Today's Deep-Dive: GNUnet
Ep. 336

Today's Deep-Dive: GNUnet

Episode description

This episode explores GNUnet, a framework designed to replace the internet’s foundational architecture with a focus on security and privacy by design. It argues that the current internet is fundamentally flawed, built without security in mind, leading to mass surveillance and centralization of power. GNUnet aims to fix these issues by addressing architectural weaknesses that allow for the exploitation of metadata, which is often more revealing than message content itself. The project is described as a decades-long academic effort to create a network where privacy is guaranteed, not an add-on. GNUnet is presented as a direct technical replacement for the current internet stack, offering fundamental improvements to addressing, routing, and naming. It provides pre-built, robust components for peer-to-peer projects, saving developers from reinventing the wheel and preventing metadata leaks. The philosophy behind GNUnet emphasizes user control, freedom, and the ability to study, share, and modify the software. Unlike some decentralized technologies, GNUnet avoids computationally wasteful consensus mechanisms like proof-of-work, opting for targeted decentralization where it provides the most value. Current applications built on GNUnet include anonymous file sharing, confidential telephony, and the GNU Name System (GNS), a decentralized replacement for DNS. While GNUnet is still in its early stages with known bugs and missing features, it is usable for curious individuals and integrates with modern operating systems. The document concludes by posing the challenge of user adoption, questioning the trade-offs between convenience and privacy in the transition to a more secure internet architecture.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

Welcome to the deep dive our mission here is well, it's pretty simple

0:04

We take these really complex ground breaking projects the kind of stuff

0:08

You'd normally need a PhD to understand and we try to just you know, pull out the

0:13

core insights for you

0:13

And today we are tackling a huge one. We're not just talking about a better app or

0:18

an upgrade

0:18

No, we're talking about framework that is designed to

0:21

To replace the entire foundation of the internet. It's all about security and

0:26

privacy by design

0:28

We are diving into gene in it exactly and we're gonna explore why the network we

0:32

all use every day is well

0:34

Fundamentally broken and how this peer-to-peer approach aims to fix it. It's a big

0:39

topic it is

0:39

So before we peel back all those layers, we have to give a huge and necessary

0:43

Thank you to the supporter of this deep dive safe server

0:46

Mm-hmm safe server focuses on hosting exactly this type of software and they

0:50

support you in your digital transformation efforts

0:52

You can find out a lot more at

0:54

WWW safe server dot DE. Okay. So the whole premise here is that the internet we

1:00

rely on

1:00

It was never actually built to protect us, right? It has these deep

1:04

Architectural flaws that you know, they allow for mass surveillance for centralization

1:10

of power and gnet is the answer to that

1:12

It's a decades-long

1:14

Academic effort to go back and fix those underlying flaws to build a network where

1:19

privacy isn't just an add-on. It's

1:23

It's guaranteed. Okay, so let's unpack this the source material kicks off with this

1:27

really powerful analogy to help us get our heads around just how

1:30

Damaged the current system is yeah, I love this one

1:34

They describe the conventional internet as a vast system of roads

1:37

But these roads are just filled with these deep unavoidable potholes and worse they're

1:43

crawling with highwaymen a perfect metaphor

1:46

Really? It shows a systemic failure

1:48

Imagine you're driving your car and your car is your data or your device down this

1:52

road

1:52

Okay, even if you lock the doors the car itself could be hijacked the long arms of

1:56

these

1:56

Unaccountable actors can just reach in and steal your stuff and they use that data

2:01

against you or they sell it, right?

