Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Free Haven Project
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
The '''Free Haven Project''' was formed in 1999 by a group of [[Massachusetts Institute of Technology]] students with the aim to develop a secure, decentralized system of data storage.<ref name="freehaven">{{cite web | url=http://freehaven.net/ | title=Free Haven | publisher=Free Haven Project | work=Freehaven.net | access-date=4 June 2014 | archive-date=19 June 2014 | archive-url=https://web.archive.org/web/20140619104543/http://www.freehaven.net/ | url-status=live }}</ref> The group's work led to a collaboration with the [[United States Naval Research Laboratory]] to develop [[Tor (anonymity network)|Tor]], funded by [[DARPA]].<ref name="ieee">{{cite journal | url=http://apps.dtic.mil/dtic/tr/fulltext/u2/a527761.pdf | title=Deploying Low-Latency Anonymity: Design Challenges and Social Factors | last1=Dingledine | first1=R. | last2=Mathewson | first2=N. | last3=Syverson | first3=P. | journal=IEEE Security & Privacy | year=2007 | volume=5 | issue=5 | pages=83–87 | doi=10.1109/MSP.2007.108 | s2cid=11387129 | access-date=2022-01-04 | archive-date=2014-06-06 | archive-url=https://web.archive.org/web/20140606220222/http://www.dtic.mil/dtic/tr/fulltext/u2/a527761.pdf | url-status=live }}</ref><ref name="net working">{{cite book | title=Net Working/Networking: Citizen Initiated Internet Politics | chapter-url=https://books.google.com/books?id=29Ucv7BU_DYC&pg=PA267 | publisher=University of Tampere | editor1-first=Tapio | editor1-last=Häyhtiö | editor2-last=Rinne | editor2-first=Jarmo | last=Jordan | first=Tim | chapter=The Politics of Technology: Three Types of 'Hacktivism' | year=2008 | pages=267 | isbn=9789514474644 | access-date=2022-01-04 | archive-date=2015-03-19 | archive-url=https://web.archive.org/web/20150319070238/http://books.google.com/books?id=29Ucv7BU_DYC&pg=PA267 | url-status=live }}</ref> ==Distributed anonymous storage system== The Project's early work focused on an anonymous storage system, Free Haven, which was designed to ensure the privacy and security of both readers and publishers.<ref name="hansen">{{cite conference | last=Hansen | first=J. A. | title=Adding privacy and currency to social networking | book-title=2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) |date=March 2010 | conference=2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) | location=Mannheim | pages=607–612 | doi=10.1109/PERCOMW.2010.5470508}}<!--| access-date=3 June 2014 --></ref><ref name="hermoni">{{cite conference | title=Deniability — an alibi for users in P2P networks | url=http://www.bgu.ac.il/~gilboan/publications/Deniability%20paper.pdf | access-date=3 June 2014 | last1=Hermoni | first1=O. | last2=Gilboa | first2=N. | last3=Felstaine | first3=E. | last4=Shitrit | first4=S. | book-title=3rd International Conference on Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008 | date=January 2008 | conference=Communication Systems Software and Middleware and Workshops | pages=310–317 | doi=10.1109/COMSWA.2008.4554432 | archive-date=6 June 2014 | archive-url=https://web.archive.org/web/20140606224513/http://www.bgu.ac.il/~gilboan/publications/Deniability%20paper.pdf | url-status=live }}</ref> It contrasts Free Haven to anonymous publishing services to emphasize persistence rather than accessibility. Free Haven is a distributed peer-to-peer system designed to create a "servnet" consisting of "servnet nodes" which each hold fragments ("shares") of documents, divided using Rabin's Information dispersal algorithm such that the publisher or file contents cannot be determined by any one piece.