Why File Sharing Networks Are Dangerous?

Total Page:16

File Type:pdf, Size:1020Kb

Why File Sharing Networks Are Dangerous? contributed articles DOI: 10.1145/1461928.1461962 We analyze the P2P security issues, BY M. ERIC JOHNSON, DAN MCGUIRE, AND NICHOLAS D. WILLEY establishing the vulnerabilities these software clients represent. Then we present experimental evidence of the risk through honey-pot experiments that expose both business and personal Why File financial information and track the re- sulting consequences. This analysis and experimental results clearly show the se- Sharing curity risk of P2P file sharing networks. Peer-to-Peer File Sharing Peer-to-peer file-sharing networks enable users to “publish” or “share” files – any Networks Are file from music to video to spreadsheets. P2P networks provide a ready-made sharing infrastructure that is difficult to block and even harder to track, providing cover for espionage and criminal activity. Dangerous? They encourage users to leave their com- puters on and connected to the internet at all times, running software that heav- PEER-TO-PEER (P2P) SOFTWARE CLIENTS have become ily uses their network, disk, and proces- sor. Recent legal battles being won by the part of the standard suite of PC applications for many content industry (RIAA/MPAA) seem to users. With millions of users worldwide sharing have done little to really reduce file shar- 15 ing, but have rather pushed users onto music, video, software, and pictures, file movement new clients and networks that are even on these networks represent a significant percentage harder to track. of internet traffic. Beyond the much discussed Peer-to-peer file sharing came of age during the dot.com boom and the rise of copyright infringement issues, P2P networks threaten Napster. Between its debut in 1999 and its both corporate and individual security. Our research eventual failure in 2001, Napster enabled tens of millions of users to easily share shows that confidential and potentially damaging MP3-formatted song files with each oth- documents have made their way onto these networks er. However, its success and failure paved and continue to do so. The research also shows that the way for many new P2P file-sharing networks such as Gnutella, FastTrack, e- criminals trawl P2P networks and opportunistically donkey, and Bittorrent, with related soft- exploit information that they find. ware clients such as Limewire, KaZaA, P2P file sharing represents a growing security threat Morpheus, eMule, and BearShare. This next breed of sharing systems has proven because of the evolution of these networks. Internet far more difficult to control and a much service providers (ISPs), firms, and copyright holders larger security threat. A number of firms and internet ser- have responded to the rise of P2P both technically vice providers (ISPs) block or throttle (site blocking, traffic filtering and content poisoning1 ) traffic associated with P2P systems us- and legally. These challenges have prompted P2P ing a simple, fast approach known as port filtering. In response, P2P clients developers to create decentralized, encrypted, responded by using ports associated anonymous networks that are difficult to track, are with other services (Web traffic, email traffic, among others) to exchange data. designed to accommodate large numbers of clients, The P2P traffic then blends in with oth- and are capable of transferring vast amounts of data. er traffic. Indeed, recent traffic studies 134 COMMUNICATIONS OF THE ACM | FEBRUARY 2009 | VOL. 52 | NO. 2 contributed articles suggest that P2P connections are now Figure 1. P2P Newtwork Usage distributed across all ports with con- centrations at a few preferred points.8 Today P2P traffic levels are still grow- ing, but no single powerhouse applica- tion is driving it.9 The aggregate num- bers suggest that usage between 2003 and 2007 more than doubled, from less than 4 million to nearly ten million si- multaneous users.10 This does not in- clude Bittorrent traffic, which is one of the most popular P2P applications for video and is more difficult to monitor. It also doesn’t include users on private networks. Private networks, sometimes called dark networks (or darknets), are typically accessed through invitations from other users. Such networks, like OinkMe, may include millions of users. rect users to move files to that folder. In ˲ Wizards designed to determine media Many users shift from network to net- normal operation, a P2P client simply folders. Some sharing clients come with work based on features and popularity. writes files to disk as it downloads them wizards that scan an individual’s com- For example, the FastTrack network (used and reads files from disk as it uploads puter and recommend folders contain- by KaZaA) has seen declines over the past them. There are several routes for con- ing media to share. If there is an MP3 three years while others like Gnutella fidential data to get on to the network: a or image file in a folder with important have grown (Figure 1). Semi-successful user accidentally shares folders contain- documents, that entire folder could be attempts by content holders to disrupt ing the information; a user stores music exposed by such a wizard. access, coupled with KaZaA developers’ and other data in the same folder that is ˲ Unaware or forgetful of what is stored efforts to increase revenue, quickly drove shared; a user downloads malware that, on the computer and may simply forget users to other networks, and even fos- when executed, exposes files; or the cli- about the letter they wrote to the bank, tered the creation of new networks. This ent software has bugs that result in un- or the documents they brought home suggests low barriers to entry for new file intentional sharing of file directories. from work. Similarly, teenagers using sharing systems and also suggests that Of course it is not necessary for a worm P2P may not know what their parents P2P networks serve a very mobile, well-in- or virus to expose personal or sensitive keep on the Desktop. formed user base that is willing to explore documents because many users will un- ˲ Poor Organization Habits – Certain new alternatives as they arise. knowingly expose these documents for people may not take the time to orga- With the constant introduction of many reasons: nize their files. MP3s, videos, letters, new file sharing systems, one might won- ˲ Misplaced file. If a file is dropped ac- papers, passwords, and family pictures der what is driving the innovation. While cidentally into the wrong folder. may all be kept in the same folder. there have been some astounding at- ˲ Confusing interface design. Users may tempts to sell the computational services be unaware of what folders are be- To illustrate the problem, we spent of the user network, the typical business ing shared or even that they are shar- a couple hours searching the Gnutella models of the software client developers ing files. For example, in a user study, network for sensitive personal docu- are fairly simple, either community-driv- Good and Krekelberg found that the ments; the resulting files we found en open source or advertising supported. KaZaA interface design contributed to should be disconcerting to users of P2P P2P may have once been exclusively user confusion over what files were be- networks: for the technologically elite, but today ing shared.4 ˲ Birth Certificate – 45 Results P2P adoption is widespread. One study ˲ Incentives to share a large number of ˲ Passport – 42 Results found that 27% of adult Americans admit files. Certain programs reward users ˲ Tax Return – 208 Results to sharing files from their computer with for making files available or uploading ˲ FAFSA – 114 Results others.11 Income, race, and sex seem to more files. Some users may believe they play little role in determining whether an can gain an advantage by sharing their The Free Application for Federal individual will engage in file sharing.12 entire hard drives. Student Aid (FAFSA) and the U.S. Gov- Age is by far the largest signal of an in- ˲ General laziness on the part of the ernment’s “EFILE” program both en- clination to share: Students are almost user. If a user has a folder such as “My courage individuals to complete forms twice as likely to share as non-students. Documents” with many media folders online. When these forms are complete inside, they may share My Documents and full of potentially harmful informa- P2P Security — How Does Sensitive rather than selecting each media fold- tion, applicants are asked to save a copy Information Get Exposed? er individually to share, thus exposing for their records. Similarly, those who Current P2P clients allow users to share all the other types of documents and are worried about credit scores often items in a particular folder and often di- folders contained within. visit sites such as freecreditreport.com FEBRUARY 2009 | VOL. 52 | NO. 2 | COMMUNICATIONS OF THE ACM 135 contributed articles and annualcreditreport.com which, af- rity breeches that depend on human that run in the background and while ter asking several questions, return the intervention, abetted by a carelessness the user is not at the computer.3 This customer a pdf file with their credit his- or lack of proper security education suggests that the user is not carefully tory. These types of files leak out onto among users. The remedies are also tracking the activities of the P2P cli- the P2P networks because of their in- similar: user education, proper controls ent, increasing the opportunity for herent digital nature. on corporate information, site blocking, abuse. Further, even benign file shar- We downloaded a selection of these periodic tests, and P2P network moni- ing programs consume significant pro- files and verified that they were indeed toring. We believe that the vast major- cessor time and network bandwidth, real. We observed one particular indi- ity of information leaks are the result of conditioning the P2P user to tolerate vidual who was sharing a scanned copy accidentally shared data rather than the sluggish performance that, for others, of his passport.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • Simulacijski Alati I Njihova Ograničenja Pri Analizi I Unapređenju Rada Mreža Istovrsnih Entiteta
    SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN Tedo Vrbanec SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Varaždin, 2010. PODACI O MAGISTARSKOM RADU I. AUTOR Ime i prezime Tedo Vrbanec Datum i mjesto rođenja 7. travanj 1969., Čakovec Naziv fakulteta i datum diplomiranja Fakultet organizacije i informatike, 10. listopad 2001. Sadašnje zaposlenje Učiteljski fakultet Zagreb – Odsjek u Čakovcu II. MAGISTARSKI RAD Simulacijski alati i njihova ograničenja pri analizi i Naslov unapređenju rada mreža istovrsnih entiteta Broj stranica, slika, tablica, priloga, XIV + 181 + XXXVIII stranica, 53 slike, 18 tablica, 3 bibliografskih podataka priloga, 288 bibliografskih podataka Znanstveno područje, smjer i disciplina iz koje Područje: Informacijske znanosti je postignut akademski stupanj Smjer: Informacijski sustavi Mentor Prof. dr. sc. Željko Hutinski Sumentor Prof. dr. sc. Vesna Dušak Fakultet na kojem je rad obranjen Fakultet organizacije i informatike Varaždin Oznaka i redni broj rada III. OCJENA I OBRANA Datum prihvaćanja teme od Znanstveno- 17. lipanj 2008. nastavnog vijeća Datum predaje rada 9. travanj 2010. Datum sjednice ZNV-a na kojoj je prihvaćena 18. svibanj 2010. pozitivna ocjena rada Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva koje je rad ocijenilo Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum obrane rada 1. lipanj 2010. Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva pred kojim je rad obranjen Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum promocije SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN POSLIJEDIPLOMSKI ZNANSTVENI STUDIJ INFORMACIJSKIH ZNANOSTI SMJER STUDIJA: INFORMACIJSKI SUSTAVI Tedo Vrbanec Broj indeksa: P-802/2001 SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Mentor: Prof.
    [Show full text]
  • Beat the Heat! Come Inside! Cool
    PAGE TWENTY-FOUR F R ID A Y , J U L Y 18, 1989 Manrbt'Btipr lEtic^rnttg iimlb ATHRge Dait)r N et P raw Run Var The Week Ended June M, IMk The Weather Fair, .(Cooler, less humid to­ >15,459 day. Low In the 6(>s. High Sun­ day 80 to 85. ■ ManeheUer— 4 City of ViUofe Charm 1 VOL. LXXXVin. NO. 246 (SIXTEEN PAGES—TV SECnON) MANCHESTER, CONN., SA-TURDAY, JULY 19, 1969 (TMeatned AdvertWng on Page 1 8 ) PRICE TEN CENTS 8'V*-' A 'v\ V: \*/ On Tarfret ^ r ^ C \ O f ^ r i ( .............................f l l ( / 0........................................ \ .... ................................................ ........... BEAT THE HEAT! COME INSIDE! COOL OFR Moon Blots Out Sun Apollo ]^ears Goal; V SAVE WITH THESE VALUABLE COUPONS TONIGHT and SATURDAY ■sS' By HOWARD BENEDICT two days of g r ^ t human ad­ He also reported a brilliant AP Aerospace Writer DON'T FORGET TO CHECK ALL STORES — IF YOU FIND YOUR venture. solar corona as the moon ec­ SPACE CENTER, Houshm As they darted Into an arejs lipsed all but the halo of gases (A P ) — Apollo U’b explorers where the moon blotted out the surrounding the stki. NAME POSTED — YOU'RE A LUCKY WINNER! raced Into the shadow of the sunUght at 8:60 a.m. EOT, com­ “ It. looks like an eerie sight," moon today and reported a mander Nell A. Armstrong re­ the Apollo H commander said. spectacular final sighting of ported picking out lunar fea­ Armstrong, Edwin E. Aldrln their tatget as they prepared tures Illuminated by light re­ Jr.
