A Bittorrent Performance Evaluation Framework

Total Page:16

File Type:pdf, Size:1020Kb

A Bittorrent Performance Evaluation Framework A BitTorrent Performance Evaluation Framework Razvan˘ Deaconescu Razvan˘ Rughinis¸ Nicolae T¸ apus¸˘ University Politehnica of Bucharest Computer Science Department Splaiul Independent¸ei nr. 313, Bucharest, Romania frazvan.deaconescu, razvan.rughinis, [email protected] Abstract to be the killer application of the recent ears, by dominating the P2P traffic in the Internet [13]. In the last decade, file sharing systems have generally Most of the P2P and HTTP traffic in the Internet is mul- been dominated by P2P solutions. Whereas e-mail and timedia traffic. Current research and development are fo- HTTP have been the killer apps of the earlier Internet, a cused on expanding BitTorrent solution to video on demand large percentage of the current Internet backbone traffic is [8] and multimedia broadcasting and on creating social net- BitTorrent traffic [12]. BitTorrent has proven to be the per- works [2]. fect file sharing solution for a decentralized Internet, mov- As most of the current Internet traffic is video, BitTor- ing the burden from central servers to each individual sta- rent implementations focus on providing a media player in- tion and maximizing network performance by enabling un- terface, integrating video download and video rendering. used communication paths between clients. The BitTorrent protocol is also starting to integrate video Although there have been extensive studies regarding the streaming capabilities [14] [7]. performance of the BitTorrent protocol and the impact of As a decentralized system, a BitTorrent network is very network and human factors on the overall transfer quality, dynamic and download performance is influenced by many there has been little interest in evaluating, comparing and factors: swarm size, number of peers, network topology, analyzing current real world implementations. With hun- ratio enforcement. The innate design of the BitTorrent pro- dreds of BitTorrent clients, each applying different algo- tocol implies that each client may get a higher download rithms and performance optimization techniques, we con- speed by unchoking a certain client. At the same time, fire- sider evaluating and comparing various implementations walls and NAT have continuously been a problem for mod- an important issue. ern P2P systems and decrease the overall performance. In this paper, we present a BitTorrent performance eval- Despite implementing the BitTorrent specification [1] uation framework that we are using to test and compare and possible extensions each client uses different algo- current real world BitTorrent implementations. The frame- rithms and behaves differently on a given situation: it may work is fully automated and clients have been instrumented limit the number of peers, it may use heuristic information to output transfer status data and extensive logging infor- for an optimistic unchoke, it could choose a better client to mation. download from. Our paper presents a BitTorrent performance evaluation framework [9] that enables testing various BitTorrent imple- mentations and offering extensive status information about 1 Introduction each client. This information can be used for analysis, in- terpretation and correlation between different implementa- P2P sharing systems are continuously developing and in- tions and for the impact of a swarms state on the download creasing in size. There is a large diversity of solutions and performance. protocols for sharing data and knowledge which enable an Our BitTorrent performance evaluation framework is increasing interest from common users and commercial and fully automated. All clients have been instrumented to academic institutions [11]. use command line interfaces that enable automated actions. It is assumed [12] that BitTorrent is responsible for a Clients are started simultaneously and results are collected large portion of all Internet traffic. BitTorrent has proven after the file transfer is complete. 1 2 BitTorrent Clients For our experiments we have selected the BitTorrent clients that are most significant nowadays, based on the number of users, reported performance and features and his- tory. We have used Azureus, Tribler, Transmission, Aria, libtorrent rasterbar/hrktorrent, BitTornado and the mainline client (open source version). All clients are open source as we had to instrument them to use a command line interface and to output verbose logging information. Azureus, now called Vuze, is a popular BitTorrent client written in Java. We have been using version 2.3.0.6 of Azureus. The main issue with Azureus was the lack of a Figure 1. Infrastructure proper CLI that would enable automation. Though limited, a Console UI module enabled automating the tasks of run- ning Azureus and gathering download status and logging The reason for choosing to test it was because of a common information. background with Tribler. However, as testing revealed, it Tribler is a BitTorrent client written in Java and one of had its share of bugs and problems and it was eventually the most successful academic research