Hacker News new | past | comments | ask | show | jobs | submit login

But your argument was "All Freenet peers know each others IP addresses". All the nodes in the tor network also know each other's ip addresses. (I suppose clients arent really public, especially if you are using a obfuscating bridge). I don't understand how you are distinguishing between "plausible deniability" and "anonyminity". I feel like either both freenet & tor either have these properties or they both don't, depending on what your definition of those terms are.

That's not to say they have the same threat model or provide the same protections. They are very different systems that have different properties - but at a broad-brush high level they both roughly allow you to publish stuff without people being able to easily track the information back to you under various assumptions.

> But it's hard to imagine how any low-latency overlay network could resist global adversaries.

This is a bit of an aside, but making a scalabe low-latency anonymous network is tricky. If you drop the scalabe requirement you can use dining cryptographers.




There's a key distinction between Tor and Freenet. With Freenet, all nodes host content, access content, and relay traffic for other nodes.

But with Tor, only clients (including onion services) host and access content, and they don't relay traffic. Conversely, relays merely relay traffic, and don't host or access content. Also, only entry guards ever see the IP addresses of clients. And they only see encrypted data going to middle relays.

So attacks like police have used against Freenet are impossible. Because clients never connect directly to each other. The closest analog is taking over an onion site, and then serving malware to users. But that's much harder than running nodes, serving child porn, and logging IPs.

Also, given that relays retain no content, operators have so far managed to escape liability.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: