Bitcoin Contents

Total Page:16

File Type:pdf, Size:1020Kb

Bitcoin Contents Bitcoin Contents 1 Overview 1 1.1 Bitcoin ................................................. 1 1.1.1 Etymology and orthography ................................. 1 1.1.2 Design ............................................ 1 1.1.3 History ............................................ 5 1.1.4 Economics .......................................... 6 1.1.5 Legal status and regulation .................................. 11 1.1.6 Criminal activity ....................................... 11 1.1.7 Security ............................................ 13 1.1.8 Data in the blockchain .................................... 14 1.1.9 In academia ......................................... 14 1.1.10 In art, entertainment, and media ............................... 14 1.1.11 See also ............................................ 14 1.1.12 Notes ............................................. 14 1.1.13 References .......................................... 15 1.2 History of Bitcoin ........................................... 26 1.2.1 Pre-history .......................................... 26 1.2.2 Creation ............................................ 26 1.2.3 Growth ............................................ 26 1.2.4 Prices and value history .................................... 27 1.2.5 Satoshi Nakamoto ....................................... 28 1.2.6 The fork of March 2013 ................................... 28 1.2.7 Regulatory issues ....................................... 29 1.2.8 Theft and exchange shutdowns ................................ 29 1.2.9 Taxation and regulation .................................... 30 1.2.10 Sports sponsorship ...................................... 31 1.2.11 References .......................................... 31 1.2.12 External Links ........................................ 35 1.3 Legality of bitcoin by country ..................................... 35 1.3.1 List by country ........................................ 35 1.3.2 Details by country ....................................... 35 1.3.3 Footnotes ........................................... 41 i ii CONTENTS 1.3.4 References .......................................... 42 2 People 47 2.1 Satoshi Nakamoto ........................................... 47 2.1.1 Development of bitcoin .................................... 47 2.1.2 Characteristics ........................................ 47 2.1.3 Candidates .......................................... 47 2.1.4 References .......................................... 49 2.1.5 External links ......................................... 51 2.2 Hal Finney ............................................... 51 2.2.1 Early life and education ................................... 51 2.2.2 Career ............................................ 51 2.2.3 Private life, illness ....................................... 51 2.2.4 Death ............................................. 51 2.2.5 References .......................................... 51 2.2.6 External links ......................................... 52 2.3 Gavin Andresen ............................................ 52 2.3.1 References .......................................... 52 2.3.2 External links ......................................... 52 2.4 Nick Szabo .............................................. 52 2.4.1 Bit gold ............................................ 53 2.4.2 Bitcoin speculation ...................................... 53 2.4.3 References .......................................... 53 2.4.4 External links ......................................... 54 2.5 Winklevoss twins ........................................... 54 2.5.1 Early life and education .................................... 54 2.5.2 ConnectU ........................................... 54 2.5.3 Bitcoin ............................................ 54 2.5.4 Popular culture ........................................ 55 2.5.5 References .......................................... 55 2.6 Mark Karpelès ............................................. 55 2.6.1 Early life and education .................................... 55 2.6.2 Career ............................................. 56 2.6.3 Arrest and prosecution .................................... 56 2.6.4 References .......................................... 56 2.6.5 External links ......................................... 57 3 Organizations 58 3.1 Bitcoin Foundation .......................................... 58 3.1.1 History ............................................ 58 3.1.2 Leadership .......................................... 58 3.1.3 Awards ............................................ 58 CONTENTS iii 3.1.4 Criticism ........................................... 58 3.1.5 References .......................................... 59 3.1.6 External links ......................................... 60 4 Technologies 61 4.1 Bitcoin network ............................................ 61 4.1.1 Transactions .......................................... 61 4.1.2 Mining ............................................ 61 4.1.3 Local system resources .................................... 62 4.1.4 Payment verification ..................................... 63 4.1.5 See also ............................................ 63 4.1.6 References .......................................... 63 4.2 Cryptocurrency ............................................ 63 4.2.1 Overview ........................................... 63 4.2.2 History ............................................ 64 4.2.3 Legality ............................................ 64 4.2.4 Timestamping ......................................... 66 4.2.5 Economics .......................................... 66 4.2.6 List .............................................. 67 4.2.7 Academic studies ....................................... 67 4.2.8 Criticism ........................................... 67 4.2.9 See also ............................................ 67 4.2.10 References .......................................... 68 4.2.11 Further reading ........................................ 70 4.2.12 External links ......................................... 70 4.3 Elliptic Curve Digital Signature Algorithm .............................. 70 4.3.1 Key and signature-size comparison to DSA .......................... 70 4.3.2 Signature generation algorithm ................................ 70 4.3.3 Signature verification algorithm ................................ 70 4.3.4 Correctness of the algorithm ................................. 71 4.3.5 Security ............................................ 71 4.3.6 See also ............................................ 71 4.3.7 Notes ............................................. 71 4.3.8 References .......................................... 72 4.3.9 External links ......................................... 72 4.4 Peer-to-peer .............................................. 72 4.4.1 Historical development .................................... 73 4.4.2 Architecture .......................................... 73 4.4.3 Applications .......................................... 76 4.4.4 Social implications ...................................... 77 4.4.5 Political implications ..................................... 77 4.4.6 Current research ....................................... 78 iv CONTENTS 4.4.7 See also ............................................ 78 4.4.8 References .......................................... 78 4.4.9 External links ......................................... 80 4.5 Proof-of-work system ......................................... 81 4.5.1 Background .......................................... 81 4.5.2 Variants ............................................ 81 4.5.3 List of proof-of-work functions ................................ 82 4.5.4 Reusable proof-of-work as e-money ............................. 82 4.5.5 Notes ............................................. 83 4.5.6 See also ............................................ 83 4.5.7 References .......................................... 83 4.5.8 External links ......................................... 83 4.6 SHA-2 ................................................. 84 4.6.1 Hash standard ......................................... 84 4.6.2 Applications .......................................... 85 4.6.3 Cryptoanalysis and validation ................................. 85 4.6.4 Test vectors .......................................... 86 4.6.5 Pseudocode .......................................... 86 4.6.6 Comparison of SHA functions ................................ 88 4.6.7 See also ............................................ 89 4.6.8 References .......................................... 89 4.6.9 External links ......................................... 90 5 Exchanges 91 5.1 ANX (Hong Kong company) ..................................... 91 5.1.1 Sub-brands .......................................... 91 5.1.2 History ............................................ 91 5.1.3 Company Growth ....................................... 91 5.1.4 Acquisitions .......................................... 92 5.1.5 Agreements .......................................... 92 5.1.6 References .......................................... 92 5.2 BitInstant ............................................... 93 5.2.1 History ............................................ 93 5.2.2 Criticism ........................................... 93 5.2.3 References .......................................... 93 5.2.4 External links ......................................... 94 5.3 Bitstamp ................................................ 94 5.3.1 Service
Recommended publications
  • The Wealth of Networks How Social Production Transforms Markets and Freedom
    Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 3 # 3 The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press Ϫ1 New Haven and London 0 ϩ1 Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 4 # 4 Copyright ᭧ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copy- ing permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources.
    [Show full text]
  • Moneylab Reader: an Intervention in Digital Economy
    READER A N INTERVENTION IN DIGITAL ECONOMY FOREWORD BY SASKIA SASSEN EDITED BY GEERT LOVINK NATHANIEL TKACZ PATRICIA DE VRIES INC READER #10 MoneyLab Reader: An Intervention in Digital Economy Editors: Geert Lovink, Nathaniel Tkacz and Patricia de Vries Copy editing: Annie Goodner, Jess van Zyl, Matt Beros, Miriam Rasch and Morgan Currie Cover design: Content Context Design: Katja van Stiphout EPUB development: André Castro Printer: Drukkerij Tuijtel, Hardinxveld-Giessendam Publisher: Institute of Network Cultures, Amsterdam, 2015 ISBN: 978-90-822345-5-8 Contact Institute of Network Cultures phone: +31205951865 email: [email protected] web: www.networkcultures.org Order a copy or download this publication freely at: www.networkcultures.org/publications Join the MoneyLab mailing list at: http://listcultures.org/mailman/listinfo/moneylab_listcultures.org Supported by: Amsterdam University of Applied Sciences (Hogeschool van Amster- dam), Amsterdam Creative Industries Publishing and the University of Warwick Thanks to everyone at INC, to all of the authors for their contributions, Annie Goodner and Morgan Currie for their copy editing, and to Amsterdam Creative Industries Publishing for their financial support. This publication is licensed under Creative Commons Attribution NonCommercial ShareAlike 4.0 Unported (CC BY-NC-SA 4.0). To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/. EDITED BY GEERT LOVINK, NATHANIEL TKACZ AND PATRICIA DE VRIES INC READER #10 Previously published INC Readers The INC Reader series is derived from conference contributions and produced by the Institute of Network Cultures. They are available in print, EPUB, and PDF form. The MoneyLab Reader is the tenth publication in the series.
    [Show full text]
  • Het Juridisch Statuut Van Virtuele Munteenheden
    KU LEUVEN FACULTEIT RECHTSGELEERDHEID Academiejaar 2014 - 2015 Het juridisch statuut van virtuele munteenheden Bitcoin’s pragmatic legal vacuum Promotor : Prof. Dr. M.E. Storme Masterscriptie, ingediend door Begeleider: Drs. F. Helsen Cedric Hauben bij het eindexamen voor de graad van MASTER IN DE RECHTEN “There are few things more fascinating in our jurisprudence than the organization of what comes, almost immediately, to be perceived as a new field of law” - Grant GILMORE, 1974 Sterling professor of Law, Yale Univesity 2 Inhoudstafel Inhoudstafel ...................................................................................................................................... 3 Samenvatting .................................................................................................................................... 7 Dankwoord ........................................................................................................................................ 8 Inleiding ............................................................................................................................................. 9 Hoofdstuk 1: Situering ............................................................................................................... 11 §1.1. Wat is geld? ...................................................................................................................... 11 1.1.1. Definitie ........................................................................................................................................
