StealthNet
   HOME

TheInfoList



OR:

StealthNet is an
anonymous P2P An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routi ...
file sharing File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
software based on the original RShare client, and has been enhanced. It was first named 'RShare CE' (RShare Community Edition). It use the same network and protocols as RShare. In 2011 a fork named ''DarkNode'' was released, but one year later the website is cleared with the source code.


History

Development was stopped in March 2011, with version 0.8.7.9, with no official explanation on the web site. In 2012, the developers had an incident with the software
Apache Subversion Apache Subversion (often abbreviated SVN, after its command name ''svn'') is a software versioning and revision control system distributed as open source under the Apache License. Software developers use Subversion to maintain current and histo ...
, a part of the
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the w ...
of StealthNet was lost : versions 0.8.7.5 (February 2010) to 0.8.7.9 (October 2010). However the source code is still available as files. In 2017 it was forked into version 0.8.8.0.


Features

Some of the features of StealhNet:http://www.stealthnet.de/en_features.php *
Mix network Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as ''mixes'' which take in messages from multiple senders, shuffle them, and send them back out in random order to the next dest ...
(use for the pseudo anonymous process) * Easy to use (same principles as
eMule eMule is a free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule now connects to both the eDonkey network and the Kad network. The distinguishing features of eMule are ...
) * Multi-source download : 'Swarming' (Segmented file transfer) * Resumption of interrupted downloads * Can filter the file types searched (allowing to search only among the videos/archives/musics/... files) * SNCollection: this type of file contain a list of files shared into StealthNet. Like the "eMule collection" file and Torrents files * Point-to-Point traffic encryption with AES standard process (
Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a varian ...
, 256 bitsStealthNet v0.8.7.9 source code, file '\core\Core\Constants.cs') * EndPoint to EndPoint traffic encryption with RSA standard (1024 bits) * Strong file hashes based on SHA-512 algorithm * Anti-
flooding A flood is an overflow of water ( or rarely other fluids) that submerges land that is usually dry. In the sense of "flowing water", the word may also be applied to the inflow of the tide. Floods are an area of study of the discipline hydrolog ...
measures *
Text mode Text mode is a computer display mode in which content is internally represented on a computer screen in terms of characters rather than individual pixels. Typically, the screen consists of a uniform rectangular grid of ''character cells'', each ...
client available for OS with Mono support like Linux, OSX and others


Drawbacks

* Has no support for UPnP (
Universal Plug and Play Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the n ...
), the user must open a
port A port is a maritime facility comprising one or more wharves or loading areas, where ships load and discharge cargo and passengers. Although usually situated on a sea coast or estuary, ports can also be found far inland, such as H ...
number (ie: 6097) into his router. * Anonymity is unproven. * The
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the w ...
contains no documentation at all. * The encryption level (AES 256 bits and RSA 1024 bits in the v0.8.7.9) that was strong in the 2000s is now medium since the 2010s.


See also

*
Anonymous P2P An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routi ...
*
I2P The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using ...


References


External links

*
Official web site
*
StealthNet upgrade (2017)
{{Internet censorship circumvention technologies Anonymous file sharing networks Free file sharing software File sharing software for Linux Windows file sharing software Free software programmed in C Sharp