1. Q: Do I have to have a dedicated hardware or can I run it at my desktop machine (or tablet, phone etc.)?

    A: No dedicated hardware required. In fact it's often installed at the users desktop. But: it's the more natural use case. Having a dedicated, cheap computer, typically a plug computer running 24/7 at low power consumption allows you to log into your system from any device anywhere.

    Furthermore keep in mind that you peer should be available (with at least 66% probability) to your relatives, friends, colleagues and peers as a notary whenever those want to store or share information.

  2. Q: The administrator was invented to easy computer operations, who maintains those systems?

    A: That's your responsibility. You might ask someone to help you. But in principle it's your machine. The Askemos/BALL must be able to span areas of accountability. An omni-privileged administrative power doesn't fit. It's comes at the risk of inside attacks from simple leaks of secrets up to impersonation.

  3. Q: If every node keep and process all the information available in the Askemos system? The sheer amount of data will grow beyond bounds!

    A: True. But not all data replicates everywhere. Users decide where the data goes.

    The user most "somehow" trust a particular machine to process the information because only clear text information can be processed and during the processing it's vulnerable to breach of anonymity. Therefore only a subset of the data is available at each node.

    Note BTW that one might choose to simply store (in contrast to process) data using Askemos/BALL, e.g., in a WebDAV directory. This in turn can be encrypted.

  4. Q: Is a user assigned a set of nodes of the Askemos network where all the information of said user is processed?

    A: No. "Spatial privacy is often the best way to promote physical privacy." Data is distributed the way the user trusts nodes. And users usually trust different parties with different information. A user might trust the doctor's and the spouse's computer with his/her health data but hide it from the employer, while the pay check is left with the employer and the tax consultant but better hidden from the doctor (...or was it the spouse in that case? ;-).

  5. Q: Which (cryptographic) methods are deployed to protect privacy within BALL?

    A: None. Cryptographic protection of privacy (anonymity) is intentionally left outside of the scope of Askemos. BALL is supposed to be used in conjunction (linked against libraries) for encryption. Askemos is concerned with topics like availability, liability and trustworthiness.

    Note however that's easy to use crypto filesystems etc. on to of file systems held in a BALL network. That gives you both: availability and the secrecy of encryption.