Creación De Una Herramienta Para La Investigación De La Red Bittorrent

Total Page:16

File Type:pdf, Size:1020Kb

Creación De Una Herramienta Para La Investigación De La Red Bittorrent Universidad de Alcalá Escuela Politécnica Superior Grado en Ingeniería Informática Trabajo Fin de Grado Creación de una herramienta para la investigación de la red BitTorrent Autor: Raúl Calvo Laorden Tutor: Manuel Sánchez Rubio 2019 UNIVERSIDAD DE ALCALÁ ESCUELA POLITÉCNICA SUPERIOR Grado en Ingeniería Informática Trabajo Fin de Grado Creación de una herramienta para la investigación de la red BitTorrent Autor: Raúl Calvo Laorden Director: Manuel Sánchez Rubio Tribunal: Presidente: « Nombre y Apellidos » Vocal 1o: « Nombre y Apellidos » Vocal 2o: « Nombre y Apellidos » Calificación: .......................................................................... Fecha: ................................................................................... A todos los profesores que se preocupan porque sus alumnos aprendan de verdad y hacen todo lo posible para conseguirlo.. “Sólo podemos ver poco del futuro, pero lo suficiente para darnos cuenta de que hay mucho que hacer” Alan Mathison Turing Resumen BitTorrent, a pesar de ser una de las principales formas de compartir ficheros en red, su número de herramientas para la investigación es escaso. En este trabajo se realiza, en primer lugar, un estudio en profundidad del protocolo BitTorrent para después desarrollar una aplicación con el máximo número de funcionalidades encontradas. Esta aplicación tiene como objetivo ser útil a investigadores de modo que tengan todas las funcionalidades necesarias para cualquier investigación en este campo, desde encontrar los archivos .torrent que se están compartiendo de un fichero, a monitorizar uno o más torrents y recibir alertas por IP o rango. Palabras clave: BitTorrent, herramienta, Protocolo BitTorrent, DHT, Golang. Abstract BitTorrent, despite being one of the main ways of sharing files on a network, its number of research tools is scarce. In this work, in the first place, an in-depth study of the BitTorrent protocol is carried out to later develop an application with the maximum number of functionalities found. This application aims to be useful to researchers so that they have all the necessary functionalities for any investigation in this field, from finding the .torrent files that are being shared from a file, to monitoring one or more torrents and receiving alerts via IP or range. Keywords: BitTorrent, toolkit, BitTorrent Protocol, DHT, Golang. Índice general Resumen vii Abstract ix Índice general xi Índice de figuras xv Índice de tablas xvii Índice de listados de código fuente xix Lista de acrónimos xxi Glosario xxiii Lista de símbolos xxiv 1 Introducción 1 1.1 Presentación...........................................1 1.2 Motivación y objetivos......................................1 1.3 Organización y formato de la memoria.............................2 2 Estudio teórico 3 2.1 Introducción............................................3 2.2 Estado del Arte..........................................3 2.3 P2P................................................4 2.4 BitTorrent.............................................6 2.5 Protocolo BitTorrent.......................................6 2.5.1 BEP............................................7 2.5.1.1 Proceso de un BEP..............................7 2.5.1.2 Otros datos importantes para el BEP....................8 2.5.2 Bencoding.........................................8 xii ÍNDICE GENERAL 2.5.3 Ficheros Metainfo....................................9 2.5.4 Trackers..........................................9 2.5.4.1 Trackers HTTP................................9 2.5.4.1.1 Petición................................ 10 2.5.4.1.2 Respuesta............................... 10 2.5.4.2 Trackers UDP................................. 11 2.5.4.3 Scrape..................................... 11 2.5.4.4 Multitracker.................................. 12 2.5.5 Comunicación Peer-to-Peer (Igual a Igual) (P2P) o Peer Protocol....... 12 2.5.5.1 Handshake................................... 12 2.5.5.2 Estados..................................... 13 2.5.5.3 Mensajes.................................... 13 2.5.5.4 Peer_id..................................... 14 2.5.5.4.1 Estilo Mainline BitTorrent..................... 14 2.5.5.4.2 Estilo Azureus............................ 14 2.5.5.4.3 Estilo Shadow............................ 15 2.5.5.5 Seguridad.................................... 15 2.5.6 DHT............................................ 15 2.5.6.1 Funcionamiento DHT............................. 16 2.5.6.2 Protocolo KRPC................................ 17 2.5.7 Otros BEPs........................................ 18 2.5.7.1 DHT Infohash Indexing............................ 18 2.5.7.2 The BitTorrent Protocol Specification v2.................. 19 2.5.7.3 DHT Security extension............................ 19 2.6 Implementaciones BitTorrent.................................. 19 2.6.1 Clientes.......................................... 19 2.6.2 Bibliotecas........................................ 19 2.7 Conclusiones........................................... 20 3 Desarrollo 21 3.1 Introducción............................................ 21 3.2 Objetivo del desarrollo...................................... 21 3.3 Tecnología utilizada....................................... 22 3.4 Plan de trabajo.......................................... 22 3.5 Desarrollo del programa..................................... 22 3.5.1 Bibliotecas de Go utilizadas............................... 22 3.5.2 Base de datos....................................... 23 ÍNDICE GENERAL xiii 3.5.2.1 Diagrama de la base de datos......................... 23 3.5.2.2 Código SQL de la base de datos....................... 24 3.5.3 Explicación código.................................... 24 3.5.3.1 CLI....................................... 24 3.5.3.2 Manipulación fichero torrent......................... 25 3.5.3.2.1 Crear y descargar un torrent.................... 26 3.5.3.2.2 Obtener el torrent dado un hash.................. 26 3.5.3.3 Alertas y monitorización........................... 27 3.5.3.4 Demonio.................................... 28 3.5.3.5 Crawl...................................... 29 3.5.3.6 Buscar ficheros en la red (find)........................ 30 3.5.3.7 Mostrar información de la base de datos................... 33 3.5.4 Problemas encontrados................................. 33 3.6 Conclusiones........................................... 33 4 Conclusiones y líneas futuras 39 4.1 Conclusiones........................................... 39 4.2 Líneas futuras........................................... 40 Bibliografía 41 A Manual de usuario 45 A.1 Introducción............................................ 45 A.2 Instalación............................................ 45 A.2.1 Docker........................................... 45 A.2.2 Golang.......................................... 46 A.2.3 BNToolkit......................................... 46 A.3 Uso................................................ 46 A.3.1 Inicio PostgreSQL.................................... 47 A.3.2 Fichero de configuración configFile.toml........................ 47 A.3.3 help............................................ 47 A.3.4 version........................................... 48 A.3.5 initDB........................................... 48 A.3.6 create........................................... 49 A.3.7 download......................................... 50 A.3.8 addAlert.......................................... 51 A.3.9 deleteAlert........................................ 51 A.3.10 addmonitor........................................ 52 xiv ÍNDICE GENERAL A.3.11 deleteMonitor....................................... 52 A.3.12 crawl............................................ 53 A.3.13 daemon.......................................... 54 A.3.14 find............................................ 55 A.3.15 insert........................................... 56 A.3.16 show............................................ 57 A.3.16.1 hash....................................... 58 A.3.16.2 alert....................................... 58 A.3.16.3 count...................................... 59 A.3.16.4 ip........................................ 59 A.3.16.5 monitor..................................... 60 A.3.16.6 possibles.................................... 60 A.3.16.7 project..................................... 60 A.3.17 Ejecución en Windows.................................. 61 B Herramientas y recursos 63 Índice de figuras 2.1 Evolución de publicaciones en IEEEXplore [1] hasta 2019...................4 2.2 Tiempo mínimo de distribución.................................5 2.3 Arquitectura BitTorrent[2]...................................6 2.4 Flujo trabajo de un BitTorrent Enhancement Proposal (BEP)[3]..............8 3.1 Diagrama de la base de datos con Toad Data Modeler [4].................. 23 A.1 BNTtoolkit –help......................................... 45 A.2 BNTtoolkit help –help...................................... 47 A.3 BNTtoolkit version –help y ejecución.............................. 48 A.4 BNTtoolkit initDB –help.................................... 48 A.5 BNTtoolkit create –help y ejecución.............................. 49 A.6 BNTtoolkit download –help y ejecución............................ 50 A.7 addAlert y deleteAlert...................................... 51 A.8 addMonitor y deleteMonitor................................... 53 A.9 bntoolkit crawl –help y ejecución................................ 54 A.10 bntoolkit daemon –help y ejecución............................... 55 A.11 bntoolkit find –help.......................................
