Peer-To-Peer Distribution of Web Content Using Webrtc Within a Web Browser

Total Page:16

File Type:pdf, Size:1020Kb

Peer-To-Peer Distribution of Web Content Using Webrtc Within a Web Browser TVE 15 036 Examensarbete 15 hp Juni 2015 Peer-to-peer distribution of web content using WebRTC within a web browser Kerstin Ersson Siri Persson Abstract Peer-to-peer distribution of web content using WebRTC within a web browser Kerstin Ersson, Siri Persson Teknisk- naturvetenskaplig fakultet UTH-enheten The aim of this project was to investigate if it is possible to host websites using the BitTorrent Besöksadress: protocol, a protocol for distribution of data on Ångströmlaboratoriet Lägerhyddsvägen 1 the web. This was done using several Node.js Hus 4, Plan 0 modules, small clusters of code written in JavaScript, such as Browserify and a modified Postadress: version of WebTorrent. In these modules, Box 536 751 21 Uppsala technologies like websockets and WebRTC are implemented. The project resulted in a working Telefon: WebTorrent module, implemented on the 018 – 471 30 03 website www.peerweb.io. However, the module Telefax: still needs optimization concerning the time it 018 – 471 30 00 takes to set up a WebRTC peer connection. With these modifications, we believe that Hemsida: hosting websites via peer-to-peer network will http://www.teknat.uu.se/student be the future of the web. Handledare: Magnus Lundstedt Ämnesgranskare: Rikard Emanuelsson Examinator: Martin Sjödin ISSN: 1401-5757, TVE 15 036 Populärvetenskaplig sammanfattning En fråga av stor vikt i dagens informationstekniska samhälle är hur data effektivt ska distribueras på nätet. Våra tidspressade scheman kräver att vi snabbt kan få tillgång till alla former av data. Den traditionella lösningen, en server som tillhandahåller information klienter som måste fråga servern innan de kan få tillgång till och ladda ner data, är både ineffektiv och tidskrävande. Som tur är finns nya lösningar till detta problem,baserade på ny teknik som websockets och WebRTC, två verktyg för realtidskommunikation, vilket möjliggör effektivare metoder att sprida data. BitTorrent är ett protokoll för så kallade peer-to-peer-nätverk, som används bland annat av fildelningstjänster. Trots att BitTorrent mest har använts till att olagligt sprida filmer, musik och spel på nätet har det också öppnat lagliga möjligheter för företag och enskilda användare, exempelvis kan dessa tekniker bidra till att minska bandbreddskostnader. I detta projekt undersöktes om det är möjligt att implementera ett peer-to-peer nätverk som använder sig av BitTorrent-protokollet, websockets och WebRTC för att dela data som till exempel hemsidor. Målet var att skapa en fungerande, modifierad version av den befintliga modulen WebTorrent, skriven i Node.js med programspråket JavaScript, för att kunna överföra dessa filer. Målet uppnåddes och det enda problemet som kvarstod var att processen ibland tog längre tid än önskat. Vid överföring av filer är detta acceptabelt, men vid överföring av hemsidor krävs en högre överföringshastighet. Detta skulle dock kunna åtgärdas i en framtida optimeringsprocess. 3 Contents 1 Introduction 7 1.1 Precisit . .7 1.2 Project description . .7 2 Theory 8 2.1 Programming languages . .8 2.1.1 Python . .8 2.1.2 HTML . .8 2.1.3 CSS . .8 2.1.4 JSON . .9 2.1.5 JavaScript and Node.js . .9 2.2 Developing environment and services . .9 2.2.1 GitHub . 10 2.2.2 Terminal . 10 2.2.3 Sublime Text . 10 2.3 Server-client model and peer-to-peer networks . 10 2.4 Websockets . 11 2.5 WebRTC . 11 2.5.1 Signaling . 12 2.6 The BitTorrent protocol . 13 2.6.1 Uploading and downloading files . 14 2.7 WebTorrent . 14 2.8 Similar projects . 15 3 Method 16 4 3.1 Introduction projects . 16 3.1.1 Chat application using websockets . 17 3.1.2 Video chat using WebRTC . 17 3.1.3 Chat application using a WebRTC data channel . 17 3.2 Analyzing and developing the WebTorrent module . 17 3.2.1 Modifying the modules . 17 3.2.2 Testing during development . 19 4 Result 19 4.1 Subprojects . 19 4.2 WebTorrent . 21 4.3 www.peerweb.io . 21 5 Discussion 22 5.1 Methods and the development phase . 22 5.1.1 The subprojects . 22 5.1.2 Developing the WebTorrent module . 23 5.2 Benefits and disadvantages when hosting websites with WebTorrent 24 6 Conclusions 25 5 Abbreviations API Application Programming Interface CDN Content Delivery Network CSS Cascading Style Sheets DNS Domain Name System HTML HyperText Markup Language HTTP HyperText Transfer Protocol ICE Interactive Connectivity Establishment IM Instant Messaging IP Internet Protocol JSON JavaScript Object Notation REST Representational State Transfer RTC Real Time Communication SDP Session Description Protocol SHA Secure Hash Algorithm STUN Session Traversal Utilities for NAT TCP Transmission Control Protocol UDP User Datagram Protocol URI Uniform Resource Identification URL Uniform Resource Locator 6 1 Introduction Recent technologies within modern web browsers enable new solutions to old problems, such as distribution of content (HTML code, CSS sheets, JavaScript, movies, pictures etcetera). The traditional client-server model is being replaced by new solutions with connections directly between peers, such as websockets (Theory 2.4) and WebRTC (Theory 2.5) peer connections. These new solutions have opened a world of new possibilities for distribution of content in browsers, making it faster and easier than ever to exchange information on the web. The first service for file sharing through peer-to-peer networks is considered to be Napster, which was released in 1999 [1]. Since then, several other clients have been released, and in the early 2000’s the BitTorrent protocol was presented. The BitTorrent protocol has revolutionized the way people share files on the internet. Even though its main use has been unauthorized distribution of movies, games, music, and other copyright data, it is also used legally by companies and individuals to cut bandwidth costs. 1.1 Precisit This project was done at Precisit, a startup company in IT and management consulting, at their office in Uppsala. Precisit’s vision is to work with cutting edge technology that can simplify our everyday life, and possibly change the world. 1.2 Project description This project will attempt to implement a distribution network for web content using a web implementation of the BitTorrent protocol, WebTorrent. We will, however, make a few changes to the WebTorrent source code, in order to receive desired functionality. Currently, the host company has a solution for real time signaling between a large number of peers, called jsFlow.[2] This would be extended with support for torrent trackers written in JavaScript to enable distributing content over the WebRTC data channels used by WebTorrent. The aim of this project is to investigate the feasibility in using these technologies 7 to share data such as web pages, in terms of, inter alia, application-handiness and latency. 2 Theory 2.1 Programming languages In this project several different programming languages were used. In this section, these programming languages are listed and shortly explained, since a background knowledge about these different programming languages is needed to understand concepts later on in the project. 2.1.1 Python Python is a programming language used for object oriented and functional programming. It has extensive libraries available for implementing efficient REST-services such as Tornado, which is a library by Facebook for solving the C10k problem (>10k connecting per server) and as such is highly scalable and efficient.[3] 2.1.2 HTML HTML is the standard markup language for creating web pages. The language mostly uses tag pairs to create elements, one opening tag and one closing tag enclosed by angle brackets. Web browsers use the HTML code to interpret the content of the web page. The HTML objects are the building blocks of the web pages and allow for the embedding of, for example, videos and images.[4] 2.1.3 CSS CSS is a style sheet language used to change the layout of interfaces written in a markup language. Together with HTML and JavaScript, CSS forms the cornerstone technology of building engaging web pages and mobile applications. For each HTML object used, a number of formatting instructions are provided.[5] 8 2.1.4 JSON JSON is an open standard format language originally derived from JavaScript to enable transmission of data in attribute-value pairs. Most programming languages has code for handling JSON objects.[6] 2.1.5 JavaScript and Node.js JavaScript is a dynamic script language which is mostly used on the client side in web applications. Many JavaScript developers use the module pattern when coding, which is a way of dividing bigger programs into smaller clusters of code. An example of this is Node.js, which allows JavaScript to be used on the server side as well as allows connections to databases, sending emails and so on. The idea behind Node.js modules is that they each should do one thing, and do that well. Thus, bigger and more complex programs can then be built using these modules as building blocks. npm is a package manager for Node.js, where Node developers can upload their modules for other people to use in their programs. npm has over 70 000 modules that handles anything from video streaming to advanced mathematics and encoding. Modules are imported to Node by using the command require(’module’).[7] In the browser, however, the require method is not defined. But software written for Node.js can be compiled to run in the browser environment by using Browserify, a tool that compiles Node.js style modules for use in the browser. JavaScript is also used in Precisit’s real-time messaging service jsFlow, which uses websockets to enable users to send JSON-objects.[8] 2.2 Developing environment and services To be able to develop our own code in an efficient and practical way, we used Github, the Terminal and Sublime text.
Recommended publications
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • ARK​ ​​Whitepaper
    ARK Whitepaper ​ ​​ A Platform for Consumer Adoption ​ ​ ​ ​ ​ ​ ​ ​ v.1.0.3 The ARK Crew ARK Whitepaper v.1.0.3 ​ ​ ​ ​ ​ ​ ​ ​ Table Of Contents ​ ​ ​ ​ Overview………………………………………………………………...……………………………….……………….………………………………………………………….….3 ​ Purpose of this Whitepaper………………………………………………………………………………………………………………………..….……….3 ​ ​ ​ ​ ​ ​ ​ Why?…………………………………………………………………………………………………………………….…………………………………………………….…………..4 ​ ​ ARK…………………………………………………………………………………………………….……………….…………………………………………………………………..5 ​ ​ ARK IS………………………………………………………………………………………………....……………….………………………………………………………………..5 ​ ​ ​ ​ ARK: Technical Details……………………………………….…….…..…………………………...……………….………………...…………………………...6 ​ ​ ​ ​ ​ ​ - Delegated Proof of Stake…………………………….……………...………………………….……………………………………….………...…...6 ​ ​​ ​ ​ ​ ​ ​ ​ ​ - Hierarchical Deterministic (HD) Wallets ​ ​​ ​ ​ ​ ​ ​ ​ (BIP32)…………………………………………………….....…………………..…..8 ​ - Fees……………………………………………………………………………………………………………….……………….…...………………………………..……...8 ​ ​​ ​ - ARK Delegates and Delegate Voting.…………………………………………………………………………………...………………….9 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ - Bridged Blockchains (SmartBridges)....................………………………………………………………………….………...…….10 ​ ​​ ​ ​ ​ ​ ​ - POST ARK-TEC Token Distribution …………………..…………………………………….………………….………..……..…..……….11 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ - Testnet Release……………………………………………….…………………………………………………………………….………...….....12 ​ ​ ​ And Beyond?…………………………………………………………………….………...……………………………………….………………………...……….…12 ​ ​ ​ ​ Addendum 1: ARK IS…(Cont.)...……..……..…………....…..………...………………………………………...………………………......……12
    [Show full text]
  • [Hal-00744922, V1] Improving Content Availability in the I2P Anonymous
    Improving Content Availability in the I2P Anonymous File-Sharing Environment Juan Pablo Timpanaro, Isabelle Chrisment*, Olivier Festor INRIA Nancy-Grand Est, France *LORIA - ESIAL, Universit´ede Lorraine Email: fjuanpablo.timpanaro, [email protected] Email: [email protected] Abstract. Anonymous communication has gained more and more inter- est from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anony- mous file-sharing among users. However, one major problem with anony- mous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTor- rent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content. Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable. 1 Introduction Peer-to-peer file-sharing has always been one of the major sources of the Internet hal-00744922, version 1 - 24 Oct 2012 traffic, since its early beginnings in 2000. It has been moving from semi-central approaches (eDonkey2000, for example), to semi-decentralized approaches (Kazaa, for instance) to fully decentralized file-sharing architectures (like the KAD net- work).
    [Show full text]
  • Downloading Copyrighted Materials
    What you need to know before... Downloading Copyrighted Materials Including movies, TV shows, music, digital books, software and interactive games The Facts and Consequences Who monitors peer-to-peer file sharing? What are the consequences at UAF The Motion Picture Association of America for violators of this policy? (MPAA), Home Box Office, and other copyright Student Services at UAF takes the following holders monitor file-sharing on the Internet minimum actions when the policy is violated: for the illegal distribution of their copyrighted 1st Offense: contents. Once identified they issue DMCA Loss of Internet access until issue is resolved. (Digital Millennium Copyright Act) take-down 2nd Offense: notices to the ISP (Internet Service Provider), in Loss of Internet access pending which the University of Alaska is considered as resolution and a $100 fee assessment. one, requesting the infringement be stopped. If 3rd Offense: not stopped, lawsuit against the user is possible. Loss of Internet access pending resolution and a $250 fee assessment. What is UAF’s responsibility? 4th, 5th, 6th Offense: Under the Digital Millennium Copyright Act and Loss of Internet access pending resolution and Higher Education Opportunity Act, university a $500 fee assessment. administrators are obligated to track these infractions and preserve relevent logs in your What are the Federal consequences student record. This means that if your case goes for violators? to court, your record may be subpoenaed as The MPAA, HBO and similar organizations are evidence. Since illegal file sharing also drains becoming more and more aggressive in finding bandwidth, costing schools money and slowing and prosecuting alleged offenders in criminal Internet connections, for students trying to use court.
    [Show full text]
  • Download Torrent File Href=Magnet Download Torrent File"" Href=""Magnet: Last Active: Oct 26, 2014 Threads: 13 Posts: 20
    download torrent file href=magnet Download torrent file"" href=""magnet: Last Active: Oct 26, 2014 Threads: 13 Posts: 20. Last Active: Jun 05, 2017 Threads: 308 Posts: 515. i've read from the old suprbay about magnet links being set as default, and torrent links only be used for torrents below 10 peers. Last Active: Oct 02, 2019 Threads: 48 Posts: 2,385. Last Active: Jul 10, 2020 Threads: 0 Posts: 3. Last Active: Jul 12, 2018 Threads: 54 Posts: 2,462. Torrent links haven't appeared on the site since it returned 18 months ago. They never will again. The Download link is advertising, deliberately deceptive advertising at that, fuck knows what clicking it will result in but I wouldn't expect it to be anything good. Download torrent file"" href=""magnet: Last Active: Sep 11, 2020 Threads: 242 Posts: 604. credits to my friend suzitastik With the widespread use of magnet links on various sites, many people with seedboxes ask how to get the .torrent file from the Magnet Link to add to rutorrent. Firstly find the torrent you want. Right click on the red Magnet Link icon. Copy Link Address. Go to rutorrent client, click ADD torrent. This will open up a box. Choose Add Torrent URL > paste URL. The .torrent should now be successfully added to rtorrent. All Done ! I hope this helps some people. Please add anything to improve this process. Given a .torrent file how do I generate a magnet link in python? [closed] I need a way to convert .torrents into magnet links.
    [Show full text]
  • A Study of Peer-To-Peer Systems
    A Study of Peer-to-Peer Systems JIA, Lu A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Philosophy in Information Engineering The Chinese University of Hong Kong August 2009 Abstract of thesis entitled: A Study of Peer-to-Peer Systems Submitted by JIA, Lu for the degree of Master of Philosophy at The Chinese University of Hong Kong in June 2009 Peer-to-peer (P2P) systems have evolved rapidly and become immensely popular in Internet. Users in P2P systems can share resources with each other and in this way the server loading is reduced. P2P systems' good performance and scalability attract a lot of interest in the research community as well as in industry. Yet, P2P systems are very complicated systems. Building a P2P system requires carefully and repeatedly thinking and ex- amining architectural design issues. Instead of setting foot in all aspects of designing a P2P system, this thesis focuses on two things: analyzing reliability and performance of different tracker designs and studying a large-scale P2P file sharing system, Xun- lei. The "tracker" of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server tracker, to DHT- based (distributed hash table) serverless systems. In the first part of this thesis, we classify the different tracker designs, dis- cuss the different considerations for these designs, and provide simple models to evaluate the reliability of these designs. Xunlei is a new proprietary P2P file sharing protocol that has become very popular in China.
    [Show full text]
  • Bittorrent Files Hace Stopped Downloading
    bittorrent files hace stopped downloading Why Some Torrents Don’t Download? A torrent that doesn’t start downloading or one that suddenly stops can be very frustrating. You check your Internet connection, the cables, and everything looks good. So what can be the reasons for those torrents that don’t seem to work? Some Torrents Don’t Download. The main reason behind a torrent file that doesn’t even start downloading is the lack of seeders and peers. In other words, there is no one seeding that file, meaning there’s no place where you can download it from. That’s why it’s very important that you have a look at the number of seeders and peers every time you start a new download. Seeders are the users who already finished downloading and are only sharing. The peers are the ones like you, the ones who are downloading and uploading at the same time. Some Files Suddenly Stop Downloading. This is another common scenario. We’ve all been there when a torrent stops at some moment, such as 99%. That usually happens when there are only peers, but no seeders . If you think about it, it makes total sense. The peers have many parts of the torrent in common, and they will share those between them. But because there are zero seeders, no one has the entire file , and everyone will share the same parts and stop in the same percentage point. A Dead Torrent. Both of the situations we just saw are what users in the community call a “dead torrent”.
    [Show full text]
  • Frequently Asked Questions
    Copyright & File-Sharing FREQUENTLY ASKED QUESTIONS WHAT IS COPYRIGHT? BUT I BOUGHT IT. WHY CAN’T I SHARE IT? WHAT CAN I DO TO AVOID COPYRIGHT Copyright refers to the legal rights creators have There is a difference between using and distributing INFRINGEMENT? over the use, distribution, and reproduction of copyrighted materials. Purchasing songs, movies, or Download content from legitimate sources and do original work (music, movies, software, etc.). software from legitimate sources does not give you the not share copyrighted materials online. Uninstall Copyright infringement is the unlawful use of any right to share these materials over the Internet or make P2P applications (e.g., Popcorn Time, BitTorrent, material protected under copyright law. Common copies for others. When you purchase a Peer-to-Peer Vuze), which may be sharing your files without violations include downloading ‘pirated’ copies of (P2P) program (e.g., Frostwire, BitTorrent, Vuze), you your knowledge. Do not share your NetID and copyrighted materials or sharing files not intended only buy the software, not any files you download or password with anyone. Keep your computer for you to distribute. share using this software. up-to-date with the latest security patches and anti-virus software. HOW DO I KNOW IT’S COPYRIGHTED? DOES UMASS IT MONITOR MY INTERNET Assume all materials are copyright-protected CONNECTION? HOW CAN I LEGALLY DOWNLOAD CONTENT? unless you created them or you have received the No. We do not monitor the contents of your computer Services like Amazon, iTunes, and eMusic offer author’s explicit permission to distribute them. All or issue copyright complaints.
