Privacy-Preserving Edge-Assisted Video Streaming Simon Da Silva, Sonia Ben Mokhtar, Stefan Contiu, Daniel Négru, Laurent Réveillère, Etienne Rivière

Total Page:16

File Type:pdf, Size:1020Kb

Privacy-Preserving Edge-Assisted Video Streaming Simon Da Silva, Sonia Ben Mokhtar, Stefan Contiu, Daniel Négru, Laurent Réveillère, Etienne Rivière PrivaTube: Privacy-Preserving Edge-Assisted Video Streaming Simon da Silva, Sonia Ben Mokhtar, Stefan Contiu, Daniel Négru, Laurent Réveillère, Etienne Rivière To cite this version: Simon da Silva, Sonia Ben Mokhtar, Stefan Contiu, Daniel Négru, Laurent Réveillère, et al.. Pri- vaTube: Privacy-Preserving Edge-Assisted Video Streaming. the 20th ACM/IFIP/USENIX Inter- national Middleware Conference, Dec 2019, Davis, France. pp.189-201, 10.1145/3361525.3361546. hal-02408184 HAL Id: hal-02408184 https://hal.archives-ouvertes.fr/hal-02408184 Submitted on 12 Dec 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. PrivaTube: Privacy-Preserving Edge-Assisted Video Streaming Simon Da Silva Sonia Ben Mokhtar Stefan Contiu Univ. Bordeaux, CNRS, Bordeaux INP, INSA Lyon, LIRIS, CNRS, France Scille SAS, France LaBRI, UMR 5800, Talence, France Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI, UMR 5800, Talence, France Daniel Négru Laurent Réveillère Etienne Rivière Univ. Bordeaux, CNRS, Bordeaux INP, Univ. Bordeaux, CNRS, Bordeaux INP, ICTEAM, UCLouvain, Belgium LaBRI, UMR 5800, Talence, France LaBRI, UMR 5800, Talence, France Abstract 1 Introduction Video on Demand (VoD) streaming is the largest source of Inter- Video streaming accounted for close to 58% of all Internet traffic in net traffic. Efficient and scalable VoD requires Content Delivery 2018 [1] and is expected to reach 81% in 2021 [2]. There are two rea- Networks (CDNs) whose cost are prohibitive for many providers. sons for this success: the multiplication of video sources (e.g., video An alternative is to cache and serve video content using end-users streaming catalogs, online TV channels, personal videos sharing) devices. Direct connections between these devices complement the and the pervasiveness of high-quality Internet connections. resources of core VoD servers with an edge-assisted collaborative Dominating Video on Demand (VoD) platforms rely on large- CDN. scale infrastructures to cope with an increasing demand for high VoD access histories can reveal critical personal information, Quality of Experience (QoE) and high-bitrate content. YouTube, and centralized VoD solutions are notorious for exploiting personal Netflix or Twitch have set up planetary-scale proprietary Content data. Hiding the interests of users from servers and edge-assisting Delivery Networks (CDNs) [3, 4, 9, 23]. They further deploy ex- devices is necessary for a new generation of privacy-preserving tra CDN nodes directly at Internet Service Providers (ISPs) and VoD services. negotiate special peering relations with their Autonomous Sys- We introduce PrivaTube, a scalable and cost-effective VoD solu- tems (ASs) [38]. Other platforms can rely on existing third-party tion. PrivaTube aggregates video content from multiple servers and CDNs to serve content. DailyMotion is reported to use the CDNs of edge peers to offer a high Quality of Experience (QoE) for its users. Orange, Akamai, and Limelight to scale video delivery in different It enables privacy preservation at all levels of the content distribu- parts of the world [8]. tion process. It leverages Trusted Execution Environments (TEEs) Dedicated CDNs require a high up-front investment, and third- at servers and clients, and obfuscates access patterns using fake party CDNs incur high operational costs. The use of an edge-assisted requests that reduce the risk of personal information leaks. Fake CDN is an appealing alternative for smaller players or platforms requests are further leveraged to implement proactive provisioning that do not wish to monetize their users’ personal data to sustain and improve QoE. Our evaluation of a complete prototype shows their activity, such as the free and open PeerTube [46] network. that PrivaTube reduces the load on servers and increases QoE Edge-assisted CDNs complement core dedicated servers with the while providing strong privacy guarantees. direct exchange of video content between end-users’ devices. Ex- amples of platforms using an edge-assisted CDN are LiveSky [62], CCS Concepts · Security and privacy; Peer5 [45], Quanteec [49], Streamroot [54] and Kankan [64]. The usage of VoD platforms generates sensitive personal data in Keywords multimedia, privacy, security, streaming, TEE the form of access histories to videos. This data can be leveraged for the benefit of the user, e.g. allowing personalized recommendations ACM Reference Format: for new videos, or for the benefit of the platform, e.g. for targeted Simon Da Silva, Sonia Ben Mokhtar, Stefan Contiu, Daniel Négru, Lau- advertising. However, the availability of access histories also leads rent Réveillère, and Etienne Rivière. 