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Confidential Data-Outsourcing And
    Konrad Jünemann Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems Confidential Data-Outsourcing and Self-Optimizing P2P-Networks Konrad Jünemann Konrad Jünemann Confidential Data-Outsourcing and Self- Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems Confidential Data-Outsourcing and Self- Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems by Konrad Jünemann Dissertation, Karlsruher Institut für Technologie (KIT) Fakultät für Informatik, 2014 Tag der mündlichen Prüfung: 01. Dezember 2014 Referenten: Prof. Dr. rer. nat. Hannes Hartenstein Prof. Dr. rer. nat. Ralf Reussner Impressum Karlsruher Institut für Technologie (KIT) KIT Scientific Publishing Straße am Forum 2 D-76131 Karlsruhe KIT Scientific Publishing is a registered trademark of Karlsruhe Institute of Technology. Reprint using the book cover is not allowed. www.ksp.kit.edu This document – excluding the cover – is licensed under the Creative Commons Attribution-Share Alike 3.0 DE License (CC BY-SA 3.0 DE): http://creativecommons.org/licenses/by-sa/3.0/de/ The cover page is licensed under the Creative Commons Attribution-No Derivatives 3.0 DE License (CC BY-ND 3.0 DE): http://creativecommons.org/licenses/by-nd/3.0/de/ Print on Demand 2015 ISBN 978-3-7315-0328-6 DOI 10.5445/KSP/1000045068 Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems zur Erlangung des akademischen Grades eines Doktors der Ingenieurwissenschaften von der Fakultat¨ fur¨ Informatik des Karlsruher Instituts fur¨ Technologie (KIT) genehmigte Dissertation von Konrad Junemann¨ aus Wilhelmshaven Tag der mundlichen¨ Prufung:¨ 01.
    [Show full text]
  • TRON Weekly Report 2019.7.6-2019.7.12 in the Past
    TRON Weekly Report 2019.7.6-2019.7.12 In the past week, the TRON project continued to run smoothly. Here is this week's update for all of our supporters, believers, and followers. 一、 I. Technical Development 1. Progress of the week: · Architecture: Developed data collection project: static data and dynamic data. · Mechanism: Conducted MPC first-stage walkthrough. · Smart Contract: Developed parallel ECRecover instruction. 2. Plan for next week: · Architecture: Design one-click blockchain deployment solution. · Mechanism: Test anonymous transaction. · Smart Contract: Improve Solidity compiler unit test. II. Core statistics 1. On-chain data ·TRON block height exceeded 10.87 million and the total number of nodes stood at 1,065. · The total number of TRON real-time accounts reached 3,282,692 and 35,206 new addresses were added this week. ·Total number of transactions reached 497 million. Number of new transactions this week: 6.09 million. 2. DApp data of this week. ·Total number of DApps on TRON: 516; this week's new DApps: 14; week-on-week growth: 2.8%. · DAU of TRON DApp this week: 341,500; number of transactions: 4.09 million; transaction volume: $77.95 million. III. Community Update 1. From July 16 to August 15, TRC20-USDT Incentive Plan 2.0 will be rolled out to reward early users with ¥200 million. TRON will work with some of the world's top digital asset exchanges to provide users with premium interest rate returns paid in TRC20-USDT free of charge. We hope to encourage users to exchange the USDT in their balance with TRC20-USDT.
