Free communications on the Freenet network.
Price of Freedom
Freenet is licensed under the GPL. The current 0.7 version of Freenet works extremely well, despite its complexity; it is easy to install and well documented. The controls are simple, and the system offers a high degree of security.
Freenet has made much progress since version 0.5, which is still very much in active use; however, this progress has had an effect on upload and download performance for volumes of data above 100MB.
Despite excellent usability, Freenet is still a very complex system that requires serious attention to the topic of anonymity on the part of the user.
If you compare a Freesite's performance with that of an ordinary website, you are bound to be disappointed. But performance is not the most important consideration of the Freenet community. It is Freenet's declared goal to ensure a free exchange of opinions and information even in unfree environments.
Security
Freenet guarantees the confidentiality, anonymity, and authenticity of the data it manages on various levels:
- Freenet encrypts files on uploading and does not decrypt them until downloaded – the files stored on a node are thus invisible to the operator. This allows the operator to plausibly deny any knowledge of the files.
- Nodes use encrypted communications – no external third party can discover who requests a key or stores its data.
- Freenet pads files to fixed size packages – the file size and the number of data packages exchanged do not allow any conclusions on the file content or the path the data takes through the network.
- Each node only sees its immediate neighbors – no node can tell whether an incoming request originated with the neighbor node that was the immediate source or whether the request is simply being forwarded.
- When a user requests a file, Freenet copies the file multiple times en route through the network – if a participant switches off his node, this does not necessarily mean that the data stored on it will be lost.
- Nodes can be configured to connect only to specific nodes, such as nodes run by friends and acquaintances – this means that only trusted persons learn that a participant actually runs a node. A network comprising trust-based connections is referred to as a darknet by the Freenet community.
Conclusion
No one can deny the need for this kind of tool, and on the basis of Freenet's popularity, it looks like the Freenet network has the potential to serve the role of building the foundation for an anonymous Internet.
Infos
- Freenet homepage: http://www.freenetproject.org/
- Frost homepage: http://jtcfrost.sourceforge.net/
- Arch on Freenet: http://www.unix-ag.uni-kl.de/~conrad/Archives/DSDiF/
« Previous 1 2 3
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Gnome 47.1 Released with a Few Fixes
The latest release of the Gnome desktop is all about fixing a few nagging issues and not about bringing new features into the mix.
-
System76 Unveils an Ampere-Powered Thelio Desktop
If you're looking for a new desktop system for developing autonomous driving and software-defined vehicle solutions. System76 has you covered.
-
VirtualBox 7.1.4 Includes Initial Support for Linux kernel 6.12
The latest version of VirtualBox has arrived and it not only adds initial support for kernel 6.12 but another feature that will make using the virtual machine tool much easier.
-
New Slimbook EVO with Raw AMD Ryzen Power
If you're looking for serious power in a 14" ultrabook that is powered by Linux, Slimbook has just the thing for you.
-
The Gnome Foundation Struggling to Stay Afloat
The foundation behind the Gnome desktop environment is having to go through some serious belt-tightening due to continued financial problems.
-
Thousands of Linux Servers Infected with Stealth Malware Since 2021
Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.
-
Halcyon Creates Anti-Ransomware Protection for Linux
As more Linux systems are targeted by ransomware, Halcyon is stepping up its protection.
-
Valve and Arch Linux Announce Collaboration
Valve and Arch have come together for two projects that will have a serious impact on the Linux distribution.
-
Hacker Successfully Runs Linux on a CPU from the Early ‘70s
From the office of "Look what I can do," Dmitry Grinberg was able to get Linux running on a processor that was created in 1971.
-
OSI and LPI Form Strategic Alliance
With a goal of strengthening Linux and open source communities, this new alliance aims to nurture the growth of more highly skilled professionals.