project. Developed dropped. by a team in TU Delft, Tribler aims at adding various fea- BitTorrent Mainline is the original BitTorrent client tures to increase download speed and user experience. We written by Bram Cohen in Python. We have used version have used Tribler 4.2. Although a GUI oriented client, Tri- 5.2 during our experiments, the last open-source version. bler does offer a command line interface for automation. The mainline client provides a CLI and logging can be en- Extensive logging information is enabled by updating the abled through minor modifications of the source code. value of a few variables. Transmission is the default BitTorrent client in the pop- ular Ubuntu Linux distribution. Transmission is written in 3 Framework C and aims at delivering a good amount of features while still keeping a small memory footprint. The version we used for our tests was transmission 1.22. Transmission has As shown in Figure 1, the infrastructure on top of which a fully featured CLI and was one of the clients that were our framework runs consists of a command station, a repos- very easy to automate. Detailed debugging information re- itory and a set of client stations. garding connections and chunk transfers can be enabled by Communication between the CS and the BTS is handled setting the TR DEBUG FD evironment variable. over SSH for easy access and commanding. The repository Aria2 is a multiprotocol (HTTP, FTP, BitTorrent, Met- is used for storing the framework implementation and .tor- alink) download client. Throughout our tests we have been rent files for download sessions. Each BTS checks out the using version 0.14. aria2 natively provides a CLI and it was most recent framework version and the .torrent files to be easy to automate. Logging is also enabled through CLI ar- used. guments. Aria2 is written in C++ The framework is actually a set of small shell scripts en- libtorrent rasterbar/hrktorrent is a BitTorrent library abling the communication between the CS and the BTS and written in C++. It is used by a number of BitTorrent clients for running each BitTorrent client through its command line such as Deluge, qBittorent and SharkTorrent. As we were interface. looking for a client with a CLI we found hrktorrent to be For each download session the commander specifies the the best choice. hrktorrent is a lightweight implementa- .torrent file to be used and the mapping between each Bit- tion over libtorrent and provides the necessary interface for Torrent client and a BTS. Through SSH it runs a specific automating a BitTorrent transfer, albeit some modifications script on the target BTS enabling a BitTorrent client. The have been necessary. Libtorrent provides extensive logging BTS need not be in the same network. The only require- information by defining the TORRENT LOGGING and ment for the client stations is to run an SSH server and be TORRENT VERBOSE LOGGING MACROS. We have accessible through SSH. used version 0.13.1 of libtorrent and the most recent ver- Each BitTorrent client uses a specialized environment for sion of hrktorrent. storing logging and download status information. All these BitTornado is an old BitTorrent client written in Python. data can then be collected and analyzed. Figure 2. Test Swarm 1 Figure 3. Test Swarm 2 3.1 Repository access Table 1. Test Swarms Results Client Test1 Test2 Test3 Test 4 This project has been developed as part of the FP7 P2P- file size 908MB 4.1GB 1.09GB 1.09GB Next project. The project is open source. Anyone can acces seeders 2900 761 521 496 its repository [9] or use the web interface [10] to browse the leechers 2700 117 49 51 source. aria2c 1h17m 53m53s 8m 10m23s azureus 32m41s 38m33s N/A 7m bittorrent 4h53m 60m39s 26m 14m 4 Experimental setup libtorrent 9m41s 15m13s 2m30s 2m14s transmission 40m46s 53m 7m 5m Our experimental setup consisted of six identical com- tribler 34m 21m N/A N/A puters running the same operating system and sowftware. The hardware configuration includes CPU Pentium 4 2GHz, RAM 1 GB, HDD 160 GB. We have used Ubuntu 7.10 swarm. Although many data were collected, only the total Gutsy Gibbon. download time is featured in the table. The six computers are located in the same network and The conclusions drawn after result analysis were: are, thus using a common bandwidth to access the Internet. The computers have been firewalled from each other such • hrk/libttorrent is continuously surpassing the other that communication is enabled only with peers from the In- clients in different scenarios; ternet. Most of our experiments were simultaneous download • tribler, azureus and transmission are quite good clients sessions. Each system ran a specific client in the same time but lag behind hrktorrent; and conditions as the other clients. Results and logging data were collected after each client finished its download. • mainline and aria are very slow clients and should be dropped from further tests; 5 Results • swarms that are using sharing ratio enforcement of- fer better performance; a file is downloaded at least Our framework has been used to test different swarm 4 times faster within a swarm using sharing ratio en- (different .torrent files).
