updated readme and whitepaper

master
Kevin Froman 2019-03-05 00:06:49 -06:00
parent b74315f75a
commit 456e3f68ad
5 changed files with 41 additions and 16 deletions

View File

@ -31,15 +31,29 @@ Onionr can be used for mail, as a social network, instant messenger, file sharin
## Main Features ## Main Features
* [X] Fully p2p/decentralized, no trackers or other single points of failure * [X] 🌐 Fully p2p/decentralized, no trackers or other single points of failure
* [X] End to end encryption of user data * [X] 🔒 End to end encryption of user data
* [X] Optional non-encrypted blocks, useful for blog posts or public file sharing * [X] 📢 Optional non-encrypted blocks, useful for blog posts or public file sharing
* [X] Easy API system for integration to websites * [X] 👩🏾‍💻 Easy API system for integration to websites
* [X] Metadata analysis resistance * [X] 🕵️ Metadata analysis resistance and anonymity
* [X] Transport agnosticism (no internet required) * [X] 📡 Transport agnosticism (no internet required)
**Onionr API and functionality is subject to non-backwards compatible change during pre-alpha development** **Onionr API and functionality is subject to non-backwards compatible change during pre-alpha development**
# Screenshots
<img alt='Node statistics page screenshot' src='docs/onionr-1.png' width=600>
Node statistics
<img alt='Friend/contact manager screenshot' src='docs/onionr-2.png' width=600>
Friend/contact manager
<img alt='Encrypted, metadata-masking mail application screenshot' src='docs/onionr-3.png' width=600>
Encrypted, metadata-masking mail application.
# Install and Run on Linux # Install and Run on Linux
The following applies to Ubuntu Bionic. Other distros may have different package or command names. The following applies to Ubuntu Bionic. Other distros may have different package or command names.
@ -54,17 +68,27 @@ The following applies to Ubuntu Bionic. Other distros may have different package
Everyone is welcome to help out. Help is wanted for the following: Everyone is welcome to help out. Help is wanted for the following:
* Development (Get in touch first) * Development (Get in touch first)
* Creation of a lib for use from other languages and faster proof-of-work * Creation of a shared lib for use from other languages and faster proof-of-work
* Android and IOS development * Android and IOS development
* Windows and Mac support * Windows and Mac support (already partially supported, testers needed)
* General bug fixes and development of new features * General bug fixes and development of new features
* Testing * Testing
* UI/UX design
* Running stable nodes * Running stable nodes
* Security review/audit * Security review/audit
* Automatic I2P setup * Automatic I2P setup
Bitcoin: [1onion55FXzm6h8KQw3zFw2igpHcV7LPq](bitcoin:1onion55FXzm6h8KQw3zFw2igpHcV7LPq) Contribute money:
USD: [Ko-Fi](https://www.ko-fi.com/beardogkf)
Donating at least $5 gets you cool Onionr stickers. Get in touch if you want them.
Bitcoin: [1onion55FXzm6h8KQw3zFw2igpHcV7LPq](bitcoin:1onion55FXzm6h8KQw3zFw2igpHcV7LPq) (Contact us for privacy coins like Monero)
USD (Card/Paypal): [Ko-Fi](https://www.ko-fi.com/beardogkf)
## Contact
beardog [ at ] mailbox.org
## Disclaimer ## Disclaimer

BIN
docs/onionr-1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 44 KiB

BIN
docs/onionr-2.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 30 KiB

BIN
docs/onionr-3.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 40 KiB

View File

@ -5,13 +5,13 @@
# Introduction # Introduction
One of the most important things in the modern world is information. The ability to communicate freely with others is crucial for maintaining personal liberties. The internet has provided humanity with the ability to spread information globally, but there are many people who try (and sometimes succeed) to stifle the flow of information. One of the most important things in the modern world is information. The ability to communicate freely with others is crucial for maintaining societal and personal liberty. The internet has provided humanity with the ability to spread information globally, but there are many people who try (and sometimes succeed) to stifle the flow of information.
Internet censorship comes in many forms, state censorship, corporate consolidation of media, threats of violence, network exploitation (e.g. denial of service attacks). Internet censorship comes in many forms, state censorship, corporate consolidation of media, threats of violence, network exploitation (e.g. denial of service attacks) and other threats.
To prevent censorship or loss of information, these measures must be in place: To prevent censorship and loss of information, these measures must be in place:
* Resistance to censorship of underlying infrastructure or of network hosts * Resistance to censorship of underlying infrastructure or of particular network hosts
* Anonymization of users by default * Anonymization of users by default
* The Inability to coerce human users (personal threats/"doxxing", or totalitarian regime censorship) * The Inability to coerce human users (personal threats/"doxxing", or totalitarian regime censorship)
@ -124,10 +124,11 @@ We seek to protect the following information:
* Data specifically inserted as plaintext is available to the public * Data specifically inserted as plaintext is available to the public
* The public key of signed plaintext blocks * The public key of signed plaintext blocks
* The fact that one is using Tor or I2P * The fact that one is using Tor or I2P
* The fact that one is using Onionr can likely be discovered using long term traffic analysis * The fact that one is using Onionr specifically can likely be discovered using long term traffic analysis
* Intense traffic analysis may be able to discover what node created a block. For this reason we offer a high security setting to only share blocks via uploads that we recommend for those who need the best privacy.
## Assumptions ## Assumptions
We assume that Tor onion services (v3) and I2P services cannot be trivially deanonymized, and that the cryptographic algorithms we employ cannot be broken in any manner faster than brute force unless a quantum computer is used. We assume that Tor onion services (v3) and I2P services cannot be trivially deanonymized, and that the underlying cryptographic primitives we employ cannot be broken in any manner faster than brute force unless a quantum computer is used.
Once quantum safe algorithms are more mature and have relatively high level libraries, they will be deployed. Once quantum safe algorithms are more mature and have relatively high level libraries, they will be deployed.