
The reason why the demand for anonymity has been low is because there’s a very slim chance of legal reprecussions while using networks like bittorrent today, and also that anonymity measures ‘waste’ bandwidth. Then we have anonymity, popular networks such as bittorrent and ed2k/kademlia have no anonymity to speak of, the closest thing is protocol obfuscation but that is targeted entirely at preventing isp-throttling.

Other areas where centralized networks can be more attractive is how they can be community/interest targeted, and often with their own set of rules pertaining to how much peers must upload in contrast with how much they are allowed to download. A single purpose server in a centralized setting is more efficient in spreading necessary information to peers than it a decentralized network where more bandwidth use/cpu use is required for relaying the same information. I read up on the p2p methodologies a while back with torrents, e2dk, direct connect being examples of centralized networks and kademlia, DHT (partly), winny, share, being examples of decentralized networks.Ĭentralized networks relies on a server which provides vital information neccesary for file sharing, this is quite efficient but also has a huge vulnerability as the network is totally dependant on these servers operating and if they go down, so does the network functionality.ĭecentralized networks are those where each peer take on part of the burden handled entirely by a server in a centralized setting and therefore has no central point of functionality, leading to a network where it can lose any peer and still continue to function as before.įrom a network robustness standpoint it’s obvious that decentralized networks are better, but there are as always other factors, such as efficency. Yes, I find this interesting aswell, particularly the decentralized bit. It’s not really anything like Freenet, where anonymity is actually the primary goal. That is the point I think – not address anonymity. You would of course need a few “superpeers” to bootstrap things, but once it got going it would be self-maintaining. There is no address anonymity as far as I can see – it is simply decentralized.

Tribler does not seem to even try to behave like a darknet. Its fine to a point for a small group of peers who actually do know each other – but then you never really gain the advantages you have with large P2P networks (namely diverse content and multiple seeders to speed up downloads). As such, it is all rather pointless to me, since they eventually succumb to their own popularity – once you reach the point that you no longer know everyone you can no longer trust it. I’d be interested in hearing anyone else’s take on this subject.ĭarknets for file sharing are simply trust networks – they are only as trustworthy as the people you let into them. And it tends to create very long if not completely broken routes between members who exchange peer information in the IRC channels at different times. In practice, the freenet darknet between anonymous users is practically useless because users go to a clear IRC channel to exchange peer lists, which is far less secure than the previous freenet since it leaks even more information than before. So, the state wouldn’t have a way to identify peers by simply joining the network. This has/had so many obvious scalability problems that it was a terrible idea from the get-go in my opinion, but it was supposed to allow peers to operate with much better confidence that no one outside the trusted peers would know that they’re part of the network.

The principal difference is that this protocol does not exchange peers, and the user must enter “trusted” peers manually. They developed a new freenet protocol and called it the “dark net”. This enabled one to get IPs of peers in the network, which was considered a security problem in regimes like china where the simple fact of running an anti-censorship technology can land someone in trouble. However the fact that the network exchanged peer information to repair and optimize the network implies that an attacker can join the network and build a list of peers over time. The old freenet network was an example of this type of design. As long as enough peers are online, the network has a very good chance to recover itself. Once bootstrapped with some initial peers, the network can expand by itself to learn new peers. “Pure P2P” systems need to be boot strapped somehow.