Recommended publications
  • New York University Annual Survey of American Law New York of American Law University Annual Survey
    nys69-2_cv_nys69-2_cv 9/22/2014 8:41 AM Page 2 (trap 04 plate) Vol. 69 No. 2 Vol. New York University Annual Survey of American Law New York University Annual Survey of American Law New York ARTICLES TOWARD ADEQUACY Sarah L. Brinton SHOULD EVIDENCE OF SETTLEMENT NEGOTIATIONS AFFECT ATTORNEYS’ FEES AWARDS? Seth Katsuya Endo A LOOK INSIDE THE BUTLER’S CUPBOARD: HOW THE EXTERNAL WORLD REVEALS INTERNAL STATE OF MIND IN LEGAL NARRATIVES Cathren Koehlert-Page NOTES EXPERTISE AND IMMIGRATION ADMINISTRATION: WHEN DOES CHEVRON APPLY TO BIA INTERPRETATIONS OF THE INA? Paul Chaffin WHAT MOTIVATES ILLEGAL FILE SHARING? EMPIRICAL AND THEORETICAL APPROACHES Joseph M. Eno 2013 Volume 69 Issue 2 2013 35568-nys_69-2 Sheet No. 1 Side A 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 1 23-OCT-14 9:10 NEW YORK UNIVERSITY ANNUAL SURVEY OF AMERICAN LAW VOLUME 69 ISSUE 2 35568-nys_69-2 Sheet No. 1 Side A 10/28/2014 12:36:12 NEW YORK UNIVERSITY SCHOOL OF LAW ARTHUR T. VANDERBILT HALL Washington Square New York City 35568-nys_69-2 Sheet No. 1 Side B 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 2 23-OCT-14 9:10 New York University Annual Survey of American Law is in its seventy-first year of publication. L.C. Cat. Card No.: 46-30523 ISSN 0066-4413 All Rights Reserved New York University Annual Survey of American Law is published quarterly at 110 West 3rd Street, New York, New York 10012.
    [Show full text]
  • Digital Fountain Erasure-Recovery in Bittorrent
    UNIVERSITÀ DEGLI STUDI DI BERGAMO Facoltà di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S – Sistemi Informatici Digital Fountain Erasure Recovery in BitTorrent: integration and security issues Relatore: Chiar.mo Prof. Stefano Paraboschi Correlatore: Chiar.mo Prof. Andrea Lorenzo Vitali Tesi di Laurea Specialistica Michele BOLOGNA Matricola n. 56108 ANNO ACCADEMICO 2007 / 2008 This thesis has been written, typeset and prepared using LATEX 2". Printed on December 5, 2008. Alla mia famiglia “Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to,” said the Cat. “I don’t much care where —” said Alice. “Then it doesn’t matter which way you go,” said the Cat. “— so long as I get somewhere,” Alice added as an explanation. “Oh, you’re sure to do that,” said the Cat, “if you only walk enough.” Lewis Carroll Alice in Wonderland Acknowledgments (in Italian) Ci sono molte persone che mi hanno aiutato durante lo svolgimento di questo lavoro. Il primo ringraziamento va ai proff. Stefano Paraboschi e Andrea Vitali per la disponibilità, la competenza, i consigli, la pazienza e l’aiuto tecnico che mi hanno saputo dare. Grazie di avermi dato la maggior parte delle idee che sono poi confluite nella mia tesi. Un sentito ringraziamento anche a Andrea Rota e Ruben Villa per l’aiuto e i chiarimenti che mi hanno gentilmente fornito. Vorrei ringraziare STMicroelectronics, ed in particolare il gruppo Advanced System Technology, per avermi offerto le infrastrutture, gli spa- zi e tutto il necessario per svolgere al meglio il mio periodo di tirocinio.