    [Show full text]
  • ISP Liability in the Field of Copyright
    Internet Service Providers’ Liability in the Field of Copyright: A Review of Asia-Pacific Copyright Law WIPO International Seminar on Copyright Jointly organized by WIPO and the Ministry of Culture of Brazil 26 November 2008 A/Prof Daniel Seng Faculty of Law, National University of Singapore 1 Internet Intermediaries • Who is an Internet “service provider”? – Infrastructure intermediaries e.g. Internet Access Service Providers, proxies, DNS – Services intermediaries e.g. search engines, archives – Software developers of networks and connectivity tools e.g. FreeNet, Kazaa, Morpheus – Operators and hosting companies e.g. content hosts, exchange platforms, forums – Diverse types of intermediaries with different roles offering different services • Are intermediaries liable for: – Direct liability e.g. reproductions, communication of works on their infrastructure? – Indirect/secondary liability e.g. authorising or facilitating the infringement of their users/subscribers? 2 Developments Worldwide • Legislative Developments to Protect Internet Service Providers – WIPO Copyright and Performances and Phonograms Treaties 1996 – US Digital Millennium Copyright Act 1998 – Australian Copyright Amendment (Digital Agenda) Act 2000 – EU Information Society and E-Commerce Directives 2001 – Singapore Copyright Amendment Act 2005 – HK Copyright (Amendment) Bill (proposed, 2007) – New Zealand Copyright (New Technologies) Amendment Act 2008 – France, “Three-Strikes” Law (4 Nov 2008); cf: U.K.’s “Graduated Response” Law 3 Litigation Worldwide • Exposure of
    [Show full text]
  • Conducting and Optimizing Eclipse Attacks in the Kad Peer-To-Peer Network
    Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network Michael Kohnen, Mike Leske, and Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics, Ellernstr. 29, 45326 Essen [email protected], [email protected], [email protected] Abstract. The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented secu- rity measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required re- sources. Keywords: P2P security, Sybil attack, Eclipse attack, Kad. 1 Introduction and Related Work P2P networks form an overlay on top of the internet infrastructure. Nodes in a P2P network interact directly with each other, i.e., no central entity is required (at least in case of structured P2P networks). P2P networks have become increasingly popular mainly because file sharing networks use P2P technology. Several studies have shown that P2P traffic is responsible for a large share of the total internet traffic [1, 2]. While file sharing probably accounts for the largest part of the P2P traffic share, also other P2P applications exist which are widely used, e.g., Skype [3] for VoIP or Joost [4] for IPTV. The P2P paradigm is becoming more and more accepted also for professional and commercial applications (e.g., Microsoft Groove [5]), and therefore, P2P technology is one of the key components of the next generation internet.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Forever Remembered
    July 2015 Vol. 2 No. 7 National Aeronautics and Space Administration KENNEDY SPACE CENTER’S magazine FOREVER REMEMBERED Earth Solar Aeronautics Mars Technology Right ISS System & Research Now Beyond NASA’S National Aeronautics and Space Administration LAUNCH KENNEDY SPACE CENTER’S SCHEDULE SPACEPORT MAGAZINE Date: July 3, 12:55 a.m. EDT Mission: Progress 60P Cargo Craft CONTENTS Description: In early July, the Progress 60P resupply vehicle — 4 �������������������Solemn shuttle exhibit shares enduring lessons an automated, unpiloted version of the Soyuz spacecraft that is used to ����������������Flyby will provide best ever view of Pluto 10 bring supplies and fuel — launches 14 ����������������New Horizons spacecraft hones in on Pluto to the International Space Station. http://go.nasa.gov/1HUAYbO 24 ����������������Firing Room 4 used for RESOLVE mission simulation Date: July 22, 5:02 p.m. EDT 28 ����������������SpaceX, NASA will rebound from CRS-7 loss Mission: Expedition 44 Launch to 29 ����������������Backup docking adapter to replace lost IDA-1 the ISS Description: In late July, Kjell SHUN FUJIMURA 31 ����������������Thermal Protection System Facility keeping up Lindgren of NASA, Kimiya Yui of JAXA and Oleg Kononenko of am an education specialist in the Education Projects and 35 ����������������New crew access tower takes shape at Cape Roscosmos launch aboard a Soyuz I Youth Engagement Office. I work to inspire students to pursue science, technology, engineering, mathematics, or 36 ����������������Innovative thinking converts repair site into garden spacecraft from the Baikonur Cosmodrome, Kazakhstan to the STEM, careers and with teachers to better integrate STEM 38 ����������������Proposals in for new class of launch services space station.
    [Show full text]
  • Emule for Dummies V 0.1 - by Ciquta
    eMule for dummies v 0.1 - by ciquta (Guida funzionale ed incompleta rivolta ai neofiti della rete ed2k) Filosofia ed2k I p2p ed2k (edonkey, emule, emule plus, etc…) sono la generazione “intelligente” dei p2p: si basano sul principio dei “crediti”, ovvero chi più shara risorse, chi più invia, chi in definitiva si impegna di più a mettere a disposizione la propria banda di upload viene maggiormente premiato con slot di download. La quantità totale di upload in qualsiasi p2p è uguale identica a quella totale di download, pertanto più vengono messi a disposizione bit di upload, più vi saranno utenti connessi alla rete e maggiori saranno le possibilità di reperimento di un file e quindi di download. Il che sta a significare che gli utenti collegati avendo un ristorno in termini di download di quello che sharano e soprattutto inviano sono ben disposti a alimentare questo circolo di scambio dati, e i risultati si palpano in termini di reperibilità di file particolarmente rari e di numero delle fonti e di slot disponibili. Il software lato client è open source, pertanto vi capiterà di perdervi tra le mille versioni e relativi modding. Tuttavia la sostanza è sempre simile e notevoli cambiamenti tra l’una e l’altra sono percettibili solo tra versioni notevolmente distanti tra di loro in termini di date di sviluppo, quindi non è certo il caso di cambiare ad ogni uscita di una nuova versione, credo sia sufficiente farlo una volta ogni 3 o 4 mesi a scanso di epocali svolte nello sviluppo. Principali caratteristiche innovative Tante sono le interessanti differenze con gli altri p2p: • Gestione autonoma delle code: eMule non da modo agli utenti di “segare” gli upload, evitando quindi i classici casi di troncamento dei download tipici degli altri p2p, nei quali c’è da guerrigliare con baratti e suppliche per farsi finire un download.
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Pure Software in an Impure World? WINNY, Japan's First P2P Case
    20 U. OF PENNSYLVANIA EAST ASIA LAW REVIEW [Vol. 8 ! ! ! ! [This Page Intentionally Left Blank.] ! Pure Software in an Impure World? WINNY, Japan’s First P2P Case Ridwan Khan* “Even the purest technology has to live in an impure world.”1 In 2011, Japan’s Supreme Court decided its first contributory infringement peer-to-peer case, involving Isamu Kaneko and his popular file-sharing program, Winny. This program was used in Japan to distribute many copyrighted works, including movies, video games, and music. At the district court level, Kaneko was found guilty of contributory infringement, fined 1.5 million yen, and sentenced to one year in prison. However, the Osaka High Court reversed the district court and found for Kaneko. The High Court decision was then affirmed by the Supreme Court, which settled on a contributory infringement standard based on fault, similar to the standard announced by the United States Supreme Court in MGM Studios * The author would like to thank Professor David Shipley of the University of Georgia for his guidance in preparing this article. He would also like to thank Professor Paul Heald of the University of Illinois College of Law for additional help. Finally, the author expresses gratitude to Shinya Nochioka of the Ministry of Finance and Yuuka Kawazoe of Osaka Jogakuin for their friendship and advice on Japanese legal matters and language through the two years spent researching and writing this article. All mistakes, however, are the responsibility of the author. All translations of Japanese language materials into English are by the author. 1 Benjamin Wallace, The Rise and Fall of Bitcoin, WIRED MAGAZINE (Nov.
    [Show full text]