Private Peer-to-peer
   HOME
*





Private Peer-to-peer
Private peer-to-peer (P2P) systems are peer-to-peer (P2P) systems that allow only mutually trusted peers to participate. This can be achieved by using a central server such as a Direct Connect hub to authenticate clients. Alternatively, users can exchange passwords or cryptographic keys with friends to form a decentralized network. Private peer-to-peer systems can be divided into friend-to-friend (F2F) and group-based systems. Friend-to-friend systems only allow connections between users who know one another, but may also provide automatic anonymous forwarding. Group-based systems allow any user to connect to any other, and thus they cannot grow in size without compromising their users' privacy. Some software, such as WASTE, can be configured to create either group-based or F2F networks. Software list * Direct Connect - file sharing and chat using private hubs * GigaTribe - a private community-oriented file-sharing program *Retroshare - a private F2F system based on PGP, implement ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer network of nodes. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional client–server model in which the consumption and supply of resources are divided. While P2P systems had previously been used in many application domains, the architecture was popularized by the file sharing system Napster, originally released in 1999. The concept has inspired new structures and philosophies in many areas of human interaction. In such social contexts, peer-to-peer as a meme refers to the egalitarian so ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Madster
Madster (initially called Aimster) was a peer-to-peer file sharing service. It was released in Napster's wake in August 2000 shut down in December 2002 as a result of a lawsuit by the Recording Industry Association of America. Origin According to John Deep, a professor at Rensselaer Polytechnic Institute, the Madster software was originally inspired by his daughter's use of instant messaging software. His idea was to combine instant messaging with file sharing. John Deep's daughter Aimee had an interest in providing privacy to her online friends; instant messaging was lacking when it came to privacy protection. Features The Madster service was initially called Aimster, but it was later renamed to Madster due to concerns that the Aimster name infringed AOL's AIM (AOL Instant Messenger) trademark. The Madster software allowed users to share files via instant messaging services. In particular, users could share files specifically with users who were included on a " buddy list" with ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Social VPN
A social VPN is a virtual private network that is created among individual peers, automatically, based on relationships established by them through a social networking service. A social VPN aims at providing peer-to-peer (P2P) network connectivity between a user and his or her friends, in an easy to set up manner that hides from the users the complexity in setting up and maintaining authenticated/encrypted end-to-end VPN tunnels. Architecture An architecture of a social VPN is based on a centralized infrastructure where users authenticate, discover their friends and exchange cryptographic public keys, and a P2P overlay which is used to route messages between VPN endpoints. For example, this allows an organization to have routed connections with separate offices, or with other organizations, over the Internet. A routed VPN connection across the Internet logically operates as a dedicated Wide Area Network (WAN) link. Packet capture and injection A social VPN uses a virtual network int ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


LAN Messenger
A LAN Messenger is an instant messaging program for computers designed for use within a single local area network (LAN). Many LAN Messengers offer basics functionality for sending private messages, file transfer, chatrooms and graphical smileys. The advantage of using a simple LAN messenger over a normal instant messenger is that no active Internet connection or central server is required, and only people inside the firewall will have access to the system. History A precursor of LAN Messengers is the Unix talk command, and similar facilities on earlier systems, which enabled multiple users on one host system to directly talk with each other. At the time, computers were usually shared between multiple users, who accessed them through serial or telephone lines. Novell NetWare featured a trivial person-to-person chat program for DOS, which used the PX/SPXprotocol suite. NetWare for Windows also included broadcast and targeted messages similar to WinPopup and the Windows Messenger ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Darknet
A dark net or darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social networks (usually used for file hosting with a peer-to-peer connection), and anonymity proxy networks such as Tor via an anonymized series of connections. The term "darknet" was popularized by major news outlets to associate with Tor Onion services, when the infamous drug bazaar Silk Road used it, despite the terminology being unofficial. Technology such as Tor, I2P, and Freenet was intended to defend digital rights by providing security, anonymity, or censorship resistance and is used for both illegal and legitimate reasons. Anonymous communication between whistle-blowers, activists, journalists and news organisations is also facilitated by darknets through use of applications such as SecureDrop. Terminology The term originally descri ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Friend-to-friend
A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication. Unlike other kinds of private P2P, users in a friend-to-friend network cannot find out who else is participating beyond their own circle of friends, so F2F networks can grow in size without compromising their users' anonymity. Retroshare, WASTE, GNUnet, Freenet and OneSwarm are examples of software that can be used to build F2F networks, though RetroShare is the only one of these configured for friend-to-friend operation by default. Many F2F networks support indirect anonymous or pseudonymous communication between users who do not know or trust one another. For example, a node in a friend-to-friend overlay can automatically forward a file (or a request for a file) anonymously between two friends, without telling either of them the other's name or IP address. These friends ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Microsoft Office Groove
Microsoft SharePoint Workspace (formerly Microsoft Office Groove) is a discontinued desktop application designed for document collaboration in teams with members who are regularly off-line or who do not share the same network security clearance. It is no longer included with Microsoft Office 2013. It has been replaced by a web-based service called OneDrive for Business. Groove's uses have included coordination between emergency relief agencies where different organizations do not share a common security infrastructure and where offline access is important, and amongst teams of knowledge workers, such as consultants who need to work securely on client sites. It is also used as a staging system for documents in development, where content can be developed then transferred to a portal when complete. Groove was initially developed by Lotus Notes creator Ray Ozzie, and developed by Groove Networks of Beverly, Massachusetts, until Microsoft's acquisition of Groove Networks in March 2005. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

