Zprovoznění a Popis Funkčnosti Freenet

Total Page:16

File Type:pdf, Size:1020Kb

Zprovoznění a Popis Funkčnosti Freenet Zprovoznění a popis funkčnosti FreeNet Autor: Tomáš František Kašpar Předmět: 4iz110 (úterý 12:45) Vyučující: Radomír Palovský Datum vytvoření: 3. 12. 2016 Datum odevzdání: 6. 12. 2016 I. Obsah II. Úvod: ................................................................................................................................................. 3 III. Definice .............................................................................................................................................. 3 IV. Historie ............................................................................................................................................... 4 V. Jak to funguje? .................................................................................................................................... 5 Data ............................................................................................................................................................ 5 Směrování ................................................................................................................................................... 5 Přístup k datům – Klíče ................................................................................................................................ 6 CHK – Content Hash Keys ........................................................................................................................ 6 SSK - Signed Subspace Keys .................................................................................................................... 7 USK – Updateable Subspace Keys ............................................................................................................. 7 KSK – Keyword Signed Keys ................................................................................................................... 8 VI. Útoky ve freenetu ................................................................................................................................ 8 Harvesting ................................................................................................................................................... 8 Analýza provozu .......................................................................................................................................... 8 Útoky na korelace ........................................................................................................................................ 8 Připojení na všechny .................................................................................................................................... 8 VII. Instalace .............................................................................................................................................. 9 Požadavky: .................................................................................................................................................. 9 Instalace: ..................................................................................................................................................... 9 Nastavení pří prvním spuštění: .................................................................................................................... 11 Programy pro freenet .................................................................................................................................. 12 jSite:...................................................................................................................................................... 12 Freemail ................................................................................................................................................ 12 Frost ...................................................................................................................................................... 12 Sone ...................................................................................................................................................... 12 Freenet Messaging systém (FMS) ............................................................................................................ 12 VIII. Závěr ................................................................................................................................................ 13 2 II. Úvod: Cílem této semestrální práce je shrnout veškeré informace o technologii Freenet, první část bude teoretická a v druhé části bude praktický popis toho, jak se technologie v praxi používá. Teoretická část obsahuje samotnou definici Freenetu, jak to vlastně funguje a v neposlední řadě také jeho slabiny a případné útoky spolu s návodem jak jim předejít. Druhá část je již čistě praktická s návodem jak nainstalovat programy pro použití této technologie. Také praktické využití jednotlivých možností, včetně informací jak jich využít. Po přečtení této práce by každý měl vědět co to vlastně Freenet je, jaké má využití a umět ho použít. III. Definice Freenet je peer-to-peer, cenzuře odolná platforma pro komunikaci. Používá decentralizované rozdělení dat a pro publikování a komunikaci používá software dostupný zdarma.1 Vlastními slovy to znamená následující: Pokud nahrajete soubor na freenet tak vám ho rozdělí na více menších souborů, které následně uloží na počítačích ostatních uživatelů (uzlů). Zároveň, vzhledem k tomu, že tato platforma funguje na peer-to-peer principu, to znamená, že vy také poskytujete část svého úložného prostoru na disku k ukládání souborů ostatních uživatelů, nicméně jsou zašifrované, takže nevíte, co je u vás zrovna uloženo. Stejně tak pokud požadujete nějaký soubor, který si chcete stáhnout tak nevíte, kde jsou jednotlivé části uložené a uzly si přeposílají části souborů dokud nedojdou k uživateli, který o ně požádal. 1 Wikipedia: Freenet. [Cit. 5. 12.2016] https://sk.wikipedia.org/wiki/Freenet 3 IV. Historie První zmínka o Freenetu je z roku 1999 kdy Ian Clarke napsal nepublikovanou práci s názvem "A distributed decentralized information storage and retrieval system", která následně byla přepracována spolu s jeho dalšími kolegy na publikaci "Freenet: A Distributed Anonymous Information Storage and Retrieval System" vydanou v roce 2001.2 Podle webové stránky http://citeseerx.ist.psu.edu/ byla tato publikace jednou z nejvíce citovaných v roce 2002 v oblasti informatiky3. První verze byla vydána v již v roce 2000, ve které byla naprogramována čistě základní funkčnost a principy technologie. Zásadní změny se odehrály ve verzi z 8. května 2008 a to 0.7. První změnou byl přechod z protokolu TCP na UDP které mělo za cíl rychlejší přenos informací mezi uzly. Ale tou nejdůležitější byla podpora opennetu a darknetu zároveň. Opennet znamená možnost připojit se do freenetu i přesto, že neznáte nikoho, kdo tuto službu již používá. Připojíte se prostřednictvím takzvaných seed nodes, které provozují dobrovolníci a dovolí vám se přes ně připojit i přesto že vás neznají. Samozřejmě s tím souvisí jisté nebezpečí, protože jste napřímo propojeni s někým koho neznáte a tím pádem zranitelní vůči útokům. Darknet je pravým opakem, připojit se můžete pouze za předpokladu, že znáte někoho kdo již na freenetu funguje. Snižuje se tím riziko útoků na vás, protože s uzly s kterými jste propojeni, jsou pro vás důvěryhodné. Pokud by takto fungovali všichni tak je prakticky nemožné se do takovéto sítě dostat a to i například pro vašeho poskytovatele internetu nebo i úřady. Poslední verze byla vydána před pěti měsíci, takže na systému se stále pracuje a je aktuální. 2 Wikipedia: Freenet. [Cit. 5. 12.2016] https://en.wikipedia.org/wiki/Freenet 3 Citeseerx [Cit. 5. 12. 2016] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4919 4 V. Jak to funguje? Freenet je vlastně jedno velké úložiště dat složené z mnoha malých částí úložného prostoru na uživatelských zařízeních. Nikdo ale neví, co a kde je vlastně uloženo, pokud od souboru nemá klíč. Klíč uživatel obdrží, jakmile do sítě nahraje soubor a klíč může poté dále šířit a tím pádem i soubor. Princip freenetu je postavený na konceptu zvaném „Small world network“ nebo také „Síť malého světa“ což znamená, že vám k připojení do sítě stačí znát pár uživatelů této sítě a vlastně už znáte všechny přes známého známého. Tímto způsobem by mělo být možné připojit se ke komukoliv připojeného do této sítě. Data Každý z připojených uživatelů si musí vyhradit místo na svém disku, do kterého se budou soubory ukládat. Nevýhodou této sítě je, že nemáte v podstatě žádnou kontrolu nad tím, co máte právě uloženo na svém počítači, protože soubory jsou zašifrovány. Dokonce nemáte ani možnost soubor vymazat, jediná možnost jak soubor zmizí je, že přestane být populární, v této chvíli, kdy ho nikdo nestahuje, sám zmizí. Freenet při instalaci sám navrhuje, jak velké by mělo být vaše úložiště podle skutečné velikosti vašeho disku a kapacity RAM, protože samozřejmě větší úložiště potřebuje k provozu více vyrovnávací paměti, ale k požadavkům na hardware se dostaneme později. Směrování Směrování v síti freenet je na počátku vždy náhodné, protože díky anonymitě sítě nemáme žádné informace o ostatních uzlech a tím pádem ani o souborech. Nicméně pokud jeden uzel bude nahrávat více souborů tak se jeho soubory na základě podobnosti jejich klíčů (kvůli stejnému majiteli) začnou slučovat do clusterů a ukládat se poblíž sebe, tím pádem vytvoří jakési hlavní cesty k souborům, pokud je stahuje čím dál tím více lidí. Samozřejmě čím více je dokument stahován, tím více se kopíruje po síti, aby byl všem
Recommended publications
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • A Fog Storage Software Architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein
    A Fog storage software architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein To cite this version: Bastien Confais, Adrien Lebre, Benoît Parrein. A Fog storage software architecture for the Internet of Things. Advances in Edge Computing: Massive Parallel Processing and Applications, IOS Press, pp.61-105, 2020, Advances in Parallel Computing, 978-1-64368-062-0. 10.3233/APC200004. hal- 02496105 HAL Id: hal-02496105 https://hal.archives-ouvertes.fr/hal-02496105 Submitted on 2 Mar 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. November 2019 A Fog storage software architecture for the Internet of Things Bastien CONFAIS a Adrien LEBRE b and Benoˆıt PARREIN c;1 a CNRS, LS2N, Polytech Nantes, rue Christian Pauc, Nantes, France b Institut Mines Telecom Atlantique, LS2N/Inria, 4 Rue Alfred Kastler, Nantes, France c Universite´ de Nantes, LS2N, Polytech Nantes, Nantes, France Abstract. The last prevision of the european Think Tank IDATE Digiworld esti- mates to 35 billion of connected devices in 2030 over the world just for the con- sumer market. This deep wave will be accompanied by a deluge of data, applica- tions and services.