2019. PrivaTube: Privacy-Preserving to major threats to privacy. Indeed, this data can be used to infer Edge-Assisted Video Streaming. In Middleware ’19: Middleware ’19: 20th private information about the user, such as her/his gender, origin, International Middleware Conference, December 8ś13, 2019, Davis, CA, USA. political, religious or sexual orientation. Kandias et al. [31] show ACM, New York, NY, USA, 13 pages. https://doi.org/10.1145/3361525.3361546 for instance that the political affiliation of YouTube users can easily be extracted from their access histories. Luo et al. [36] similarly show how a household composition can be inferred. Permission to make digital or hard copies of all or part of this work for personal or Protecting users’ privacy in a video streaming system requires classroom use is granted without fee provided that copies are not made or distributed hiding their access histories from servers and other users. Anonymiz- for profit or commercial advantage and that copies bear this notice and the full citation ing networks such as TOR [24] allow hiding the identity of the client on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, of a service. Onion routing, TOR’s central mechanism, requires to post on servers or to redistribute to lists, requires prior specific permission and/or multi-hop forwarding and cryptographic operations at each relay a fee. Request permissions from [email protected]. server. TOR is therefore well-suited to web browsing but completely Middleware ’19, December 8ś13, 2019, Davis, CA, USA © 2019 Association for Computing Machinery. ill-suited for high-bandwidth video delivery. Fully decentralized, ACM ISBN 978-1-4503-7009-7/19/12...$15.00 gossip-based broadcast protocols such as PAG [22] allow hiding https://doi.org/10.1145/3361525.3361546 189 Middleware ’19, December 8ś13, 2019, Davis, CA, USA Simon Da Silva et al. the source and destination of messages, but similarly come at a Service model. We target the Video on Demand (VoD) service high cost, due to the use of resource-intensive homomorphic hash- model, consisting of a video player in a web browser allowing users ing.1 This is also not compatible with VoD bandwidth requirements. to select and play videos from a publicly-known catalog. The ob- Some video streaming services with privacy as a design goal have jective is to reach the highest possible Quality of Experience (QoE). been proposed [18, 29, 40, 50]. All these solutions target fully peer- Achieving high-QoE delivery is a multi-criteria optimization. It con- to-peer approaches, without core servers. This results in limited sists in (1) provisioning a content bitrate that is not only the highest guarantees in terms of QoE: Video discovery is a best effort and possible but also the stablest possible, (2) minimizing the amplitude unreliable operation, and the lack of a reliable authoritative source and occurrence of variations in quality, (3) avoiding video interrup- means videos of low popularity are only served with very low tions and (4) ensuring a fast startup time. Continuity and stability of reliability. the video playback, together with fast startup times, are the factors that impact the most the viewing experience of users [52]. Contributions. We present the design and implementation of Pri- vaTube, a practical and privacy-preserving VoD streaming system. Deployment constraints. We target VoD providers who do not Practicality refers to the ability of PrivaTube to serve video wish to monetize the personal data of their users while requiring content with a high QoE to its users: Low startup times, a constant good scalability and reasonable operational costs, e.g. open and and stable stream of high-bitrate video, and no interruption in alternative social media such as PeerTube [46]. The provider uses the playback. This performance is enforced by the use of an edge- public cloud infrastructures to host servers for metadata and video assisted CDN, allowing clients to fetch video content from both content. For cost reasons, it does not use a third-party CDN. The core servers and several assisting peers having accessed the same number and capacity of cloud servers are limited. In particular, up- video in the past. load bandwidth for servers is not sufficient to successfully provision
