June 24, 2005 - Smile, You're on P2P
by Jeff Moss
If you've
logged on to your favorite file sharing peer-to-peer
network recently there is a good chance a node is
waiting to log your every download. Securing and providing
anonymity on p2p systems is a critical step in protecting
the free flow of digital information. Luckily, Ian
Clarke and Oskar Sandberg are the kind of guys that
can pull
something like this off. On today's page, Ian
takes a look on how to keep peer-to-peer networks
dark, searchable, secure and efficient. Whether it
is Freenet or their work on the free music-sharing
client, Indy, Ian and
Oskar have the lockdown on p2p. Word.
Keeping Peer to Peer Private
by Ian Clarke posted June 24, 2005
I
started the Freenet
Project in 1998 with the goal of building a network
for truly free communication, and of all the things
we have learned since
then, perhaps the most salient is that the biggest
threats to P2P networks come not from without, but
from within the network itself. This is something
that the current file sharing networks are now learning
the hard way, with those organizations who wish
to stop them now infiltrating
the networks to sue individual users for providing
certain files. And while Freenet has always been designed
...its design has never been able to protect the identity of people who operate nodes in the network from one another.
to protect the identity and security of people who access and publish information from attackers and prying eyes, its design has never been able to protect the identity of people who operate nodes in the network from one another.Recently Oskar, who was one of the original contributors to the project and who is now working on his PhD in Mathematics, and I have been discussing the mathematical mechanics behind large scale networks. As a part of this discussion it dawned on us, that because science now believes that human relationships really do form a "small world" (between any two of us, there are only six degrees of separation), with the right algorithms it should be possible to find data fast even in a network where peers only ever talk to peers that they already know and trust. We believe our methods for doing this provide to key to making peer-to-peer networks that are both dark and searchable: secure and efficient. For those who wish to constrain the free flow of information, such networks could be the biggest nightmare of all...
Big Companies, Big Targets
One of the benefits of working at Black Hat is our exposure to the world’s leading technology researchers. The Black Page is our opportunity to share their research with the world. The Black Page will be sporadically updated, exclusively featuring the Black Hat Briefings speakers, their latest research, and new announcements... read more
The Black Page is always looking for concise and interesting comments from researchers and experts about issues that affect the security community. Contact us here to learn more about submission rules