02.06.2013 Views

The current state of anonymous file-sharing - Marc's Blog

The current state of anonymous file-sharing - Marc's Blog

The current state of anonymous file-sharing - Marc's Blog

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

a certain throughput/security trade<strong>of</strong>f, it extremely extends the amount and availability<br />

<strong>of</strong> <strong>file</strong>s. Both, search queries and results are only forwarded between trusted peers. <strong>The</strong><br />

"<strong>of</strong>ficial" implementation <strong>of</strong> turtle hopping, which was developed at the Vrije Universiteit<br />

in Amsterdam also uses encryption between hops to keep eavesdroppers from listening<br />

to the searches.<br />

A great source <strong>of</strong> further information concerning the darknet pattern is "<strong>The</strong> Darknet<br />

and the Future <strong>of</strong> Content Distribution" by Micros<strong>of</strong>t [9]<br />

5.2 <strong>The</strong> Brightnet pattern<br />

<strong>The</strong> word Brightnet makes one thing pretty clear: it’s the opposite <strong>of</strong> a Darknet. To<br />

freshen up you memories: In the Darknet pattern, you only control WHO you share<br />

your data with, but once you decide to share with a peer, you usually don’t have any<br />

secrets from that node about WHAT you share.<br />

In the Brightnet pattern it is exactly the opposite: you usually don’t care that much<br />

about who you trade data with, but the data itself is a "secret".<br />

This might seem a little bit confusing, how can data that is openly shared with everyone<br />

be a secret?<br />

To understand this, one has to look at the typical bits and bytes that are shared in a<br />

<strong>file</strong>-<strong>sharing</strong> application: Usually, every piece <strong>of</strong> data does not only consists <strong>of</strong> arbitrary<br />

numbers, but it has a certain meaning. It is part <strong>of</strong> the movie "xyz", the song "abc"<br />

or the book "123". When uploading even a small portion <strong>of</strong> this data, you might be<br />

infringing copyright or, depending where you live, might get yourself into all sorts <strong>of</strong><br />

trouble for the content you downloaded. This could lead to the situation that every<br />

government agency or corporation could tell if you’re <strong>sharing</strong>/acquiring a <strong>file</strong> by either<br />

simply receiving a request from or sending a request to you (given that you’re on an<br />

"open" network) or looking at the transfered data on an ISP level.<br />

<strong>The</strong> main idea behind the brightnet pattern is to strip the meaning from the data<br />

you transfer. Without any distinct meaning, the data itself isn’t protected by any<br />

copyright law or deemed questionable in any way. It would be totally fine to share<br />

and download this meaningless data. To end up with "meaningless" data, the <strong>current</strong><br />

brightnet implementations use a method called "multi-use encoding" as described in the<br />

paper "On copyrightable numbers with an application to the Gesetzklageproblem[19] by<br />

"Cracker Jack" (<strong>The</strong> title is a play on Turing’s "On computable numbers").<br />

<strong>The</strong> simplified idea is to rip apart two or more <strong>file</strong>s and use an XOR algorithm to<br />

recombine them to a new blob <strong>of</strong> binary data which, depending on the way you look at<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!