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • In Re Xunlei Limited Securities Litigation 18-CV-00467-Amended
    Case 1:18-cv-00467-RJS Document 27 Filed 06/04/18 Page 1 of 35 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ) ) ) Case No. 18-cv-467 (RJS) ) In re XUNLEI LIMITED SECURITIES ) LITIGATION ) CLASS ACTION COMPLAINT ) ) ) JURY TRIAL DEMANDED ) AMENDED CLASS ACTION COMPLAINT Lead Plaintiffs Tongyan Wang and Yuyan Jia and additional named plaintiff Peng Li (collectively, “Plaintiffs”), individually and on behalf of all other persons similarly situated, by Plaintiffs’ undersigned attorneys, for Plaintiffs’ complaint against Defendants, allege the following based upon personal knowledge as to Plaintiffs and Plaintiffs’ own acts, and information and belief as to all other matters, based upon, inter alia, the investigation conducted by and through Plaintiffs’ attorneys, which included, among other things, a review of the Defendants’ public documents, conference calls and announcements made by Defendants, United States Securities and Exchange Commission (“SEC”) filings, news articles and press releases published by and regarding Xunlei Limited (“Xunlei” or the “Company”) and its cryptocurrency program, analysts’ reports and advisories about the Company, and information readily obtainable on the Internet. Plaintiffs believe that substantial evidentiary support will exist for the allegations set forth herein after a reasonable opportunity for discovery. NATURE OF THE ACTION 1. This is a federal securities class action on behalf of a class consisting of persons other than defendants who purchased or otherwise acquired Xunlei’s American Depositary Shares (“ADSs”) between October 10, 2017, and January 11, 2018, both dates inclusive (the “Class 1 Case 1:18-cv-00467-RJS Document 27 Filed 06/04/18 Page 2 of 35 Period”), seeking to recover damages caused by defendants’ violations of the federal securities laws and to pursue remedies under Sections 10(b) and 20(a) of the Securities Exchange Act of 1934 (the “Exchange Act”) and Rule 10b-5 promulgated thereunder, against the Company and its Chief Executive Officer (“CEO”), Lei Chen.
    [Show full text]
  • Peertube Has Worked Twice As Hard to Free Your Videos from Youtube !
    PeerTube has worked twice as hard to free your videos from YouTube ! Thanks to your donations, we have been developing a software to free us all from YouTube & Co for a year. Why have we gone much further than the first release, (crowdfunded in the spring of 2018), you might ask? Well, that’s because we sincerely believe in the emancipatory power of PeerTube. This article is a part of « Contributopia’s travel journals ». From October to December of 2019, we will assess our many (donations-founded) actions, which are tax-deductible for French taxpayers. Donate here if you can. La version originale (en Français) de cet article est à lire ici. Federation and instances to avoid creating a new tech giant PeerTube’s aim is to create an emancipatory alternative to centralized platforms a la YouTube. In a centralized service, you sign-up with a single address, and each and every of your actions, videos and data are gathered on a single huge computer. For example, Google’s, that hosts YouTube (to be precise, they are server farms rather than huge computers, but on a symbolic level it is the same thing!). Centralisation, CC-By SA Fédération, CC-By SA LILA LILA PeerTube is a software. It can be installed on a server by anyone possessing the appropriate skills; say, for the sake of argument, Bernadette, College X and karate club Y. This is called an instance, i.e. a PeerTube host. In concrete terms, hosting an instance creates a website (let’s say, BernadetTube.fr, CollegeTube.org or KarateTube.net) on which you can watch videos and sign-up, so you can interact or upload your own content.