    [Show full text]
  • Downloading Copyrighted Materials
    What you need to know before... Downloading Copyrighted Materials Including movies, TV shows, music, digital books, software and interactive games The Facts and Consequences Who monitors peer-to-peer file sharing? What are the consequences at UAF The Motion Picture Association of America for violators of this policy? (MPAA), Home Box Office, and other copyright Student Services at UAF takes the following holders monitor file-sharing on the Internet minimum actions when the policy is violated: for the illegal distribution of their copyrighted 1st Offense: contents. Once identified they issue DMCA Loss of Internet access until issue is resolved. (Digital Millennium Copyright Act) take-down 2nd Offense: notices to the ISP (Internet Service Provider), in Loss of Internet access pending which the University of Alaska is considered as resolution and a $100 fee assessment. one, requesting the infringement be stopped. If 3rd Offense: not stopped, lawsuit against the user is possible. Loss of Internet access pending resolution and a $250 fee assessment. What is UAF’s responsibility? 4th, 5th, 6th Offense: Under the Digital Millennium Copyright Act and Loss of Internet access pending resolution and Higher Education Opportunity Act, university a $500 fee assessment. administrators are obligated to track these infractions and preserve relevent logs in your What are the Federal consequences student record. This means that if your case goes for violators? to court, your record may be subpoenaed as The MPAA, HBO and similar organizations are evidence. Since illegal file sharing also drains becoming more and more aggressive in finding bandwidth, costing schools money and slowing and prosecuting alleged offenders in criminal Internet connections, for students trying to use court.
    [Show full text]
  • A Study of Peer-To-Peer Systems
    A Study of Peer-to-Peer Systems JIA, Lu A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Philosophy in Information Engineering The Chinese University of Hong Kong August 2009 Abstract of thesis entitled: A Study of Peer-to-Peer Systems Submitted by JIA, Lu for the degree of Master of Philosophy at The Chinese University of Hong Kong in June 2009 Peer-to-peer (P2P) systems have evolved rapidly and become immensely popular in Internet. Users in P2P systems can share resources with each other and in this way the server loading is reduced. P2P systems' good performance and scalability attract a lot of interest in the research community as well as in industry. Yet, P2P systems are very complicated systems. Building a P2P system requires carefully and repeatedly thinking and ex- amining architectural design issues. Instead of setting foot in all aspects of designing a P2P system, this thesis focuses on two things: analyzing reliability and performance of different tracker designs and studying a large-scale P2P file sharing system, Xun- lei. The "tracker" of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server tracker, to DHT- based (distributed hash table) serverless systems. In the first part of this thesis, we classify the different tracker designs, dis- cuss the different considerations for these designs, and provide simple models to evaluate the reliability of these designs. Xunlei is a new proprietary P2P file sharing protocol that has become very popular in China.
    [Show full text]
  • TI3800 Bachelorproject
    TI3800 Bachelorproject Android Tor Tribler Tunneling Final Report Authors: Supervisor: Rolf Jagerman Dr. Ir. Johan Pouwelse Laurens Versluis Project coach: Martijn de Vos Ir. Egbert Bouman June 23, 2014 Abstract Tribler is a decentralized peer-to-peer file sharing system. Recently the Tribler development team has introduced anonymous internet communication using a Tor-like protocol in their trial version. The goal of our bachelor project is to port this technology to Android devices. This is a challenging task because cross-compiling the necessary libraries to the ARM CPU architecture is uncharted territory. We have successfully ported all dependencies of Tribler to Android. An application called Android Tor Tribler Tunneling (AT3) has been developed that tests whether these libraries work. This application downloads a test torrent and measures information such as CPU usage and download speed. Based on this information we have concluded that it is currently not viable to run the anonymous tunnels on an Android smartphone. Creating circuits with several hops that use encryption is very computationally expensive and modern smartphones can hardly keep up. By using optimized cryptographic libraries such as gmp or with the recently announced ARMv8 architecture which supports hardware-accelerated AES encryption, creating such circuits might become possible. Preface This document describes the bachelor project we performed at the TU Delft. Without the help of certain people at the TU Delft (and outside), this project would not be possible. In particular, we would like to thank the following people: Johan Pouwelse, for his excellent guidance, deep insights and feedback. The Tribler team, for always being able to help us with problems and questions.
