795:, and entertainment industry to filter out copyrighted content. Although server-client networks are able to monitor and manage content availability, they can have more stability in the availability of the content they choose to host. A client should not have trouble accessing obscure content that is being shared on a stable centralized network. P2P networks, however, are more unreliable in sharing unpopular files because sharing files in a P2P network requires that at least one node in the network has the requested data, and that node must be able to connect to the node requesting the data. This requirement is occasionally hard to meet because users may delete or stop sharing data at any point.
456:
1346:
reproducible so that other researchers can replicate, validate, and extend existing work." If the research cannot be reproduced, then the opportunity for further research is hindered. "Even though new simulators continue to be released, the research community tends towards only a handful of open-source simulators. The demand for features in simulators, as shown by our criteria and survey, is high. Therefore, the community should work together to get these features in open-source software. This would reduce the need for custom simulators, and hence increase repeatability and reputability of experiments."
409:
447:/memory (by requiring every peer to process all search queries), and does not ensure that search queries will always be resolved. Furthermore, since there is no correlation between a peer and the content managed by it, there is no guarantee that flooding will find a peer that has the desired data. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing. But if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that the search will be successful.
1372:
264:
780:, recovery, and availability. In a centralized network, the system administrators are the only forces controlling the availability of files being shared. If the administrators decide to no longer distribute a file, they simply have to remove it from their servers, and it will no longer be available to users. Along with leaving the users powerless in deciding what is distributed throughout the community, this makes the entire system vulnerable to threats and requests from the government and other large forces.
799:
and available than files on central networks. In a centralized network, a simple loss of connection between the server and clients can cause a failure, but in P2P networks, the connections between every node must be lost to cause a data-sharing failure. In a centralized system, the administrators are responsible for all data recovery and backups, while in P2P systems, each node requires its backup system. Because of the lack of central authority in P2P networks, forces such as the recording industry,
179:
6060:
4314:
4236:
25:
4304:
757:
940:
137:
6070:
4246:
502:
282:. The peer-to-peer movement allowed millions of Internet users to connect "directly, forming groups and collaborating to become user-created search engines, virtual supercomputers, and filesystems". The basic concept of peer-to-peer computing was envisioned in earlier software systems and networking discussions, reaching back to principles stated in the first
1277:
networks regarding public safety and national security. When a file is downloaded through a peer-to-peer network, it is impossible to know who created the file or what users are connected to the network at a given time. Trustworthiness of sources is a potential security threat that can be seen with peer-to-peer systems.
514:(i.e. with large numbers of nodes frequently joining and leaving the network). More recent evaluation of P2P resource discovery solutions under real workloads have pointed out several issues in DHT-based solutions such as high cost of advertising/discovering resources and static and dynamic load imbalance.
344:
introduced the music and file-sharing application called
Napster. Napster was the beginning of peer-to-peer networks, as we know them today, where "participating users establish a virtual network, entirely independent from the physical network, without having to obey any administrative authorities or
1250:
Although peer-to-peer networks can be used for legitimate purposes, rights holders have targeted peer-to-peer over the involvement with sharing copyrighted material. Peer-to-peer networking involves data transfer from one user to another without using an intermediate server. Companies developing P2P
1185:
Some researchers have explored the benefits of enabling virtual communities to self-organize and introduce incentives for resource sharing and cooperation, arguing that the social aspect missing from today's P2P systems should be seen both as a goal and a means for self-organized virtual communities
1276:
exceptions allow limited use of copyrighted material to be downloaded without acquiring permission from the rights holders. These documents are usually news reporting or under the lines of research and scholarly work. Controversies have developed over the concern of illegitimate use of peer-to-peer
798:
In a P2P network, the community of users is entirely responsible for deciding which content is available. Unpopular files eventually disappear and become unavailable as fewer people share them. Popular files, however, are highly and easily distributed. Popular files on a P2P network are more stable
747:
that can be inherent in a client–server based system. As nodes arrive and demand on the system increases, the total capacity of the system also increases, and the likelihood of failure decreases. If one peer on the network fails to function properly, the whole network is not compromised or damaged.
296:
was close to a P2P network in that it assumed each user of the web would be an active editor and contributor, creating and linking content to form an interlinked "web" of links. The early
Internet was more open than the present day, where two machines connected to the Internet could send packets to
1159:
1309:
usage. Compared to Web browsing, e-mail or many other uses of the internet, where data is only transferred in short intervals and relative small quantities, P2P file-sharing often consists of relatively heavy bandwidth usage due to ongoing file transfers and swarm/network coordination packets. In
1288:
lead to an increase in overall video game sales because newer games charge for extra features or levels. The paper concluded that piracy had a negative financial impact on movies, music, and literature. The study relied on self-reported data about game purchases and use of illegal download sites.
1177:
Cooperation among a community of participants is key to the continued success of P2P systems aimed at casual human users; these reach their full potential only when large numbers of nodes contribute resources. But in current practice, P2P networks often contain large numbers of users who utilize
438:
Because there is no structure globally imposed upon them, unstructured networks are easy to build and allow for localized optimizations to different regions of the overlay. Also, because the role of all peers in the network is the same, unstructured networks are highly robust in the face of high
391:
peers can communicate with each other directly, via the logical overlay links (each of which corresponds to a path through the underlying physical network). Overlays are used for indexing and peer discovery, and make the P2P system independent from the physical network topology. Based on how the
716:
files). Files infected with the RIAA virus were unusable afterwards and contained malicious code. The RIAA is also known to have uploaded fake music and movies to P2P networks in order to deter illegal file sharing. Consequently, the P2P networks of today have seen an enormous increase of their
573:
was an example of a hybrid model . There are a variety of hybrid models, all of which make trade-offs between the centralized functionality provided by a structured server/client network and the node equality afforded by the pure peer-to-peer unstructured networks. Currently, hybrid models have
442:
However, the primary limitations of unstructured networks also arise from this lack of structure. In particular, when a peer wants to find a desired piece of data in the network, the search query must be flooded through the network to find as many peers as possible that share the data. Flooding
748:
In contrast, in a typical client–server architecture, clients share only their demands with the system, but not their resources. In this case, as more clients join the system, fewer resources are available to serve each client, and if the central server fails, the entire network is taken down.
1345:
Researchers have used computer simulations to aid in understanding and evaluating the complex behaviors of individuals within the network. "Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be
1181:
Freeloading can have a profound impact on the network and in some cases can cause the community to collapse. In these types of networks "users have natural disincentives to cooperate because cooperation consumes their own resources and may degrade their own performance". Studying the social
662:
attacks. Examples of common routing attacks include "incorrect lookup routing" whereby malicious nodes deliberately forward requests incorrectly or return false results, "incorrect routing updates" where malicious nodes corrupt the routing tables of neighboring nodes by sending them false
1114:, uses a proprietary peer-to-peer technology called "Delivery Optimization" to deploy operating system updates using end-users' PCs either on the local network or other PCs. According to Microsoft's Channel 9, this led to a 30%-50% reduction in Internet bandwidth usage. Artisoft's
3028:
Gareth Tyson, Andreas Mauthe, Sebastian Kaune, Mu Mu and Thomas
Plagemann. Corelli: A Dynamic Replication Service for Supporting Latency-Dependent Content in Community Networks. In Proc. 16th ACM/SPIE Multimedia Computing and Networking Conference (MMCN), San Jose, CA
1333:. Techniques for achieving "protocol obfuscation" involves removing otherwise easily identifiable properties of protocols, such as deterministic byte sequences and packet sizes, by making the data look as if it were random. The ISP's solution to the high bandwidth is
574:
better performance than either pure unstructured networks or pure structured networks because certain functions, such as searching, do require a centralized functionality but benefit from the decentralized aggregation of nodes provided by unstructured networks.
305:
was a successful peer-to-peer network where "every participating node could request and serve content". However, ARPANET was not self-organized, and it could not "provide any means for context or content-based routing beyond 'simple' address-based routing."
873:
Peer-to-peer networking involves data transfer from one user to another without using an intermediate server. Companies developing P2P applications have been involved in numerous legal cases, primarily in the United States, over conflicts with
1182:
attributes of P2P networks is challenging due to large populations of turnover, asymmetry of interest and zero-cost identity. A variety of incentive mechanisms have been implemented to encourage or even force nodes to contribute resources.
1186:
to be built and fostered. Ongoing research efforts for designing effective incentive mechanisms in P2P systems, based on principles from game theory, are beginning to take on a more psychological and information-processing direction.
1271:
To establish criminal liability for the copyright infringement on peer-to-peer systems, the government must prove that the defendant infringed a copyright willingly for the purpose of personal financial gain or commercial advantage.
1169:: In this animation, the colored bars beneath all of the 7 clients in the upper region above represent the file being shared, with each color representing an individual piece of the file. After the initial pieces transfer from the
828:
that require users to share, refer a performance measurement study). This property is one of the major advantages of using P2P networks because it makes the setup and running costs very small for the original content distributor.
3180:
Krishnan, R., Smith, M. D., Tang, Z., & Telang, R. (2004, January). The impact of free-riding on peer-to-peer networks. In System
Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on (pp. 10-pp).
663:
information, and "incorrect routing network partition" where when new nodes are joining they bootstrap via a malicious node, which places the new node in a partition of the network that is populated by other malicious nodes.
856:
and services, including distributed caching systems like
Correli Caches to enhance performance. Furthermore, peer-to-peer networks have made possible the software publication and distribution, enabling efficient sharing of
509:
However, in order to route traffic efficiently through the network, nodes in a structured overlay must maintain lists of neighbors that satisfy specific criteria. This makes them less robust in networks with a high rate of
1352:
Besides all the above stated facts, there has also been work done on ns-2 open source network simulators. One research issue related to free rider detection and punishment has been explored using ns-2 simulator here.
605:
the content, thus off-loading balance from the server. All of the information is retained at the server. This system makes use of the fact that the bottleneck is most likely in the outgoing bandwidth than the
205:, directly available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional
1325:-based application architecture. The client–server model provides financial barriers-to-entry to small publishers and individuals, and can be less efficient for sharing large files. As a reaction to this
3193:
Feldman, M., Lai, K., Stoica, I., & Chuang, J. (2004, May). Robust incentive techniques for peer-to-peer networks. In
Proceedings of the 5th ACM conference on Electronic commerce (pp. 102-111). ACM.
2811:
1321:
Critics point out that P2P networking has legitimate legal uses, and that this is another way that large providers are trying to control use and content on the
Internet, and direct people towards a
725:
and different encryption methods have made most networks resistant to almost any type of attack, even when major parts of the respective network have been replaced by faked or nonfunctional hosts.
693:
contained malware. In both cases, the top three most common types of malware accounted for the large majority of cases (99% in gnutella, and 65% in OpenFT). Another study analyzing traffic on the
2723:
1173:(large system at the bottom), the pieces are individually transferred from client to client. The original seeder only needs to send out one copy of the file for all the clients to receive a copy.
2143:
Making Grids Work: Proceedings of the CoreGRID Workshop on
Programming Models Grid and P2P System Architecture Grid Systems, Tools and Environments 12-13 June 2007, Heraklion, Crete, Greece
475:
the overlay is organized into a specific topology, and the protocol ensures that any node can efficiently. search the network for a file/resource, even if the resource is extremely rare.
2053:
Networking 2007: Ad Hoc and Sensor
Networks, Wireless Networks, Next Generation Internet: 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007 Proceedings
2461:
Bandara, H. M. N. Dilum; Jayasumana, Anura P. (January 2012). "Evaluation of P2P Resource
Discovery Architectures Using Real-Life Multi-Attribute Resource and Query Characteristics".
3227:
P. Antoniadis and B. Le Grand, "Incentives for resource sharing in self-organized communities: From economics to social psychology," Digital Information Management (ICDIM '07), 2007
646:. What makes this particularly dangerous for P2P software, however, is that peer-to-peer applications act as servers as well as clients, meaning that they can be more vulnerable to
2625:. Lecture Notes in Computer Science. Vol. Proceedings of the First International Workshop on Peer-to-Peer Systems. Cambridge, MA: Springer (published March 2002). pp.
685:
varies between different peer-to-peer protocols. Studies analyzing the spread of malware on P2P networks found, for example, that 63% of the answered download requests on the
1349:
Popular simulators that were widely used in the past are NS2, OMNeT++, SimPy, NetLogo, PlanetLab, ProtoPeer, QTM, PeerSim, ONE, P2PStrmSim, PlanetSim, GNUSim, and Bharambe.
891:. In the last case, the Court unanimously held that defendant peer-to-peer file sharing companies Grokster and Streamcast could be sued for inducing copyright infringement.
3450:
Basu, A., Fleming, S., Stanier, J., Naicken, S., Wakeman, I., & Gurbani, V. K. (2013). The state of peer-to-peer network simulators. ACM Computing Surveys, 45(4), 46.
820:
In P2P networks, clients both provide and use resources. This means that unlike client–server systems, the content-serving capacity of peer-to-peer networks can actually
3131:
313:, a distributed messaging system that is often described as an early peer-to-peer architecture, was established. It was developed in 1979 as a system that enforces a
1268:
In both of the cases the file sharing technology was ruled to be legal as long as the developers had no ability to prevent the sharing of the copyrighted material.
3006:
NETWORKING 2005 -- Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
3647:", in the proceedings of the 1st Multimedia Communications Workshop MULTICOMM 2006 held in conjunction with IEEE ICC 2006 pp 43–48, June 2006, Istanbul, Turkey.
3108:
2746:
Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings
569:
Hybrid models are a combination of peer-to-peer and client–server models. A common hybrid model is to have a central server that helps peers find each other.
2815:
2652:
3654:
3158:
1206:—that is, ensuring that the contents of communications are hidden from eavesdroppers, and that the identities/locations of the participants are concealed.
1318:. Their rationale was that P2P is mostly used to share illegal content, and their infrastructure is not designed for continuous, high-bandwidth traffic.
359:
nodes simultaneously functioning as both "clients" and "servers" to the other nodes on the network. This model of network arrangement differs from the
2537:
1945:
423:
do not impose a particular structure on the overlay network by design, but rather are formed by nodes that randomly form connections to each other. (
325:
communicate with one another as peers to propagate Usenet news articles over the entire group of network servers. The same consideration applies to
5158:
3552:
2420:
3579:
3279:
Majoras, D. B. (2005). Peer-to-peer file-sharing technology consumer protection and competition issues. Federal Trade Commission, Retrieved from
363:
model where communication is usually to and from a central server. A typical example of a file transfer that uses the client-server model is the
367:(FTP) service in which the client and server programs are distinct: the clients initiate the transfer, and the servers satisfy these requests.
2313:
Dabek, Frank; Zhao, Ben; Druschel, Peter; Kubiatowicz, John; Stoica, Ion (2003). "Towards a Common API for Structured Peer-to-Peer Overlays".
3593:
2255:
2082:
Transactions on Large-Scale Data- and Knowledge-Centered Systems III: Special Issue on Data and Knowledge Management in Grid and PSP Systems
704:
Corrupted data can also be distributed on P2P networks by modifying files that are already being shared on the network. For example, on the
4282:
3536:
911:
multimedia applications leverage a peer-to-peer network in conjunction with streaming servers to stream audio and video to their clients.
3800:
3369:
3302:
916:
2662:
1492:
1122:
Hotline Client was built with decentralized servers and tracker software dedicated to any type of files and continues to operate today.
3998:
3062:
3711:
3555:, Special Issue, Elsevier Journal of Computer Communication, (Ed) Javed I. Khan and Adam Wierzbicki, Volume 31, Issue 2, February 2008
6658:
3741:
3720:
3031:
658:
Since each node plays a role in routing traffic through the network, malicious users can perform a variety of "routing attacks", or
1401:
3729:
2359:
392:
nodes are linked to each other within the overlay network, and how resources are indexed and located, we can classify networks as
6073:
3957:
1522:
Bandara, H. M. N. D; A. P. Jayasumana (2012). "Collaborative Applications over Peer-to-Peer Systems – Challenges and Solutions".
486:
is used to assign ownership of each file to a particular peer. This enables peers to search for resources on the network using a
144:
in which interconnected nodes ("peers") share resources amongst each other without the use of a centralized administrative system
2888:
6106:
5882:
5677:
3640:
3670:
2379:
6365:
3607:
3246:
3212:
3088:
3013:
2939:
2707:
2642:
2487:
2445:
2340:
2238:
2175:
240:
radio. The concept has inspired new structures and philosophies in many areas of human interaction. In such social contexts,
3344:
5302:
5151:
3283:
1251:
applications have been involved in numerous legal cases, primarily in the United States, primarily over issues surrounding
1178:
resources shared by other nodes, but who do not share anything themselves (often referred to as the "freeloader problem").
89:
4958:
1118:
was built as a peer-to-peer operating system where machines can function as both servers and workstations simultaneously.
498:) pairs are stored in the DHT, and any participating node can efficiently retrieve the value associated with a given key.
5433:
2504:
1395:
1264:
1040:
887:
554:
61:
6355:
5852:
4968:
1589:
3692:
5907:
3770:
3679:
3298:
The Government of the Hong Kong Special Administrative Region, (2008). Peer-to-peer network. Retrieved from website:
2753:
2574:
2297:
2213:
2150:
2121:
2089:
2060:
2031:
2004:
1892:
1727:
1467:
928:
108:
3116:
2956:
2166:
Jin, Xing; Chan, S.-H. Gary (2010). "Unstructured Peer-to-Peer Network Architectures". In Shen; et al. (eds.).
68:
6507:
6360:
5098:
4275:
3805:
2201:
Peer-to-Peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers
355:
2649:
1314:, one of the largest broadband Internet providers in the United States, started blocking P2P applications such as
6643:
6063:
5144:
4990:
4854:
4448:
3851:
1911:
126:
3651:
3546:
3155:
931:, enables users to create anonymous and autonomous web portals that are distributed via a peer-to-peer network.
321:
model from the user or client perspective that offers a self-organizing approach to newsgroup servers. However,
6648:
6587:
6370:
4848:
4109:
3700:
3630:
1844:
1330:
46:
1337:, where an ISP stores the part of files most accessed by P2P clients in order to save access to the Internet.
75:
6490:
4952:
4767:
3952:
1507:
A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications
1021:
is a connection-sharing application that shares Internet access with other devices using Wi-Fi or Bluetooth.
920:
122:
42:
5398:
5373:
4126:
2544:
3509:
2268:
R. Ranjan, A. Harwood, and R. Buyya, "Peer-to-peer based resource discovery in global grids: a tutorial,"
969:
is not itself peer-to-peer; however, it can enable peer-to-peer applications to be built on top of it via
697:
network found that 15% of the 500,000 file sample taken were infected by one or more of the 365 different
6023:
5979:
5383:
4933:
4317:
4268:
4089:
1421:
1390:
1230:
998:
982:
589:
content, proposed by computer scientists Venkata N. Padmanabhan and Kunwadee Sripanidkulchai, working at
57:
2397:
1969:
6480:
6219:
6099:
4707:
4307:
3576:
3079:
Glorioso, Andrea; et al. (2010). "The Social Impact of P2P Systems". In Shen; et al. (eds.).
1946:"Practical Applications of Peer-to-Peer Networks in File Sharing and Content Distribution | SimpleSwap"
1362:
1068:
1014:
974:
594:
557:. DHT-based networks have also been widely utilized for accomplishing efficient resource discovery for
274:
While P2P systems had previously been used in many application domains, the concept was popularized by
852:
have been useful in popularizing peer-to-peer technologies. These advancements have paved the way for
439:
rates of "churn"—that is, when large numbers of peers are frequently joining and leaving the network.
6143:
6115:
5777:
5413:
4104:
3942:
3320:"Illegal downloads may not actually harm sales, but the European Union doesn't want you to know that"
1385:
1052:
837:
769:
643:
3319:
1071:
is conducting research on P2P networks as part of its modern network warfare strategy. In May 2003,
927:, aims to facilitate file sharing among educational institutions globally. Another notable program,
6617:
6472:
6013:
5917:
5887:
5582:
5360:
5259:
4908:
4462:
4249:
3533:
2323:
1660:
1137:
853:
6467:
3590:
2850:
2272:, vol. 10, no. 2. and P. Trunfio, "Peer-to-Peer resource discovery in Grids: Models and systems,"
6008:
5877:
5747:
5463:
4757:
4732:
3460:
Ihle, Cornelius; Trautwein, Dennis; Schubotz, Moritz; Meuschke, Norman; Gipp, Bela (2023-01-24).
2479:
Structured P2P Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
1446:
1207:
990:
978:
924:
744:
314:
206:
184:
172:
156:
35:
2626:
2620:
455:
6567:
6128:
6035:
6028:
5867:
5794:
5642:
4834:
4737:
4633:
4203:
3622:
2845:
2318:
2205:
2199:
1719:
1119:
479:
464:
364:
301:-like structure of the web as it has developed over the years. As a precursor to the Internet,
2741:
2562:
2435:
2048:
2021:
1994:
601:
experiences an increase in load it redirects incoming peers to other peers who have agreed to
6653:
6638:
6442:
6092:
6040:
5034:
5013:
4872:
4842:
4722:
4099:
4033:
3988:
3947:
3831:
3763:
3560:
3299:
3167:
2591:
2195:
2138:
2109:
2077:
1426:
1416:
1306:
738:
734:
614:' to its neighbors in an attempt to use locality. If multiple peers are found with the same
522:
229:
168:
159:
architecture that partitions tasks or workloads between peers. Peers are equally privileged,
5112:
4291:
408:
5248:
4866:
4860:
4777:
3826:
3795:
3708:
3685:
2829:
Balakrishnan, Hari; Kaashoek, M. Frans; Karger, David; Morris, Robert; Stoica, Ion (2003).
1541:
1509:, Proceedings of the First International Conference on Peer-to-Peer Computing, IEEE (2002).
1406:
1326:
1032:
908:
772:
that runs on a peer-to-peer network instead of making requests to centralized index servers
546:
383:
of the nodes in the physical network. Data is still exchanged directly over the underlying
283:
130:
2770:
82:
8:
6315:
5832:
5320:
5238:
5228:
5223:
5167:
5056:
3911:
3393:
3038:
2830:
1142:
807:, and the government are unable to delete or stop the sharing of content on P2P systems.
776:
There are both advantages and disadvantages in P2P networks related to the topic of data
330:
241:
3726:
1907:
Horton, Mark, and Rick Adams. "Standard for interchange of USENET messages." (1987): 1.
1545:
6607:
6347:
6244:
5822:
5627:
5617:
5008:
4782:
4528:
4477:
4156:
4094:
3901:
3790:
3491:
3263:"No country is free from child sexual abuse, exploitation, UN's top rights forum hears"
2979:
2863:
2398:"Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks"
2356:
1850:
1713:
1642:
1557:
1531:
1298:
1127:
1099:
1084:
1044:
962:
858:
598:
590:
483:
213:
195:
189:
2998:
2742:"Measurement and Analysis of Autonomous Spreading Malware in a University Environment"
6612:
6406:
6375:
5590:
5471:
5218:
5203:
5023:
4772:
4752:
4717:
4689:
4554:
4419:
4327:
4048:
4003:
3675:
3626:
3495:
3483:
3430:
3280:
3242:
3208:
3084:
3056:
3009:
2935:
2896:
2749:
2703:
2638:
2570:
2483:
2441:
2414:
2336:
2293:
2234:
2209:
2171:
2146:
2117:
2085:
2056:
2027:
2000:
1888:
1840:
1802:
1733:
1723:
1634:
1595:
1585:
1579:
1322:
1170:
743:
The decentralized nature of P2P networks increases robustness because it removes the
722:
659:
635:
610:, hence its server-centric design. It assigns peers to other peers who are 'close in
388:
360:
318:
202:
164:
3637:
2983:
1646:
1561:
1371:
201:
Peers make a portion of their resources, such as processing power, disk storage, or
6535:
6530:
6123:
5562:
4888:
4811:
4806:
4567:
4549:
4490:
4406:
4239:
4162:
3906:
3866:
3756:
3513:
3473:
2971:
2927:
2867:
2855:
2630:
2536:
Ranjan, Rajiv; Chan, Lipo; Harwood, Aaron; Karunasekera, Shanika; Buyya, Rajkumar.
