StealthNet is an
anonymous P2P
An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routin ...
file sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include ...
software based on the original
RShare client, and has been enhanced. It was first named 'RShare CE' (RShare Community Edition). It use the same network and protocols as
RShare.
In 2011 a fork named ''DarkNode'' was released, but one year later the website is cleared with the source code.
History
Development was stopped in March 2011, with version 0.8.7.9, with no official explanation on the web site.
In 2012, the developers had an incident with the software
Apache Subversion
Apache Subversion (often abbreviated SVN, after its command name ''svn'') is a version control system distributed as open source under the Apache License. Software developers use Subversion to maintain current and historical versions of files su ...
, a part of the
source code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer.
Since a computer, at base, only ...
of StealthNet was lost : versions 0.8.7.5 (February 2010) to 0.8.7.9 (October 2010). However the source code is still available as files.
In 2017 it was forked into version 0.8.8.0.
Features
Some of the features of StealthNet:
*
Mix network
Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as ''mixes'' which take in messages from multiple senders, shuffle them, and send them back out in random order to the next dest ...
(use for the pseudo anonymous process)
* Easy to use (same principles as
eMule
eMule is a Free software, free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule connects to both the eDonkey network and the Kad network. The distinguishing features of eM ...
)
* Multi-source download : 'Swarming' (Segmented file transfer)
* Resumption of interrupted downloads
* Can filter the file types searched (allowing to search only among the videos/archives/musics/... files)
* SNCollection: this type of file contain a list of files shared into StealthNet. Like the "eMule collection" file and Torrents files
*
Point-to-Point traffic encryption with AES standard process (
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
, 256 bits
[StealthNet v0.8.7.9 source code, file '\core\Core\Constants.cs'])
* EndPoint to EndPoint traffic encryption with
RSA standard (1024 bits
)
* Strong
file hashes based on
SHA-512 algorithm
* Anti-
flooding
A flood is an overflow of water ( or rarely other fluids) that submerges land that is usually dry. In the sense of "flowing water", the word may also be applied to the inflow of the tide. Floods are of significant concern in agriculture, civi ...
measures
*
Text mode
Text mode is a computer display mode in which content is internally represented on a computer screen in terms of characters rather than individual pixels. Typically, the screen consists of a uniform rectangular grid of ''character cells'', ea ...
client available for OS with
Mono support like Linux, OSX and others
Drawbacks
* Has no support for UPnP (
Universal Plug and Play
Universal Plug and Play (UPnP) is a set of networking protocols on the Internet Protocol (IP) that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices, to seamlessly discover ...
), the user must open a
port
A port is a maritime facility comprising one or more wharves or loading areas, where ships load and discharge cargo and passengers. Although usually situated on a sea coast or estuary, ports can also be found far inland, such as Hamburg, Manch ...
number (ie: 6097) into his router.
* Anonymity is unproven.
* The
source code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer.
Since a computer, at base, only ...
contains no documentation at all.
* The encryption level (AES 256 bits and RSA 1024 bits in the v0.8.7.9) that was strong in the 2000s is now medium since the 2010s.
See also
*
Anonymous P2P
An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routin ...
*
I2P
References
External links
Archived Web Site(Archive.Org)
{{Internet censorship circumvention technologies
Anonymous file sharing networks
Free file sharing software
File sharing software for Linux
Windows file sharing software
Free software programmed in C Sharp