    [Show full text]
  • Groundbreaking Ceremony Held for New ECE Building by TOM MOONE
    NEWS FOR ECE ILLINOIS ALUMNI AND FRIENDS WINTER 2011 Also in this issue: New Assured Cloud Computing Center to be established at Illinois Groundbreaking Solar Decathlon: Helping students and the world ceremony held Alumnus Michael McCorquodale is the first ECE Engineer for new ECE building in Residence Department of Electrical and Computer Engineering Breaking ground on the future Dear alumni and friends, I have good news! The dream of a new building for our department, after many years of planning and anticipation, is now becoming a reality. Last month’s groundbreaking of the new ECE building marks the beginning of a new era for our department, a department of global influence and impact, thanks to the excellence of its faculty and alumni. And it is this global impact that makes this groundbreaking special not only for our department, our college, our campus, and our university, but also for the state of Illinois, our nation, and the world. Our faculty and our alumni have been among the pioneers of the major technological innovations that are the bedrock of today’s computing and communication technologies. The marvel of the computing technology and the communications infrastructure we enjoy today, and its catalytic role in improving living standards around the globe, would not have been possible without John Bardeen’s invention of the transistor or Jack Kilby’s brilliant idea of the integrated circuit. These Nobel Prize-winning innovations by two giants of the ECE ILLINOIS community have been followed by many more groundbreaking advances by ECE faculty and alumni, advances that inspire and drive our quest for a sustainable future for all.
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Justin Sun Chief Executive Officer Bittorrent, Inc. 301 Howard Street #2000 San Francisco, CA 94105
    Justin Sun Chief Executive Officer BitTorrent, Inc. 301 Howard Street #2000 San Francisco, CA 94105 Charles Wayn Chief Executive Officer DLive 19450 Stevens Creek Blvd #100 Cupertino, CA 95014 February 9, 2021 Dear Mr. Sun and Mr. Wayn, We write to you expressing concern about recent user activity in DLive communities attempting to attract American citizens, and particularly adolescent users, to white supremacy and domestic extremism. We noted the company’s internal governance actions taken on January 17th, 2021, in the wake of the riots at the U.S. Capitol Building on January 6th, 20211; however, it is evident that oversight from outside of the company’s internal review body may be necessary. According to media reports, DLive CEO Charles Wayn stated last year in a set of emails that the company strategy to combat extreme right-wing content was to “tolerate” them and allow other more popular content producers to “dilute” their reach.2 If true, this is unacceptable. During the January 6th, 2021, storming of the United States Capitol, your platform live streamed a number of individuals who entered and were around the building. Several of these individuals earned thousands of dollars in DLive’s digital currency that day, and a number received large donations through the platform ahead of the event. One individual received $2,800 in a live stream on January 5th, 2021, in which he encouraged his viewers to murder elected officials.3 We understand that DLive has supposedly removed 1 Wayn, Charles. “An Open Letter to the DLive Community.” DLive Community Announcements, (January 17th, 2021).
    [Show full text]
  • Crypto Twitter: Social Currency for Digital Currency
    Crypto Twitter: Social Currency for Digital Currency By Anastasia Breeze Ditto PR, August 2019 In a world dominated by social media, in-person interaction has gone by the wayside. Reality is virtual, machines are automated, communication is social, and in the last few years alone, money has become digital. There are strong parallels between peer-to-peer communication and decentralized finance (DeFi) – both remove the middle man. Those who are active in the cryptocurrency space have established Twitter as their decentralized medium for exchanging news, insight and commentary. Distributed networks, crypto and Twitter have proven to work hand in hand. While crypto fosters a network without a governing body, Crypto Twitter serves as a third party communication supplement to its “ungoverned” users. Twitter’s accessible, free, uncensored platform can compensate for global scalability obstacles, ultimately lowering barriers and increasing education around and enthusiasm for tokenized currency. A decade since the creation of Bitcoin, the DeFi industry has developed a need to streamline effective communication about crypto and all its moving parts to the public — and Twitter has proven the gold (or should we stay Bitcoin?) standard. Over the past several years, the crypto space has established a strong, influential community on Twitter. Users exchange news, knowledge and commentary as social currency, increasing awareness and discussion of all industry insights. The multi-way communication that Twitter facilitates is invaluable in propelling social collaboration and interaction, which are key to increasing innovation and education in the crypto space. 1 Introduction to the Crypto Twitter Landscape The lay of the decentralized finance and social media land Crypto Twitter (#CT) is a unique community and a world of its own inside the greater Twitterverse.