2:03

And the scariest part of that which I think really captures the modern problem

2:07

Is that you the driver you often can't even tell it's happening

2:10

You don't even notice the theft and you certainly can't hold the scroungers as they

2:15

call them accountable in any real way

2:17

So where does that weakness come from? Well, it traces right back to the 70s. The

2:22

sources are really clear on this

2:23

The original internet protocols were just not developed with security in mind at

2:28

all not at all

2:29

So try to stop someone from say faking their network address or preventing a

2:34

central router from learning your metadata

2:36

It's incredibly hard. It's non-trivial and sometimes it's just plain impossible

2:41

with the current architecture

2:42

Now most of us think we've got this covered right we use VPNs HTTPS end-to-end

2:47

encryption

2:48

But the sources really stress that focusing just on the content of the message

2:53

Misses the biggest threat the metadata metadata. Exactly. Absolutely because your

2:58

metadata

2:58

That's who you talk to when you talk to them how often how much data you exchange

3:03

That is profoundly revealing more so than the message itself sometimes often

3:08

Yeah, so the sources make this massive claim that exposing this metadata actually

3:13

threatens democracy itself

3:15

Okay

3:15

how that seems like a huge leap it all connects to the chilling effect if a

3:20

powerful entity be it a corporation or a

3:22

Government can map out who is talking to whom they can identify journalists sources

3:27

or dissidents precisely

3:29

They do it just by analyzing the timing and frequency of communication

3:33

So what happens people's ability to exercise free speech just erodes you start to

3:38

self censor

3:39

I see so even with your messages encrypted this metadata trail allows for a total

3:44

identification

3:44

Centralization of power and ultimately political control that paints a very clear

3:49

picture of the problem

3:50

So if the old internet is that broken crime-ridden road then Geonet is the project

3:55

trying to build a brand new

3:56

Secure freeway underneath it all okay. Let's pivot to the solution though for a

4:00

beginner someone just hearing about this

4:02

How would you define gene it you can think of it as a whole new set of rules for

4:05

the internet a?

4:06

Network protocol stack a stack okay, and its whole goal is to be a direct technical

4:12

replacement for the old

4:14

Insecure stack we use now and it achieves that privacy by design idea. Yes, not

4:19

through patches or add-ons, but through

4:22

Fundamental improvements to how things like

4:26

Addressing routing and naming actually work. It sounds like they're building a

4:30

really complex foundation not just one simple app

4:33

Why is that framework approach so necessary for privacy? Why not just build a

4:37

better app? That is a crucial question

4:39

I mean if you look at the bigger picture in the peer-to-peer space you just see

4:42

massive inefficiency

4:44

How so every single PDP project is constantly reinventing the wheel

4:48

They all spend huge amounts of time and money trying to build reliable encrypted

4:52

channels or tools for resource discovery

4:55

And if they get it even slightly wrong, the users metadata is instantly leaked all

4:59

that work is for nothing

5:00

So G minute is providing those common pre-built components that are already robust

5:05

and tested to be metadata preserving

5:07

Exactly. It offers that solid foundation. It's rooted in you know, almost two

5:11

decades of continuous academic research

5:14

It's designed to withstand intense scrutiny. So developers can just focus on

5:18

building their apps

5:19

Let's move beyond the tech for a second and look at the philosophy behind it

5:23

because that seems to inform all the design choices

5:25

You said the goal is to support a free and open society. That's right

5:29

I mean today our freedoms are restricted by constant monitoring by centralized

5:35

network hubs

5:36

By software we can't even inspect and things like traffic shapers and firewalls

5:41

that just block

5:42

Communication all of it and here's where it gets for me really interesting the

5:46

software itself embodies that philosophy

5:49

The project is explicitly free software as in freedom, right?

5:53

Which gives the user four specific guarantees the freedom to run the network to

5:57

study the code to share information and to

6:00

Modify it or build new things on top of it

6:02

It's all about putting you back in control of your data

6:04

You determine what you share and with who without that external pressure to

6:08

compromise your privacy just to participate now speaking of philosophy

6:12

The sources take a very strong I'd say almost

6:17

controversial stance against some current tech trends

6:19

specifically

6:22

blockchains and

6:24

Distributed ledgers. They absolutely do the sources state that the hype around all

6:28

this is and I'm quoting here

6:30

Detrimental to the health of our planet Wow, that's a serious claim

6:34

But wait, isn't a decentralized ledger like the gold standard right now for trust