    [Show full text]
  • Multi-Core Architecture for Anonymous Internet Streaming
    Multi-core architecture for anonymous Internet streaming Quinten Stokkink Multi-core architecture for anonymous Internet streaming Master’s Thesis in Computer Science Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Quinten Stokkink 3rd March 2017 Author Quinten Stokkink Title Multi-core architecture for anonymous Internet streaming MSc presentation 15th March 2017 Graduation Committee Graduation professor: Prof. dr. ir. D. H. J. Epema Delft University of Technology Supervisor: Dr. ir. J. A. Pouwelse Delft University of Technology Committee member: Dr. Z. Erkin Delft University of Technology Abstract There are two key components for high throughput distributed anonymizing ap- plications. The first key component is overhead due to message complexity of the utilized algorithms. The second key component is an nonscalable architecture to deal with this high throughput. These issues are compounded by the need for an- onymization. Using a state of the art serialization technology has been shown to increase performance, in terms of CPU utilization, by 65%. This is due to the com- pression (byte stuffing) used by this technology. It also decreased lines of code in the Tribler project by roughly 2000 lines. Single-core architectures are shown to be optimizable by performing a minimum s,t-cut on the data flows within the original architecture: between the entry point and the most costly CPU-utilizing compon- ent as derived from profiling the application. This method is used on the Tribler technology to create a multi-core architecture. The resulting architecture is shown to be significantly more efficient in terms of consumed CPU for the delivered file download speed.
    [Show full text]
  • Credits in Bittorrent: Designing Prospecting and Investments Functions
    Credits in BitTorrent: designing prospecting and investments functions Ardhi Putra Pratama Hartono Credits in BitTorrent: designing prospecting and investment functions Master’s Thesis in Computer Science Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Ardhi Putra Pratama Hartono March 17, 2017 Author Ardhi Putra Pratama Hartono Title Credits in BitTorrent: designing prospecting and investment functions MSc presentation Snijderzaal, LB01.010 EEMCS, Delft 16:00 - 17:30, March 24, 2017 Graduation Committee Prof. Dr. Ir. J.A. Pouwelse (supervisor) Delft University of Technology Prof. Dr. Ir. S. Hamdioui Delft University of Technology Dr. Ir. C. Hauff Delft University of Technology Abstract One of the cause of slow download speed in the BitTorrent community is the existence of freeriders. The credit system, as one of the most widely implemented incentive mechanisms, is designed to tackle this issue. However, in some cases, gaining credit efficiently is difficult. Moreover, the supply and demand misalign- ment in swarms can result in performance deficiency. As an answer to this issue, we introduce a credit mining system, an autonomous system to download pieces from selected swarms in order to gain a high upload ratio. Our main work is to develop a credit mining system. Specifically, we focused on an algorithm to invest the credit in swarms. This is composed of two stages: prospecting and mining. In prospecting, swarm information is extensively col- lected and then filtered. In mining, swarms are sorted by their potential and then selected. We also propose a scoring policy as a method to quantify swarms with a numerical score.
    [Show full text]
  • Master's Thesis
    MASTER'S THESIS Analysis of UDP-based Reliable Transport using Network Emulation Andreas Vernersson 2015 Master of Science in Engineering Technology Computer Science and Engineering Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Abstract The TCP protocol is the foundation of the Internet of yesterday and today. In most cases it simply works and is both robust and versatile. However, in recent years there has been a renewed interest in building new reliable transport protocols based on UDP to handle certain problems and situations better, such as head-of-line blocking and IP address changes. The first part of the thesis starts with a study of a few existing reliable UDP-based transport protocols, SCTP which can also be used natively on IP, QUIC and uTP, to see what they can offer and how they work, in terms of features and underlying mechanisms. The second part consists of performance and congestion tests of QUIC and uTP imple- mentations. The emulation framework Mininet was used to perform these tests using controllable network properties. While easy to get started with, a number of issues were found in Mininet that had to be resolved to improve the accuracy of emulation. The tests of QUIC have shown performance improvements since a similar test in 2013 by Connectify, while new tests have identified specific areas that might require further analysis such as QUIC’s fairness to TCP and performance impact of delay jitter. The tests of two different uTP implementations have shown that they are very similar, but also a few differences such as slow-start growth and back-off handling.
    [Show full text]
  • Bittorrent, Inc., ) DOCKET NO
    142 3020 UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION COMMISSIONERS: Edith Ramirez, Chairwoman Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny ____________________________________ ) In the Matter of ) ) BitTorrent, Inc., ) DOCKET NO. C-4464 a corporation. ) ) ___________________________________ ) COMPLAINT The Federal Trade Commission, having reason to believe that the BitTorrent, Inc., a corporation, has violated the Federal Trade Commission Act (“FTC Act”), and it appearing to the Commission that this proceeding is in the public interest, alleges: 1. Respondent BitTorrent, Inc. (“BitTorrent”) is a California corporation, with its principal office or place of business at 303 2nd Street, Suite S600, San Francisco, CA 94107. 2. Respondent is the developer of a popular peer-to-peer file-sharing system used to exchange software, music, movies, digital books, and other large files online. 3. The acts and practices of respondent as alleged in this complaint have been in or affecting commerce, as “commerce” is defined in Section 4 of the FTC Act. 4. Respondent has set forth on its website, www.bittorrent.com, privacy policies and statements about its practices, including statements related to its participation in the Safe Harbor privacy framework agreed upon by the U.S. and the European Union (“U.S.-EU Safe Harbor Framework”). The Framework 5. The U.S.-EU Safe Harbor Framework provides a method for U.S. companies to transfer personal data outside of Europe that is consistent with the requirements of the European Union Directive on Data Protection (“Directive”). Enacted in 1995, the Directive sets forth European Union (“EU”) requirements for privacy and the protection of personal data.
    [Show full text]
  • Deluge-2.0.3
    deluge Documentation Release 2.0.3 Deluge Team June 12, 2019 CONTENTS 1 Contents 1 1.1 Getting started with Deluge.......................................1 1.2 How-to guides..............................................2 1.3 Release notes...............................................3 1.4 Development & community.......................................6 1.5 Development guide............................................ 11 1.6 Reference................................................. 21 i ii CHAPTER ONE CONTENTS 1.1 Getting started with Deluge This is a starting point if you are new to Deluge where we will walk you through getting up and running with our BitTorrent client. 1.1.1 Installing Deluge These are the instructions for installing Deluge. Consider them a work-in-progress and feel free to make suggestions for improvement. Ubuntu PPA Until the stable PPA is updated, the development version of Deluge can be used: sudo add-apt-repository-u ppa:deluge-team/stable sudo apt install deluge PyPi To install from Python PyPi, Deluge requires the following system installed packages: sudo apt install python3-pip python3-libtorrent python3-gi python3-gi-cairo gir1.2- ,!gtk-3.0 gir1.2-appindicator3 Install with pip: pip install deluge Windows Unfortuately due to move to GTK3 and Python 3 there is no installer package currently available for Windows. Intrepid users can install Deluge from seperate packages as detailed in issue #3201. 1 deluge Documentation, Release 2.0.3 macOS There is no .app package currently for macOS, but can try Deluge with homebrew. 1. Install Homebrew 2. Open a terminal. 3. Run the following to install required packages: brew install pygobject3 gtk+3 adwaita-icon-theme brew install libtorrent-rasterbar 4. To fix translations: brew link gettext--force 5.
