/r/Kovri
View all available downloads here Download Nightlies Report an Issue/Bug
Kovri is a free, decentralized, anonymity technology developed by Monero.
Currently based on I2P's open specifications, Kovri uses both garlic encryption and garlic routing to create a private, protected overlay-network across the internet. This overlay-network provides users with the ability to effectively hide their geographical location and internet IP address.
Essentially, Kovri covers an application's internet traffic to make it anonymous within the network.
A lightweight and security-focused router, Kovri is fully compatible with the I2P network. An alpha version of Kovri is in the works.
Watch development via the Kovri repo and join the community.
- Breaking the rules gets your post deleted and may result in a ban.
- Follow redditquette and the rules of reddit.
- Do not post your IP address or port number
- Issues go to GitLab
- Only Kovri-related topics/links.
- When mentioning other anonymity systems, keep the discussion civil. No zealotry.
- Downvotes are for bad information or rudeness, not casual disagreement.
- Use the search function before you submit a support question.
/r/Kovri
Hi,
I am new to crypto and Monero.
When will Kovri be integrated in to the Monero GUI walllet?
Thanks!
Primer:
https://www.youtube.com/watch?v=v_PvLKbeOhs (Good primer!)
Meat:
https://devblogs.nvidia.com/dgx-1-fastest-deep-learning-system/ (Hybrid Cube Mesh - DGX 1, good to ~6 GPUs)
https://www.servethehome.com/nvidia-dgx-2-details-at-hot-chips-30/ (I'm guessing Hybrid Fat Tree, good to ~16+ GPUs)
https://export.arxiv.org/abs/1903.04611 ("Evaluating Modern GPU Interconnect: PCIe, NVLink, NV-SLI, NVSwitch and GPUDirect")
https://en.wikipedia.org/wiki/Supercomputer#Distributed_supercomputing (Shows a toroidal-interconnected 3-D cube topology at bottom, similar to some Infiniband networks)
Other / Design your own for use in scalable anonymous networks:
https://youtu.be/SisTfH7ns7Y (HPC Networks: Topologies and Design - 2011)
https://youtu.be/pmNpIdtdudg (HPC Cluster Interconnect Topologies - 2014)
https://youtu.be/rLjMrIWHsxs (SlimFly: Cost effective efficient topology - 2015)
https://youtu.be/bXwtQzJVIOY (Innovative Topologies - 2013)
https://youtu.be/DXqhzRhZ2BE (InfiniBand, 3D-Torus topologies, Offloading and accelerations - 2012)
Use MFBD or PCID way back from the 90s astronomy club to enhance those low quality posterity videos like the pros (got triggered on the 240p):
http://suvrit.de/papers/icip10.pdf
https://www.researchgate.net/profile/Francis_Flaherty/publication/24398666_Physically_constrained_Fourier_transform_deconvolution_method/links/54c6707b0cf2911c7a58d7e2.pdf?inViewer=true&pdfJsDownload=true&disableCoverPage=true&origin=publication_detail
It lays out some ideas that helps to significantly reduce forms of traffic analysis where the attacker doesn't have to be participating in the network to see whats going on. The ideas and other methods can be expanded upon to secure the traffic flows against attackers operating inside the network on a majority scale to a decent extent.
As a preface, known data of any kind is the enemy. If everyone could have their own privately protected fiber line to every other node that would be almost ideal, but it is not realistic. Eventually even then each line or major junctions of lines would be monitored. That doesn't mean you should give up on privacy and anonymity, which I believe plays an extremely importatnt role in protecting open free speech.
Basically this post very generally tries to implement ideas from what I imagine a true mixnet would use. Complete data encryption/obfuscation, full transportation freedom with multi-homing, data aggregation, and raiding/striping. (Don't say homomorphic encryption, don't say homomorphic encryption..)
https://en.wikipedia.org/wiki/Multihoming
https://en.wikipedia.org/wiki/Link_aggregation
https://speedify.com/blog/combining-internet-connections/link-aggregation-router-software/
https://www.connectify.me/blog/wifi-bridge/bridging-vs-bonding-explained/
https://ieeexplore.ieee.org/document/880788
Jun 27 '19: https://youtu.be/rLjMrIWHsxs?t=1349
#3 There is no way to connect to other nodes without showing who you are immediately connected to. There are ways around this but no one would casually use it; If it required you to buy expensive hardware and bounce signals off the moon, or an alternate method of communication using Line-of-Sight/Transparent data communications that is of no obvious origin and offering no single redirection point, making it difficult to track but not impossible [EG point-to-point and point-to-multipoint wireless backbone hauls but with terahertz optics].
In reality the best way would be to never have a handshake between nodes and instead start with a constant stream of encrypted data with a rolling key [Preshared EG via carrier pigeon, codeworded news stories, broadcast in ciphered morse by hooking a capacitor to the prison bars, or sent in a charge controller chip with PGP over ebay], to never require your network traffic to travel over known monitored trans-regional and international backbone junctions, never be easily tied to a unique IP address or MAC or subscription to an ISP, never worry about attackers running dozens of analysis and sniffer nodes in the network, and ideally never worry about "what you say can't hurt you".
######################
Icu2/P (I see you, too!) suggested modifications to anonymous network architecture
Node = A computer participating in the I2P network. Hopefully it isn't a network tap, or a virtual node in a honeypot network.
Tunnel = How I2P gets traffic from one end to the other, through many nodes, using many protocols, in a semi-anonymous fashion.
Pipe = Idea to make I2P much safer from outside attack and analysis, and a little bit from evil snitches.
Anonymous = A joke.
Single Point of Failure = You name, address, SSN, DoB, leaked WebRTC IP address, nontransient online pseudonym, permanenet node ID, cross domain browser or hardware fingerprint, software exploit, operating system telemetry, leaked permacookies, hidden x86 MSR RISC backdoors [Intel's AMT, Supermicro BMC, AMD PSP, etc], email address, background photo siphoning, correlation exposing conversations, keyloggers, speculative execution and caching attacks, ...
Buffer = A pool of data that can act as a shock/lag absorber
VPN = A single encrypted container around network traffic, usually non-continuous and never truly anonymous. >~85% bandwidth efficiency.
Obfuscation = Tries to avoid deep packet inspection and next-gen application firewall signature matching. Might be able to combine with Pipes.
Operating System = What a real anonymous network could be.
Quality of Service [QoS] = A feature in better routers that will allow you to have a stable dedicated pipe architecture at the same time as your games and videos, necessary on shared networks unless the Analysis Security Certainty Factor has a good AI adjuster behind it.
ISP = Internet Service Provider. If you have ATT or Verizon you should stop reading ... >here< (IX still needs to add a shield on Kansas City)
To be fair to the engineers, you should run pipes through tunnels, not tunnels through pipes. Just never say that it can't be done.
######################
That took a little while to type. I had space for a new point inbetween 9 and 10 on the notes from 2 years ago, so theres probably more knocking around in there somewhere. I'm here for questions if you need me to explain something.Edit: It may read redundantly, but I'm not sure how many ways I have to explain something for someone to get the picture. Advice welcome.
Edit May 25: I've been thinking about the timing reliability that all the Pipe VPN packets would need to be sent at, and want to suggest that something like Precision Timing Protocol be used to accurately determine [to a much higher degree than any form of NTP] the clock drift and other statistics between nodes with the standard continuous-bandwidth Pipes. I know that timing can be determined to <100 nanoseconds using PTP over leased dark fiber lines [from NIST on one side of the country to USNO AMC in Colorado Springs], and less so with standard backbone communications equipment [due to processing time and queuing]. Using anything but highly accurate and precise methods can allow fingerprinting and traffic deobfuscation both inside and outside the network. Also a highly accurate sort of fingerprinting would be possible knowing these clock timing & drift statistics.
Edit Sep 2 [Changed wording again, added WireGuard in #9 refs]: Modern high end network tap equipment can copy packets and tag them within 5ns, synchronized to their own local UTC source within 3ns at the extreme end of the bell curve, which is only ever off from UNSO-UTC or NIST-UTC by about 40ns. Traffic flow and timing analysis attacks are a real threat to anonymous networks.
We will discuss the future of Kovri.
Where: #kovri room on Freenode
Hi Kovri and Monero community, oneiric here. I just posted a new FFS idea to work full-time on Kovri for another quarter.
I appreciate all the support I received for my last FFS, and any love you show me for this FFS: https://forum.getmonero.org/6/ideas/91264/oneiric-full-time-kovri-developer-december-to-february
Developments will focus on expanding the test suite (unit/integration/fuzz), associated refactors/bug-fixes, and working toward integration with Monero.
Thanks for reading, love you all!
From a GitLab issue: https://gitlab.com/kovri-project/kovri/issues/1000
"Hard fork the I2P network, or design/implement a new system, or implement another existing system
We have gathered enough evidence over the years to finally propose this issue. Not to be taken lightly, I will present a very clear proposal and finish writing this issue after defcon.
The most recent of many poor decisions made by Java I2P project have proven to be the straw that broke the camel's back.
Details to come."
What is happening?
Thanks /u/medoelma7al for this huge work.
The new localization was included by two merge requests: one in kovri-docs and another one in kovri-site
As the title says, will a Kovri node get you in trouble as Tor would?
I'm not referring to the fact that the software is only in alpha stage and could have bugs that could allow an attacker to take control of your machine. (it will be a dedicated machine)
I'm looking for some help compiling the alpha release, was going to ask on #kovri but it appears I have to be a member and authenticate in. I'd like to join. Can someone help me with that?
what's the current status of kovri....
Why did the dev's decide to build Kovri rather than using the existing C++ I2P implementation: https://github.com/PurpleI2P/i2pd
hi i m running a monero stagenet full miner node how can i use kovri to hide and jumble my internet traffic while using windows 10
I recently stumbled upon ricochet, which is a anonymous peer-to-peer instant messaging app. https://github.com/ricochet-im/ricochet
Is there something similar based on kovri?
Can Kovri help defend against a DDoS and how should it be configured to do so?
Hello Kovri and Monero redditors! I'm oneiric, and am humbly asking for your support as a part-time Kovri junior developer for June to August.
Much more to come if the community likes my work.
I appreciate your contributions, attention, and/or feedback: https://forum.getmonero.org/6/ideas/90300/oneiric-june-august-part-time-kovri-junior-developer
Kovri PR
The worst thing you can do is overcomplicate something. Overengineering a process, especially with PR, is more often than not a waste of time. Time is life's most precious commodity, so let's cut through the bullshit and find a direct route to our audience(s).
What is/are Kovri's audience(s)?
For each audience, what does Kovri want to communicate at this point in time?
How/where does Kovri communicate with each audience?
Thoughts:
Assign someone to cover/manage a specific audience.
The person in charge of a specific audience will work with the Kovri community to craft a message for that audience. As the project develops, this message will need to be updated.
The person in charge of a specific audience will take the message and share it with the audience. This can be done (dependent on the audience) via e-mail, phone/video conference, appearances on podcasts, meetups, or conferences.
Note: This is not a directive. It is food for thought ahead of the meeting.