Formatting
This commit is contained in:
parent
d2aae573d4
commit
8687d23f60
|
@ -10,13 +10,17 @@ Here are the problems we know about:
|
||||||
|
|
||||||
* **The User Experience of Metadata Resistance Tools**: Environments that offer
|
* **The User Experience of Metadata Resistance Tools**: Environments that offer
|
||||||
metadata resistance are plagued with issues that impact usability, e.g.
|
metadata resistance are plagued with issues that impact usability, e.g.
|
||||||
higher latencies than seen with centralized, metadata-driven systems, or dropped connections resulting from unstable anonymization networks. Additional research is needed to understand how users experience these kinds of failures, and how apps should handle and/or communicate them to users.
|
higher latencies than seen with centralized, metadata-driven systems, or dropped connections
|
||||||
|
resulting from unstable anonymization networks. Additional research is needed to understand
|
||||||
|
how users experience these kinds of failures, and how apps should handle and/or communicate them to users.
|
||||||
|
|
||||||
* **Scalability**: Heavily utilized Cwtch servers increase message latency, and
|
* **Scalability**: Heavily utilized Cwtch servers increase message latency, and
|
||||||
the resources a client requires to process messages. While Cwtch servers are
|
the resources a client requires to process messages. While Cwtch servers are
|
||||||
designed to be cheap and easy to set up, and Cwtch peers are encouraged to
|
designed to be cheap and easy to set up, and Cwtch peers are encouraged to
|
||||||
move around, there is a clear balance to be found between increasing the
|
move around, there is a clear balance to be found between increasing the
|
||||||
anonymity set of a given Cwtch server (to prevent targeted disruptions)
|
anonymity set of a given Cwtch server (to prevent targeted disruptions)
|
||||||
and the decentralization of Cwtch groups.
|
and the decentralization of Cwtch groups.
|
||||||
|
|
||||||
* **The (Online) First Contact Problem**: Cwtch requires that any two peers are
|
* **The (Online) First Contact Problem**: Cwtch requires that any two peers are
|
||||||
online at the same time before a key exchange/group setup is possible.
|
online at the same time before a key exchange/group setup is possible.
|
||||||
One potential way to overcome this is through encoding an additional public
|
One potential way to overcome this is through encoding an additional public
|
||||||
|
@ -29,18 +33,15 @@ Here are the problems we know about:
|
||||||
aim of disrupting new connections). However, the benefit of first contact
|
aim of disrupting new connections). However, the benefit of first contact
|
||||||
without an online key exchange is likely worth the potential DoS risk in many
|
without an online key exchange is likely worth the potential DoS risk in many
|
||||||
threat models.
|
threat models.
|
||||||
* **Reliability**: In Cwtch, servers have full control over the number of
|
|
||||||
messages they store and for how long. This has an unfortunate impact on the
|
* **Reliability**: In Cwtch, servers have full control over the number of messages they store and for how long. This has
|
||||||
reliability of group messages: if groups choose an unreliable server, they
|
an unfortunate impact on the reliability of group messages: if groups choose an unreliable server, they might find
|
||||||
might find their messages have been dropped.
|
their messages have been dropped. While we provide a mechanism for detecting dropped/missing messages, we do not
|
||||||
While we provide a mechanism for detecting dropped/missing messages, we do
|
currently provide a way to recover from such failures. There are many possible strategies from asking peers to resend
|
||||||
not currently provide a way to recover from such failures. There are many
|
messages to moving to a different server, each one with benefits and drawbacks. A full evaluation of these approaches
|
||||||
possible strategies from asking peers to resend messages to moving to a
|
should be conducted to derive a practical solution.
|
||||||
different server, each one with benefits and drawbacks.
|
|
||||||
A full evaluation of these approaches should be conducted to derive a
|
* **Discoverability** of Servers: Much of the strength of Cwtch rests on the assumption that peers and groups can change
|
||||||
practical solution.
|
groups at any time, and that servers are untrusted and discardable. However, in this paper we have not introduced any
|
||||||
* **Discoverability** of Servers: Much of the strength of Cwtch rests on the
|
mechanism for finding new servers to use to host groups. We believe that such an advertising mechanism could be built
|
||||||
assumption that peers and groups can change groups at any time, and that
|
ver Cwtch itself.
|
||||||
servers are untrusted and discardable. However, in this paper we have not
|
|
||||||
introduced any mechanism for finding new servers to use to host groups.
|
|
||||||
We believe that such an advertising mechanism could be built over Cwtch itself.
|
|
||||||
|
|
Loading…
Reference in New Issue