May 6, 2021 Blockchain and Bankruptcy

Total Page:16

File Type:pdf, Size:1020Kb

May 6, 2021 Blockchain and Bankruptcy May 6, 2021 Blockchain and Bankruptcy: Short term and long term observations of how blockchain technology can affect the law and practice of bankruptcy Presented by the Orange County Bankruptcy Forum SPEAKERS Jonathan Dunsmoor Securities Attorney | Investor | Blockchain Believer William J. Wall The Wall Law Office Bankruptcy Attorney MODERATOR Anerio V. Altman Lake Forest Bankruptcy Date/Time: Thursday, May 6, 2021 12:00 pm - 1:30 pm PT This activity has been approved for Minimum Continuing Legal Education by the State Bar of California in the amount of 1.5 hours of CLE. The Orange County Bankruptcy Forum certifies that this activity conforms to the standards for the approved education activities prescribed by the rules and regulations of the State Bar of California governing MCLE. OCBF ● 6789 Quail Hill Parkway #204 ● Irvine, CA 92603 Phone/Fax: 949-681-8676 ● [email protected] www.OCBF.org. OCBF 2021 SPONSORS PLATINUM GOLD SILVER BIOS Jonathan C. Dunsmoor, Esq. is a US corporate attorney who focuses his practice on securities law and regulatory matters including blockchain related offerings, asset management in DeFi, and governance tokens. Mr. Dunsmoor represents private companies, including those exploring blockchain/ cryptocurrency opportunities, as well as angel investors and investment funds. He has extensive experience in structuring, negotiating and consummating public and private securities offerings with a particular focus on technology driven finance including Crowdfunding, Regulation A+ and Security Token Offerings. He routinely advises large financial institutions and both private and public companies on blockchain technology and as well as best practices in structuring operational and corporate data. Jonathan is the founder and principal of Dunsmoor Law, P.C. and Senior Of Counsel for the New York-based Reid & Wise, LLC with offices in San Francisco and Shanghai. William (Bill) J. Wall has a long history and proven record of success in achieving consensual and often unique solutions for distressed entities and their stakeholders. Bill represents individuals and organizations, including debtors, creditors, trustees, and assignees for the benefit of creditors, in all phases of the insolvency process with an emphasis on insolvency related litigation. After two decades of bankruptcy practice, Bill has expanded his practice to encompass blockchain law, particularly the intersection between blockchain technology and bankruptcy. Bill also counsels entertainers, visual artists, writers, and other content creators through the process of protecting and monetizing their content, often in conjunction with the integration of emerging blockchain technologies. BLOCKCHAIN AND BANKRUPTCY BY: JONATHAN C. DUNSMOOR, ESQ.* AND WILLIAM “BILL” WALL, ESQ.** The Wall Law Office 26895 Aliso Creek Rd, #B-110, Aliso Viejo, CA 92656 949-387-4300 - [email protected] Dunsmoor Law, P.C. 3407 Delaware Ave Ste. 257, Tonawanda, NY 14217 (by appointment only) 716-371-1936 – [email protected] *Licensed in New York **Licensed in California All Rights Reserved 2021 INTRODUCTION William J. Wall (BW); Bankruptcy Attorney and Blockchain Enthusiast Jonathan Dunsmoor (JD); Securities Attorney and Blockchain Believer WHAT IS BLOCKCHAIN? • Blockchain is a technology that allows for an immutable transmission of data over a decentralized network. • Immutable because of advanced levels mathematics resulting in cryptography • Decentralized because no one central party has the entire “chain.”* *in most cases WHAT IS MONEY?: A VERY, VERY BRIEF HISTORY 1. Barter: Goods in exchange for service and other goods! 2. Gold, jewels, oh my! 3. Gold to paper receipts • Safety for travelers • Fungibility • Aided with Lending 4. Paper money! 5. The Gold Standard Act of the United States 1900 and established gold as the only standard for redeeming paper money. 6. The End of the Gold Standard 1933 7. Nixon Administration and the Smithsonian Agreement (birth of fiat currency) THE BIRTH OF ELECTRONIC MONEY • EGold - 1996 to 2009 ($2 billion transactions per year in 2008) • Liberty Reserve - 2006 to 2013 (“Liberty Dollars” and “Liberty Euros” $0.9 billion transactions per year) • Others, Goldmoney.com, e-Bullion.com, CrowneGold.com, Pecunix.com, and INTgold.com. • Most resulted in criminal prosecution for lack of money transmission licenses and/or related criminal activity associated with product CREATION OF BITCOIN • What is Bitcoin? Bitcoin is the first decentralized cryptocurrency • Created by Satoshi Nakamoto (and NOT Craig Wright) • But possibly the NSA. • Only 21 Million BTC available • Created via “Proof of Work” mining Condensed Timeline: • October 2008: White paper released Bitcoin: A Peer-to-Peer Electronic Cash System • January 2009: Bitcoin Genesis block “mined” • October 2009: $1 = ~ 1,309 BTC • 2014: Ethereum's ICO • September 2019: 1 BTC = $10,500 • May 2021: 1 BTC=$56,000 • Meaning a $1 investment in Bitcoin in October 2009 would be worth approximately $73 million dollars in May 2021. WHAT ARE ALTCOINS? WHY IS THIS IMPORTANT?!? • Peer to Peer • Decentralized • Private or Public blockchains but mostly anonymous transactions • Cryptographically secure • No double spend! • Immutable! (Possibly subject to a 51% attack) SOME BASIC TERMINOLOGY • Blockchain is the technology • Mining: Processing transactions using “hashing” power to solve “blocks” • Transactional Hash: Is a uniquely identifier of each particular transaction on a blockchain (it can be private, public or both) • Block: Small records of the entire blockchain • Fiat money: Inconvertible paper money made legal tender by a government decree. • Bitcoin is the first cryptocurrency system • Bitcoins are the units within the Bitcoin blockchain (1 bitcoin (BTC) equivalent to 1,000 millibitcoins (mBTC), 1,000,000 microbitcoins (μBTC), or 100,000,000 satoshis) • Altcoins are anything other than Bitcoin. “Alternative coins” • Coin is generally a specific unique blockchain protocol (ie. Bitcoin, Litecoin, Ethereum, etc.) • Token is a derivate of an existing blockchain that is built “on top” another blockchain protocol • ICO or Initial Coin Offering • STO or Security Token Offering sometimes called a DSO Fun fact: A “whale” is a • HODL: Hold On for Dear Life cryptocurrency holder with • FOMO: Fear Of Missing Out significant assets. • FUD: Fear, Uncertainty and Doubt • UTILITY TOKEN V. SECURITY TOKEN…. *WE WILL PROVIDE A GLOSSARY PRIVATE KEY V. PUBLIC KEY BLOCKCHAIN & THE LAW: WHY DOES THIS MATTER? • In the same way the Internet changed the world, Blockchain technology will change everything again. • Contract Disputes (Smart Contracts: are self-executing contracts with the terms of the agreement between buyer and seller being directly written into lines of code) • Payments made on chain (Stablecoin: A cryptocurrency with a stable asset price. Generally backed by a fiat currency) • Financial transactions, real estate transactions, HIPPA, and more • No one truly cared until ICO started to become popular… STATE VS. FEDERAL VS. INTERNATIONAL LAW • Each and every jurisdiction is different and changing rapidly • Canadian, Gibraltar, Malta, Estonia, Singapore and Switzerland all ahead of USA. • Why? Easy regulatory process. Canadian provinces govern. Gibraltar, Malta, Estonia, and Switzerland all small countries with quick response time. Singapore understands it is the key to Asia • Bahrain, a strong US ally with Fifth Fleet station there, dramatically ahead of most of MENA region • South America and Africa are significantly behind; mostly for fear of giving up centralized power • Australia is suffering a bit of an identity crisis • USA must step in several ways THE STATES • Just as in real estate, location matters most. • Some states are working diligently to combat fraud and build sandboxes • Do work with universities and private companies to create a thorough understanding of the technology • Don’t be New York and create a BitLicense • All cryptocurrencies are blockchain based but not all blockchains are cryptocurrencies! WTF: SEC, CFTC, IRS, FINCEN, ET. AL. •Who has jurisdiction? (It depends) •Why do they have jurisdiction? (No one is exactly sure) •But I want jurisdiction? •But I want a bigger budget! •WHAT IS A DOA?! BANKRUPTCY JURISDICTION AND COMMENCING CASES SEC V. W.J. HOWEY CO., 328 U.S. 293 (1946) The Howey Test: 1) Investment of money; 2) In a common enterprise; and 3) With the profits coming primarily from the efforts of others. If, all three conditions are met, it’s a security! - Howey SO WHAT IS RIPPLE (XRP?) THE DAO REPORT • July 25, 2017 • “Decentralized Autonomous Organization” • As of the time the offering closed, the total ETH raised by The DAO was valued in U.S. Dollars (“USD”) at approximately $150 million • Problems: • 1) DAO Token holder certain voting and ownership rights. • 2) The DAO would earn profits by funding projects • 3) DAO Token holders could sell their DAO Tokens in a variety of ways in the secondary market and thereby monetize their investment U.S. SECURITIES AND EXCHANGE COMMISSION (SEC) THE SPEECH HEARD AROUND THE CRYPTO WORLD • 2) June 14, 2018 - Digital Asset Transactions: When Howey Met Gary (Plastic) - William Hinman Director, Division of Corporation Finance • In cases where the digital asset represents a set of rights that gives the holder a financial interest in an enterprise = Security • And putting aside the fundraising that accompanied the creation of Ether, based on my understanding of the present state of Ether, the Ethereum network and its decentralized structure,
Recommended publications
  • The Pirate Bay Liability
    THE PIRATE BAY LIABILITY University of Oslo Faculty of Law Candidate name: Angela Sobolciakova Supervisor: Jon Bing Deadline for submission: 12/01/2011 Number of words: 16,613 10.12.2011 Abstract The thesis discuses about peer-to-peer technology and easy availability of an Internet access which are prerequisites to a rapid growth of sharing data online. File sharing activities are managing without the copyright holder‟s permission and so there is a great opportunity of infringing exclusive rights. The popular pee-to-peer website which is enabling immediate file sharing is for example www.thepiratebay.org – the object of this thesis. The copyright law is obviously breaching by end users who are committing these acts. However, on the following pages we are dealing with the third party liability – liability of online intermediaries for unlawful acts committed by their users. A file sharing through the pee-to-peer networks brings benefits for the Internet users. They need no special knowledge in order to learn how to use the technology. The service of www.thepiratebay.org website is offering simultaneously users an access to a broad spectrum of legal content and a copyright protected works. The service is mainly free of charge and the users can find a data they are interested in quickly and in a users‟ friendly format. The aim of the thesis is to compare the actual jurisprudential status of liability of intermediary information society service providers for the file sharing activities on www.thepiratebay.org. 2 Acknowledgement I would like to thank Professor Jon Bing, I am grateful to him for supervising the thesis.
