[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: tor and p2p



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 
Personally, I believe you won't see any useful/fast anonymous p2p
network until most users have very fast broadband connections with
high upstream (something that isn't very common in my country for
example) due to the huge amount of data that has to be forwarded or it
would be awfully slow. While broadband is catching up in many
countries to a point where it's really fast quite networks need to be
created or adapted (as you wrote). So as long as development time is
not lacking behind broadband development it's probably all on the
right track. However, I believe it will take many years still till we
are at a point where most users have the bandwidth to ensure a fast,
anonymous network. Take the edonkey network as an example. If everyone
contributes just 10-20 kb/s it might be too slow unless the file isn't
too large or you have a huge amount of uploaders. So if that is too
slow, it would take even more upstream bandwidth to send the data AND
the encryption related data / the forwarded traffic of other users as
well as your own).
Look at VoIP for example, it's just the opposite: encryption programs
such as zfone are available, so is the bandwidth in many countries.
However, hardware development is lacking behind (okay, zfone is rather
new still) and it will still take a good while until you can initiate
encrypted voip conversations with hardware phones (hopefully earlier
than later).

I remember some people came up with the idea of creating VPNs so each
user gets a different IP instead of using his own. I'm not very
experienced in VPNs but I believe that requires a VPN host/service
that guarantees to not forward the connection data to anyone and/or
doesn't log any connection data.

When looking at available anonymity services it appears as if we will
have to use different networks in the future for different purposes
because each of them seems to specialize on something. Freenet for
example seems to be perfect for storing web content anonymously (blogs
etc), I2P (never tried this yet) for p2p and Tor for browsing, IRC
etc. But who knows, maybe one of these networks will become one
network for everything someday instead. ;)

Sincerely,
Enigma

- --
German Tor mailing list / surveillance and anonymity:
http://www.anti1984.com

GPG key ID: 4096R/602492EA



eweb101 schrieb:
> I don't think it would be too difficult to get something like
> bittorrent working within the Tor network. What I mean by that is
> both the tracker and all clients are within the network. We'd  have
> to update the bittorrent client software to not use IP addresses of
> course, but something similar has already been done on Azureus for
> I2P. Users of the network would have to set themselves up a hidden
> service in order to participate.
>
> I'm sure there will be scaling issues involved with the increased
> number of hidden services and we'd want to optimize some of the
> transfer parameters but conceptually, it shouldn't be difficult to
> support.
>
>
> On Jan 24, 2007, at 1:49 PM, Roger Dingledine wrote:
>
>> On Wed, Jan 24, 2007 at 07:25:13PM +0000, Robert Hogan wrote:
>>> Has there been any thought, specc-ing in this direction? Anything
>>> that could
>>> sheds some light on the technical issues that would need to be
>>> addressed? Or
>>> is there something in the tor design which would make any attempt
>>> to build
>>> anonymous p2p on top of it unfeasible?
>>
>> There's lots of work left before Tor is in a position for most users
>> to be servers.
>>
>> http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#EverybodyAServer
>>
>> Hope that helps,
>> --Roger
>>
>
>



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 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=PcPR
-----END PGP SIGNATURE-----