    [Show full text]
  • A Study of Peer-To-Peer Systems
    A Study of Peer-to-Peer Systems JIA, Lu A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Philosophy in Information Engineering The Chinese University of Hong Kong August 2009 Abstract of thesis entitled: A Study of Peer-to-Peer Systems Submitted by JIA, Lu for the degree of Master of Philosophy at The Chinese University of Hong Kong in June 2009 Peer-to-peer (P2P) systems have evolved rapidly and become immensely popular in Internet. Users in P2P systems can share resources with each other and in this way the server loading is reduced. P2P systems' good performance and scalability attract a lot of interest in the research community as well as in industry. Yet, P2P systems are very complicated systems. Building a P2P system requires carefully and repeatedly thinking and ex- amining architectural design issues. Instead of setting foot in all aspects of designing a P2P system, this thesis focuses on two things: analyzing reliability and performance of different tracker designs and studying a large-scale P2P file sharing system, Xun- lei. The "tracker" of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server tracker, to DHT- based (distributed hash table) serverless systems. In the first part of this thesis, we classify the different tracker designs, dis- cuss the different considerations for these designs, and provide simple models to evaluate the reliability of these designs. Xunlei is a new proprietary P2P file sharing protocol that has become very popular in China.
    [Show full text]
  • Demystifying Commercial Content Delivery Networks in China
    CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. (2015) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/spe.3464 SPECIAL ISSUE PAPER Demystifying commercial content delivery networks in China Hao Yin1,*,†,BoQiao1,YanLuo2,ChenTian3 and Y. Richard Yang4 1Dept.t of CS, Tsinghua University, Beijing, China 2Dept. of ECE, University of Massachusetts Lowell, Lowell, MA, USA 3Dept. of EIE, Huazhong Univ. of Sci. and Tech., Wuhan, China 4Dept. of CS, Yale University, New Haven, CT, USA SUMMARY Over the past decade, content delivery networks (CDNs) have attracted substantial Internet traffic and improved quality of experience for Internet users. However, the evolution of the Internet ecosystem, which is driven by underlying economic incentives and ever emerging technologies, posts great challenges to the existing commercial CDNs (CCDNs). Thoroughly understanding the CDN industry from different aspects including market choice, technology, performance, tendency and infrastructure is indispensable to future Internet. In this paper, we conduct the first comprehensive study of China’s CDNs using continuous, at-scale, content-driven measurements. Based on the massive amount of measurement data with multidimensional properties, we demystify the CCDNs in China and answer two important questions: (1) what is the develop- ment trend of CCDNs in China and (2) what are their unique characteristics. The answers to these questions have significant implications on CDN providers and users. Copyright © 2015 John Wiley & Sons, Ltd. Received 25 September 2014; Accepted 24 November 2014 KEY WORDS: CDN 1. INTRODUCTION 1.1. Motivation To bridge the gap between network applications and best effort Internet provider (IP) networks, the technique of content delivery networks (CDNs) has emerged and been developed over the last decade.
    [Show full text]
  • Challenges in the Decentralised Web: the Mastodon Case∗
    Challenges in the Decentralised Web: The Mastodon Case∗ Aravindh Raman1, Sagar Joglekar1, Emiliano De Cristofaro2;3, Nishanth Sastry1, and Gareth Tyson3;4 1King’s College London, 2University College London, 3Alan Turing Institute, 4Queen Mary University of London faravindh.raman,sagar.joglekar,[email protected], [email protected], [email protected] Abstract cols to let instances interact and aggregate their users to offer a globally integrated service. The Decentralised Web (DW) has recently seen a renewed mo- DW platforms intend to offer a number of benefits. For ex- mentum, with a number of DW platforms like Mastodon, Peer- ample, data is spread among many independent instances, thus Tube, and Hubzilla gaining increasing traction. These offer al- possibly making privacy-intrusive data mining more difficult. ternatives to traditional social networks like Twitter, YouTube, Data ownership is more transparent, and the lack of centralisa- and Facebook, by enabling the operation of web infrastruc- tion could make the overall system more robust against techni- ture and services without centralised ownership or control. cal, legal or regulatory attacks. Although their services differ greatly, modern DW platforms mostly rely on two key innovations: first, their open source However, these properties may also bring inherent chal- software allows anybody to setup independent servers (“in- lenges that are difficult to avoid, particularly when consid- stances”) that people can sign-up to and use within a local ering the natural pressures towards centralisation in both so- community; and second, they build on top of federation pro- cial [12, 49] and economic [42] systems.
    [Show full text]
  • People's Tech Movement to Kick Big Tech out of Africa Could Form a Critical Part of the Global Protests Against the Enduring Legacy of Racism and Colonialism
    CONTENTS Acronyms ................................................................................................................................................ 1 1 Introduction: The Rise of Digital Colonialism and Surveillance Capitalism ..................... 2 2 Threat Modeling .......................................................................................................................... 8 3 The Basics of Information Security and Software ............................................................... 10 4 Mobile Phones: Talking and Texting ...................................................................................... 14 5 Web Browsing ............................................................................................................................ 18 6 Searching the Web .................................................................................................................... 23 7 Sharing Data Safely ................................................................................................................... 25 8 Email Encryption ....................................................................................................................... 28 9 Video Chat ................................................................................................................................... 31 10 Online Document Collaboration ............................................................................................ 34 11 Protecting Your Data ................................................................................................................
    [Show full text]
  • Technology Stack for Decentralized Mobile Services
    Technology Stack for Decentralized Mobile Services Matouš Skála Technology Stack for Decentralized Mobile Services by Matouš Skála to obtain the degree of Master of Science at the Delft University of Technology, to be defended publicly on Monday August 31, 2020 at 3:00 PM. Student number: 4893964 Project duration: November 15, 2019 – August 31, 2020 Thesis committee: Dr.ir. J.A. Pouwelse, TU Delft, supervisor Dr. J.S. Rellermeyer, TU Delft Dr. N. Yorke-Smith, TU Delft An electronic version of this thesis is available at http://repository.tudelft.nl/. Preface When I was choosing my thesis topic, I originally came up with an idea of designing a decen- tralized social network. After realizing how ambitious that goal was, I later decided to focus on more fundamental issues first and create a library that would allow for building any de- centralized applications, running purely on an overlay network consisting of smartphones. Rather than reinventing the wheel, I took inspiration from an existing networking library de- veloped at TU Delft over the last decade and created its wire-compatible implementation in Kotlin. Interestingly, in the end, I have even implemented a trivial social network to demon- strate the usage of the library, returning back to the original idea. I would like to thank my supervisor Johan Pouwelse for an endless stream of fresh ideas and valuable feedback, and to PhD students of the Delft Blockchain Lab for numerous coffee meetings and for serving me as a walking documentation of the existing codebase. Matouš Skála Prague,
    [Show full text]
  • Computer Networking: a Top-Down Approach, 7Th Edition
    Computer Networking A Top-Down Approach Seventh Edition James F. Kurose University of Massachusetts, Amherst Keith W. Ross NYU and NYU Shanghai Boston Columbus Indianapolis New York San Francisco Hoboken Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President, Editorial Director, ECS: Marcia Horton Acquisitions Editor: Matt Goldstein Editorial Assistant: Kristy Alaura Vice President of Marketing: Christy Lesko Director of Field Marketing: Tim Galligan Product Marketing Manager: Bram Van Kempen Field Marketing Manager: Demetrius Hall Marketing Assistant: Jon Bryant Director of Product Management: Erin Gregg Team Lead, Program and Project Management: Scott Disanno Program Manager: Joanne Manning and Carole Snyder Project Manager: Katrina Ostler, Ostler Editorial, Inc. Senior Specialist, Program Planning and Support: Maura Zaldivar-Garcia Cover Designer: Joyce Wells Manager, Rights and Permissions: Ben Ferrini Project Manager, Rights and Permissions: Jenny Hoffman, Aptara Corporation Inventory Manager: Ann Lam Cover Image: Marc Gutierrez/Getty Images Media Project Manager: Steve Wright Composition: Cenveo Publishing Services Printer/Binder: Edwards Brothers Malloy Cover and Insert Printer: Phoenix Color/ Hagerstown Credits and acknowledgments borrowed from other sources and reproduced, with ­permission, in this textbook appear on appropriate page within text. Copyright © 2017, 2013, 2010 Pearson Education, Inc. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions, request forms and the appropriate contacts within the Pearson Education Global Rights & Permissions Department, please visit www.pearsoned.com/permissions/.
