Ruslan · Tuesday, 28 April - 06:30
Ruslan · Tuesday, 28 April - 06:30
Ruslan · Sunday, 26 April - 17:57
PicoTorrent is a BitTorrent client
PicoTorrent is designed to be a friendly BitTorrent client for Windows with high performance and low memory usage.
At a glance
Strong encryption with support for tunneling via I2P, SOCKS4, SOCKS5 and HTTP(S)
Works with both IPv4 and IPv6
Multi-lingual user interface
Free, open source, with a great community
#Torrent #BitTorrent #p2p
Ruslan · Tuesday, 21 April - 03:32
Aside from anonymizing traffic within the network, I2P functions with the same capabilities as the Internet, however its design and decentralization create a censorship resistant environment for the free-flow of information.
Mirrored sites hosted on the network allow access to news outlets and other resources in areas where information is being filtered or denied. Online communities wishing to organize in restrictive environments can do so anonymously to mitigate political threat and protect each other
#i2p #p2p #DHT #Kademlia
Ruslan · Monday, 20 April - 18:32
Easy anonymous file sharing using I2P technology
MuWire is an anonymous file-sharing program. You can share, search and download files of any type.
MuWire is completely free and open source. There are no bundled ads or offers of any kind.
The first time you start MuWire it takes a few minutes to load.
The first time you run MuWire it will ask you to choose a nickname. That nickname is combined with a cryptographically strong I2P address and forms your unique identity on MuWire. For more info see
#p2p #filesharing #MuWire
Ruslan · Sunday, 12 April - 05:26
Xorro P2P How we built a BitTorrent-like P2P network from scratch
Xorro P2P is a BitTorrent-like peer-to-peer file sharing network built by software engineers Ken Chen, David Kurutz, and Terry Lee.
Interested in P2P networks and distributed systems, we set out to build our own from scratch. The version available today is our alpha release, providing a working proof-of-concept. We want to continue improving upon Xorro — upcoming features are listed further down this page.
This site outlines our journey building Xorro P2P. We hope that readers leave with a better understanding of the P2P problem space.
As strictly end users of P2P systems, we started our journey facing a very large learning curve. Much research was needed for us to understand the history and internals of these systems. We collectively read up on P2P networks, old and new: Napster, Gnutella, Freenet, BitTorrent, IPFS…
Centralized vs Decentralized
An important concept to understand is the difference between centralized and decentralized systems. A comparison of first and second generation networks helps to illustrate the difference.
Napster was a P2P file sharing service that was mostly used to transfer music files, and was popular from 1999-2001, It’s estimated that there were about 80 million registered users at its peak. Napster worked by having all nodes connect to a central index server that contained all the information about who was in possession of which files.
Due to its centralized nature, Napster was vulnerable to attacks and lawsuits and Napster was shut down by court order after about 2 years of service. In addition to those vulnerabilities, the central index meant there was a single point of failure, as well as a lack of scalability.
BitTorrent, Gnutella, Freenet: Decentralized
The next generation of P2P networks were able to escape the same fate as Napster by moving to a distributed model.
In a decentralized system like BitTorrent, every computer/node acts as a client and server, maintaining its own segment of a file lookup index. Nodes can find out about the locations of files through other nodes, removing the reliance on a central server.
Focusing on P2P File Sharing Systems
Knowing the advantages of newer P2P systems, we went down the path of investigating their features more deeply. Luckily P2P networks have been around for a while so there were many resources available. White papers about distributed hash tables (DHTs) proved to be the most critical, as DHTs are the foundation of current P2P networks. Countless hours were spent reading and digesting white papers, specification documents, blog posts, and StackOverflow answers. We made sure to have a good understanding of DHTs before we started any coding.
A Kademlia network consists of many Nodes.
Has a unique 160 bit ID.
Maintains a routing table containing contact information for other nodes.
Maintains its own segment of the larger distributed hash table.
Communicates with other nodes via 4 remote procedure calls.
Each node’s routing table is divided into ‘buckets’ — each bucket contains contact information for nodes of a specific ‘distance’ from the current node. We will discuss the concept of distance in more detail shortly.
Each contact contains the ID, IP address, and port number of the other node.
Because Xorro is a file sharing application, the DHT segment will contain key/value pairs where each key is a file id, and the corresponding value is the file location.
#XorroP2P #p2p #filesharing #dht #Kademlia
Ruslan · Wednesday, 1 April - 20:14
Technitium Mesh is a secure, anonymous, peer-to-peer (p2p), open source instant messenger designed to provide end-to-end encryption. Primary aim of developing this instant messenger is to provide privacy which is achieved using cryptography and anonymity using Tor network. It can be used over Internet and private LAN networks (without Internet) for instant messaging and file transfer with support for private chats and group chats.
Mesh is based on Bit Chat and is its successor. Mesh takes core ideas from its predecessor and removes a few. Notably, Mesh does not require centralized user registration and provides anonymous profile support using Tor hidden service. It also removes use of BitTorrent trackers for finding peers which was causing issues with Bit Chat since some ISPs blocking BitTorrent traffic would also block Bit Chat traffic. Instead, Mesh relies only on Distributed Hash Tables (DHT) for all purposes.
Mesh allows creating both pure p2p and anonymous profiles with support for running multiple profiles concurrently. Both p2p and anonymous profiles are interoperable such that a p2p profile user can connect with an anonymous profile user via Tor Network.
With Mesh, there is no meta data generated. User identifier is designed in such a way that it can be changed anytime to hide identity. Since, there is no user registration, we don’t know who uses Mesh or how many people use it. In p2p mode, the connections use IPv4 or IPv6 connectivity directly to connect with peers without any server in between. With anonymous mode, all connectivity occurs over Tor network and uses Tor hidden service to accept inbound connections.
#peer-to-peer #p2p #Mesh #messenger #Messaging
Riposte graduée : la Hadopi envoie de moins en moins de mails d’avertissement
news.movim.eu / Numerama · Tuesday, 31 March - 16:08
Depuis 2016, l'activité de la Hadopi se contracte sur la riposte graduée. Alors qu'elle a envoyé plus de 1,8 million de mails d'avertissement en 2017, elle en a transmis trois fois moins en 2019. [Lire la suite]
Abonnez-vous à notre chaîne YouTube pour ne manquer aucune vidéo !
L'article Riposte graduée : la Hadopi envoie de moins en moins de mails d’avertissement est apparu en premier sur Numerama .