    [Show full text]
  • Bittorrent Architecture and Protocol
    Bittorrent Architecture And Protocol CaireneErethismic Jennings Marlon unpackworst hazily. his aguardientes Rene wallpaper hyperbolize her dilettantism disbudding papally, agonisingly. unrestrained and autoradiograph. Multidentate and Scribd membership was approved the protocol and photonics topics can contain confidential information And time and as bittorrent architecture and protocol to appropriately accommodate the architecture designed for each piece which the least one of touch with. In order to log into groups of where and magnetic links, and reliability of packet as bittorrent architecture and protocol only makes use increases, and always permits me. Net beneath its knees. The basic flow among the BitTorrent protocol By splitting the file and clear one outlet to each peer review let the peers download the part they graduate missing in each. Managing partner ashwin navin. Making it maintains the bittorrent architecture and protocol should be reduced dependence on the architecture. How BitTorrent Works GeeksforGeeks. On international advanced user agents, a protocol lowers bandwidth towards file until they mark off like. Bt protocol should be two keys to perform fast as an architecture, but not attempt to transfer, and will announce regularly to geek is termed the checkbox to. It stores it can download, the bittorrent files on all, the file they had deep properties may arrest all. All trade is needed is for the affiliate community to doll the technology and decree the good that could come had it. Uses HTTP to contribute out download Encrypted protocol queuing QoS. Downloader US Peer feedback Peer Leech Tracker Web Server to rre n t CSE 4656 Spring 2013 BitTorrent Protocol 24 Web page with been to torrent.
    [Show full text]
  • Peer Production on the Crypto Commons
    Peer Production on the Crypto Commons Search Peer Production on the Crypto Commons • Home • Posts • Projects • Publications • Contact • • Introduction 1 Introduction This book/resource presents a view of blockchains and cryptocurrencies as com- mon pool resources, and as products of commons-based peer production. These concepts will be introduced, and their relevance to understanding blockchain ecosystems will be explored. Free and Open Source Software (FOSS) is behind most of the digital public infrastructure we rely on when we use the internet, and offers compelling alter- natives to proprietary software in almost every domain. Commons-based peer production includes FOSS and also other types of information resource that are freely available and produced by their community - including Wikipedia, OpenStreetMap and the Pirate Bay. The book presents a view of cryptocurrencies as significant new forms of commons-based peer production, that have in some cases managed to overcome the incentives/funding issue which often limits the scale of FOSS volunteer collectives and what they can produce. Cryptography strengthens the digital commons by allowing people to build things that are robust to attack. It has opened up a new range of possibili- ties for the kind of commons-based resources that can be produced, and the ways in which these resources can sustain themselves. Bitcoin is a resilient social organism, native to the crypto commons. Participa- tion in the Bitcoin network is open to all. The distributed ledger and software to read and interact with it are freely available and open source. The network is peer to peer, which gives it the same kind of decentralized redundancy and resilience to shutdown as the Bittorrent protocol.
    [Show full text]
  • Alma Mater Studiorum – Università Di Bologna in Cotutela Con Université Du Luxembourg DOTTORATO DI RICERCA in LAW, SCIENCE
    Alma Mater Studiorum – Università di Bologna in cotutela con Université du Luxembourg DOTTORATO DI RICERCA IN LAW, SCIENCE, AND TECHNOLOGY – LAST-JD Ciclo XXXII Settore Concorsuale: IUS/20 Settore Scientifico Disciplinare: 12/H3 The Authority of Distributed Consensus Systems: Trust, Governance, and Normative Perspectives on Blockchains and Distributed Ledgers Presentata da: Crepaldi Marco Coordinatore Dottorato Supervisore Prof. Monica Palmirani Prof. Ugo Pagallo Co-supervisore Prof. Sjouke Mauw Esame finale anno 2020 ABSTRACT The subjects of this dissertation are distributed consensus systems (DCS). These systems gained prominence with the implementation of cryptocurrencies, such as Bitcoin. This work aims at understanding the drivers and motives behind the adoption of this class of technologies, and to – consequently – evaluate the social and normative implications of blockchains and distributed ledgers. To do so, a phenomenological account of the field of distributed consensus systems is offered, then the core claims for the adoption of systems are taken into consideration. Accordingly, the relevance of these technologies on trust and governance is examined. It will be argued that the effects on these two elements do not justify the adoption of distributed consensus systems satisfactorily. Against this backdrop, it will be held that blockchains and similar technologies are being adopted because they are regarded as having a valid claim to authority as specified by Max Weber, i.e., herrschaft. Consequently, it will be discussed whether current implementations fall – and to what extent – within the legitimate types of traditional, charismatic, and rational-legal authority. The conclusion is that the conceptualization developed by Weber does not capture the core ideas that appear to establish the belief in the legitimacy of distributed consensus systems.