    [Show full text]
  • The Chromium Mess Meets Android
    The Chromium mess meets Android David Ludovino, The Chromium mess meets Android Jeremy Rand Proposals on how to get a fully free WebView build or replace it with something What is completely new WebView? Which apps use it? What's underneath it? ∗ What's the David Ludovino Jeremy Rand matter with Chromium? WebView and Replicant Replicant Chromium forks Desktop Chromium Android Chromium Stepwise cleansing GeckoView shim Mapping WebView to GeckoView GeckoView on apps ∗with support from Andr´esD and Kurtis Hanna Feedback? The Chromium mess meets Android What is WebView? David Ludovino, Jeremy Rand Renders web content (HTML, CSS, JavaScript) What is WebView? inside apps. Which apps use it? What's underneath it? API has been around since Android 1. What's the matter with Chromium? public class MainActivity extends Activity { WebView and @Override Replicant protected void onCreate(Bundle state) { Chromium super.onCreate(state); forks WebView v = new WebView(this); Desktop Chromium setContentView(v); Android Chromium Stepwise cleansing v. loadUrl ("https://replicant.us"); } GeckoView shim } Mapping WebView to GeckoView GeckoView on apps Feedback? The Chromium mess meets Android Which apps use WebView? David Apps that render HTML: email clients, RSS readers, etc. Ludovino, Jeremy Rand Became pervasive with the advent of cross-platform mobile frameworks. What is WebView? Which apps use it? What's underneath Half of the apps listed at PRISM Break depend on WebView it? What's the uses WebView does not use WebView matter with Chromium? WebView and
    [Show full text]
  • Collaboration Opportunities for Content Delivery and Network Infrastructures
    Collaboration Opportunities for Content Delivery and Network Infrastructures Benjamin Frank, Ingmar Poese, Georgios Smaragdakis, Anja Feldmann, Bruce M. Maggs, Steve Uhlig, Vinay Aggarwal, and Fabian Schneider 1 Motivation The Internet is a hugely successful man-made artifact that has changed society fundamentally. Imagine the effect a prolonged outage of the Internet would have: (1) Youngsters wouldn’t know how to interact with their peers and how to spend their leisure time as they increasingly rely on social networks, online games, YouTube, and other online entertainment offerings. (2) Manufacturing would hit a roadblock as the communication paths within and between companies increasingly rely on the Internet. (3) Control of critical infrastructures would be hampered as it increasingly relies on the Internet for gathering input data and propagating control information. In becoming a hugely successful infrastructure, the usage of the Internet and thus its structure has also undergone continuous changes. Usage has changed from dominance by email and FTP in the early days, to the World Wide Web (WWW) from 1995 to 2000, to peer-to-peer applications (P2P) from 2000 to 2007, back to the WWW since 2007. These changes are driven in part by the Internet users’ interests as well as how content, including user generated content, is made available. When considering the current application mix and traffic streams in the Internet, the latest buzz is that “Content is King” just as Bill Gates [28] predicted in his essay from 1996. Hereby, the term content has to be seen very broadly and encompasses everything from commercially prepared content, e.g., broadcast and interactive TV, news, and software, to user-generated content, e.g., videos uploaded to YouTube, and photos uploaded to Flickr, to interactive activities, e.g., online games.
    [Show full text]