    [Show full text]
  • Justin Sun Chief Executive Officer Bittorrent, Inc. 301 Howard Street #2000 San Francisco, CA 94105
    Justin Sun Chief Executive Officer BitTorrent, Inc. 301 Howard Street #2000 San Francisco, CA 94105 Charles Wayn Chief Executive Officer DLive 19450 Stevens Creek Blvd #100 Cupertino, CA 95014 February 9, 2021 Dear Mr. Sun and Mr. Wayn, We write to you expressing concern about recent user activity in DLive communities attempting to attract American citizens, and particularly adolescent users, to white supremacy and domestic extremism. We noted the company’s internal governance actions taken on January 17th, 2021, in the wake of the riots at the U.S. Capitol Building on January 6th, 20211; however, it is evident that oversight from outside of the company’s internal review body may be necessary. According to media reports, DLive CEO Charles Wayn stated last year in a set of emails that the company strategy to combat extreme right-wing content was to “tolerate” them and allow other more popular content producers to “dilute” their reach.2 If true, this is unacceptable. During the January 6th, 2021, storming of the United States Capitol, your platform live streamed a number of individuals who entered and were around the building. Several of these individuals earned thousands of dollars in DLive’s digital currency that day, and a number received large donations through the platform ahead of the event. One individual received $2,800 in a live stream on January 5th, 2021, in which he encouraged his viewers to murder elected officials.3 We understand that DLive has supposedly removed 1 Wayn, Charles. “An Open Letter to the DLive Community.” DLive Community Announcements, (January 17th, 2021).
    [Show full text]
  • Analys Av Popcorn Time Med Hjälp Av Sniffingprogrammet Wireshark
    Analys av Popcorn Time med hjalp¨ av sniffingprogrammet Wireshark Kevin A.˚ Kimaryo Fredrik Siemund Lund University Lund University [email protected] [email protected] Sammanfattning—Vi har anvant¨ sniffingprogrammet ocksa˚ sa˚ det funkar, men ar¨ det en stor fil som laddas upp Wireshark for¨ att analysera vad som hander¨ nar¨ man streamar i omraden˚ med laga˚ overf¨ oringshastigheter¨ kan det innebara¨ (svenska: strommar)¨ film med den olagliga tjansten¨ Popcorn stora belastningar pa˚ internettrafiken och andra anvandare¨ i Time. Popcorn Time ar¨ en BitTorrent-klient vilket betyder att anvandarna¨ bade˚ laddar upp och ner data vid tittandet av en omradet˚ kan uppleva storningar.¨ Dessutom kan det vara valdigt¨ film. Popcorn Time hittar andra anvandare¨ genom att ta kontakt dyrt att tillgodose den nodv¨ andiga¨ uppladdningshastigheten for¨ med en server som i BitTorrent-protokollet kallas for¨ "tracker", att kunna distribuera stora filer pa˚ ett snabbt och smidigt satt.¨ vilket ar¨ det enda centrala elementet i Popcorn Time och som Istallet¨ for¨ att ha en enda nedladdningskalla¨ sa˚ kan haller˚ reda pa˚ vart andra anvandare¨ finns. Vart˚ resultat visar man utnyttja de anvandare¨ som laddar ner filen; man later˚ att Popcorn Time i princip beter sig som en vanlig BitTorrent- klient med den enda skillnad att tjansten¨ dessutom anvander¨ ett dem inte bara ladda ner utan aven¨ ladda upp delar av filen protokoll for¨ streaming av video, kallat GVSP. till andra anvandare.¨ Detta ar¨ tanken bakom BitTorrent och innebar¨ att anvandarnas¨ (det vill saga¨ de som laddar ner en I. INLEDNING fil) uppladningskapacitet utnyttjas och pa˚ sa˚ satt¨ skickas och Att streama innehall˚ over¨ natet¨ blir allt vanligare.
    [Show full text]