-
-
Notifications
You must be signed in to change notification settings - Fork 3.1k
Anonymous IPFS #6430
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I'd like to add some thoughts about TOR, anonymity and onion transport integration for ipfs. What that means if we use tor (not focused on anonymity):
Summary: |
please add freenet or mute transport too |
@luisarriojas similar dismay echoed in this older and longer thread ipfs/notes#37 (comment) |
Reposting my comment as I deleted accidentally: |
It has never been marketed as censorship proof or uncensorable. Making the IPFS protocol itself uncensorable is a non-starter. If you wish to discuss this, please make a post on https://discuss.ipfs.io. |
Did this ever happen ? |
I don't think so. I stopped using IPFS because of this. It's way too risky becoming accidentally a publisher of some crap that could push you into legal trouble... IPFS is currently "torrent roulette"... |
Just to be clear, when you run IPFS on your computer you are only loading content onto your node which you explicitly tell it to download. You won't have legal troubles just by running a node. If you're running a public gateway that others can use, then you have more liability and would wanna integrate a deny list like badbits to keep yourself out of trouble. |
I wanted to bring up that in order to make mixnets viable for the IPFS space, we'll likely need to figure out how to do key routing between peers who advertise on hidden services. My hypothesis is that the Kademlia DHT inside libp2p is going to be way to slow for creating mixnet connections if we use the method of adding something like tor for multiaddress and having a few tor-enabled DHT nodes to bootstrap into. I think it'd be worthwhile to sit down and talk about alternatives where we can rely more on persistent connections for routing since it's cheaper to keep mixnet tunnels going than it is to create new ones (I may be wrong on this point?). One thought I had which I'd like to discuss is to combine my Mostly Minimal Spanning Trees idea with some thoughts I had about content discovery on mesh networks. Also talked to @masih recently about some ideas of dynamically changing how routing works which we might want to explore. |
Thast just sha hash list of 'bad' files? So if someone extract a a hashed zip and rezip it it is good again ? |
We should understand if we want to be doing DHT protocols over such a mixnet, or if it would make more sense to use something like delegated routing, where the the request over the circuit causes the exit to do the full dht lookup, or maybe just act as a relay and transfer the full requested block back. In the mixnet the intermediate hops will already be acting as relays for network traffic, so it's unclear that this is any more of an amplification, and it would be more efficient. |
I think the list hashes the CIDs so it's hard to get the original out unless you already know it, but yes if you change the data by even a byte it will result in a new hash. (Might be useful to move this into a separate thread if there's more Q's about it) |
Yeah delegated routing would be a good approach. I personally worry about it being a point of centralization and failure. If there was a lot of nodes that could be discovered for doing the delegated routing it'd be less worrying, but at the same time you'd need some sort of discovery mechanism in order to find them. 😅 |
Also I'm not certain that delegated routing would be able to connect two mixnet peers to each other. |
Also, privacy is something that's getting some attention from the IPFS core right now so there's funding for folks that have useful ideas: https://research.protocol.ai/blog/2022/new-open-problems-in-private-data-retrieval/ |
You guys should consider i2p |
I2P, in contrast to Tor, also supports UDP and has an API. |
@marek22k Tor also has an API, but you're right that I2P is probably still the better choice in this context. |
We've received many requests for anonymity support in go-ipfs. This issue tracks the issue and the related concerns.
First, there was a significant amount of work put into a tor transport. Unfortunately, reliable anonymity requires more than just TOR:
Unfortunately, this is a lot of work and we have no plans on working on this till after the IPFS 1.0 release. Getting this wrong could put users in serious danger so it's not something we'll even experiment with till we're ready.
The text was updated successfully, but these errors were encountered: