P2P Population Tracking and Traffic Characterisation

Total Page:16

File Type:pdf, Size:1020Kb

P2P Population Tracking and Traffic Characterisation Institut für Technische Informatik und Kommunikationsnetze P2P Population Tracking and Traffic Characterization of Current P2P File-sharing Systems Lukas H¨ammerle Master Thesis MA-2004-04 April 2004 - September 2004 Tutor: Arno Wagner Co-tutor: Thomas Dubendorfer¨ Supervisor: Prof. Dr. Bernhard Plattner Preface While writing this thesis a lot of interesting P2P related developments took place. Some of them will change the P2P community very rapidly as it was always the case with P2P networks. It was a very exciting time and even when this thesis is finished I still will be observing the P2P (r)evolution. At this place I also want to thank some people who supported my work and who I could count on if I needed assistance or guidance. Namely these are: • Arno Wagner: For the good guidance and technical support • Thomas Dubendorfer:¨ For being my co-tutor and gnuplot guru • Prof. Bernhard Plattner: For being my supervisor and making this thesis possible • Dienstgruppe TIK: For providing an overall reliable computer environment that was comfortable to work with • Stephane Racine: For introducing me to NetFlow and the cluster environ- ment • Philipp Jardas: For his preceding survey work about P2P file sharing systems • Caspar Schlegel: For his support with UPFrame • Rakesh Kumar: For providing me some of their FastTrack client port usage data • Luca Deri: For providing us a free version of nprobe/ntop • My fellow co-workers of G69: For the “candy-sharing” and the interesting conversations during coffee brakes I further want to state that this thesis did not aim at finding methods to identify P2P users in order to prosecute them but in order to better analyze and observe their numbers and their usage characteristics. Since the described methods and concepts are based on flow-level data they can’t be used to inspect which files a certain user shares or downloads. Copyright °c 2004 Lukas H¨ammerle <[email protected]> ETH Zurich, TIK, Communication Systems Group, DDoSVax team. Abstract Detecting denial of service attacks and the spreading of virii and worms requires knowledge about the type of Internet traffic that passes a network. Nowadays a fairly large amount of all traffic in Internet backbones is not easily identifiable anymore since the amount of non well-known traffic has dramatically increased with the upcoming popularity of P2P file-sharing networks. For network mon- itoring and anomaly detection reasons it is important to know which traffic is to account for P2P networks. This master’s thesis gives an overview about problems and methods concern- ing identification, population tracking and traffic monitoring of P2P clients. The examined P2P networks are FastTrack, eDonkey, Overnet, Kademlia, Gnutella and BitTorrent, which represent the six most popular P2P networks world- wide. While other research on that topic mainly tried to identify P2P traffic directly, our approach first identifies P2P hosts in the medium sized back-bone SWITCH network and then uses them to track other peers. Various measure- ments made with a proof of concept implementation called “PeerTracker” are presented and verified. The results show that the P2P bandwidth consumption in the SWITCH network is considerable and that a substantial amount of the total P2P population can be tracked for some P2P networks. iv Table of Contents 1 Introduction 1 1.1 Overview ............................... 2 1.1.1 DDoSVax Project ...................... 3 1.1.2 Reasons for P2P Identification ............... 3 1.1.3 P2P Identification and DDoS ................ 3 1.2 Goals ................................. 4 1.3 Internet Communication Patterns .................. 5 1.3.1 Client-Server Model ..................... 5 1.3.2 P2P Model .......................... 6 1.4 Ways of File-sharing ......................... 7 1.5 P2P Networks and Clients ...................... 7 1.5.1 Generations .......................... 7 1.5.2 General P2P Usage ...................... 8 1.5.3 Popularity ........................... 9 1.5.4 P2P Prosecution ....................... 10 1.6 Network environment ........................ 11 1.6.1 Flow-level Data ........................ 11 1.6.2 SWITCH NetFlows ..................... 12 2 P2P Host Identification 15 2.1 P2P Systems Considered ....................... 16 2.2 Traffic Observation Possibilities ................... 20 2.2.1 Packet-level Observations .................. 20 2.2.2 Flow-level Observations ................... 21 2.3 Host Identification Methods ..................... 22 2.3.1 Default Ports ......................... 24 2.3.2 Generic Approaches ..................... 27 2.3.3 Host Pool ........................... 32 2.3.4 Non-peer Identification ................... 33 2.4 Identification for Concrete P2P Systems .............. 33 2.4.1 eDonkey Identification .................... 33 2.4.2 Kademlia Identification ................... 34 2.4.3 Overnet Identification .................... 35 2.4.4 Gnutella Identification .................... 35 2.4.5 FastTrack Identification ................... 36 2.4.6 BitTorrent Identification ................... 37 2.4.7 Undetectable and Safe P2P Usage ............. 39 2.5 Population Tracking ......................... 39 v vi TABLE OF CONTENTS 2.5.1 Conditions .......................... 40 2.6 Example: Overnet Tracking ..................... 41 2.7 Traffic Identification ......................... 42 2.8 Limitations .............................. 43 3 Implementation 45 3.1 Offline Scripts ............................. 45 3.2 Online Plug-in ............................ 45 3.2.1 Identification Algorithm Overview ............. 45 3.2.2 Suspicious Port Range .................... 49 3.2.3 Tracking of External P2P Hosts .............. 50 3.2.4 Client Shutdown Detection ................. 51 3.2.5 Listening Port Detection ................... 51 3.3 Containers ............................... 53 3.3.1 Hashed Table ......................... 53 3.3.2 Hashed Queue ........................ 55 3.4 Resource usage ............................ 56 3.4.1 Space Complexity ...................... 56 3.4.2 Time Complexity ....................... 56 4 Findings 59 4.1 Peer Verification Approaches .................... 59 4.1.1 eDonkey Server Tracking .................. 60 4.1.2 Polling Peers ......................... 61 4.1.3 BitTorrent probe clients ................... 64 4.2 Interpretation of Verification Results ................ 64 4.3 P2P Usage in SWITCH Network .................. 65 4.3.1 Measurement Setup ..................... 65 4.3.2 Peers in SWITCH network ................. 66 4.3.3 Peer Characteristics ..................... 67 4.3.4 Bandwidth Consumption .................. 71 4.4 Population Tracking Results ..................... 74 4.5 Related Work ............................. 77 5 Conclusion 81 6 Outlook 85 6.1 Future Work and Improvements ................... 85 6.1.1 Automated Verification ................... 85 6.1.2 More General Identification ................. 85 6.1.3 Auxiliary Network Processors ................ 85 6.1.4 More P2P Networks ..................... 86 6.1.5 Multi Peer identification ................... 86 6.1.6 TCP flags in NetFlow .................... 86 6.1.7 Continuous Examination .................. 86 6.1.8 State Reload ......................... 86 6.2 Unsolved Problems .......................... 86 References 89 A Full Task Description 93 TABLE OF CONTENTS vii B P2P Networks Table 99 C NetFlow Format 101 D SWITCH Network 105 E P2P Port Usage in the Internet 2 109 F Identification Code 113 G PeerTracker Usage Instructions 119 H Used Software 127 viii TABLE OF CONTENTS List of Figures 1-1 Client-Server model ......................... 5 1-2 P2P model .............................. 6 1-3 Flow Timings ............................. 12 1-4 Switch network topology ....................... 13 1-5 NetFlows emitted in SWITCH network .............. 14 2-1 P2P network and client relations .................. 17 2-2 TCP and UDP connections in P2P networks ........... 25 3-1 Internal SWITCH candidate peers ................. 48 3-2 Internal SWITCH non-peers ..................... 48 3-3 Influence of suspicious port range on identification ........ 50 3-4 Hashed queue ............................. 55 4-1 One day eDonkey comparison server method vs port method . 60 4-2 Active peers within SWITCH network ............... 66 4-3 P2P clients vs web clients comparison ............... 68 4-4 Comparison Web vs P2P vs Mail .................. 72 4-5 Total TCP bandwidth consumption ................ 72 4-6 P2P traffic in comparison to other protocols ............ 73 4-7 P2P traffic of considered networks ................. 73 4-8 Tracked Overnet peers with different timeouts ........... 76 4-9 Tracked extern peers with 6 hours timeout ............. 76 4-10 FastTrack tracked vs internal peers ................. 77 D-1 Switch network ............................106 D-2 Switch traffic volume per month since 1998, from [1] ....... 106 D-3 Active internal hosts in the SWITCH network during 8 days . 107 D-4 Active extern hosts contacting hosts within the SWITCH network 107 E-1 Internet 2 traffic graph ........................110 E-2 Internet S2 P2P traffic graph ....................111 ix x LIST OF FIGURES List of Tables 2-1 Official port ranges .......................... 25 2-2 Hosts with suspicious flows ..................... 27 2-3 Top level domain names of 565 Kazaa peers (TCP) ........ 30 2-4 Top level domain names of 3’975 Kazaa peers (UDP) ....... 31 2-5 Hosts which had at least k flows with P2P default ports ..... 31 2-6 eDonkey and Kademlia top 5 TCP listening ports ......... 34 2-7 Overnet top 5 UDP listening
Recommended publications
  • Foxx Street Gossip Zip File Download Avtok V.1.0
    foxx street gossip zip file download AvtoK v.1.0. AvtoK - multi autoclicker. Software for recording and playback of action with a keyboard and mouse, which can be repeated in autoclicker. Despite the apparent simplicity of the main window is quite powerful in its class. Scope: In games and sites that require routine activities. To automate tedious and repetitive actions on the computer. By setting the control points can analyze the image on the screen and organize complex actions. Features. Read more. Rate: License: Freeware Category: Automation Tools Developer: Ocean games Downloads: 319 Size: 1.63 Mb Price: Free. To free download a trial version of AvtoK, click here To visit developer homepage of AvtoK, click here. Screen Shot. Click on a thumbnail for the larger image. System Requirements. AvtoK requires Win2000, Win7 x32, Win7 x64, Win98, WinServer, WinVista, WinVista x64, WinXP. Buzzer v.1.1.0.0. A massive red button that plays a sound of your choice from the config menu allowing you to have a game show style buzzer. Cockerel sound Smelly bottom sound Joke drum roll sound French tart sound Door bell sound Horny horn sound Bloke who’s trapped his figure in the car boot sound Wolf whistle sound Some nifty piece of. Read more. Rate: Release Date: 09/13/2012 License: Freeware Category: Recreation Developer: FluxedDev.com Downloads: 26 Size: 6 Mb Price: Free. To free download a trial version of Buzzer, click here To visit developer homepage of Buzzer, click here. Screen Shot. Click on a thumbnail for the larger image. System Requirements.
    [Show full text]
  • Looking up Data in P2p Systems
    LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica∗ MIT Laboratory for Computer Science 1. Introduction a good example of how the challenges of designing P2P systems The recent success of some widely deployed peer-to-peer (P2P) can be addressed. file sharing applications has sparked new research in this area. We The recent algorithms developed by several research groups for are interested in the P2P systems that have no centralized control the lookup problem present a simple and general interface, a dis- or hierarchical organization, where the software running at each tributed hash table (DHT). Data items are inserted in a DHT and node is equivalent in functionality. Because these completely de- found by specifying a unique key for that data. To implement a centralized systems have the potential to significantly change the DHT, the underlying algorithm must be able to determine which way large-scale distributed systems are built in the future, it seems node is responsible for storing the data associated with any given timely to review some of this recent research. key. To solve this problem, each node maintains information (e.g., The main challenge in P2P computing is to design and imple- the IP address) of a small number of other nodes (“neighbors”) in ment a robust distributed system composed of inexpensive com- the system, forming an overlay network and routing messages in puters in unrelated administrative domains. The participants in a the overlay to store and retrieve keys. typical P2P system might be home computers with cable modem One might believe from recent news items that P2P systems are or DSL links to the Internet, as well as computers in enterprises.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • The Wealth of Networks How Social Production Transforms Markets and Freedom
    Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 3 # 3 The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press Ϫ1 New Haven and London 0 ϩ1 Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 4 # 4 Copyright ᭧ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copy- ing permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources.
    [Show full text]
  • Étude De La Pratique Du Téléchargement Légal Et Illégal Sur Internet
    Étude de la pratique du téléchargement légal et illégal sur Internet Travail de Bachelor réalisé en vue de l’obtention du Bachelor HES par : Julien MARIETHOZ Conseiller au travail de Bachelor : (David Billard, Professeur HES) Genève, le 12 mai 2010 Haute École de Gestion de Genève (HEG-GE) Informatique de Gestion Déclaration Ce travail de Bachelor est réalisé dans le cadre de l’examen final de la Haute école de gestion de Genève, en vue de l’obtention du titre d’ « informaticien de gestion ». L’étudiant accepte, le cas échéant, la clause de confidentialité. L'utilisation des conclusions et recommandations formulées dans le travail de Bachelor, sans préjuger de leur valeur, n'engage ni la responsabilité de l'auteur, ni celle du conseiller au travail de Bachelor, du juré et de la HEG. « J’atteste avoir réalisé seul le présent travail, sans avoir utilisé des sources autres que celles citées dans la bibliographie. » Fait à Genève, le 12 mai 2010 Julien MARIETHOZ Étude de la pratique du téléchargement légal et illégal sur Internet MARIETHOZ, Julien iv Remerciements Dans le cadre de la réalisation de ce travail, je tiens à remercier tous ceux qui ont pu y contribuer directement ou indirectement : M. David Billard pour son encadrement et ses conseils. Carole, ma femme, qui a pris le temps de s’occuper de notre petit qui est né le jour après la date de début officiel, me permettant de me concentrer sur ce travail. Tous ceux qui ont pris le temps de répondre à mon questionnaire, en me fournissant les données nécessaires à ce rapport.
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • A Fog Storage Software Architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein
    A Fog storage software architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein To cite this version: Bastien Confais, Adrien Lebre, Benoît Parrein. A Fog storage software architecture for the Internet of Things. Advances in Edge Computing: Massive Parallel Processing and Applications, IOS Press, pp.61-105, 2020, Advances in Parallel Computing, 978-1-64368-062-0. 10.3233/APC200004. hal- 02496105 HAL Id: hal-02496105 https://hal.archives-ouvertes.fr/hal-02496105 Submitted on 2 Mar 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. November 2019 A Fog storage software architecture for the Internet of Things Bastien CONFAIS a Adrien LEBRE b and Benoˆıt PARREIN c;1 a CNRS, LS2N, Polytech Nantes, rue Christian Pauc, Nantes, France b Institut Mines Telecom Atlantique, LS2N/Inria, 4 Rue Alfred Kastler, Nantes, France c Universite´ de Nantes, LS2N, Polytech Nantes, Nantes, France Abstract. The last prevision of the european Think Tank IDATE Digiworld esti- mates to 35 billion of connected devices in 2030 over the world just for the con- sumer market. This deep wave will be accompanied by a deluge of data, applica- tions and services.
    [Show full text]
  • Conducting and Optimizing Eclipse Attacks in the Kad Peer-To-Peer Network
    Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network Michael Kohnen, Mike Leske, and Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics, Ellernstr. 29, 45326 Essen [email protected], [email protected], [email protected] Abstract. The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented secu- rity measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required re- sources. Keywords: P2P security, Sybil attack, Eclipse attack, Kad. 1 Introduction and Related Work P2P networks form an overlay on top of the internet infrastructure. Nodes in a P2P network interact directly with each other, i.e., no central entity is required (at least in case of structured P2P networks). P2P networks have become increasingly popular mainly because file sharing networks use P2P technology. Several studies have shown that P2P traffic is responsible for a large share of the total internet traffic [1, 2]. While file sharing probably accounts for the largest part of the P2P traffic share, also other P2P applications exist which are widely used, e.g., Skype [3] for VoIP or Joost [4] for IPTV. The P2P paradigm is becoming more and more accepted also for professional and commercial applications (e.g., Microsoft Groove [5]), and therefore, P2P technology is one of the key components of the next generation internet.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Hartkad: a Hard Real-Time Kademlia Approach
    HaRTKad: A Hard Real-Time Kademlia Approach Jan Skodzik, Peter Danielis, Vlado Altmann, Dirk Timmermann University of Rostock Institute of Applied Microelectronics and Computer Engineering 18051 Rostock, Germany, Tel./Fax: +49 381 498-7284 / -1187251 Email: [email protected] Abstract—The Internet of Things is becoming more and time behavior. Additionally, many solutions leak flexibility and more relevant in industrial environments. As the industry itself need a dedicated instance for administrative tasks. These issues has different requirements like (hard) real-time behavior for will becomes more relevant in the future. As mentioned in many scenarios, different solutions are needed to fulfill future challenges. Common Industrial Ethernet solution often leak [3], the future for the industry will be more intelligent devices, scalability, flexibility, and robustness. Most realizations also which can act more dynamically. Facilities as one main area require special hardware to guarantee a hard real-time behavior. of application will consist of more devices still requiring real- Therefore, an approach is presented to realize a hard real- time or even hard real-time behavior. So we think, the existing time network for automation scenarios using Peer-to-Peer (P2P) solutions will not fulfill the future challenges in terms of technology. Kad as implementation variant of the structured decentralized P2P protocol Kademlia has been chosen as base scalability, flexibility, and robustness. for the realization. As Kad is not suitable for hard real-time Peer-to-Peer (P2P) networks instead offer an innovative applications per se, changes of the protocol are necessary. Thus, alternative to the typical Client-Server or Master-Slave concepts Kad is extended by a TDMA-based mechanism.
    [Show full text]