Peertube 1.0 : the Free/Libre and Federated Video
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
ARK Whitepaper
ARK Whitepaper A Platform for Consumer Adoption v.1.0.3 The ARK Crew ARK Whitepaper v.1.0.3 Table Of Contents Overview………………………………………………………………...……………………………….……………….………………………………………………………….….3 Purpose of this Whitepaper………………………………………………………………………………………………………………………..….……….3 Why?…………………………………………………………………………………………………………………….…………………………………………………….…………..4 ARK…………………………………………………………………………………………………….……………….…………………………………………………………………..5 ARK IS………………………………………………………………………………………………....……………….………………………………………………………………..5 ARK: Technical Details……………………………………….…….…..…………………………...……………….………………...…………………………...6 - Delegated Proof of Stake…………………………….……………...………………………….……………………………………….………...…...6 - Hierarchical Deterministic (HD) Wallets (BIP32)…………………………………………………….....…………………..…..8 - Fees……………………………………………………………………………………………………………….……………….…...………………………………..……...8 - ARK Delegates and Delegate Voting.…………………………………………………………………………………...………………….9 - Bridged Blockchains (SmartBridges)....................………………………………………………………………….………...…….10 - POST ARK-TEC Token Distribution …………………..…………………………………….………………….………..……..…..……….11 - Testnet Release……………………………………………….…………………………………………………………………….………...….....12 And Beyond?…………………………………………………………………….………...……………………………………….………………………...……….…12 Addendum 1: ARK IS…(Cont.)...……..……..…………....…..………...………………………………………...………………………......……12 -
Peertube Has Worked Twice As Hard to Free Your Videos from Youtube !
PeerTube has worked twice as hard to free your videos from YouTube ! Thanks to your donations, we have been developing a software to free us all from YouTube & Co for a year. Why have we gone much further than the first release, (crowdfunded in the spring of 2018), you might ask? Well, that’s because we sincerely believe in the emancipatory power of PeerTube. This article is a part of « Contributopia’s travel journals ». From October to December of 2019, we will assess our many (donations-founded) actions, which are tax-deductible for French taxpayers. Donate here if you can. La version originale (en Français) de cet article est à lire ici. Federation and instances to avoid creating a new tech giant PeerTube’s aim is to create an emancipatory alternative to centralized platforms a la YouTube. In a centralized service, you sign-up with a single address, and each and every of your actions, videos and data are gathered on a single huge computer. For example, Google’s, that hosts YouTube (to be precise, they are server farms rather than huge computers, but on a symbolic level it is the same thing!). Centralisation, CC-By SA Fédération, CC-By SA LILA LILA PeerTube is a software. It can be installed on a server by anyone possessing the appropriate skills; say, for the sake of argument, Bernadette, College X and karate club Y. This is called an instance, i.e. a PeerTube host. In concrete terms, hosting an instance creates a website (let’s say, BernadetTube.fr, CollegeTube.org or KarateTube.net) on which you can watch videos and sign-up, so you can interact or upload your own content. -
Challenges in the Decentralised Web: the Mastodon Case∗
Challenges in the Decentralised Web: The Mastodon Case∗ Aravindh Raman1, Sagar Joglekar1, Emiliano De Cristofaro2;3, Nishanth Sastry1, and Gareth Tyson3;4 1King’s College London, 2University College London, 3Alan Turing Institute, 4Queen Mary University of London faravindh.raman,sagar.joglekar,[email protected], [email protected], [email protected] Abstract cols to let instances interact and aggregate their users to offer a globally integrated service. The Decentralised Web (DW) has recently seen a renewed mo- DW platforms intend to offer a number of benefits. For ex- mentum, with a number of DW platforms like Mastodon, Peer- ample, data is spread among many independent instances, thus Tube, and Hubzilla gaining increasing traction. These offer al- possibly making privacy-intrusive data mining more difficult. ternatives to traditional social networks like Twitter, YouTube, Data ownership is more transparent, and the lack of centralisa- and Facebook, by enabling the operation of web infrastruc- tion could make the overall system more robust against techni- ture and services without centralised ownership or control. cal, legal or regulatory attacks. Although their services differ greatly, modern DW platforms mostly rely on two key innovations: first, their open source However, these properties may also bring inherent chal- software allows anybody to setup independent servers (“in- lenges that are difficult to avoid, particularly when consid- stances”) that people can sign-up to and use within a local ering the natural pressures towards centralisation in both so- community; and second, they build on top of federation pro- cial [12, 49] and economic [42] systems. -
An Architecture for Client Virtualization: a Case Study
Computer Networks 100 (2016) 75–89 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet An architecture for client virtualization: A case study ∗ Syed Arefinul Haque a, Salekul Islam a, , Md. Jahidul Islam a, Jean-Charles Grégoire b a United International University, Dhaka, Bangladesh b INRS-EMT, Montréal, Canada a r t i c l e i n f o a b s t r a c t Article history: As edge clouds become more widespread, it is important to study their impact on tradi- Received 30 November 2015 tional application architectures, most importantly the separation of the data and control Revised 17 February 2016 planes of traditional clients. We explore such impact using the virtualization of a Peer- Accepted 18 February 2016 to-Peer (P2P) client as a case study. In this model, an end user accesses and controls the Available online 26 February 2016 virtual P2P client application using a web browser and all P2P application-related control Keywords: messages originate and terminate from the virtual P2P client deployed inside the remote Edge cloud server. The web browser running on the user device only manages download and upload of P2P the P2P data packets. BitTorrent, as it is the most widely deployed P2P platform, is used to BitTorrent validate the feasibility and study the performance of our approach. We introduce a proto- Virtual client type that has been deployed in public cloud infrastructures. We present simulation results Cloud-based server which show clear improvements in the use of user resources. Based on this experience we Web-RTC derive lessons on the challenges and benefits from such edge cloud-based deployments. -
Convergence-2020.Pdf
A universal architecture to anonymize any application or protocol and turn it into an independent decentralized p2p network inside browsers and servers, with browsers acting as servers CONVERGENCE 1. Description This proposal is a complete redesign of our initial Convergence proposal from 2015 (http://www.peersm.com/Convergence.pdf ) which was intended as a research study for an EU call By “Convergence” in this proposal we don’t refer to a specific network or node but to methods using the Convergence principles 1.1 Background and rationale The initial Convergence proposal was written based on the observation that we must invent one network/system per need if we want to evade big data centralization and protect privacy/anonymity: to browse, to chat, to email, to exchange files, to do social networking or cooperative work, to do crypto currency, to protect the users from their connected objects, to handle peer identities. So it did envision the support of any type of applications and protocols on top of a secure anonymization system, inside browsers and servers The first part is very exactly what IPFS did, including the crypto currency concept in our proposal to sustain the network (Filecoin) But IPFS is not at all designed for privacy, the IPFS team knows that they will have to address the issue but it’s not even part of their roadmap And IPFS adoption is not for all protocols, many other networks will not use it and lack privacy too That’s why we are proposing the Convergence concepts, which are still very up to date, with a major novelty: -
People's Tech Movement to Kick Big Tech out of Africa Could Form a Critical Part of the Global Protests Against the Enduring Legacy of Racism and Colonialism
CONTENTS Acronyms ................................................................................................................................................ 1 1 Introduction: The Rise of Digital Colonialism and Surveillance Capitalism ..................... 2 2 Threat Modeling .......................................................................................................................... 8 3 The Basics of Information Security and Software ............................................................... 10 4 Mobile Phones: Talking and Texting ...................................................................................... 14 5 Web Browsing ............................................................................................................................ 18 6 Searching the Web .................................................................................................................... 23 7 Sharing Data Safely ................................................................................................................... 25 8 Email Encryption ....................................................................................................................... 28 9 Video Chat ................................................................................................................................... 31 10 Online Document Collaboration ............................................................................................ 34 11 Protecting Your Data ................................................................................................................ -
Technology Stack for Decentralized Mobile Services
Technology Stack for Decentralized Mobile Services Matouš Skála Technology Stack for Decentralized Mobile Services by Matouš Skála to obtain the degree of Master of Science at the Delft University of Technology, to be defended publicly on Monday August 31, 2020 at 3:00 PM. Student number: 4893964 Project duration: November 15, 2019 – August 31, 2020 Thesis committee: Dr.ir. J.A. Pouwelse, TU Delft, supervisor Dr. J.S. Rellermeyer, TU Delft Dr. N. Yorke-Smith, TU Delft An electronic version of this thesis is available at http://repository.tudelft.nl/. Preface When I was choosing my thesis topic, I originally came up with an idea of designing a decen- tralized social network. After realizing how ambitious that goal was, I later decided to focus on more fundamental issues first and create a library that would allow for building any de- centralized applications, running purely on an overlay network consisting of smartphones. Rather than reinventing the wheel, I took inspiration from an existing networking library de- veloped at TU Delft over the last decade and created its wire-compatible implementation in Kotlin. Interestingly, in the end, I have even implemented a trivial social network to demon- strate the usage of the library, returning back to the original idea. I would like to thank my supervisor Johan Pouwelse for an endless stream of fresh ideas and valuable feedback, and to PhD students of the Delft Blockchain Lab for numerous coffee meetings and for serving me as a walking documentation of the existing codebase. Matouš Skála Prague, -
Bittorrent Architecture and Protocol
Bittorrent Architecture And Protocol CaireneErethismic Jennings Marlon unpackworst hazily. his aguardientes Rene wallpaper hyperbolize her dilettantism disbudding papally, agonisingly. unrestrained and autoradiograph. Multidentate and Scribd membership was approved the protocol and photonics topics can contain confidential information And time and as bittorrent architecture and protocol to appropriately accommodate the architecture designed for each piece which the least one of touch with. In order to log into groups of where and magnetic links, and reliability of packet as bittorrent architecture and protocol only makes use increases, and always permits me. Net beneath its knees. The basic flow among the BitTorrent protocol By splitting the file and clear one outlet to each peer review let the peers download the part they graduate missing in each. Managing partner ashwin navin. Making it maintains the bittorrent architecture and protocol should be reduced dependence on the architecture. How BitTorrent Works GeeksforGeeks. On international advanced user agents, a protocol lowers bandwidth towards file until they mark off like. Bt protocol should be two keys to perform fast as an architecture, but not attempt to transfer, and will announce regularly to geek is termed the checkbox to. It stores it can download, the bittorrent files on all, the file they had deep properties may arrest all. All trade is needed is for the affiliate community to doll the technology and decree the good that could come had it. Uses HTTP to contribute out download Encrypted protocol queuing QoS. Downloader US Peer feedback Peer Leech Tracker Web Server to rre n t CSE 4656 Spring 2013 BitTorrent Protocol 24 Web page with been to torrent. -
Pando: Personal Volunteer Computing in Browsers
Pando: Personal Volunteer Computing in Browsers Erick Lavoie, Laurie Hendren Frederic Desprez Miguel Correia McGill University, Montreal, Canada INRIA Grenoble Rhône-Alpes INESC-ID [email protected] Grenoble, France Lisboa, Portugal [email protected] [email protected] [email protected] Abstract In this paper, we therefore present Pando, a new tool that can The large penetration and continued growth in ownership of per- leverage a dynamically varying number of failure-prone personal sonal electronic devices represents a freely available and largely devices contributed by volunteers, to parallelize the application of a untapped source of computing power. To leverage those, we present function on a stream of values, by using the devices’ browsers. Pando, a new volunteer computing tool based on a declarative con- Pando is based on a declarative concurrent programming para- current programming model and implemented using JavaScript, digm [99] which greatly simplifies reasoning about concurrent WebRTC, and WebSockets. This tool enables a dynamically varying processes: it abstracts the non-determinism in the execution by number of failure-prone personal devices contributed by volunteers making it non-observable. This paradigm has already enjoyed great to parallelize the application of a function on a stream of values, practical successes with the popular MapReduce [38] and Unix by using the devices’ browsers. We show that Pando can provide pipelining [56] programming models. We show for the first time it throughput improvements compared to a single personal device, is also effective in personal volunteer computing tools. on a variety of compute-bound applications including animation Pando abstracts distribution but otherwise relies on existing rendering and image processing. -
Torrents for Mac
1 / 2 Torrents For Mac Mac Torrent Download - Torrents for Mac. Free Apps, Games & Plugins. Apple Final Cut Pro & Logic Pro X, Adobe Photoshop, Lightroom, Illustrator, Premiere .... H. D. Mac Murdo , residing in Glasgow , v . ... Torrents of abuse were poured upon Lord Eldon , as a judge wavering in his mind , and dilatory in his decisions .... Quickly play torrent files and magnet links · Download torrents on Mac from your favorite browser · Supporting MacOS Catalina and below.. Jun 28, 2019 — Vuze, which was previously known as Azureus, offers far more detail than qBittorrent and Transmission, but still has a good macOS-friendly .... 11 hours ago — Google search now casually highlights 'best torrent sites . ... torrent torrentfunk site torrents mac torrenting software movies downloading ... Nov 14, 2020 — Can anyone suggest which is the best Torrent client on macOS Big Sur 11.0.1 ? Vuze torrent client which was running smoothly on Catalina , it .... May 28, 2021 — uTorrent; Transmission; WebTorrent; BitTorrent; Vuze; Deluge; qBitTorrent. The problem is, if you have a Mac device, installing a quality torrent .... Jan 29, 2021 — You could also have a firewall feature turned on your Mac. In this case, disabling it will likely let the torrent client downloads go through:.. A site offering torrents: It will serve as torrent search engine; A Torrent download software: Install on your Mac, it is he that will let you upload your file .... Find: Search for torrents or browse artist-sponsored content, directly from your software interface. Get: Download torrents and manage your files in the torrent .... Mar 16, 2006 — Softonic review. The original Bittorrent client. -
The Chromium Mess Meets Android
The Chromium mess meets Android David Ludovino, The Chromium mess meets Android Jeremy Rand Proposals on how to get a fully free WebView build or replace it with something What is completely new WebView? Which apps use it? What's underneath it? ∗ What's the David Ludovino Jeremy Rand matter with Chromium? WebView and Replicant Replicant Chromium forks Desktop Chromium Android Chromium Stepwise cleansing GeckoView shim Mapping WebView to GeckoView GeckoView on apps ∗with support from Andr´esD and Kurtis Hanna Feedback? The Chromium mess meets Android What is WebView? David Ludovino, Jeremy Rand Renders web content (HTML, CSS, JavaScript) What is WebView? inside apps. Which apps use it? What's underneath it? API has been around since Android 1. What's the matter with Chromium? public class MainActivity extends Activity { WebView and @Override Replicant protected void onCreate(Bundle state) { Chromium super.onCreate(state); forks WebView v = new WebView(this); Desktop Chromium setContentView(v); Android Chromium Stepwise cleansing v. loadUrl ("https://replicant.us"); } GeckoView shim } Mapping WebView to GeckoView GeckoView on apps Feedback? The Chromium mess meets Android Which apps use WebView? David Apps that render HTML: email clients, RSS readers, etc. Ludovino, Jeremy Rand Became pervasive with the advent of cross-platform mobile frameworks. What is WebView? Which apps use it? What's underneath Half of the apps listed at PRISM Break depend on WebView it? What's the uses WebView does not use WebView matter with Chromium? WebView and -
Involuntary Browser-Based Torrenting
Involuntary Browser-Based Torrenting Supervisor: Course: Author: Jan Freudenreich Research Project 2 Alexander Bode Introduction BitTorrent Protocol for distributing files using peer-to-peer connections. - BitTorrent Swarm - Seeders - Leechers - Trackers - Tracker Servers - Distributed Hash Tables - Repository Servers - Torrents Source: Enhanced BitTorrent Simulation using Omnet++, IEEE, 2020 - Magnet URI’s Transport Protocol: TCP / uTP 2 Introduction Advantages of BitTorrent - Every downloader is also an uploader - Splits files into pieces - Uses tit-for-tat principle for leeching - Downloads rarest piece first - No central point of failure - Takes action with slow peers Disadvantages of BitTorrent - Torrent can’t complete if all seeds go offline and all leechers require a specific piece. - IP address is exposed to the tracker and peers 3 Introduction WebTorrent First torrent client that works in a browser. - Completely written in JavaScript - WebRTC as transport protocol - Custom tracker implementation, ICE - Once peers connected, same as BitTorrent Use Cases - File sharing & streaming - Peer-assisted delivery Source: WebTorrent.io, 2020 - Hybrid clients as bridge to “normal” BitTorrent Transport Protocol: WebRTC (on top TCP/UDP) 4 Introduction Research Questions Main Research Question Can WebTorrent be abused to have web page visitors involuntarily participate in peer-to-peer networks? Sub Questions - Which WebTorrent specific features can be abused? - In which ways could WebTorrent be useful to an adversary? - What can be done to