Group: GNU/consensus/30C3

From LibrePlanet
< Group:GNU‎ | consensus
Revision as of 13:04, 27 December 2013 by Codedieb (talk | contribs) (Added question to Christian)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search


See the corresponding page over at the 30C3 website.

The past

In the past we reached consensus on the following four goals:

  • End-to-end encryption
  • Perfect Forward Secrecy
  • Social graph and transmission pattern obfuscation
  • Self-determined data storage

(Depending on your point of view, you might also consider the fourth point being the most important one as it also compromises the other three.)

These four requirements make it such that any discussion of "improvements" of the general situation that does not fulfil them should be seen as out of scope for our initiative.

Ideas for and results from the workshops

Feel free to add things here!

Usability and Adoption Threshold

Next-Generation Applications

Scalability and Architecture

Futures of Crypto Routing Backends

Secure Name Systems

@GNUnet/GNS: Regarding adoption and usability: How would my mother get to e.g. in the pet name system? Should she use google.bob.gnu or rather google.alice.gnu? Whose of her friends should she trust with rather global names? [Short reality check: On Facebook there are many people who are falling for fake accounts with whom they got friends in common (mainly because their friends are dumb and, at some point, also trusted this fake account and accepted his friend request – they literally behave like lemmings in this regard).] Now, Google could of course publish their QR codes with their key everywhere so that my mother could directly call google.gnu. But what happens in case their key gets compromised and they need to somehow publish the new key / QR code? Google could of course go public with this again but what about mid-sized companies / organizations which don't have the budget for that? Then we might have n keys concurrently being distributed in the network of which n-1 keys are fake ones.

I know that you're currently focusing on social applications where you only connect to your friends (and not global entities) in the first place, anyway. But I still think this is a serious adoption risk.

-- codethief

Operating Systems

(Wireless) Mesh Networks

Free & Open Hardware

Strategic Choices, Financing and Dissemination

Political Attack Vectors

Further ideas

Let's keep in touch!


Who would like to do what?


This is how we stay in touch after the congress: