June 24, 2005 - Smile, You're on P2P
by Jeff Moss
If you've logged on to your favorite file sharing peer-to-peer network recently there is a good chance a node is waiting to log your every download. Securing and providing anonymity on p2p systems is a critical step in protecting the free flow of digital information. Luckily, Ian Clarke and Oskar Sandberg are the kind of guys that can pull something like this off. On today's page, Ian takes a look on how to keep peer-to-peer networks dark, searchable, secure and efficient. Whether it is Freenet or their work on the free music-sharing client, Indy, Ian and Oskar have the lockdown on p2p. Word.
Keeping Peer to Peer Private
by Ian Clarke posted June 24, 2005
I started the Freenet Project in 1998 with the goal of building a network for truly free communication, and of all the things we have learned since then, perhaps the most salient is that the biggest threats to P2P networks come not from without, but from within the network itself. This is something that the current file sharing networks are now learning the hard way, with those organizations who wish to stop them now infiltrating the networks to sue individual users for providing certain files. And while Freenet has always been designed
...its design has never been able to protect the identity of people who operate nodes in the network from one another.to protect the identity and security of people who access and publish information from attackers and prying eyes, its design has never been able to protect the identity of people who operate nodes in the network from one another.
Recently Oskar, who was one of the original contributors to the project and who is now working on his PhD in Mathematics, and I have been discussing the mathematical mechanics behind large scale networks. As a part of this discussion it dawned on us, that because science now believes that human relationships really do form a "small world" (between any two of us, there are only six degrees of separation), with the right algorithms it should be possible to find data fast even in a network where peers only ever talk to peers that they already know and trust. We believe our methods for doing this provide to key to making peer-to-peer networks that are both dark and searchable: secure and efficient. For those who wish to constrain the free flow of information, such networks could be the biggest nightmare of all...
Big Companies, Big Targets
One of the benefits of working at Black Hat is our exposure to the world’s leading technology researchers. The Black Page is our opportunity to share their research with the world. The Black Page will be sporadically updated, exclusively featuring the Black Hat Briefings speakers, their latest research, and new announcements... read more
The Black Page is always looking for concise and interesting comments from researchers and experts about issues that affect the security community. Contact us here to learn more about submission rules