    [Show full text]
  • Decentralized File Sharing Application for Mobile Devices -. | Davide Taibi
    Asterism: Decentralized File Sharing Application for Mobile Devices Olli-Pekka Heinisuo Valentina Lenarduzzi Davide Taibi Tampere University Tampere University Tampere University Tampere, Finland Tampere, Finland Tampere, Finland [email protected] valentina.lenarduzzi@tut.fi davide.taibi@tut.fi Abstract—Most applications and services rely on central au- To avoid the issues of centralization, data can to be stored thorities. This introduces a single point of failure to the system. without any central authorities. Decentralized storage and The central authority must be trusted to have data stored by the content distribution can be achieved with peer-to-peer (P2P) application available at any given time. More importantly, the privacy of the user depends on the service provider capability to networking. In peer-to-peer networking every node of a network keep the data safe. A decentralized system could be a solution to is both a client and a server [4]. The nodes then talk to each remove the dependency from a central authority. Moreover, due other without any central service as opposed to centralized to the rapid growth of mobile device usage, the availability of systems where all communication goes through dedicated decentralization must not be limited only to desktop computers. central servers. In this work we aim at studying the possibility to use mobile devices as a decentralized file sharing platform without any Peer-to-peer (P2P networks and file sharing are rather central authorities. This was done by implementing Asterism, common on desktop environments but they have been rarely a peer-to-peer file-sharing mobile application based on the Inter- used on mobile devices due to more restricted resources.
    [Show full text]
  • Forensic Investigation of P2P Cloud Storage Services and Backbone For
    Forensic investigation of P2P cloud storage services and backbone for IoT networks : BitTorrent Sync as a case study Yee Yang, T, Dehghantanha, A, Choo, R and Yang, LK http://dx.doi.org/10.1016/j.compeleceng.2016.08.020 Title Forensic investigation of P2P cloud storage services and backbone for IoT networks : BitTorrent Sync as a case study Authors Yee Yang, T, Dehghantanha, A, Choo, R and Yang, LK Type Article URL This version is available at: http://usir.salford.ac.uk/id/eprint/40497/ Published Date 2016 USIR is a digital collection of the research output of the University of Salford. Where copyright permits, full text material held in the repository is made freely available online and can be read, downloaded and copied for non-commercial private study or research purposes. Please check the manuscript for any further copyright restrictions. For more information, including our policy and submission procedure, please contact the Repository Team at: [email protected]. Note: This is authors accepted copy – for final article please refer to International Journal of Computers & Electrical Engineering Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study 1 2 3 1 Teing Yee Yang , Ali Dehghantanha , Kim-Kwang Raymond Choo , Zaiton Muda 1 Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM Serdang, Selangor, Malaysia 2 The School of Computing, Science & Engineering, Newton Building, University of Salford, Salford, Greater Manchester, United Kingdom 3 Information Assurance Research Group, University of South Australia, Adelaide, South Australia, Australia. Abstract Cloud computing has been regarded as the technology enabler for the Internet of Things (IoT).
