.

BB-Code ist an.
Smileys sind an.
[IMG] Code ist an.
HTML-Code ist aus.

Gehe zu


Alle Zeitangaben in WEZ +2. Es ist jetzt 11:05 Uhr.


Powered by vBulletin® Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
Forum SEO by Zoints
© 2009 FSL Verlag