    [Show full text]
  • An Architecture for Client Virtualization: a Case Study
    Computer Networks 100 (2016) 75–89 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet An architecture for client virtualization: A case study ∗ Syed Arefinul Haque a, Salekul Islam a, , Md. Jahidul Islam a, Jean-Charles Grégoire b a United International University, Dhaka, Bangladesh b INRS-EMT, Montréal, Canada a r t i c l e i n f o a b s t r a c t Article history: As edge clouds become more widespread, it is important to study their impact on tradi- Received 30 November 2015 tional application architectures, most importantly the separation of the data and control Revised 17 February 2016 planes of traditional clients. We explore such impact using the virtualization of a Peer- Accepted 18 February 2016 to-Peer (P2P) client as a case study. In this model, an end user accesses and controls the Available online 26 February 2016 virtual P2P client application using a web browser and all P2P application-related control Keywords: messages originate and terminate from the virtual P2P client deployed inside the remote Edge cloud server. The web browser running on the user device only manages download and upload of P2P the P2P data packets. BitTorrent, as it is the most widely deployed P2P platform, is used to BitTorrent validate the feasibility and study the performance of our approach. We introduce a proto- Virtual client type that has been deployed in public cloud infrastructures. We present simulation results Cloud-based server which show clear improvements in the use of user resources. Based on this experience we Web-RTC derive lessons on the challenges and benefits from such edge cloud-based deployments.
    [Show full text]
  • Convergence-2020.Pdf
    A universal architecture to anonymize any application or protocol and turn it into an independent decentralized p2p network inside browsers and servers, with browsers acting as servers CONVERGENCE 1. Description This proposal is a complete redesign of our initial Convergence proposal from 2015 (http://www.peersm.com/Convergence.pdf ) which was intended as a research study for an EU call By “Convergence” in this proposal we don’t refer to a specific network or node but to methods using the Convergence principles 1.1 Background and rationale The initial Convergence proposal was written based on the observation that we must invent one network/system per need if we want to evade big data centralization and protect privacy/anonymity: to browse, to chat, to email, to exchange files, to do social networking or cooperative work, to do crypto currency, to protect the users from their connected objects, to handle peer identities. So it did envision the support of any type of applications and protocols on top of a secure anonymization system, inside browsers and servers The first part is very exactly what IPFS did, including the crypto currency concept in our proposal to sustain the network (Filecoin) But IPFS is not at all designed for privacy, the IPFS team knows that they will have to address the issue but it’s not even part of their roadmap And IPFS adoption is not for all protocols, many other networks will not use it and lack privacy too That’s why we are proposing the Convergence concepts, which are still very up to date, with a major novelty:
    [Show full text]
  • Bittorrent, Inc., ) DOCKET NO
    142 3020 UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION COMMISSIONERS: Edith Ramirez, Chairwoman Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny ____________________________________ ) In the Matter of ) ) BitTorrent, Inc., ) DOCKET NO. C-4464 a corporation. ) ) ___________________________________ ) COMPLAINT The Federal Trade Commission, having reason to believe that the BitTorrent, Inc., a corporation, has violated the Federal Trade Commission Act (“FTC Act”), and it appearing to the Commission that this proceeding is in the public interest, alleges: 1. Respondent BitTorrent, Inc. (“BitTorrent”) is a California corporation, with its principal office or place of business at 303 2nd Street, Suite S600, San Francisco, CA 94107. 2. Respondent is the developer of a popular peer-to-peer file-sharing system used to exchange software, music, movies, digital books, and other large files online. 3. The acts and practices of respondent as alleged in this complaint have been in or affecting commerce, as “commerce” is defined in Section 4 of the FTC Act. 4. Respondent has set forth on its website, www.bittorrent.com, privacy policies and statements about its practices, including statements related to its participation in the Safe Harbor privacy framework agreed upon by the U.S. and the European Union (“U.S.-EU Safe Harbor Framework”). The Framework 5. The U.S.-EU Safe Harbor Framework provides a method for U.S. companies to transfer personal data outside of Europe that is consistent with the requirements of the European Union Directive on Data Protection (“Directive”). Enacted in 1995, the Directive sets forth European Union (“EU”) requirements for privacy and the protection of personal data.
    [Show full text]