    [Show full text]
  • Download-Emule-Kad-Server-List.Pdf
    Download Emule Kad Server List Download Emule Kad Server List 1 / 3 2 / 3 web site page displaying list of all active servers on the eDonkey/eMule p2p network. ... ping test update servers list at client start download list in eMule.. 0.50a installed on my computer. I can connect to eD2K network easily but I can't connect to Kad network. I have tried to download from http://www.nodes-dat.com/ but the first button " Add to eMule (from Nodes Server)" did't work and the other two worked but the problem still remains.. Bezpieczna lista serwerów emule do pobrania. Pobierz listę zawsze aktualną. Download server.met & serverlist for eMule.. eMule now connects to both the eDonkey network and the Kad network. ... eMule will use clients it knows already from the ed2k servers to get connected to Kad .... The servers merely help hold the network together. Meanwhile, Kad is a network that is also connectable via eMule. Unlike the ED2K network, ... You can use the easy to use installer or you can download the binaries. The difference is that the .... nodes.dat nodes for emule kademlia net server edonkey overnet. ... von IP/Port im Kad-Fenster, oder. - per Download aus dem Internent, z.B. nodes.dat.. Connecting to servers hasn't been working for a long time. ... started them again (there is free drive space on the download drive) but can't get a Kad connection. ... Block4: ipfilter.dat, nodes.dat, server.met (emule-security.org). Dodaj do #eMule te 2 pliki : Do serwerów, czyli eD2k --- http://www.server-list.info/ Do Kad ---..
    [Show full text]
  • Content Addressed, Versioned, P2P File System (DRAFT 3)
    IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) Juan Benet [email protected] ABSTRACT parties invested in the current model. But from another per- The InterPlanetary File System (IPFS) is a peer-to-peer dis- spective, new protocols have emerged and gained wide use tributed file system that seeks to connect all computing de- since the emergence of HTTP. What is lacking is upgrading vices with the same system of files. In some ways, IPFS design: enhancing the current HTTP web, and introducing is similar to the Web, but IPFS could be seen as a sin- new functionality without degrading user experience. gle BitTorrent swarm, exchanging objects within one Git Industry has gotten away with using HTTP this long be- repository. In other words, IPFS provides a high through- cause moving small files around is relatively cheap, even for put content-addressed block storage model, with content- small organizations with lots of traffic. But we are enter- addressed hyper links. This forms a generalized Merkle ing a new era of data distribution with new challenges: (a) DAG, a data structure upon which one can build versioned hosting and distributing petabyte datasets, (b) computing file systems, blockchains, and even a Permanent Web. IPFS on large data across organizations, (c) high-volume high- combines a distributed hashtable, an incentivized block ex- definition on-demand or real-time media streams, (d) ver- change, and a self-certifying namespace. IPFS has no single sioning and linking of massive datasets, (e) preventing ac- point of failure, and nodes do not need to trust each other.
