Introductory tasks for new GNUnet hackers (updated)

We sometimes get requests for easy tasks to get started and join the GNUnet hacker community. However, it is often difficult for potential new contributors which areas they might be able to contribute to, especially as not all tasks are suitable for people that are just starting to work with GNUnet.

New GPG key

I created a new GPG key today. You can find the full key on keyservers, my homepage and in the profile on The fingerprint is D842 3BCB 326C 7907 0339 29C7 939E 6BE1 E29F C3CC. This key will be used to sign future releases of GNUnet.

Open positions for (aspiring) GNUnet hackers!

As part of my recent move to Inria in Rennes (Bretagne, France), a few new positions for research and development around GNUnet are now opening up. The positions are open for PhD students (Master's required) and Post-Docs (PhD required).

We Fix the Net Assembly @ 31c3

The "We Fix the Net" assembly" is to be the perfect place at 31c3 for all hackers to do something about replacing today's broken Internet with secure alternatives. We hope to have some talks and panels like last year. Details will be posted here closer to the congress, for now, please contact us at if you are interested to present your work or organize something practical. Topics include:

Talk @ GHM: The GNU Name System

On August 16rd 2014, Christian Grothoff gave a talk on "The GNU Name System" at GHM 2014 hosted at TUM. You can now find the video below.

Goodbye Munich, Bonjour Rennes!

After spending five great years at TU Munich supported by a generous five year grant from the DFG, I will be moving to a new position at Inria in Rennes where my research and development on secure, decentralised network protocols will continue.

Talk @ GHM: panicd: An approach for home routers to securely erase sensitive data

On August 15rd 2014, our student Nicolas Benes gave a talk on "panicd: An approach for home routers to securely erase sensitive data" defending his almost finished Bachelor's Thesis at GHM 2014 hosted at TUM. The goal of his work is to ensure that secrets (especially key material) stored on your hardware (especially in memory) remain secret even if an adversary attempts to take physical control over the device. You can now find the video below.


Subscribe to GNUnet RSS