Difference between revisions of "User:0x20545446"

From Bitmessage Wiki
Jump to navigation Jump to search
Line 21: Line 21:
 
=== Current Protocol Deficiencies ===
 
=== Current Protocol Deficiencies ===
 
* Published public keys can be compromised by man-in-the-middle attacks during backbone routing.
 
* Published public keys can be compromised by man-in-the-middle attacks during backbone routing.
** While P2P may be hard to intercept, The Guardian has reported that a P2P protocol/network will be or already is compromised.<ref name="a">Among the specific accomplishments for 2013, the NSA expects the program to obtain access to "data flowing through a hub for a major communications provider" and to a "major internet peer-to-peer voice and text communications system".; [http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security]</ref>
+
** While P2P may be hard to intercept, The Guardian has reported that a P2P protocol/network will be or already is compromised. <ref name="a">Among the specific accomplishments for 2013, the NSA expects the program to obtain access to "data flowing through a hub for a major communications provider" and to a "major internet peer-to-peer voice and text communications system".; [http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security]</ref>
  
 
<references />
 
<references />

Revision as of 03:00, 6 September 2013

Thoughts

Protocol Goals [[Protocol

Protocol Goals

  • Asynchronous, Queued, Batched Delivery
  • Delivery Confirmation
  • Anonymous, If Desired
  • Sending Address Non-Repudiation
  • Private to Receiving Address


Protocol's Assumed Operational Environment

  • All data packets are intercepted en-route from originating host to the terminating host.
    • Metadata about all data packets are captured and made available for real-time and historical analysis. This includes size, time, route, payload, etc.
    • All data packets subject to man-in-the-middle attacks. e.g. The originating host is not sure the packet sent is the one received by the terminating host. The terminating host is unsure of the true source of the data packet received.
    • All man-in-the-middle attacks may use significant amounts of captured metadata from previous transmissions across the entire internet and operate in real-time so as not to be detectable. e.g. Linking data packet through metadata relationships for point-to-point transmissions based on size, timing, content, source, destination, route, etc. This represents core routers collection and analyzing numerous bitmessage data streams in real-time.

Current Protocol Deficiencies

  • Published public keys can be compromised by man-in-the-middle attacks during backbone routing.
    • While P2P may be hard to intercept, The Guardian has reported that a P2P protocol/network will be or already is compromised. [1]
  1. Among the specific accomplishments for 2013, the NSA expects the program to obtain access to "data flowing through a hub for a major communications provider" and to a "major internet peer-to-peer voice and text communications system".; [1]