Peer to Peer Characteristics of Peer-to-Peer (p2p)

 What is peer to peer?  Peers participate as equals in a network  Useful? Disruptive?  Unlike client-server model where there are  Manageable, governable? different responsibilites: webserver compared to client-browser  Architecture  Original , Usenet  Current Internet is more client-server  , ,  Usenet originally between Duke and UNC ('79) Limeware, Kazaa, BitTorrent, Rapidshare, Usenet, Skype  P2P systems share resources, storage, files,  Which are p2p? bandwidth, …

Compsci 82, Fall 2010 7.1 Compsci 82, Fall 2010 7.2

P2P: Technology, Ethics, Policy, Legal P2P: Technology, Ethics, Policy, Legal

 Innocent Infringer, 17.504.c 2010  Capitol v (Jammie) Thomas  Maverick Recording v Whitney Harper  Jury trial, from $2Million to $25K …  RIAA v Limewire, 2010  MGM v Grokster, 2005 (scotus)  Shut down Limewire  Non-infringing uses? Contributory  MPA v Newzbin in UK, 2010  A&M Records v Napster (2001)  Shuts down Usenet 'integrator': financial so…  Ninth Circuit: Contributory and Vicarious  Higher Education Opportunity Act 2008/10  Sony v Universal Studios (Betamax, 1984)  Notice to Duke Students  Substantial non-infringing uses, time-shifting  Capitol v (Jammie) Thomas  Jury trial, from $2Million to $25K …

Compsci 82, Fall 2010 7.3 Compsci 82, Fall 2010 7.4 Copyright infringement Napster and Shawn Fanning

 Direct infringement  Shawn Fanning  You uploaded, downloaded, copied, sang, …  Napster, 1998-99  Contributory (kind of indirect) infringement  Centralized server, distributed "peers"  Knowledge and participation (supply device)  Under 20, , …  Vicarious (kind of indirect) infringement  Still doing startups  Ability to control, financial benefit

 Napster started music  Proof, precedent, evidence peer-to-peer  What have courts say, what can you show

Compsci 82, Fall 2010 7.5 Compsci 82, Fall 2010 7.6

Gnutella and Justin Frankel Napster is Centralized p2p  , 1998-99  Legal ramifications?  Just 20, mp3+ others  AOL, $50+ million  Gnutella, 2000  AOL buying Gnutella

The goal of Cockos is to develop software sustainably while preventing profit rationale from forcing engineering compromises. By doing so, we can keep our product visions intact, giving maximum benefit to our users. (today) .

Compsci 82, Fall 2010 7.7 Compsci 82, Fall 2010 7.8 Gnutella/Limewire decentralized p2p

 Distributed  Started by Bram Cohen,  Bootstrap issues http://bitconjurer.org  Distributed p2p, torrent, tracker  You must cooperate to download  20-30% of all Internet traffic  Files are split up and downloaded in pieces  Advantages? Disadvantages?  Seeder, swarm, clients  “optimistic unchoking” not tit-for-tat?

Compsci 82, Fall 2010 7.9 Compsci 82, Fall 2010 7.10

Brian Fox BitTorrent advantages?

 GNU Bash Shell (developer)  Buddycast (co-developer) “each person has a sweet spot — a place where they are incredibly productive and at their happiest while doing so — okorians spend their lives living there — the okori sweet spot is the realization of the concept, the delivery of the impossible, from the germ of the idea to the instantiation of it” http://www.theokorigroup.com/sweet_spot

Compsci 82, Fall 2010 7.11 Compsci 82, Fall 2010 7.12 Bittorrent meets DMCA and RIAA Campus and Other P2P issues

 Indirect Swarm detection  Skype, what, where, when (Sky+p2p=?)  In swarm? Liable  Does Skype have a commercial model?  NAT, other IP address  Origins of technology?  “in-the-wild” experiment  Current issues with US Government?  eBay purchases for $2.6 billion in 2005 then …  Bootstrapping after login, but true p2p  False positives  Proprietary code, some open standards  Direct harder • AES, RSA, for encryption  Man-in-the-middle  Compliance with HEOA: campus monitors  No Encryption  Why? What? How?  Issues for students Compsci 82, Fall 2010 7.13 Compsci 82, Fall 2010 7.14

Kazaa and Skype, Disruptive? Kazaa and Skype, Disruptive? Skype has been an incredible adventure and I “Skype literally touches millions am proud to have been part of it. Looking of lives and this is something to back at 2003, at two guys running around with be proud of…I would like to a crazy idea of building a global phone think that we have contributed to company purely on the Internet, …, still making the world a little bit battling a major lawsuit from our Kazaa days, flatter.” www.crunchbase.com 2003 seems a long time ago. It is amazing to When Niklas is not creating innovative, think that it is only four years! disruptive businesses, he is a passionate sailor Janus Friss and enjoys offshore racing with his wife as well as skiing. (Niklas Zennstrom)

Compsci 82, Fall 2010 7.15 Compsci 82, Fall 2010 7.16 Costs of dealing with campus p2p Audible Magic: Copysense Appliance

 The Campus Computing Project, Paul  EFF ‘analysis’ of solutions Green, 10/08  http://tinyurl.com/6l36p6  http://tinyurl.com/5mqxyd  What does this do? Database of copyrighted works with digital fingerprints  Private universities spend (average, ’07-’08)  Compare packet data with database  $105K software, $158K hardware, $144K other  If there’s a match do “something” to squelch use direct costs (e.g., personnel)  $60-75K/year  Software for monitoring, shaping p2p  Ethics?  Hardware, e.g., Copysense appliance  Tussles?  Keeping up with RIAA: IT and student support

Compsci 82, Fall 2010 7.17 Compsci 82, Fall 2010 7.18

Packet shaping Deep Packet Inspection

 From $1,500 to $58,000 (Packeteer, there are others)  Comcast (2007) DPI to shape/deter p2p  Look at where packets go, specific port traffic • http: 80, : 6346, Edonkey: 4662, …  Look at packets and then deploy subterfuge  Look at what type of information packet carries  Forge RST (reset) packet, similar technique to • Typically don’t need to do “deep” inspection what’s done with Great Firewall of China  Throughput, latency, throttling  Machine A “forges” a reset packet from  Change network behavior machine B and sends to C. C then cuts off communication to B  Really? Is it that simple?  Violates end-to-end principle, havoc wreaking

Compsci 82, Fall 2010 7.19 Compsci 82, Fall 2010 7.20