Differences between revisions 54 and 55
Revision 54 as of 2020-09-24 07:05:39
Size: 7462
Editor: fioddor
Comment:
Revision 55 as of 2020-09-24 18:03:43
Size: 4327
Comment: Remove all completed items or items listed in more visible TODOs
Deletions are marked like this. Additions are marked like this.
Line 7: Line 7:
Most of the work to be done on !FreedomBox is available at [[https://wiki.debian.org/FreedomBox/Roadmap2020|RoadMap]] and issue tracker [[https://salsa.debian.org/freedombox-team/freedombox/issues|Salsa]]). The following is an old list kept for historic reasons.
Line 9: Line 11:
This is the result of a brainstorm from the debconf team.

 * enable people to reclaim their privacy and control of their data
 * return to the peer to peer nature of the net (vs. tendency towards hierarchical organization)
 * making a consumer product
 * easy to use for everyone (pre-installed, easily configured, easily restored)
 * inexpensive (dirt cheap)
Line 17: Line 12:
 * smooth transition from cloud services (e.g. social networks)
 * secure routing
 * generic and configurable
 * extensible
 * want hardware makers to be enthusiastic about the project and not hide their specs

== Stakeholders ==

 * Users
 * Content Providers
 * Service Providers
 * Network Providers
 * Developers
 * Device Makers
Line 35: Line 16:
  * Email
Line 43: Line 23:
 * Messaging
  * XMPP - Extensible Messaging and Presence Protocol
   * http://xmpp.org/about/
   * http://xmpp.org/extensions/


== Areas of work / architecture ==

 * project management tool
 * installer
 * [[FreedomBox/Design/UserInterface | User interface]]
 * config
 * [[FreedomBox/Router | wireless router]]
 * telephony
 * mail
 * hardware support
 * calendaring
 * IRC proxy (maybe even server?)
 * statusnet instance
Line 65: Line 26:
 * Debian base with debconf pre-seeds for base systems (lenny?)
 * Webserver ([[http://nginx.org/|nginx]]?)
 * [[http://www.torproject.org/|Tor]]
 * [[http://www.i2p2.de/|I2P (with I2P-Bote and maybe Seedless bootstrapper)]]
 * Config system ([[http://sourceforge.net/apps/mediawiki/config-model/index.php?title=Main_Page | Config::Model]]?)
Line 72: Line 28:
 * ARM CPU architecture support
 * Zero-config installation to external USB and eSATA HDDs
Line 76: Line 30:
Line 88: Line 43:
 * Mail
   * If the box does mail then spam is a problem. Running spamassassin dramitically increases resource requirements on box
   * Collective spam processing is effective because it is easy to identify mass-mailing. Would need to do this in distributed manner (razor-style?)
   * There are other efficient solutions that decrease a lot the spam rate, see policyd or postgrey.
Line 100: Line 51:
 * '''Name of the project''': Freedombox is apparently copyrighted, or at least the domain is taken by a company: http://freedombox.net.
 * Critical security updates need to be applied quickly. Perhaps critical updates should be automatically and silently installed in order to minimise maintenance.
 * An existing unified interface for most aspects of server administration is [[http://www.webmin.com|Webmin]]. Perhaps a new (or modified) [[http://doxfer.com/Webmin/CreatingOverlayThemes|theme]], minimising options and complexity, would be the simplest solution for the freedomBox remote GUI.
Line 106: Line 54:
 * What we need (See [[RoadMap|https://wiki.debian.org/FreedomBox/Roadmap2020|RoadMap]] and issues in [[https://salsa.debian.org/freedombox-team|Salsa]]).
Line 108: Line 55:

== Done ==

 * !FreedomBox [[FreedomBox|wiki]]
 * DebConf BoF Friday 9:30am 414 Schapiro
   * gobby notes: [[attachment:dc10-freedombox.txt]]
   * http://doodle.com/8kwnst8phia4h4a5
 * Salsa project (https://salsa.debian.org/freedombox-team)
 * IRC channel created on OFTC '''#freedombox''' [[irc://irc.oftc.net/#freedombox]]
 * Set up a [[https://freedombox.org/community/|core/coordination team]] (ie. people that are actually going to work on this)
 * !FreedomBox [[https://freedomboxfoundation.org|Foundation]]
 * !FreedomBox international [[https://freedombox.org|public website]]
 * [[FreedomBox/Contribute/|How to contribute]]

Design and ToDos

Most of the work to be done on FreedomBox is available at RoadMap and issue tracker Salsa). The following is an old list kept for historic reasons.

Objectives

Relevant protocols

  • Identity
    • Gnupg, good old proven method to allow encrypting and signing your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. Usability considerations need to be considered.

    • WebID, draft definition of URI to defining "you" on the semantic web - i.e. works directly with FOAF, Sparql etc. Draft implementation seemlessly fallback to resolving via Webfinger if no FOAF data resolved.

    • OpenID, single sign-on

    • OAuth2, single sign-on plus authorization flows - IETF draft

  • user info (metadata)
    • Webfinger, draft of a protocol for getting user info (metadata) associated with e-mail via HTTP

    • Fingerpoint, draft of a protocol for getting user info (metadata) associated with e-mail via HTTP - requires minimal implementation (need no processing beyond static http to serve an identity!) and works directly with FOAF and Sparql.

Base system

Issues

  • How is each box discovered and identified?
    • Need some way of finding your mates
    • Most ISPs provide dynamic IPs. Would need to rely on external dynamic DNS service. (everyone else's Freedom boxes?)

    • possible solution: page kite

    • possible solution: unhosted

    • possible solution: p2p-dns modified to be cacheing and independent of .p2p TLD

    • possible solution: set up a list of dyndns style services that freedombox will update with IP info. Good enough for most folks.
  • Upstream bandwidth
    • Very limited with typcial ADSL connections. How much of a problem is that if people keep downloading photos from it whilst you try to use the net?
  • Coping with high demand
    • Limited system resources mean popular hosted content (such as a popular social networking node) could easily make server unavailable
    • How to cope with 'slashdotting'?
  • Identity management
    • Important to be able to identify yourself on various services so you know email and facebook and whatever IDs are all you, and should refer back to this FB for authentication. How do we do it? Is it needed in order to realise that an email addy is freedom-able and so signing/encryption can be used?
    • Multiple identities needed e.g for two sites (e.g. home+college) or ID for FB and ID for mobile phone?
  • Two boxes in one building (son/daughter brings FB home from college)
    • Movable, transportable
    • If a box is moved from one location to another and plugged in again, how does it continue to do what it was doing seamlessly?
  • Storage: if it hosts all data one produces, plus backup from friends, it needs to house adequate storage, preferably commodity sata disks.
    • For a purely online storage solution, this would be ok, but we would need a way to plug in or configure external storage. For example, I would want to plug in an external hard drive or configure it to use a NAS or a Eucalyptus cloud that someone I know operates.

General ToDo


Information

Support

Contribute

Reports

Promote

Overview

Hardware

Live Help

Where To Start

Translate

Calls

Talks

Features

Vision

Q&A

Design

To Do

Releases

Press

Download

Manual

Code

Contributors

Blog

FreedomBox for Communities

FreedomBox Developer Manual

HELP & DISCUSSIONS: Discussion Forum - Mailing List - #freedombox irc.debian.org | CONTACT Foundation | JOIN Project

Next call: Sunday, October 25th at 17:00 UTC

Latest news: Help translate freedombox.org - 2020-08-01

This page is copyright its contributors and is licensed under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license.


CategoryFreedomBox