{{Header}} {{#seo: |description=GNUnet is a software framework for decentralized, peer-to-peer networking and an official GNU package. |image=Gnunet.png }} [[File:Gnunet.png|GNUnet Logo|thumb|200px]] {{intro| GNUnet is a software framework for decentralized, peer-to-peer networking and an official GNU package. }} {{Stub}} = Introduction = GNUnet is a next generation, private and anonymous P2P networking stack that rebuilds the internet from the bottom-up on these principles. It exceeds all the other members of the big four (Tor, I2P and Freenet) in scope and design assumptions. https://secushare.org/anonymity Architecturally it is a master-piece that has been undergoing constant development since 2001. == Feature List == A no where near exhaustive feature list: (GNUnet has 45 deployed subsystems for details see: https://docs.gnunet.org/latest/about.html#philosophy [https://grothoff.org/christian/psc2015.pdf The Architecture of the GNUnet: 45 Subsystems in 45 Minutes] )
* A very clean modular and documented architecture that allows for adding functionality without encumbering the protocol or limiting future changes * GNUnet primarily written in C, but the gnunet-java subsystem provides an API for developing extensions in Java https://grothoff.org/christian/teaching/2012/2194/gnunet-tutorial-java.pdf . Similar work is being done for Rust. * A P2P consensus system designed under the assumption that a powerful adversary controls nodes in the network - compared to a centralized directory servers model (Tor) * Can use TCP,UDP,HTTPS,HTTP and Bluetooth transports * ECRS is a distributed file store like Freenet but with many improvements including: ** allowing direct sharing of files from the local drive without encrypting and inserting them first. ** can share and mount directories via FUSE ** file download swarming for improved speeds ** global private keyword search for files ** resistance to keyword/unrelated content spam by using trusted namespaces https://grothoff.org/christian/ecrs.pdf ** resource accounting to reward contributors and limit attacks * User controllable anonymity levels for traffic routing - allows for more latency sensitive use-cases between peers like VoIP * An anonymous routing capability that allows for: ** VPN functionality between peers ** IP protocol routing as opposed to just TCP ** traffic exits that allow connecting to the legacy Internet * By implementing alpha-mixing (mixing traffic of varying latencies) it can provide more cover traffic for resisting traffic analysis * A strong adversary resistant DHT that handles network churn * GNS, a secure and memorable name system with query privacy and key revocation * PSYC2 (WIP) an extensible messaging format that runs on the multicast subsystem to create social networking application (secushare https://secushare.org/ ) * Conversation, a VoIP application
= GNUnet in {{project_name_long}} = {{mbox | type = notice | image = [[File:Ambox_notice.png|40px|alt=Info]] | text = These instructions are incomplete. }} GNUnet's capabilities makes it an excellent choice for a planned {{project_name_short}} notification system, a censorship resistant host of project files and even as a Tor alternative on the gateway in the future. It is currently packaged in Debian but the rapid development cycle makes the versions packaged in stable obsolete and incapable of connecting to the network. See [https://phabricator.whonix.org/T114 ticket]. * https://forums.whonix.org/t/gnunet-in-sid-chroot/3447 * See also [[chroot]]. * systemd-container is optional. Could use normal chroot command which might be less secure. Under research. * apt-cacher-ng is optional but then below --aptopt='Acquire::http { Proxy "http://127.0.0.1:3142"; }' should be removed too. {{Install Package |package=mmdebstrap systemd-container apt-cacher-ng }} Create a [[chroot]]. --aptopt='Acquire::http { Proxy "http://127.0.0.1:3142"; }' is optional but useful to avoid repeat package download while experimenting. {{CodeSelect|code= sudo mmdebstrap --verbose --include gnunet --aptopt='Acquire::http { Proxy "http://127.0.0.1:3142"; }' sid ~/debian-sid-chroot }} Enter chroot. {{CodeSelect|code= sudo systemd-nspawn -D ~/debian-sid-chroot }} Or start systemd inside chroot. This requires using above command, creating user password, otherwise no login is possible. {{CodeSelect|code= sudo systemd-nspawn -D ~/debian-sid-chroot /sbin/init }} {{systemd-nspawn-exit}} = See Also = * [https://docs.gnunet.org/ GNUnet Reference Manual] * [https://www.gnunet.org/en/use.html How to use GNUnet - in a nutshell] =Footnotes= {{reflist|close=1}} {{Footer}} [[Category:Documentation]]