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • Xp3 User Guide
    XP3 USER GUIDE © 2019 by Sonim Technologies, Inc. All rights reserved. CONTENT 1 GENERAL INFORMATION the best use of offered functions. COPYRIGHT © 2019 SONIM TECHNOLOGIES, INC. PHONE MODELS COVERED This user guide covers Sonim XP3 phone with the Sonim and the Sonim logo are trademarks of Sonim model number XP3800. Technologies, Inc. Other company and product names may be trademarks or registered trade-marks of the respective owners with whom they are associated. SONIM SUPPORT INFORMATION For additional product and support information, visit MANUFACTURER’S ADDRESS www.sonimtech.com. II Floor, No.2 Building, Phase B, Daqian Industrial OPTIONS COMMONLY USED ACROSS park, Longchang Road, 67 District, Baoan, MENU ITEMS Shenzhen, P.R. China The following are common actions used across DISPOSAL OF OLD ELECTRICAL AND various menu items: ELECTRONIC EQUIPMENT The symbol of the crossed-out wheeled OK Confirms an action. Use theCenter bin indicates that within the countries in selection key to perform this function. the European Union, this product, and any BACK Use this key to display the previous enhancements marked with this symbol, screen. cannot be disposed as unsorted waste but must be taken to separate collection at their MENU Moves the current working application to end- of-life. the recent applications list/background and displays menu screen. RECENT Displays the thumbnails of the DISPOSAL OF BATTERY applications that you have worked on Please check local regulations for disposal of recently. To remove any application from batteries. The battery should never be placed this list, Select Remove from list from in municipal waste. Use a battery disposal option.
    [Show full text]
  • Printpdf/Libra-3
    LIBRA drishtiias.com/printpdf/libra-3 Why in News? Facebook has announced the launch of a cryptocurrency called Libra by 2020. While this signals facebook’s plans to expand into the global digital currency market, it has also raised privacy concerns. Digi Currency: Facebook’s cryptocurrency Libra will allow smartphone users to buy services digitally from their phone. Digital Wallet: Libra will be stored in a digital wallet called Calibra. Calibra is a standalone app on a user's smartphone or housed within Facebook-owned services such as WhatsApp and Messenger. How can users buy Libra? Users will need to sign up for an account using a government-issued ID to use Calibra wallet. Users will then be able to convert their money into Libra and add it to their digital wallet. Once in place, the currency can be used to pay for everyday transactions. 1/5 Libra Association: The cryptocurrency will be run by the Libra Association, a Geneva-based entity that has founding partners, including Facebook, Mastercard, Visa, Uber, and the Vodafone group. Libra Reserve: Libra will be backed by a reserve of assets in the form of securities (bank deposits and short-term government securities) and fiat currencies (like dollar, pound) to give it an intrinsic value and ensure stability. Anyone with Libra will have an assurance that they can convert their digital currency into local fiat currency based on an exchange rate. Libra Blockchain: Every Libra payment is permanently written into the Libra blockchain which is a cryptographically authenticated database and acts as a public online ledger designed to handle 1,000 transactions per second.
