BitTorrent fifteen years. What would a file sharing technology developed today look like?

2:45:00 PM
BitTorrent fifteen years. What would a file sharing technology developed today look like? -

BitTorrent was developed in 01: the file-sharing technology today predates the launch of Facebook, Twitter, and iPhone. In those fifteen years, the technology of surveillance and repression increased massively. If we designed file sharing today to monitor these developments, the sharing of technology would be a network censor, untrackable unidentifiable and peer-to-peer networking between mobile devices.

There are ten years, activists have argued that file sharing was unstoppable and adapt to threats using mobile transmissions. However, this innovation has not taken place, perhaps a lack of urgency. Let's examine how this technology could work.

A little history

When sharing music has become the division with the advent of the first home computers file, files were physically carried out cassettes and floppy disks to the recipient. It was the early 1980s, and this form of sharing was dubbed the AdidasLAN retrospectively, joking that the files have been worn by Adidas sneakers.

The first major development came with BBS in the late 1980s and early 190s, when an error-correcting and file transfer protocol quality sensitive signal appeared for transferring files over telephone lines. He was known as ZModem , and you could call the version of a poor man early TCP (such as TCP / IP Internet protocol suite, which was not the Internet). This protocol was used to transfer a lot of correspondence and discussions (and other files) on an amateur network known as FidoNet which preceded the deployment of the Internet public.

Fast forward to 1999 and Napster appeared with a centralized server and centralized customer databases (where everyone could see the complete collection of everyone). He was arrested by the copyright industry in a move that was the first of a long series of errors.

A few months later, a competitor named DirectConnect appeared, which quickly got many clones protocols -Compatible. Thus, servers had decentralized many different servers -. But customers still served their complete database, which filed a legal weakness and a file has been transferred between a source and a destination at a time, which presented a weak efficiency

in response to this in turn BitTorrent was developed and released in summer 01. It has decentralized customer databases and transmission, so that nobody could see the shared open a catalog another pair. And ... well, innovation is essentially ends at that point

Take this time :. When BitTorrent was developed, not only Facebook and Twitter did not exist, but the world did not have the modern mobile phones or the concept of applications on mobile phones.

If you want an idea of ​​what BitTorrent age, consider the fact that it was released in the same was as Windows XP (July 2 and August 26, respectively).

There has been virtually no innovation at all in sharing BitTorrent files after field, and it is a problem on several fronts. The development happened was mainly in the field of convenience -. As the possibility to subscribe to certain television programs using RSS

The major security VPN add-on is, and even if they are extremely useful in anonymization and the best we have today, they are a security layer on top of old technology.

convenience or security?

There is always a case to be made for the convenience of the user if you want software adoption. Popcorn Time for example, one can argue that the latest great innovation in file sharing - but adds convenience only, and not a single piece of security. If we update the security to take account of the last fifteen years, the convenience can be nice, but this is not our main goal.

The founders, operators, and spokesman for The Pirate Bay have long argued that it is a weakness of the ecosystem they are a central chokepoint. It is easy to see that they are right in this area. In the last episode, Peter Sunde says IPFS or ZeroNet provide significant innovation - but much of it built just another interceptable layer on top of the legacy BitTorrent instead of what BitTorrent: Reinventing ground up to meet a clear and present threat.

It is important to understand that the development of a technology to protect dissidents in repressive regimes, and technology to enable the sharing nonprofit culture and knowledge are a same thing - even where repressive regimes and copyright industry use the same monitoring sellers / repression.

therefore, we focus on the development of a technology to allow free , safe sharing dissidents in repressive regimes information; a tool to protect human rights. As a bonus, we also get a general information-wants-to-be without technology. . (This is a common factor of the copyright industry, they are fighting against the fundamental human rights to enforce their monopoly, for example, the copyright industry has recently complained that digital and bitcoin - two tools to help dissidents in repressive regimes to safeguard human rights - in fact "get in the way" of the monopoly of enforcement of copyright)

once you focus on making anonymous and found information, you do most of your transmission on the Internet traceable .. you use the fact that there are many groups forming daily (if not hourly ) random sets of mobile devices (iPhones and Androids) that happen to come into physical proximity to each other - in subway stations, on buses, in parks. You use the fact that they may contain amounts of big data today, and they can communicate and transfer tons of anonymous untraceably data in these spontaneous groups, using some long-range energy Bluetooth 4 as a candidate of the most obvious transmission. Thus, we have wide range of constantly shifting mesh networks (a SuperMESH) where nodes come and go, and carry data from one mesh to another.

When using a network like this, you choose to publish a document or subscribing to a certain rate (perhaps a series of documents from a dissident), and a post somewhere - at a safe distance from you, many hops away - might choose to act as a gateway to the Internet, making them truly anonymous and ends found, let alone censor.

as funny observation technology such transmission could be built on original AdidasLAN it is based on BitTorrent, as the successful transmission of data depends nodes being in physical movement through the day.

Of course, as mentioned, this technology could also be used to indicate the mesh network to subscribe to episodes of some TV show in which these episodes would virtually appear everywhere in both a town with just a few gateway feeds in SuperMESH in that particular city. It is a byproduct of the human rights of software development, as observed previously.

Privacy remains your own responsibility.

Previous
Next Post »
0 Komentar