    [Show full text]
  • Characterizing Peer-Level Performance of Bittorrent
    Characterizing Peer-level Performance of BitTorrent DRP Report Amir H. Rasti ABSTRACT 1. INTRODUCTION BitTorrent is one of the most popular Peer-to-Peer During the past few years, peer-to-peer appli- (P2P) content distribution applications over the cations have become very popular on the In- Internet that significantly contributes in network ternet. BitTorrent in one of the most popu- traffic. lar peer-to-peer applications providing scalable peer-to-peer content distribution over the In- In BitTorrent, a file is divided into segments ternet. Some recent studies [8] have shown that and participating peers contribute their outgoing BitTorrent is accountable for approximately bandwidth by providing their available segments 35% of the Internet traffic. BitTorrent is a to other peers while obtaining their missing peers scalable peer-to-peer content distribution sys- from others. Characterization of BitTorrent is use- tem that enables one-to-many distribution of ful in determining its performance bottlenecks as large files without requiring a large access link well as its impact on the network. bandwidth at the source. Similar to other peer- In this study, we try to address the following two to-peer systems, it uses resources of participat- key questions through measurement: (i) What are ing peers to increase the capacity of the system. the main factors that affect observed performance The main shared resource in BitTorrent is the by individual peers in BitTorrent?, and (ii) What up-link bandwidth of individual peers. The file are the contributions of these factors on the per- being distributed is divided into a large number formance of individual peers? To address these of segments.
    [Show full text]
  • A Study of Peer-To-Peer Systems
    A Study of Peer-to-Peer Systems JIA, Lu A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Philosophy in Information Engineering The Chinese University of Hong Kong August 2009 Abstract of thesis entitled: A Study of Peer-to-Peer Systems Submitted by JIA, Lu for the degree of Master of Philosophy at The Chinese University of Hong Kong in June 2009 Peer-to-peer (P2P) systems have evolved rapidly and become immensely popular in Internet. Users in P2P systems can share resources with each other and in this way the server loading is reduced. P2P systems' good performance and scalability attract a lot of interest in the research community as well as in industry. Yet, P2P systems are very complicated systems. Building a P2P system requires carefully and repeatedly thinking and ex- amining architectural design issues. Instead of setting foot in all aspects of designing a P2P system, this thesis focuses on two things: analyzing reliability and performance of different tracker designs and studying a large-scale P2P file sharing system, Xun- lei. The "tracker" of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server tracker, to DHT- based (distributed hash table) serverless systems. In the first part of this thesis, we classify the different tracker designs, dis- cuss the different considerations for these designs, and provide simple models to evaluate the reliability of these designs. Xunlei is a new proprietary P2P file sharing protocol that has become very popular in China.
    [Show full text]
  • Torrent Crawler: a Tool for Collecting Information from Bittorrent Networks
    Torrent Crawler: a tool for collecting information from BitTorrent networks Yeounoh Chung 1. Abstract structure and the unpredictability of the clients can cause problems in the network, making errors BitTorrent is a free peer-to-peer (P2P) difficult to detect and diagnosis. The reliance of a content-sharing application with a complex and node on node local views to maintain the overlay dynamic overlay structure due to loose coupling, high structure further compounds the problem. Defects or churn rate, and varying responsiveness of nodes. The anomalies such as partitioning in the overlay or load complexity and the dynamic nature of the overlay imbalance due to biased peer selection are structure can mask the problems in the network, undetectable without partial global information and a making errors difficult to detect and diagnosis in a good understanding of the various characteristics and timely manner. Furthermore, the heavy reliance of dynamic behaviors of the network. However, such an clients on the node local views compounds the understanding was often times missing or incorrectly problems such as partitioning in the network or load obtained from non-representative measurement imbalance due to biased peer selection. studies, in which a few instrumented clients were In an effort to provide the network with used to capture the desired properties. partial global information to resolve the network Collecting representative global information problems, this project looks into introducing a tool such as peer’s download rate, known neighboring that efficiently collects global information from peers, and the network’s churn rate, from the BitTorrent network. The tool, called Torrent Crawler complex and dynamic BitTorrent network is not (TC) uses a number of techniques to efficiently find simple.
