Smart Regulation in the Age of Disruptive Technologies

Total Page:16

File Type:pdf, Size:1020Kb

Smart Regulation in the Age of Disruptive Technologies SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term pathways enabled regulation “Laws that learn” ALTERNATIVE POLICY OPTIONS • Regulating behaviour – Need to fully account for behavioural biases in individuals – Stop protecting consumers, start empowering users – “Nudge” most controversial when it comes to emerging technologies? (Yeung 2017) • Regulating technology – Code, not law, defines what’s possible (Lessig 1996; 1999) – Design-based rules: embedding ethical principles/normative goals in code? • Regulating “with” technology – Constant surveillance – Distributed ledgers – “Guardian AI”: algorithms that monitor algorithms “Regulatory engineering” • New screens • New experiments – Openness/neutrality – RCTs – Interoperability – (Virtual) sandboxes – Scalability – Ideation Sprints – Contestability – Rapid prototyping – Resilience – Regulation via “extensions” – Enforceability – Co-regulatory schemes Taxonomy of algorithmic approaches (Yeung 2017) Actionable insights? Transparency Garbage in, garbage out Discriminatory actions Profiling and reorganising reality Responsibility Source: Mittelstadt et al (2016) Overall EU SDG goals Mission-oriented policy Mission-oriented innovation policy Spending (MFF) Mission innovation Sectoral policies EU Mission 1 Mission 2 Mission X EU SDG Indicator Set Horizontal policy Governance Semester/Cohesion funds Frontier 2030 (Europe) Tools National SD MS pathways Progress/evaluation Regulation & MOIP: key challenges • Embedding innovation in coherent baseline scenarios • Embedding different technology mixes and business models in the choice of policy alternatives • Linking the evaluation cycle with updates in the technology roadmaps • Experimentation, data management and collection in both MOIP and policy Regulation & MOIP: key challenges 1 Mission-led platforms Coherence check Coherence check Mobility + Motivation + Motivation Political validation of amendments of amendments Shelter First VP New IA guidelines 5 6 Jobs 2 3 4 Baseline Energy Ex ante IA Council Adoption Options RTD RSB EPRS Health Lead DG Security Climate STOA Unit Monitoring and ex post evaluation SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 Example 1: Why did we want net neutrality? • Anonymity • Competition and fair business practices • Innovation • User choice • Openness • Freedom of expression/Pluralism Example 2: Grid neutrality? • “The electric grid does not care if you plug in a toaster, an iron, or a computer … [It’s] a model of a neutral, innovation-driving network” (Tim Wu, 2002) • Still true? • Grid neutrality would have effects on competition, investment, distributional, and industrial policy • Grid neutrality would not make the grid neutral • It would clash with the trend towards responsible cooperation with platforms • Any alternative is problematic in terms of enforcement: but this is a debate that is nowhere on the map, in all ICT-permeated sectors EXAMPLE 3: COPYRIGHT ENFORCEMENT • Early years (1996-2001): belief that ISPs should not inspect content • 2001-2010: belief that DRMs would dominate the market, allowing for “easy” enforcement (not without shortcomings) • 2010 onwards: the age of inspection and intermediary liability • Need to review the problem definition • Policy learning: need to monitor emerging technologies and verify possible avoidance strategies (e.g. TOR, Onion Routing, etc.) Achilles and the turtle n Mp3.com (2000) ¨ One-way downloads ¨ No sharing ¨ Space-shifting ¨ Not fault-tolerant ¨ Not extensible ¨ Not lawsuit-proof n Napster (2000) ¨ Centralized ¨ Static ¨ Manageable ¨ Not extensible ¨ Not fault-tolerant ¨ Not lawsuit-proof Achilles and the turtle n Morpheus (2003) ¨ Decentralized ¨ Dynamic ¨ Difficult to manage ¨ Extensible ¨ Fault-tolerant ¨ Lawsuit-proof n Grokster (2003) ¨ Decentralized ¨ Dynamic ¨ Manageable ¨ Extensible ¨ Fault-tolerant ¨ Lawsuit-proof p2p boom! 2 Find MP3 BitComet Easy File Sharing Web Server KazaaHttp Searchius ABC BitComet Accelerator eDonkey 2000 Knutell SendLink eDonkey Accelerator Acquisition BitLord LimeWire Shareaza eFileGo Lphant peer to peer ShareDirect Adagio BitSpirit Einstein Amini p2p Software BitTorrent MagicVortex ShareGear Emule MediaGrab! aMule Project BitTorrent Absolute Downloader ShareIt eMule Plus Mercora IMRadio Soulseek ANts p2p BitTorrent Lite eXeem Mextractor Anywhere Explorer Black Pirate FS FilePipe MLdonkey Streamjack Music Apollon Blubster Filetopia Morpheus The Circle Applejuice BT2Net Freenet