    [Show full text]
  • African Development Bank Group Mali
    AFRICAN DEVELOPMENT BANK GROUP Public Disclosure Authorized Disclosure Public MALI PROJECT FOR THE ECONOMIC EMPOWERMENT OF WOMEN IN THE SHEA BUTTER SUBSECTOR (PAEFFK) Public Disclosure Authorized Disclosure Public RDGW DEPARTMENT November 2018 Translated document TABLE OF CONTENTS Currency Equivalents and Fiscal Year ................................................................................................................i Acronyms and Abbreviations ............................................................................................................................ii Project Brief ................................................................................................................................................... iii Project summary............................................................................................................................................... v Results-Based Logical Framework ................................................................................................................... vi Project Implementation Schedule ……………………………………………………………………………......viii I. STRATEGIC THRUST AND RATIONALE ............................................................................................ 1 1.1. Project Linkages with the Country Strategy and Objectives .................................................................. 1 1.2. Rationale for Bank Involvement ........................................................................................................... 1 1.3. Aid Coordination
    [Show full text]
  • A Distributed Content Addressable Network for Open Educational Resources
    DOI: 10.33965/celda2019_201911C063 16th International Conference on Cognition and Exploratory Learning in Digital Age (CELDA 2019) A DISTRIBUTED CONTENT ADDRESSABLE NETWORK FOR OPEN EDUCATIONAL RESOURCES Stephen Downes National Research Council Canada, Ottawa, Ontario, Canada ABSTRACT We introduce Content Addressable Resources for Education (CARE) as a method for addressing issues of scale, access, management and distribution that currently exist for open educational resources (OER) as they are currently developed in higher education. CARE is based on the concept of the distributed web (dweb) and, using (for example) the Interplanetary File System (IPFS) provides a means to distributed OER in such a way that they cannot be blocked or paywalled, can be associated with each other (for example, as links in a single site, or as newer versions of existing resources) creating what is essentially an open resource graph (ORG), and when accessed through applications such as Beaker Browser, can be cloned and edited by any user to create and share new resources. KEYWORDS Open Educational Resources, Distributed Web, Dat, Interplanetary File System, Open Resource Graph, Content-based Addressing 1. INTRODUCTION The distributed web potentially solves issues proponents of decentralization have long sought to address. One challenge is traffic, which overloads a single server. A second issue is latency, or the lag created by accessing resources half a world away. Additionally, some resources may be subject to national policies creating the need to differentiate access. And finally, if the centralized source is unavailable for some reason, then access for the entire world is disrupted. For the World Wide Web, many of these challenges are addressed with Content Distribution Networks (CDN).
    [Show full text]
  • An Efficient Holistic Data Distribution and Storage Solution for Online Social Networks Guoxin Liu Clemson University
    Clemson University TigerPrints All Dissertations Dissertations 12-2015 An Efficient Holistic Data Distribution and Storage Solution for Online Social Networks Guoxin Liu Clemson University Follow this and additional works at: https://tigerprints.clemson.edu/all_dissertations Recommended Citation Liu, Guoxin, "An Efficient Holistic Data Distribution and Storage Solution for Online Social Networks" (2015). All Dissertations. 1774. https://tigerprints.clemson.edu/all_dissertations/1774 This Dissertation is brought to you for free and open access by the Dissertations at TigerPrints. It has been accepted for inclusion in All Dissertations by an authorized administrator of TigerPrints. For more information, please contact [email protected]. An Efficient Holistic Data Distribution and Storage Solution for Online Social Networks A Dissertation Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Computer Engineering by Guoxin Liu December 2015 Accepted by: Dr. Haiying Shen, Committee Chair Dr. Richard R. Brooks Dr. Kuang-Ching (KC) Wang Dr. Feng Luo Abstract In the past few years, Online Social Networks (OSNs) have dramatically spread over the world. Facebook [4], one of the largest worldwide OSNs, has 1.35 billion users, 82.2% of whom are outside the US [36]. The browsing and posting interactions (text content) between OSN users lead to user data reads (visits) and writes (updates) in OSN datacenters, and Facebook now serves a billion reads and tens of millions of writes per second [37]. Besides that, Facebook has become one of the top Internet traffic sources [36] by sharing tremendous number of large multimedia files including photos and videos.
    [Show full text]
  • Bittorrent App Change Download Location How to Seed Moved Or Renamed Files in Bittorrent
    bittorrent app change download location How to Seed Moved or Renamed Files in BitTorrent. BitTorrent etiquette dictates that once you've downloaded files, you also seed them to help others' downloads go quickly. If you need to move or rename your download, everything's thrown off. Reader Jake Champion explains how to seed after moving or renaming files. This feature is available in uTorrent version 1.8 and later. You can not change file names and keep seeding with earlier versions of uTorrent. You can use this guide if you move or rename the folder in addition to changing file names. It is possible to change file (and folder) names because they are not really parts of the files. They are like ''labels'' that tell the computer where to find the content of the files. After such changes, you need to retarget the files in uTorrent if you want to keep seeding the torrent. The procedure for doing this is the same no matter if the torrent is already loaded in uTorrent, or if you add it as a new torrent. Seed Renamed Files. 1. If the torrent is already loaded in uTorrent, right-click it and choose ''Stop'' (if it is not already stopped). If you are adding a new torrent with changed file names, make sure that you add it in stopped mode (or stop it very quickly if you fail to do this). 2. Select the torrent, then click the ''Files'' tab in the lower pane. (If you have no lower pane, click ''Options'' and check ''Show detailed info''.) 3.