University Of Cambridge
, mottoeng = Literal: From here, light and sacred draughts. Non literal: From this place, we gain enlightenment and precious knowledge. , established = , other_name = The Chancellor, Masters and Scholars of the University of Cambridge , type = Public research university , endowment = £7.121 billion (including colleges) , budget = £2.308 billion (excluding colleges) , chancellor = The Lord Sainsbury of Turville , vice_chancellor = Anthony Freeling , students = 24,450 (2020) , undergrad = 12,850 (2020) , postgrad = 11,600 (2020) , city = Cambridge , country = England , campus_type = , sporting_affiliations = The Sporting Blue , colours = Cambridge Blue , website = , logo = University of Cambridge logo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Direct Connect (file Sharing)
Direct Connect (DC) is a peer-to-peer file sharing protocol. Direct Connect clients connect to a central hub and can download files directly from one another. Advanced Direct Connect can be considered a successor protocol. Hubs feature a list of clients or users connected to them. Users can search for files and download them from other clients, as well as chat with other users. History NeoModus was started as a company funded by the adware Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ... "Direct Connect" by Jon Hess in November, 1999 while he was in high school. The first third-party client was called "DClite", which never fully supported the file sharing aspects of the protocol. Hess released a new version of Direct Connect, requiring a simple encryption key to initiate a con ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Turtle F2F
Turtle was a free software, free anonymous peer-to-peer network project being developed at the Vrije Universiteit in Amsterdam, involving professor Andrew Tanenbaum. It is not developed anymore. Like other anonymous P2P software, it allows users to share files and otherwise communicate without fear of legal sanctions or censorship. Turtle's claims of anonymity are backed by two research papers provided in the "external links" below. Architecture Technically, Turtle is a friend-to-friend (friend-to-friend, F2F) network - a special type of peer-to-peer network in which all your communication goes only to your friends, and then to their friends, and so on, to the ultimate destination. The basic idea behind Turtle is to build a peer-to-peer, P2P overlay on top of pre-existing trust relationships among Turtle users. Each user acts as node in the overlay by running a copy of the Turtle client software. Unlike existing P2P networks, Turtle does not allow arbitrary nodes to connect and exc ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Retroshare
Retroshare is a free and open-source peer-to-peer communication and file sharing app based on a friend-to-friend network built by GNU Privacy Guard (GPG). Optionally, peers may exchange certificates and IP addresses to their friends and vice versa. History Retroshare was founded in 2004 by Mark Fernie. There has been an unofficial build for the single-board computer Raspberry Pi, named PiShare, since 2012. On 4 November 2014, Retroshare scored 6 out of 7 points on the Electronic Frontier Foundation's secure messaging scorecard, which is now out-of-date. It lost a point because there has not been a recent independent code audit. In August 2015, Retroshare repository was migrated from SourceForge to GitHub. In 2016, ''Linux Magazine'' reviewed security gaps in Retroshare and described it as "a brave effort, but, in the end, an ineffective one." Design Retroshare is an instant messaging and file sharing network that uses a distributed hash table for address discovery. Users ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]