    [Show full text]
  • Offering Circular
    IMPORTANT NOTICE NOT FOR DISTRIBUTION TO ANY U.S. PERSON OR TO ANY PERSON OR ADDRESS IN THE UNITED STATES. IMPORTANT: You must read the following before continuing. The following applies to the base prospectus (the Base Prospectus) following this notice, and you are therefore advised to read this carefully before reading, accessing or making any other use of the Base Prospectus. In accessing the Base Prospectus, you agree to be bound by the following terms and conditions, including any modifications to them any time you receive any information from the Issuer or the Initial Authorised Participants (each as defined in the Base Prospectus) as a result of such access. NOTHING IN THIS ELECTRONIC TRANSMISSION CONSTITUTES AN OFFER OF SECURITIES FOR SALE IN ANY JURISDICTION WHERE IT IS UNLAWFUL TO DO SO. THE PRODUCTS HAVE NOT BEEN AND WILL NOT BE REGISTERED UNDER THE U.S. SECURITIES ACT OF 1933, AS AMENDED (THE SECURITIES ACT) OR WITH ANY SECURITIES REGULATORY AUTHORITY OF ANY STATE OR OTHER JURISDICTION OF THE UNITED STATES AND (I) MAY NOT BE OFFERED, SOLD OR DELIVERED WITHIN THE UNITED STATES TO, OR FOR THE ACCOUNT OR BENEFIT OF U.S. PERSONS (AS DEFINED IN REGULATION S (REGULATION S) UNDER THE SECURITIES ACT), EXCEPT PURSUANT TO AN EXEMPTION FROM, OR IN A TRANSACTION NOT SUBJECT TO, THE REGISTRATION REQUIREMENTS OF THE SECURITIES ACT AND APPLICABLE STATE SECURITIES LAWS AND (II) MAY BE OFFERED, SOLD OR OTHERWISE DELIVERED AT ANY TIME ONLY TO TRANSFEREES THAT ARE NON-UNITED STATES PERSONS (AS DEFINED BY THE U.S. COMMODITIES FUTURES TRADING COMMISSION).
    [Show full text]
  • Whitepaper: Public Whitepaper Release to Consider Feedback and Improve Proposal Design
    WeYouMe is a peer-to-peer decentralized social media protocol. WeYouMe enables users to own their own data, to create posts to connect with their audience, message their friends, and earn digital currency rewards for sharing valuable content. The protocol leverages a participatory approach to community driven content moderation, a Delegated Proof of Stake and Proof of Work hybrid consensus mechanism, and enables a multi-application approach to create a neutral public square. The WeYouMe Mobile Application and Web Applications are the flagship social platforms of the WeYouMe network. They pack a suite of fun and creative new content types, and digital currency features. Users can share any type of content with their friends, peers, and the world by making posts to the WeYouMe blockchain. It will be free to use, open source, borderless, neutral, and censorship resistant. The network will reward users for posting content, voting on content, and contributing resources. The WeYouMe team will launch the WeYouMe Mainnet blockchain, and will create an ecosystem of cross platform compatible and open source applications that operate on the protocol. It will offer a comprehensive digital currency wallet and trading platform, with a decentralized and open marketplace of digital assets, services, and products. It will also integrate a native advertising network, and account memberships to deliver on-chain verifiable cash flows to buyback assets as protocol revenue. Contents: 1. CONTEXT: ..............................................................................................................................................
    [Show full text]