<ref name="pet">{{cite conference | url=http://www.cs.princeton.edu/~mfreed/docs/freehaven-pet00.pdf | title=The Free Haven Project: Distributed Anonymous Storage Service | publisher=Springer-Verlag | access-date=2 June 2014 | author1=Dingledine, R. | author2=Freedman, M. J. | author3=Molnar, D. | name-list-style=amp | book-title=Lecture Notes in Computer Science 2009 | year=2001 | conference=Proc. Workshop on Design Issues in Anonymity and Unobservability | archive-date=23 September 2015 | archive-url=https://web.archive.org/web/20150923213004/http://www.cs.princeton.edu/~mfreed/docs/freehaven-pet00.pdf | url-status=live }}</ref><ref name="mirembe">{{cite conference | url=http://cit.mak.ac.ug/iccir/downloads/SREC_07/Drake%20Patrick%20Mirembe,%20Francis%20Otto_07.pdf | title=Analysis of Free Haven anonymous storage and publication system | access-date=3 June 2014 | author1=Mayeba, M. | author2=Mirembe, D. P. | author3=Otto, F. | book-title=Proceedings of SREC'07, Kampala, Uganda | year=2007 | conference=SREC'07 | location=Kampala, Uganda | pages=380–389 | archive-date=6 June 2014 | archive-url=https://web.archive.org/web/20140606214222/http://cit.mak.ac.ug/iccir/downloads/SREC_07/Drake%20Patrick%20Mirembe,%20Francis%20Otto_07.pdf | url-status=live }}</ref><ref>{{cite conference | title=A Survey of Anonymous Peer-to-Peer File-Sharing | url=http://www.lix.polytechnique.fr/~tomc/Papers/AnonyP2PSurvey.pdf | publisher=Springer Berlin Heidelberg | access-date=3 June 2014 | last1=Chothia | first1=T. | last2=Chatzikokolakis | first2=K. | book-title=Lecture Notes in Computer Science | year=2005 | conference=Embedded and Ubiquitous Computing – EUC 2005 Workshops | pages=744–755 | doi=10.1007/11596042_77 | doi-access=free | archive-date=13 August 2021 | archive-url=https://web.archive.org/web/20210813165022/http://www.lix.polytechnique.fr/~tomc/Papers/AnonyP2PSurvey.pdf | url-status=live }}</ref> The shares are stored on the servnet along with a unique [[public key]]. To recover and recreate the file, a client broadcasts the public key to find fragments, which are sent to the client along anonymous routes. For greater security, Free Haven periodically moves the location of shares between nodes.<ref name="perng">{{cite conference | title=Censorship Resistance Revisited | url=http://f3.tiera.ru/2/Cs_Computer%20science/CsLn_Lecture%20notes/I/Information%20Hiding,%207%20conf.,%20IH%202005(LNCS3727,%20Springer,%202005)(ISBN%203540290397)(424s).pdf#page=72 | format=PDF | publisher=Springer Berlin Heidelberg | access-date=3 June 2014 | last1=Perng | first1=G. | last2=Reiter | first2=M. K. | last3=Wang | first3=C. | book-title=Information Hiding | date=June 2005 | conference=7th International Workshop, IH 2005 | location=Barcelona, Spain | pages=62–76 | doi=10.1007/11558859_6 }}{{Dead link|date=October 2023 |bot=InternetArchiveBot |fix-attempted=yes }}</ref><ref name="xiao">{{cite journal|title=Survey on Anonymity in Unstructured Peer-to-Peer Systems |url=http://jcst.ict.ac.cn:8080/jcst/CN/article/downloadArticleFile.do?attachType=PDF&id=8415 |format=PDF |last=Xiao |first=R. |journal=Journal of Computer Science and Technology |date=July 2008 |volume=23 |issue=4 |pages=660–671 |doi=10.1007/s11390-008-9162-7 |s2cid = 28191470|url-status=dead |archive-url=https://web.archive.org/web/20140606213948/http://jcst.ict.ac.cn:8080/jcst/CN/article/downloadArticleFile.do?attachType=PDF&id=8415 |archive-date=2014-06-06 |url-access=subscription }}</ref> Its function is similar to [[Freenet]] but with greater focus on persistence to ensure unpopular files do not disappear.