6:38

without a central authority

6:40

How can Gina do that without it and that's the key difference? Yes ledgers achieve

6:45

trust

6:45

But they do it through these incredibly wasteful consensus mechanisms. You mean

6:49

like proof-of-work mining exactly

6:51

It requires massive continuous energy use just to keep a public record that

6:55

everyone agrees on

6:56

The sources argue these systems just don't scale and are frankly

7:00

Ecologically unsustainable so Junionet's approach is fundamentally different

7:05

completely. They use decentralization only where it provides the most value

7:08

Like for naming or key management, they don't require a public globally validated

7:12

ledger for every little interaction

7:14

So it's more target. It's smart targeted decentralization. Not this broad

7:18

computationally expensive approach

7:20

It provides a path that is actually efficient and sustainable. This all sounds

7:24

incredibly ambitious

7:26

Maybe a bit high-level. So what does it all mean for the person listening at home?

7:30

What can you actually do with Junionet today?

7:33

Well, a number of applications have already been built on the framework that show

7:36

what it can do. Like what?

7:37

We're looking at things like anonymous and robust file sharing

7:42

Decentralized and confidential telephony and you mentioned

7:45

Decentralized naming and identity which sounds critical. It is it's called GNS the

7:50

GNU name system

7:52

Think of it as a replacement for DNS the domain name system

7:55

We use now which is a huge point of centralization and control a massive one

7:59

Yeah, GNS lets users manage their own identities and name their own services

8:03

without relying on those centrally controlled authorities

8:06

It's a huge step towards real network autonomy and beyond GNS and telephony you

8:11

said file sharing. Yes anonymous file sharing

8:14

It's sort of the original promise of P2P tech, but actually secured and anonymized

8:19

at the protocol level

8:21

They've also developed a way to tunnel normal IP traffic over GNE app

8:26

So you could use it as a kind of anonymizing layer for your regular web browsing

8:31

potentially

8:31

Yes. Now it's really important for our listeners to know where the project stands.

8:35

This isn't finished polished software

8:38

Is it no not at all. The sources are very clear. It is an LBHA release

8:42

That means there are known significant bugs. There are missing features. This is

8:47

the research frontier

8:48

But it is usable for someone who's curious

8:51

Okay, so for those in our audience who are comfortable messing around with their

8:55

operating system, how do they get started?

8:58

We don't need the exact commands. But what's the entry point like? Well, the great

9:01

thing is that it integrates pretty smoothly into modern operating systems

9:05

It's available for many Linux distributions

9:08

Debian Ubuntu Arch Linux and you can usually just install it with your system's

9:12

package manager and it runs as a local node

9:15

On your machine. That's right. And once that node is running you interact with the

9:19

network through some simple tools

9:21

So a command line interface there's one for people who prefer the console

9:24

Yeah, simple commands to search the network download files or publish your own

9:28

content

9:29

But for users who want a graphical interface

9:32

There are separate GUI tools for setting it up and for using things like the file

9:36

sharing system

9:37

Those are options. The focus is on functionality and user agency. This has been a

9:41

really fascinating deep dive

9:43

Geonet is I mean, it's a crucial attempt to build a robust private foundation for

9:49

the next generation of the Internet

9:51

It's directly addressing these deep security flaws this

9:55

Rampant exposure of metadata. It's an enormous undertaking one

9:59

That's required nearly 20 years of sustained work and that kind of raises an

10:02

important final question for you the listener

10:05

What challenge does the inherent complexity of a truly privacy preserving

10:09

architecture like G unit present?

10:11

When you compare it to the simple convenience of the centralized broken systems we

10:16

use every day. That's the real question

10:18

What trade-offs will people accept and what will it ultimately take for essential

10:23

projects like this to move from the research frontier?

10:25

To you know widespread mainstream adoption something to think about definitely

10:31

Thank you for joining us for this deep dive and once again a huge

10:34

will catch you next time

10:34

will catch you next time