    [Show full text]
  • A Week in the Life of the Most Popular Bittorrent Swarms
    A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University College Dublin, Belfield, Dublin 4, Ireland {mark.scanlon, alan.hannaway, tahar.kechadi}@ucd.ie AbstractThe popularity of peer-to-peer (P2P) file distribution is c material, which typically commences with a single source sharing large sized files to many downloaders. networks lend themselves well to the unauthorised distribution of To commence the download of the content in a particular copyrighted material due to their ease of use, the abundance of - material available and the apparent anonymity awarded to the downloaders. This paper presents the results of an investigation loaded from an indexing website. This file is then opened conducted on the top 100 most popular BitTorrent swarms over using a BitTorrent client, which proceeds to connect to several the course of one week. The purpose of this investigation is to members of the swarm and download the content. Each quantify the scale of unauthorised distribution of copyrighted BitTorrent swarm is built around a particular piece of content material through the use of the BitTorrent protocol. Each IP which is determined through a unique identifier based on a address, which was discovered over the period of the weeklong SHA-1 hash of the file information contained in this UTF- 8 investigation, is mapped through the use of a geolocation encoded metadata file, e.g., name, piece length, piece hash database, which results in the ability to determine where the values, length and path.
    [Show full text]
  • Bittorrent and Bittyrant CS 344G 2/9/2015 Gregory D
    BitTorrent and BitTyrant CS 344G 2/9/2015 Gregory D. Hill BitTorrent Overview Download .torrent file or use magnet URI to get file hash, required metadata Get partial list of peers from Tracker or Kademlia-based DHT Download file from peers following peer protocol (uses TCP) 10 message types described in following slides keep-alive choke/unchoke Interested/not interested have bitfield request piece cancel Basic BitTorrent Protocol Handshake with peer, after send bitfield(length, bitfield) message which has a bit for each piece of the file representing whether that peer has that piece or not have(piece index) message – tell a peer you have piece x request(piece index, byte offset, length) to a peer hopefully reciprocated by a piece(piece index, byte offset, data) which can be aborted with a cancel(piece index, byte offset, length) Send interested() to a peer that has data you want and undo this by sending them not interested() Piece Selection First piece: choose at random until a complete piece downloaded Normal: Rarest First, try to download piece fewest peers have Endgame: on last pieces, request all subpieces left from all peers, send cancels to others when data arrives BitTorrent Choking Refuse to upload to, or choke, all but a few (commonly 4) peers Upload even share to these unchoked peers Prefer to give to peers who upload most to you (tit-for-tat) Every 10 seconds decide which mutually interested peer to unchoke based on best rolling 20 second average of download rate from peers If no reciprocation from an
    [Show full text]
  • Problems with Bittorrent Litigation in the United States: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System
    Washington University Global Studies Law Review Volume 13 Issue 1 2014 Problems with BitTorrent Litigation in the United states: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System Violeta Solonova Foreman Washington University in St. Louis, School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_globalstudies Part of the Comparative and Foreign Law Commons, and the Intellectual Property Law Commons Recommended Citation Violeta Solonova Foreman, Problems with BitTorrent Litigation in the United states: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System, 13 WASH. U. GLOBAL STUD. L. REV. 127 (2014), https://openscholarship.wustl.edu/law_globalstudies/vol13/iss1/8 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Global Studies Law Review by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. PROBLEMS WITH BITTORRENT LITIGATION IN THE UNITED STATES: PERSONAL JURISDICTION, JOINDER, EVIDENTIARY ISSUES, AND WHY THE DUTCH HAVE A BETTER SYSTEM INTRODUCTION In 2011, 23.76% of global internet traffic involved downloading or uploading pirated content, with BitTorrent accounting for an estimated 17.9% of all internet traffic.1 In the United States alone, 17.53% of internet traffic consists of illegal downloading.2 Despite many crackdowns, illegal downloading websites continue to thrive,3 and their users include some of their most avid opponents.4 Initially the Recording Industry Association of America (the “RIAA”) took it upon itself to prosecute individuals who 1.