    [Show full text]
  • Executive Summary Background Information What Is Bitcoin? What Is
    Executive Summary Details surrounding the identity of Satoshi Nakamoto and the origins of Bitcoin have emerged from a Florida court case, Kleiman v Wright. The plaintiff, Ira Kleiman, is suing the defendant, Craig Steven Wright (CSW) for the rights to Bitcoin tokens and Bitcoin related intellectual property. Ira alleges that his deceased brother Dave Kleiman was CSW’s partner in the development of Bitcoin and Bitcoin related IP. Implicit in this allegation is that CSW created Bitcoin and has access to Satoshi’s Bitcoins currently valued ~$10B. CSW has made it clear that his intention is to sell his BTC in favor of his preferred version of Bitcoin, BSV, which is more aligned with the original design. If this occurs it will have massive market ramifications on the order of hundreds of billions of dollars. Court case details support CSW’s claim to be Satoshi. This contrasts the opinion of many industry leaders who don’t believe that CSW is Satoshi or that he can follow through on his threat to sell BTC for BSV. The conflict around the Satoshi identity ties into a larger conflict about the purpose of Bitcoin and the role of law in Bitcoin. Background Information What is Bitcoin? What is BTC? Bitcoin is a revolutionary peer-to-peer network and electronic cash system. Over its 10 year ​ history, Bitcoin tokens have appreciated from being effectively worthless to having a market cap of over $315 billion. BTC is the predominant ticker symbol of the Bitcoin token. Others, like BSV and BCH exist through a process called forking.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • Blockchain and Cryptocurrencies Technologies and Network Structures: Applications, Implications and Beyond Lisa Morhaim
    Blockchain and cryptocurrencies technologies and network structures: applications, implications and beyond Lisa Morhaim To cite this version: Lisa Morhaim. Blockchain and cryptocurrencies technologies and network structures: applications, implications and beyond. 2019. hal-02280279 HAL Id: hal-02280279 https://hal.archives-ouvertes.fr/hal-02280279 Preprint submitted on 6 Sep 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Blockchain and cryptocurrencies technologies and network structures: applications, implications and beyond Lisa Morhaim∗ Wednesday 4th September, 2019 Abstract Blockchain technology is bringing together concepts and operations from several fields, including computing, communications networks, cryptography, and has broad implications and consequences thus encompassing a wide variety of domains and issues, including Network Science, computer science, economics, law, geography, etc. The aim of the paper is to provide a synthetic sketch of issues raised by the development of Blockchains and Cryptocurrencies, these issues are mainly presented through the link between on one hand the techno- logical aspects, i.e. involved technologies and networks structures, and on the other hand the issues raised from applications to implications. We believe the link is a two-sided one. The goal is that it may contribute facilitating bridges between research areas.
    [Show full text]
  • Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center
    Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center before the Subcommittee on National Security, International Development and Monetary Policy Committee on Financial Services United States House of Representatives Dollars against Democracy: Domestic Terrorist Financing in the Aftermath of Insurrection February 25, 2021 My name is Lecia Brooks. I am chief of staff of the Southern Poverty Law Center (SPLC). Now in our 50th year, the SPLC is a catalyst for racial justice in the South and beyond, working in partnership with communities to dismantle white supremacy, strengthen intersectional movements, and advance the human rights of all people. SPLC lawyers have worked to shut down some of the nation’s most violent white supremacist groups by winning crushing, multimillion-dollar jury verdicts on behalf of their victims. We have helped dismantle vestiges of Jim Crow, reformed juvenile justice practices, shattered barriers to equality for women, children, the LGBTQ+ community, and the disabled, and worked to protect low-wage immigrant workers from exploitation. The SPLC began tracking white supremacist activity in the 1980s, during a resurgence of the Ku Klux Klan and other organized extremist hate groups. Today, the SPLC is the premier U.S. nonprofit organization monitoring the activities of domestic hate groups and other extremists. In the early 1990s, the SPLC launched its pioneering Teaching Tolerance program to provide educators with free, anti-bias classroom resources, such as classroom documentaries and lesson plans. Now renamed Learning For Justice, our program reaches millions of schoolchildren with award-winning curricula and other materials that promote understanding of our nation’s history and respect for others, helping educators create inclusive, equitable school environments.
    [Show full text]
  • P2P Networking and Applications
    P2P Networking and Applications John F. Buford Heather Yu Eng Keong Lua AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO u' SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO MORGAN Morean Kaufmann Publishers is an imprint of Elsevier Table of Contents Preface xvii About the Authors xxi CHAPTER 1 Introduction 1 P2P Emerges as a Mainstream Application 1 The Rise of P2P File-Sharing Applications 1 Voice over P2P (VoP2P) 4 P2PTV 5 P2P Networking and the Internet 8 P2P Overlays and Network Services 8 Impact of P2P Traffic on the Internet 10 Motivation for P2P Applications 11 P2P from the End User's Perspective 11 Is P2P = Piracy? 12 P2P Strengths and Benefits 12 P2P Open Issues 14 P2P Economics 14 The P2P Value Proposition 14 Barrier to Entry 15 Revenue Models and Revenue Collection 15 P2P Application Critical Mass 16 Anatomy of Some P2P Business Models 17 VoP2P 17 File Sharing 19 Social Impact 21 Technology Trends Impacting P2P 22 Summary 23 Further Reading 23 CHAPTER 2 Peer-to-Peer Concepts 25 Operation of a P2P System 25 The User View 25 P2P Beyond the Desktop Computer 26 Overlay View 28 Principles of the P2P Paradigm 29 A Graph Theoretic Perspective 31 Overview 31 Overlay 31 Graph Properties 33 Object Storage and Lookup 34 vi Table of Contents A Design Space Perspective 35 A Routing Performance Perspective 36 Routing Geometries and Resilience 36 Tradeoff Between Routing State and Path Distance 37 Churn and Maintaining the Overlay 37 Locality 39 An Implementation Perspective: OverlayWeaver 41 Summary 43 For Further
    [Show full text]