40:
595:
493:
637:
590:
347:
384:
674:
933:
17:
923:
478:
420:
83:
61:
503:
54:
1211:
1075:
928:
571:
126:
programs. FastTrack was the most popular file sharing network in 2003, and used mainly for the exchange of music
461:
Piccard, Paul L.; Baskin, Brian; Edwards, Craig; Spillman, George, eds. (2005-01-01), "Chapter 12 - FastTrack",
403:
Piccard, Paul L.; Baskin, Brian; Edwards, Craig; Spillman, George, eds. (2005-01-01), "Chapter 12 - FastTrack",
1206:
1155:
938:
627:
1058:
524:
607:
28:
1048:
787:
667:
711:
683:
253:
436:
194:
on each are Kazaa (and its variations), Grokster, and iMesh. For more information about the various
1185:
1040:
187:
48:
1035:
646:
498:
186:
shut down in July of that year. There are three FastTrack-based networks, and they use mutually
1135:
696:
287:
215:
65:
1010:
660:
290:
communication, but the supernode-supernode communication protocol remains largely unknown.
634:
623:
268:
104:
8:
883:
333:
276:
271:. However, initialization data for the encryption algorithms is sent in the clear and no
120:
159:
1175:
915:
812:
470:
412:
191:
1180:
974:
943:
474:
416:
229:
178:
company
Consumer Empowerment. It appeared during the end of the first generation of
1103:
1098:
691:
466:
408:
379:
199:
1005:
969:
747:
641:
611:
575:
286:
succeeded in reverse-engineering the portion of the protocol dealing with client-
245:
134:
in 2003. It is estimated that the total number of users was greater than that of
131:
948:
1020:
742:
264:
494:"Audit: P2P Fasttrack Network Ping Messages: Attack Signature - Symantec Corp"
1200:
1170:
1150:
1145:
1113:
1083:
1015:
1000:
548:
233:
652:
802:
618:
179:
151:
123:
100:
1044:
1140:
1108:
1025:
863:
822:
792:
369:
280:
219:
175:
167:
953:
893:
832:
817:
807:
737:
283:
272:
260:
568:
777:
979:
878:
772:
762:
721:
716:
356:
319:
241:
237:
112:
225:
To allow downloading from multiple sources, FastTrack employs the
1093:
1088:
1052:
1030:
888:
847:
827:
374:
195:
183:
171:
147:
135:
995:
868:
767:
614:- A firewalling technique for blocking the fast-track protocol.
604:
311:
226:
163:
146:
The FastTrack protocol and Kazaa were created and developed by
569:
How
Overpeer was able to corrupt data on the FastTrack network
1165:
1160:
898:
873:
842:
837:
757:
326:
303:
203:
155:
116:
108:
460:
402:
797:
350:
298:
The following programs are or have been FastTrack clients:
249:
596:
Documentation of the known parts of the FastTrack protocol
782:
359:, a free multi-platform multi-network file sharing client
127:
248:
of a file to go unnoticed. Many people, as well as the
525:"Morpheus/KaZaa Called "New Napster" - ExtremeTech"
463:
Securing Im and P2P Applications for the
Enterprise
405:
Securing Im and P2P Applications for the
Enterprise
256:to spread corrupt and fake files on the network.
130:files. The network had approximately 2.4 million
1198:
437:"La historia del P2P y la descarga de archivos"
619:Advanced Peer-Based Technology Business Models
150:programmers of BlueMoon Interactive headed by
682:
668:
267:by its creators. The first clients were all
190:versions of the protocol. The most popular
174:, it was introduced in March 2001 by their
675:
661:
647:Harvard Business School Working Knowledge
84:Learn how and when to remove this message
47:This article includes a list of general
635:Music Downloads: Pirates- or Customers?
385:Comparison of file sharing applications
14:
1199:
1074:
549:"Jaan Tallinn « STARMUS Festival"
279:was made comparatively easy. In 2003,
656:
434:
315:(requires the gIFT-fasttrack plugin)
33:
240:in a short time, even on slow weak
154:, the same team that later created
24:
53:it lacks sufficient corresponding
25:
1223:
584:
232:. While UUHash allows very large
471:10.1016/B978-159749017-7/50017-3
435:LĂłpez, JosĂ© MarĂa (2019-06-10).
413:10.1016/B978-159749017-7/50017-3
38:
1156:BitTorrent protocol encryption
628:MIT Sloan School of Management
561:
541:
517:
486:
454:
428:
396:
13:
1:
390:
244:, it also allows for massive
209:
259:The FastTrack protocol uses
7:
363:
29:Fast Track (disambiguation)
10:
1228:
601:Boardwatch , July 17, 2003
293:
141:
26:
1126:
1067:
988:
962:
911:
856:
730:
704:
690:
684:Peer-to-peer file sharing
1186:Micro Transport Protocol
591:giFT-FastTrack home page
1212:File transfer protocols
924:Advanced Direct Connect
275:encryption is used, so
68:more precise citations.
1136:Distributed hash table
1011:Game and video sharing
645:. Silverthorne, Sean.