    [Show full text]
  • Libswift P2p Protocol: an Analysis and Extension
    Master Thesis - TRITA-ICT-EX-2012-262 LIBSWIFT P2P PROTOCOL: AN ANALYSIS AND EXTENSION Fu Tang Design and Implementation of ICT products and systems Royal Institute of Technology (KTH) [email protected] October 30th, 2012 Supervisor: Flutra Osmani Examiner: Bj¨ornKnutsson Department: ICT School, NSLab Royal Institute of Technology (KTH) 1 Abstract More and more end-users are using P2P protocols for content sharing, on-demand and live streaming, contributing considerably to overall Internet traffic. A novel P2P streaming protocol named libswift was developed to enable people experience a better service by consuming less resources and transferring less unnecessary functions and metadata. This master thesis studies the inner functioning of libswift and analyzes some of the vulnerabilities that directly impact performance of the protocol, namely download speed and response delay. By investigating the behavior of libswift in scenarios with multiple peers, we found that the lack of a peer selection mechanism inside the protocol affects download efficiency and response time. We also discovered that libswift's internal piece picking algorithm raises competition among peers, thus not fully utilizing connected peers. In addition, we found that current libswift implementation does not follow the specification for PEX peer discovery, thus we modified PEX algorithm to support another message that is used to proactively request new peers from the currently connected. Having made these observations, we designed and implemented a peer selection extension interface that allows for third-party peer selection mechanisms to be used with libswift protocol. Apropos, we tested the interface (or adapter) with an example peer selection mechanism that groups peers according to properties such as latency and locality.
    [Show full text]
  • Does Downloading Torrentz Harm Your Pc “This File May Harm Your Pc” Warning When Downloading
    does downloading torrentz harm your pc “This file may harm your pc” warning when downloading. Hello so i made a program in java that i want other people to download. But everytime someone downloads he sees a message with a warning prompt saying the file could harm his computer. He then gets the option to dismiss it or he can choose to download it anyways. How do you avoid this message? 1 Answer 1. This is normal behavior for most browsers. It exists to protect users who get tricked into downloading and running "software." Usually it's a file with a naming scheme like totallylegitfile.pdf.exe . Normal Windows users don't change the default to hide known extensions, so it just looks like a pdf file. Just let your users know that this might happen and tell them that it is safe. 3 Simple Reasons Why Downloading Torrents Can Be Harmful for Your Computer. This might sound unbelievable at first, but the bitter truth is that the greed of torrents might risk your computer! First of all let me ask you. Why do you depend on torrents for downloading stuff? If you want a free and legal app, you would surely find it directly using a search engine. Right? You want to download paid apps for free. Or you want a game which costs you something actually for free. You might even want your favourite movie (btw, there are other alternatives for movies, such as 123movies app) Even if you use torrents legibly, they are still harmful! I caught you this time! HAHAHA! And you should know the fact that what you are doing here is ILLEGAL! Are some ISPs mad to prevent you from downloading torrents if you use them for connecting to the world wide web? They want to prevent illegal acts happening and that is the reason why they do it.
    [Show full text]
  • CS 3700 Networks and Distributed Systems
    CS 3700 Networks and Distributed Systems Lecture 18: Peer-to-Peer Systems Revised 3/23/13 2 Outline ❑ Peer-to-Peer Overview ❑ Example: Bittorrent ❑ µTP: Micro Transport Protocol ❑ Cheating on BitTorrent Traditional Internet Services Model 3 Client-server ! Many clients, 1 (or more) server(s) ! Web servers, DNS, file downloads, video streaming Problems ! Scalability: how many users can a server support? ■ What happens when user traffic overload servers? ■ Limited resources (bandwidth, CPU, storage) ! Reliability: if # of servers is small, what happens when they break, fail, get disconnected, are mismanaged by humans? ! Efficiency: if your users are spread across the entire globe, how do you make sure you answer their requests quickly? The Alternative: Peer-to-Peer 