Gnunet 0.25 P2P Platform Released

The recent release of the framework Gnunet 0.25 was presented, aimed at developing secure decentralized P2P networks. Networks built using Gnunet do not have a single point of failure and ensure the privacy of user information, preventing potential abuses by network administrators who have access to the nodes.

Gnunet supports the creation of P2P networks over various protocols such as TCP, UDP, HTTP/HTTPS, Bluetooth, and WLAN, and can operate in Friend-to-Friend (F2F) mode. NAT traversal is supported, with options for using UPNP and ICMP. Data storage solutions include the use of a distributed hash table (DHT), and mechanisms for deploying MESH networks are provided. For selective sharing and revocation of access rights, a decentralized exchange of identification attributes such as reclaimid and the gnu name system (GNS) are utilized, along with attribute-based encryption.

The system ensures isolation between its components and includes capabilities for logging and statistical data collection. Gnunet offers a basic API for the SI language and bindings for other programming languages to simplify application development. Event-driven processing cycles and processes are recommended instead of traditional flow-based approaches. Additionally, a test library is available for deploying experimental networks covering large scales.

Several applications are currently being developed based on Gnunet technology. These include:

  • The GNS (GNU Name System) system, designed as a fully decentralized and censorship-resistant alternative to DNS. GNS can be used alongside DNS in conventional applications like web browsers. Unlike DNS, GNS utilizes a directed graph instead of a hierarchical tree structure of servers. Name resolution is similar to DNS, but requests and responses are handled with confidentiality in mind to prevent unauthorized access. Records integrity and immutability are maintained using cryptographic mechanisms. The DNS zone in GNS is defined by a combination of open and closed keys based on elliptic curve cryptography.
  • Anonymous file exchange service, ensuring data confidentiality by transmitting information solely in encrypted form to prevent tracking of file uploads, searches, and downloads. This service operates using the GAP protocol.
/Reports, release notes, official announcements.