
= Federated Social Web projects like Mastodon, Pleroma, Diaspora, Friendica and several more SVPN = SocialVPN, an XMPP-based tool that establishes virtual private networks among friends = XMPP-based open source federation projects such as Budd圜loud, movim = Faceboogle = Most web-based social network services including Facebook, Human Connection, Google+ etc Try to use them in combination with one of the proven technologies: by transmittingĪTTENTION: The symbols used in the tables below are explained in the LEGEND on the left hand side of the screen. If you have any doubts on the degree of reliability of these tools, you can always Ricochet operating in P2P over Tor rather than OTR over XMPP. Still, some things are more likely to be safe by architectural design, like This should be consideredĪn incentive to do so, since we need more advanced tools as soon as possible. Have not been sufficiently audited for safety. Many technologies mentioned here for "best current practice" however GENERAL WORD OF WARNING: PGP, OTR and Tor have all somehow proven to beĬryptographically secure for certain appropriate purposes, and within certain Unfortunately public understanding, traditional pride and motivation is lagging behind scientific rationality whereby there is currently more work being invested in old-fashioned federated rather than in distributed technologies.

In other words, distributed and federated are opposites – you can't have both – and distributed crypto-routing architectures are the ones we should invest our efforts on as none of the other approaches deliver the needed security properties. Good distributed systems take metadata-protecting measures typically by onion routing or bulk storage ( consensus, blockchain). Distributed: Computer-scientific term to describe how a computational challenge, in our case the communication of data, is spread over many relay nodes in a redundant, fail-safe and in our case content-agnostic way.Additionally, people fail to run their own servers whereby popular servers become interesting targets for intrusion. Federated: Users are hosted on specific servers of their choosing, giving those servers an augmented insight into user data and especially metadata, making those servers single points of failure while still needing to deliver data to additional servers over potentially unsafe communication links (X.509 certification is easier to man-in-the-middle).Politically favorable concerning control and censorship, but data may be located in various locations, possibly less safe than when centralized. Decentralized: There is no single entity operating the network.Centralized: A single server or a cloud-like server infrastructure operated by a single political or commercial organization or person.GLOSSARY: Some sites including Wikipedia use technical terms in not very scientific ways, so here's a definition how we mean these terms: To the threat model we elaborated for secushare. THREAT MODEL: The aims discussed on this comparison page are similar The depth at which we look at these tools, excluding several that Guarantee that our analysis is accurate and we welcome feedback toĬorrect our assertions. Recommendation, within the boundaries of our competence. Tools we are keeping it up to date as a best current practices People found this comparison useful to choose reasonable intermediate
#RETROSHARE VS FREENET SOFTWARE#
Strengths and weaknesses of many software solutions. Perspective of a developer rather than a user helps figuring out the What secushare is supposed to deliver on the day we manage to This page was originally a feature comparison of existing tools to

⊕ - likely, possibly, planned, optional.Private, fast and minimal web browser based on electron with built-in tor.The symbols have any of the following meanings: This (mirror) repo groups all parts of Jami. Mattermost is an open source platform for secure collaboration across the entire software development lifecycle. Lokinet is an anonymous, decentralized and IP based overlay network for the internet. Starting from an application for secure publication of files, it has grown to include all kinds of basic protocol components and applications towards the creation of a GNU internet. Our goal is to replace the old insecure Internet protocol stack. GNUnet is an alternative network stack for building secure, decentralized and privacy-preserving distributed applications. When comparing RetroShare and ZeroNet you can also consider the following projects:
