[p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko at zooko.com)

Eugen Leitl eugen at leitl.org
Fri Mar 11 03:42:52 PST 2005


On Thu, Mar 10, 2005 at 10:48:12PM -0800, Steve Schear wrote:

> >Why? BT is designed with zero privacy in mind.
>
> And this was a profound error, IMHO.  One of the epiphanies from my work at

It was a deliberate decision on Bram Cohen's part. BT is a very useful medium
to deliver software updates, movies und most for what there are currently
broadcast media for.

If you want to be invisible to lawyers, you have to use something else.

(Or at least run BT on a large zombie cloud, so you have plausible
deniability).

> MN was that a secrecy-oriented proxy network development and successful
> deployment needed to precede P2P file sharing if such networks were to
> survive determined technical and legal challenges.  End users often care

If a network has been declared illegal, and you're a part of that network,
and somebody receives packets from you which are part of IP-protected binary
blob, and your ISP rats on you, your ass is grass with the right kind of IP
nazi legislation.

Obvously, the only way to prevent that from happening is not be part of that
network, not make your ISP rat on you -- or, much better, do not let that
legislation happen at all.

If it does happen, freedom becomes illegal.

> little about what 'under the hood' of their P2P app only that they can get
> the content conveniently and they are not subjected to annoyances like spy
> or adware.
>
> >> exposure of the trackers was a prominent topic of MN planning
discussions
> >> and its odd that precautions, like distributing the tracker functions
> >into
> >> clients or hiding them inside a TOR-like proxy network weren't taken
> >
> >You can post BT links on a P2P network.
>
> But trackers must still be widely accessible by the general population of
> BT users and can you offer the content or obtain it without likely
> identification?

Web pages have static addresses in DNS. Search on P2P in dynamic IP is much
more ephemeral, and requires ISPs to keep track of (customer IPv4
time_period)
tuples long enough so that their logs can be subpoenaed.

--
Eugen* Leitl <a href="http://leitl.org">leitl</a>
______________________________________________________________
ICBM: 48.07078, 11.61144            http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org         http://nanomachines.net

[demime 1.01d removed an attachment of type application/pgp-signature]





More information about the cypherpunks-legacy mailing list