MP3-Wolf Torrent Searcher Ares Bt2Net Jet-speed Downloader Gnucleus Myster Torrentopia Grokster Ares p2p BTGetit Network Sunshine TribalWeb Grouper Nodescan TrustyFiles Arliweb Folders Carracho Haxial KDX AudioGalaxy Rhapsody Connect Storm Noxx Web file manager iMesh P2P ShareSpy AudioGnome Crazaa HTTP Commander iMesh Light Peer2Mail WinMP3Locator Axbar DC++ iMesh Revolution PeerFolders Azureus Deepnet Explorer InfocuSoft Photo Share WWW File Share Pro PeerFTP BadBlue Diet K K-LiteGold XBT Personal File Server BCDC++ Digital Media Server Kast Xolox KaZaa Piolet BearShare DIYP2P / Paranoia PixVillage YaCy DriveHQ Kazaa All-in-One ZipTorrent Kazaa Lite Resurrection PruneBaby! Zultrax PySoulSeek Qnext Technology wins again… Technology wins again… Example 4: Algo trading “Flash crash of 2.45” - 9.2%! Who is responsible? The making of a fly.. $23 million!! Who is responsible? Collective (ir)responsibility? BlockChain EXAMPLE 5: FILTER BUBBLES • The “Daily me”: ongoing polarization of political opinions • Alternative policy options? • Self-regulation (corporate codes of conducts, industry-wide agreements) • Co-regulation (e.g. extensions such as Balancer, PolitEcho, Bobble, This is Fake, Considerit, FlipFeed, Escape Your Bubble) • General principles of accountability for pluralism and political balance to major platforms and social media • Development of publicly funded third-party, interoperable extensions on major platforms (e.g. use of innovation prizes?) • Outcome-based policy in the form of KPIs that measure the political balance in the flow of information exchanged by individual end users. Example 6: automated driving Making decisions… Example 7: the “digital panopticon” SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • Étude De La Pratique Du Téléchargement Légal Et Illégal Sur Internet
    Étude de la pratique du téléchargement légal et illégal sur Internet Travail de Bachelor réalisé en vue de l’obtention du Bachelor HES par : Julien MARIETHOZ Conseiller au travail de Bachelor : (David Billard, Professeur HES) Genève, le 12 mai 2010 Haute École de Gestion de Genève (HEG-GE) Informatique de Gestion Déclaration Ce travail de Bachelor est réalisé dans le cadre de l’examen final de la Haute école de gestion de Genève, en vue de l’obtention du titre d’ « informaticien de gestion ». L’étudiant accepte, le cas échéant, la clause de confidentialité. L'utilisation des conclusions et recommandations formulées dans le travail de Bachelor, sans préjuger de leur valeur, n'engage ni la responsabilité de l'auteur, ni celle du conseiller au travail de Bachelor, du juré et de la HEG. « J’atteste avoir réalisé seul le présent travail, sans avoir utilisé des sources autres que celles citées dans la bibliographie. » Fait à Genève, le 12 mai 2010 Julien MARIETHOZ Étude de la pratique du téléchargement légal et illégal sur Internet MARIETHOZ, Julien iv Remerciements Dans le cadre de la réalisation de ce travail, je tiens à remercier tous ceux qui ont pu y contribuer directement ou indirectement : M. David Billard pour son encadrement et ses conseils. Carole, ma femme, qui a pris le temps de s’occuper de notre petit qui est né le jour après la date de début officiel, me permettant de me concentrer sur ce travail. Tous ceux qui ont pris le temps de répondre à mon questionnaire, en me fournissant les données nécessaires à ce rapport.
    [Show full text]
  • Interconnexion Et Routage Dans Les Systèmes Pair À Pair Salma Ktari
    Interconnexion et routage dans les systèmes pair à pair Salma Ktari To cite this version: Salma Ktari. Interconnexion et routage dans les systèmes pair à pair. domain_other. Télécom ParisTech, 2009. English. pastel-00005737 HAL Id: pastel-00005737 https://pastel.archives-ouvertes.fr/pastel-00005737 Submitted on 19 May 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Thèse présentée pour obtenir le grade de Docteur de l’École Nationale Supérieure des Télécommunications Spécialité : Informatique et Réseaux SALMA KTARI Interconnexion et routage dans les systèmes pair à pair Soutenue le 14 Décembre 2009 devant le jury composé de Isabelle Chrisment Rapporteurs Pascal Lorenz Maurice Gagnaire Examinateurs Sami Tabbane Yutaka Takahashi Invité Houda Labiod Directeur de thèse Artur Hecker Co-directeur de thèse ii À mon cher époux, À ma famille. iv Merci, Au terme de ce travail, je tiens à remercier mes directeurs de thèse, madame Houda Labiod et monsieur Artur Hecker qui m'ont accompagné dans ma recherche ces trois années. Un grand merci à Artur pour sa grande disponibilité et son suivi sérieux et parfois exigeant, qui m’ont été d’une aide précieuse.
    [Show full text]
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • Software to Download from File Sharing Sites 10 Best File Sharing Software for Peer to Peer File Sharing
    software to download from file sharing sites 10 Best File Sharing Software for Peer to Peer File Sharing. Sharing files online isn’t that much easy as it should be, especially, if you have large files with size in GBs. Thankfully, we can use P2P (peer-to- peer) file sharing software to easily share files with anyone online of no matter what size. You can easily upload or download TBs of data without any restrictions. P2P file sharing software can be quite handy, but at the same time, they also have some negative points. These p2p file sharing software also host illegal downloads so that it may lead to any action against you. Furthermore, these peer to peer file sharing software are also known to spread viruses and malware; you will have to be careful about downloading too. Top 10 Best File Sharing Software for Peer to Peer File Sharing. There are dozens of P2P file sharing software to choose from, but it is essential to choose the best P2P file sharing software that is safe and features rich. To help you find the best file sharing software for your needs, we have compiled a list of best file sharing software. You can just select the one that seems right for your needs. 1. uTorrent. Even after being acquired by BitTorrent.inc and becoming closed-sourced with ads, uTorrent is still the leader when it comes to P2P file sharing software. Although you need to subscribe for a premium membership to take full advantage of the client, even its free version offers all the required features to upload and download files without limitations.
    [Show full text]
  • UTEP Standard 20: Software Licensing 20.1 All Software Used On
    UTEP Standard 20: Software Licensing 20.1 All software used on University devices will be used in accordance with the applicable software license. Unauthorized or unlicensed use of software is regarded as a serious violation subject to disciplinary action and any such use is without the consent of the University. (a) UTEP Information Security Policies: UTEP provides a sufficient number of cost-effective, licensed copies of core business software to enable faculty members, staff, and students to perform their work in an expedient and effective manner. (b) Systems administrators have the right to remove software from University devices for cause. For example, if a user in unable to show proof of license, or if the software is not required for University business purpose, or causes problems on the University- owned device. (c) All departments/colleges are responsible for the accurate accounting of software purchased by their respective department/ college and must ensure that the installation of the software complies with the license agreement of the software. For audit purposes, departments/colleges must maintain proof of purchase and/or original installation media for each software package. Third- party software in the possession of UTEP must not be copied unless such copying is consistent with relevant license agreements and prior management approval of such copying has been obtained, or copies are being made for contingency planning purposes. (d) All software purchases shall go through the UTEP Purchasing Department. (e) All commercial software used on computing systems must be supported by a software license agreement that specifically describes the usage rights and restrictions of the product and shall be purchased through the Purchasing Department.