<ref name="peertopeer">{{cite book | url=https://archive.org/details/peertopeerharnes00oram_0 | title=Peer-to-Peer: Harnessing the Power of Disruptive Technologies | publisher=O'Reilly Media | author=Oram, Andy | year=2001 | isbn=9780596001100 | url-access=registration }}</ref> The mechanisms that enable this persistence, however, are also the cause of some problems with inefficiency.<ref name="yianilos">{{cite journal | title=The evolving field of distributed storage | url=http://www.cs.princeton.edu/~sobti/papers/ieeeic01/ieeeic01.pdf | author1=Yianilos, P. N. | author2=Sobti, S. | journal=IEEE Internet Computing | date=September–October 2001 | volume=5 | issue=5 | pages=35–39 | doi=10.1109/4236.957893 | url-status=dead | archive-url=https://web.archive.org/web/20160304111946/http://www.cs.princeton.edu/~sobti/papers/ieeeic01/ieeeic01.pdf | archive-date=2016-03-04 }}</ref> A referral- or recommendation-based "metatrust" [[reputation system]] built into the servnet attempts to ensure reciprocity and information value by holding node operators accountable.<ref name="sniffen">{{cite web | url=http://web.mit.edu/brians/www/thesis.pdf | title=Trust Economies in the Free Haven Project | publisher=Massachusetts Institute of Technology | work=Thesis | date=22 May 2000 | access-date=3 June 2014 | author=Sniffen, B. T. | archive-date=5 March 2016 | archive-url=https://web.archive.org/web/20160305082446/http://web.mit.edu/brians/www/thesis.pdf | url-status=live }}</ref><ref name="viljanen">{{cite conference | title=Towards an Ontology of Trust | url=http://www.cs.helsinki.fi/group/cinco/publications/pdfs/viljanen05towards.pdf | publisher=Springer Berlin Heidelberg | access-date=3 June 2014 | author=Viljanen, L. | book-title=Trust, Privacy, and Security in Digital Business | date=August 2005 | conference=Second International Conference, TrustBus 2005 | location=Copenhagen, Denmark | pages=175–184 | doi=10.1007/11537878_18 | archive-date=7 June 2014 | archive-url=https://web.archive.org/web/20140607004117/http://www.cs.helsinki.fi/group/cinco/publications/pdfs/viljanen05towards.pdf | url-status=live }}</ref> Although nodes remain pseudonymous, communication is facilitated between operators through [[anonymous email]].<ref name="oppliger">{{cite journal | title=Privacy-enhancing technologies for the world wide web | author=Oppliger, R. | journal=Computer Communications |date=October 2005 | volume=28 | issue=16 | pages=1791–1797 | doi=10.1016/j.comcom.2005.02.003}}</ref> ==Work with Tor== {{main article|Tor (anonymity network)}} Tor was developed by the US Naval Research Laboratory and the Free Haven Project to secure government communications, with initial funding from the US [[Office of Naval Research]] and DARPA. Tor was deployed in 2003, as their third generation of deployed [[onion routing]] designs.<ref name="ieee"/> In 2005, the [[Electronic Frontier Foundation]] provided additional funding to the Free Haven Project.<ref name="ieee"/> In 2006, the Tor Project was incorporated as a non-profit organization.<ref name="ieee"/> ==References== {{reflist|30em}} ==External links== *[http://www.freehaven.net '''The Free Haven Project''' website] {{Tor hidden services}} [[Category:Anonymity networks]] [[Category:Cloud storage]] [[Category:Computer security organizations]] [[Category:Internet privacy organizations]] [[Category:Tor (anonymity network)]] [[Category:Tor onion services]] [[Category:Science and technology in Massachusetts]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Cite book
(
edit
)
Template:Cite conference
(
edit
)
Template:Cite journal
(
edit
)
Template:Cite web
(
edit
)
Template:Dead link
(
edit
)
Template:Main article
(
edit
)
Template:Reflist
(
edit
)
Template:Tor hidden services
(
edit
)