    [Show full text]
  • Solid Over the Interplanetary File System
    Solid over the Interplanetary File System Fabrizio Parrillo Christian Tschudin Dept of Mathematics and Computer Science Dept of Mathematics and Computer Science University of Basel, Switzerland University of Basel, Switzerland <[email protected]> <[email protected]> Identity Providers Service Identity Providers Service Abstract—Solid is a moderate re-decentralization architecture Clients for the Web. In Solid, applications fetch data from storage Provider Provider providers called “pods” which implement discretionary access control, permitting users to grant and revoke access rights and HTTP over the Internet HTTP over the Internet thus keeping control over their data. In this paper, we propose Pod Providers Pod Providers to apply an additional de-verticalization by introducing IPFS as File, SPARQL, File, SPARQL, File, SPARQL, File, SPARQL, a common backend for Solid pods, the goal being to prevent pod Access Ctrl Access Ctrl Access Ctrl Access Ctrl provider lock-in and permitting users to consider “self-poding” Perssistent Perssistent IPFS backend where the heavy persistency task is out-sourced to IPFS. We have implemented this Solid-over-IPFS architecture using the open- source “Community Solid Server” and successfully ran several Fig. 1. Replacing Solid’s persistency layer with IPFS Solid applications over IPFS. Index Terms—IPFS, Solid, Dweb (see Fig. 1). In this way, IPFS becomes the uniting element I. INTRODUCTION among all Solid pod operators, effectively preventing them The Solid project [1] is Tim Berners Lee’s answer to the from holding the data hostage. Moreover, end-users and their massive centralization that has occurred in the Web: a few browser do not have to (but can) be IPFS-aware because this companies dominate the Web ecosystem and are safeguarding burden now shifts to the tech-savvy pod operators, offering a and mediating most of the world’s social media content.
    [Show full text]
  • Intro to Crypto Sci-Club Notes
    Intro to Crypto Sci-Club Notes April 25, 2019 Abstract Notes preparing for sci-club crypto-blockchain presentation. List of possible topics Start with history, review of core tech concepts. Finish with applications. • First large-scale use of blockchain was in WWII Enigma coding machines. Maybe explain how these work? • Concept of mixing/entropy. Concept of mixing at different time-scales (slow, fast). • Public key crypto mathematics theory. • Public key crypto examples: PGP/GPG, x.509 certs, SSL/https, onion routing described at general level • Crypto at a detailed level: ratchet, double ratchet, forward secrecy, what is it for, how does this work? • Nonce; using nonces for secret boxes; all secret boxes must have a different nonce else there is no forward secrecy • Merkle tree (hash tree): it doesn’t have to be an actual chain; it can be a tree of chains, leading up to a signed root. Thus the dat:// protocol and btrfs, zfs – Bitcoin has merkle trees inside of it; where? why? • Git as a blockchain, and why it was needed - to prevent source code fraud (real, not imagined - intentional covert, secret insertion of corruption/bugs into Linux kernel by unknown actors (possibly NSA??)) – Git is a blockchain of commits. – Each commit is a Merkle tree of file-objects (blobs) that captures the state of that filesystem tree at that particular moment. • File sharing, sleepycat/napster, 1 – Gnutella, BearShare, LimeWire, Shareaza, all use tiger tree hash • torrent architectures (bittorrent tracker is example of DHT) • Other weirdo crypto ideas: death-lottery. • Forking and fork resolution. A fork prevents maintanance of state (e.g.
    [Show full text]