269:closed source software
252:, have exploited this
198:surrounding Kazaa and
158:. After selling it to
1207:File sharing networks
624:Ghosemajumder, Shuman
598:, from giFT-FastTrack
465:, Syngress: 319–357,
443:(in European Spanish)
407:, Syngress: 319–357,
107:that was used by the
27:For other uses, see
18:FastTrack (protocol)
529:www.extremetech.com
506:on January 29, 2015
277:reverse engineering
1176:BitTorrent tracker
640:2006-06-30 at the
610:2010-10-21 at the
574:2007-09-26 at the
1194:
1193:
1181:UDP hole punching
1122:
1121:
907:
906:
567:Thomas Mennecke.
230:hashing algorithm
94:
93:
86:
16:(Redirected from
1219:
1104:Open music model
1099:Friend-to-friend
1072:
1071:
1036:Sharing software
702:
701:
677:
670:
663:
654:
653:
579:
565:
559:
558:
556:
555:
545:
539:
538:
536:
535:
521:
515:
514:
512:
511:
502:. Archived from
490:
484:
483:
458:
452:
451:
449:
448:
432:
426:
425:
400:
380:Open Music Model
200:Sharman Networks
160:Niklas Zennström
132:concurrent users
89:
82:
78:
75:
69:
64:this article by
55:inline citations
42:
41:
34:
21:
1227:
1226:
1222:
1221:
1220:
1218:
1217:
1216:
1197:
1196:
1195:
1190:
1128:
1118:
1063:
984:
958:
913:
903:
852:
726:
695:
686:
681:
642:Wayback Machine
612:Wayback Machine
587:
582:
576:Wayback Machine
566:
562:
553:
551:
547:
546:
542:
533:
531:
523:
522:
518:
509:
507:
492:
491:
487:
481:
459:
455:
446:
444:
433:
429:
423:
401:
397:
393:
366:
346:giFT-FastTrack
296:
214:FastTrack uses
212:
144:
90:
79:
73:
70:
60:Please help to
59:
43:
39:
32:
23:
22:
15:
12:
11:
5:
1225:
1215:
1214:
1209:
1192:
1191:
1189:
1188:
1183:
1178:
1173:
1168:
1163:
1158:
1153:
1148:
1143:
1138:
1132:
1130:
1124:
1123:
1120:
1119:
1117:
1116:
1111:
1106:
1101:
1096:
1091:
1086:
1080:
1078:
1069:
1065:
1064:
1062:
1061:
1056:
1038:
1033:
1028:
1023:
1018:
1013:
1008:
1003:
998:
992:
990:
986:
985:
983:
982:
977:
972:
966:
964:
960:
959:
957:
956:
951:
946:
941:
936:
934:Direct Connect
931:
926:
920:
918:
909:
908:
905:
904:
902:
901:
896:
891:
886:
881:
876:
871:
866:
860:
858:
854:
853:
851:
850:
845:
840:
835:
830:
825:
820:
815:
810:
805:
800:
795:
790:
785:
780:
775:
770:
765:
760:
755:
750:
745:
740:
734:
732:
728:
727:
725:
724:
719:
714:
712:Direct Connect
708:
706:
699:
688:
687:
680:
679:
672:
665:
657:
651:
650:
631:
615:
602:
599:
593:
586:
585:External links
583:
581:
580:
560:
540:
516:
485:
479:
453:
427:
421:
394:
392:
389:
388:
387:
382:
377:
372:
365:
362:
361:
360:
354:
344:
338:
330:
323:
316:
308:
295:
292:
211:
208:
143:
140:
138:at its peak.
92:
91:
46:
44:
37:
9:
6:
4:
3:
2:
1224:
1213:
1210:
1208:
1205:
1204:
1202:
1187:
1184:
1182:
1179:
1177:
1174:
1172:
1171:Super-seeding
1169:
1167:
1164:
1162:
1159:
1157:
1154:
1152:
1151:Peer exchange
1149:
1147:
1146:NAT traversal
1144:
1142:
1139:
1137:
1134:
1133:
1131:
1125:
1115:
1112:
1110:
1107:
1105:
1102:
1100:
1097:
1095:
1092:
1090:
1087:
1085:
1084:Anonymous P2P
1082:
1081:
1079:
1077:
1073:
1070:
1066:
1060:
1059:Legal aspects
1057:
1054:
1050:
1046:
1042:
1039:
1037:
1034:
1032:
1029:
1027:
1024:
1022:
1021:Music sharing
1019:
1017:
1016:Image sharing
1014:
1012:
1009:
1007:
1004:
1002:
1001:Broadcatching
999:
997:
994:
993:
991:
987:
981:
978:
976:
973:
971:
968:
967:
965:
961:
955:
952:
950:
947:
945:
942:
940:
937:
935:
932:
930:
927:
925:
922:
921:
919:
917:
910:
900:
897:
895:
892:
890:
887:
885:
882:
880:
877:
875:
872:
870:
867:
865:
862:
861:
859:
855:
849:
846:
844:
841:
839:
836:
834:
831:
829:
826:
824:
821:
819:
816:
814:
811:
809:
806:
804:
801:
799:
796:
794:
791:
789:
786:
784:
781:
779:
776:
774:
771:
769:
766:
764:
761:
759:
756:
754:
751:
749:
746:
744:
741:
739:
736:
735:
733:
731:Decentralized
729:
723:
720:
718:
715:
713:
710:
709:
707:
703:
700:
698:
693:
689:
685:
678:
673:
671:
666:
664:
659:
658:
655:
648:
644:
643:
639:
636:
632:
629:
625:
621:
620:
616:
613:
609:
606:
603:
600:
597:
594:
592:
589:
588:
577:
573:
570:
564:
550:
544:
530:
526:
520:
505:
501:
500:
495:
489:
482:
480:9781597490177
476:
472:
468:
464:
457:
442:
438:
431:
424:
422:9781597490177
418:
414:
410:
406:
399:
395:
386:
383:
381:
378:
376:
373:
371:
368:
367:
358:
355:
352:
348:
345:
342:
339:
336:
335:
331:
329:
328:
324:
322:
321:
317:
314:
313:
309:
306:
305:
301:
300:
299:
291:
289:
285:
282:
278:
274:
270:
266:
262:
257:
255:
254:vulnerability
251:
247:
243:
239:
235:
231:
228:
223:
221:
217:
207:
205:
201:
197:
193:
189:
185:
181:
177:
173:
169:
165:
161:
157:
153:
149:
139:
137:
133:
129:
125:
122:
118:
114:
110:
106:
102:
98:
88:
85:
77:
67:
63:
57:
56:
50:
45:
36:
35:
30:
19:
1129:technologies
1006:Disk sharing
813:Perfect Dark
752:
633:
617:
563:
552:. Retrieved
543:
532:. Retrieved
528:
519:
508:. Retrieved
504:the original
497:
488:
462:
456:
445:. Retrieved
441:Hipertextual
440:
430:
404:
398:
340:
337:, until 2002
332:
325:
318:
310:
307:and variants
302:
297:
263:and was not
258:
224:
213:
188:incompatible
180:P2P networks
152:Jaan Tallinn
145:
124:file sharing
101:peer-to-peer
96:
95:
80:
74:January 2013
71:
52:
1141:Merkle tree
1109:Private P2P
1041:Web hosting
1026:Peercasting
912:Comparisons
864:Audiogalaxy
705:Centralized
370:Kad network
343:- KDE-Based
284:programmers
281:open source
238:checksummed
220:scalability
218:to improve
168:Janus Friis
66:introducing
1201:Categories
963:Hyperlinks
954:WebTorrent
929:BitTorrent
833:WebTorrent
818:Retroshare
808:OnionShare
738:BitTorrent
554:2019-06-30
534:2019-06-30
510:2019-06-30
447:2019-06-30
391:References
349:– a
273:public key
265:documented
261:encryption
246:corruption
216:supernodes
210:Technology
49:references
1031:Seedboxes
949:Gnutella2
778:Gnutella2
753:FastTrack
697:protocols
288:supernode
242:computers
97:FastTrack
1127:Internal
1068:Concepts
1045:Freesite
980:Metalink
944:Gnutella
884:Morpheus
879:LimeWire
857:Historic
773:Gnutella
763:Hyphanet
722:Soulseek
717:Soribada
692:Networks
638:Archived
608:Archived
572:Archived
499:Symantec
364:See also
357:MLDonkey
334:Morpheus
320:Grokster
196:lawsuits
182:–
148:Estonian
121:Morpheus
113:Grokster
105:protocol
1094:Darkweb
1089:Darknet
1076:Privacy
1053:ZeroNet
939:eDonkey
916:clients
889:Napster
848:ZeroNet
828:Tribler
748:eDonkey
649:, 2004.
630:, 2002.
578:. 2005.
375:Overnet
341:Apollon
294:Clients
192:clients
184:Napster
172:Denmark
142:History
136:Napster
62:improve
996:Backup
975:Magnet
869:CuteMX
803:OpenFT
768:GNUnet
605:FTWall
477:
419:
353:plugin
312:KCeasy
236:to be
227:UUHash
202:, see
164:Sweden
103:(P2P)
51:, but
1166:SHA-2
1161:SHA-1
899:WASTE
894:Scour
874:Kazaa
843:Winny
838:WinMX
823:Share
758:Fopnu
327:iMesh
304:Kazaa
234:files
204:Kazaa
176:Dutch
170:from
162:from
156:Skype
117:iMesh
109:Kazaa
99:is a
1049:IPFS
989:Uses
970:eD2k
798:LBRY
788:IPFS
475:ISBN
417:ISBN
351:giFT
250:RIAA
166:and
119:and
1114:Tor
914:of
793:Kad
783:I2P
743:DAT
467:doi
409:doi
128:MP3
1203::
1051:,
1047:,
626:.
622:.
527:.
496:.
473:,
439:.
415:,
222:.
206:.
115:,
111:,
1055:)
1043:(
694:,
676:e
669:t
662:v
557:.
537:.
513:.
469::
450:.
411::
87:)
81:(
76:)
72:(
58:.
31:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.