User Tools

Site Tools


metadata_resistance

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
metadata_resistance [2019/01/09 05:01] – created Metadata Resistance article gaditbmetadata_resistance [2019/01/13 22:02] (current) – [Explanatory Examples Of Metadata Leaks] gaditb
Line 4: Line 4:
  
 ===== Explanatory Examples Of Metadata Leaks ===== ===== Explanatory Examples Of Metadata Leaks =====
 +  * IP address is visible to all servers you directly contact
 +  * IP address is public in P2P networks such as Bittorrent, Scuttlebutt, Ring, Tox, etc.
 +  * Fact (and size) of the interaction between people is public
  
-//(ToDo)//+ 
 + 
 +//(To Say More)//
  
 ===== Active Metadata-Resistant Crypto Projects ===== ===== Active Metadata-Resistant Crypto Projects =====
Line 18: Line 23:
  
 Similar to how the internet is built layer-by-layer, each one using the guarantees of the previous layer to establish more reliable data-transmission capabilities, Metadata-Resistant Applications build on the guarantees of the previous layer to provide more capabilities, while showing that their capabilities do not break privacy. Similar to how the internet is built layer-by-layer, each one using the guarantees of the previous layer to establish more reliable data-transmission capabilities, Metadata-Resistant Applications build on the guarantees of the previous layer to provide more capabilities, while showing that their capabilities do not break privacy.
 +
 +
 +===== External Links =====
 +
 +* [[https://openprivacy.ca/|The Open Privacy Research Society]] ([[http://openpravyvc6spbd4flzn4g2iqu4sxzsizbtb5aqec25t76dnoo5w7yd.onion/|Tor Hidden Service]]) 
metadata_resistance.1547010106.txt.gz · Last modified: 2019/01/09 05:01 by gaditb