4 A simple idea ! Users bring their own resources to the table ! A cooperative model: clients = peers = servers The benefits ! Scalability: # of “servers” grows with users ■ BYOR: bring your own resources (storage, CPU, B/W) ! Reliability: load spread across many peers ■ Probability of them all failing is very low… ! Efficiency: peers are distributed ■ Peers can try and get service from nearby peers The Peer-to-Peer Challenge 5 What are the key components for leveraging P2P? ! Communication: how do peers talk to each other ! Service/data location: how do peers know who to talk to New reliability challenges ! Network reachability, i.e. dealing with NATs ! Dealing with churn, i.e. short peer uptimes What about security? ! Malicious peers and cheating ! The Sybil attack Centralized
    [Show full text]
  • Bittorrent - Wikipedia, the Free Encyclopedia File:///H:/Bittorrent.Htm
    BitTorrent - Wikipedia, the free encyclopedia file:///H:/BitTorrent.htm BitTorrent From Wikipedia, the free encyclopedia This article is about the protocol. For the client, see BitTorrent client. BitTorrent is the name of a peer-to-peer (P2P) file Internet protocol suite distribution protocol, and is the name of a free Layer Protocols software implementation of that protocol. The protocol was originally designed and created by Application DNS, TLS/SSL, The BitTorrent logo programmer Bram Cohen, and is now maintained TFTP, FTP, HTTP, IMAP, IRC, NNTP, by BitTorrent Inc. BitTorrent is designed to POP3, SIP, SMTP, distribute large amounts of data widely without SNMP, SSH, incurring the corresponding consumption in costly TELNET, server and bandwidth resources. CacheLogic BitTorrent, RTP, suggests that BitTorrent traffic accounts for ~35% rlogin, … [1] of all traffic on the Internet, while other sources Transport TCP, UDP, DCCP, are skeptical.[2] SCTP, IL, RUDP, … Network IP (IPv4, IPv6), The original BitTorrent client was written in ICMP, IGMP, ARP, Python. Its source code, as of version 4.0, has been RARP, … released under the BitTorrent Open Source Data link Ethernet, Wi-Fi, License, which is a modified version of the Jabber Token ring, PPP, Open Source License. There are numerous SLIP, FDDI, ATM, compatible clients, written in a variety of DTM, Frame Relay, programming languages, and running on a variety SMDS, … of computing platforms. BitTorrent clients are programs which implement the BitTorrent protocol. Each BitTorrent client is capable
    [Show full text]
  • Receiver Anonymity Within a Distributed File Sharing Protocol
    Master thesis Computing Science Cyber Security Specialization Radboud University Receiver anonymity within a distributed file sharing protocol Author: Main supervisor/assessor: Solo Schekermans Dr. Jaap-Henk Hoepman S4811070 Second assessor: Dr. ir. Erik Poll August 2019 2 Abstract. In this thesis, we explore the field of receiver anonymity within a file sharing protocol. Exploring existing solutions, such as Resilio Sync, reveals that at this moment, a “ready to use” solution does not yet exist. Looking at the most promising solution that offers a private manner of sharing files over a peer-to- peer network, we find that the most suitable protocol to implement receiver ano- nymity is actually BitTorrent. An existing solution, called BitBlender, does a good job of adding receiver an- onymity to BitTorrent by using crowds, but does have several flaws that need to be resolved. Most flaws are easy to mitigate but one, the absence of incentives for crow members, requires an overhaul of the protocol. To incentivize the crowd members, a token based protocol is proposed that uti- lizes blind signatures and attribute based credentials. Keywords: Anonymity, peer-to-peer, file sharing, BitTorrent, Resilio Sync, BitBlender, incentivizing relay peers, blind signatures, attribute based creden- tials. 3 Contents 1 Introduction __________________________________________________ 4 2 Contextual environment _________________________________________ 5 2.1 Definitions _______________________________________________ 5 2.2 Architecture models ________________________________________ 6 2.3 Existing solutions/products __________________________________ 7 2.4 Privacy __________________________________________________ 8 3 Goal of the system ____________________________________________ 10 4 BitTorrent & Resilio Sync ______________________________________ 12 4.1 BitTorrent Protocol _______________________________________ 13 4.2 Resilio Sync protocol ______________________________________ 21 5 BitBlender by Bauer et al.
    [Show full text]