    [Show full text]
  • Conducting and Optimizing Eclipse Attacks in the Kad Peer-To-Peer Network
    Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network Michael Kohnen, Mike Leske, and Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics, Ellernstr. 29, 45326 Essen [email protected], [email protected], [email protected] Abstract. The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented secu- rity measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required re- sources. Keywords: P2P security, Sybil attack, Eclipse attack, Kad. 1 Introduction and Related Work P2P networks form an overlay on top of the internet infrastructure. Nodes in a P2P network interact directly with each other, i.e., no central entity is required (at least in case of structured P2P networks). P2P networks have become increasingly popular mainly because file sharing networks use P2P technology. Several studies have shown that P2P traffic is responsible for a large share of the total internet traffic [1, 2]. While file sharing probably accounts for the largest part of the P2P traffic share, also other P2P applications exist which are widely used, e.g., Skype [3] for VoIP or Joost [4] for IPTV. The P2P paradigm is becoming more and more accepted also for professional and commercial applications (e.g., Microsoft Groove [5]), and therefore, P2P technology is one of the key components of the next generation internet.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Forever Remembered
    July 2015 Vol. 2 No. 7 National Aeronautics and Space Administration KENNEDY SPACE CENTER’S magazine FOREVER REMEMBERED Earth Solar Aeronautics Mars Technology Right ISS System & Research Now Beyond NASA’S National Aeronautics and Space Administration LAUNCH KENNEDY SPACE CENTER’S SCHEDULE SPACEPORT MAGAZINE Date: July 3, 12:55 a.m. EDT Mission: Progress 60P Cargo Craft CONTENTS Description: In early July, the Progress 60P resupply vehicle — 4 �������������������Solemn shuttle exhibit shares enduring lessons an automated, unpiloted version of the Soyuz spacecraft that is used to ����������������Flyby will provide best ever view of Pluto 10 bring supplies and fuel — launches 14 ����������������New Horizons spacecraft hones in on Pluto to the International Space Station. http://go.nasa.gov/1HUAYbO 24 ����������������Firing Room 4 used for RESOLVE mission simulation Date: July 22, 5:02 p.m. EDT 28 ����������������SpaceX, NASA will rebound from CRS-7 loss Mission: Expedition 44 Launch to 29 ����������������Backup docking adapter to replace lost IDA-1 the ISS Description: In late July, Kjell SHUN FUJIMURA 31 ����������������Thermal Protection System Facility keeping up Lindgren of NASA, Kimiya Yui of JAXA and Oleg Kononenko of am an education specialist in the Education Projects and 35 ����������������New crew access tower takes shape at Cape Roscosmos launch aboard a Soyuz I Youth Engagement Office. I work to inspire students to pursue science, technology, engineering, mathematics, or 36 ����������������Innovative thinking converts repair site into garden spacecraft from the Baikonur Cosmodrome, Kazakhstan to the STEM, careers and with teachers to better integrate STEM 38 ����������������Proposals in for new class of launch services space station.
    [Show full text]
  • Emule for Dummies V 0.1 - by Ciquta
    eMule for dummies v 0.1 - by ciquta (Guida funzionale ed incompleta rivolta ai neofiti della rete ed2k) Filosofia ed2k I p2p ed2k (edonkey, emule, emule plus, etc…) sono la generazione “intelligente” dei p2p: si basano sul principio dei “crediti”, ovvero chi più shara risorse, chi più invia, chi in definitiva si impegna di più a mettere a disposizione la propria banda di upload viene maggiormente premiato con slot di download. La quantità totale di upload in qualsiasi p2p è uguale identica a quella totale di download, pertanto più vengono messi a disposizione bit di upload, più vi saranno utenti connessi alla rete e maggiori saranno le possibilità di reperimento di un file e quindi di download. Il che sta a significare che gli utenti collegati avendo un ristorno in termini di download di quello che sharano e soprattutto inviano sono ben disposti a alimentare questo circolo di scambio dati, e i risultati si palpano in termini di reperibilità di file particolarmente rari e di numero delle fonti e di slot disponibili. Il software lato client è open source, pertanto vi capiterà di perdervi tra le mille versioni e relativi modding. Tuttavia la sostanza è sempre simile e notevoli cambiamenti tra l’una e l’altra sono percettibili solo tra versioni notevolmente distanti tra di loro in termini di date di sviluppo, quindi non è certo il caso di cambiare ad ogni uscita di una nuova versione, credo sia sufficiente farlo una volta ogni 3 o 4 mesi a scanso di epocali svolte nello sviluppo. Principali caratteristiche innovative Tante sono le interessanti differenze con gli altri p2p: • Gestione autonoma delle code: eMule non da modo agli utenti di “segare” gli upload, evitando quindi i classici casi di troncamento dei download tipici degli altri p2p, nei quali c’è da guerrigliare con baratti e suppliche per farsi finire un download.
    [Show full text]
  • Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow
    Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow To cite this version: Ricci Ieong, Kam-Pui Chow. Validation Rules for Enhanced Foxy P2P Network Investigations. 10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.73- 83, 10.1007/978-3-662-44952-3_6. hal-01393761 HAL Id: hal-01393761 https://hal.inria.fr/hal-01393761 Submitted on 8 Nov 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Chapter 6 VALIDATION RULES FOR ENHANCED FOXY P2P NETWORK INVESTIGATIONS Ricci Ieong and Kam-Pui Chow Abstract Experiments with the Foxy P2P network have demonstrated that the first uploader of a file can be identified when search queries are sub- mitted to all the network nodes during initial file sharing. However, in real Foxy networks, file search queries are not transmitted to the entire Foxy network and this process may not identify the first uploader. This paper presents a set of validation rules that validate the observed first uploader. The validation rules define the seeder curve that consistently describes the number of uploaders over time.
    [Show full text]