2376:
2328:
1880:
1854:
1832:
1777:
1685:
1626:
1581:
Peer-to-peer computing : technologies for sharing and collaborating on the net
1549:
1411:
1123:
698:
263:
3861:
3604:
2678:
1879:. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. pp. 9–16.
1329:, several P2P applications started implementing protocol obfuscation, such as the
297:
each other without firewalls and other security measures. This contrasts with the
6437:
6401:
6179:
5812:
5742:
5671:
5637:
5622:
5534:
5501:
5476:
4667:
4644:
4533:
4523:
4442:
4400:
4178:
4134:
3973:
3881:
3737:
3733:
3715:
3696:
3658:
3644:
3611:
3597:
3583:
3540:
3306:
3287:
3162:
2810:
Lua, Eng Keong; Crowcroft, Jon; Pias, Marcelo; Sharma, Ravi; Lim, Steven (2005).
2666:
2656:
2477:
2383:
2363:
1996:
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
1915:
1431:
1376:
1215:
1048:
994:
958:
849:
672:
647:
619:
428:
376:
289:
6380:
3462:"Incentive Mechanisms in Peer-to-Peer Networks — A Systematic Literature Review"
2395:
2332:
1875:
Steinmetz, Ralf; Wehrle, Klaus (2005). "2. What Is This "Peer-to-Peer" About?".
1829:
Proceedings of the tenth ACM symposium on Access control models and technologies
6452:
6174:
5572:
5368:
4742:
4699:
4683:
4609:
4538:
4412:
4358:
4216:
4193:
3983:
3841:
3821:
3517:
3419:
3262:
2919:
2287:
1281:
1087:
1072:
970:
950:
761:
558:
379:
on top of the physical network topology, where the nodes in the overlay form a
293:
248:
2975:
2511:
1765:
1630:
1553:
712:
managed to introduce faked chunks into downloads and downloaded files (mostly
6632:
6602:
6582:
6577:
6545:
6515:
6447:
6432:
6018:
5817:
5491:
4944:
4800:
4628:
4469:
4013:
3926:
3886:
3871:
3487:
3434:
2931:
2659:
2634:
2110:"P2P Streaming Over Cellular Networks: Issues, Challenges, and Opportunities"
1825:"Peer-to-peer access control architecture using trusted computing technology"
1737:
1638:
1441:
1436:
1219:
1028:
1006:
824:
as more users begin to access the content (especially with protocols such as
615:
538:
341:
6084:
5802:
1836:
1614:
1599:
6234:
5757:
5378:
5312:
5175:
4973:
4747:
4727:
4605:
4509:
4455:
4340:
4221:
4069:
4064:
3916:
3689:
2023:
Streaming Media Architectures: Techniques and Applications: Recent Advances
1615:"Measuring and analyzing the characteristics of Napster and Gnutella hosts"
1024:
943:
862:
561:
systems, as it aids in resource management and scheduling of applications.
530:
334:
298:
275:
6476:
2859:
2538:"Decentralised Resource Discovery Service for Large Scale Federated Grids"
2437:
An Efficient, Scalable, and Robust P2P Overlay for Autonomic Communication
2357:
Novel Architectures for P2P Applications: the Continuous-Discrete Approach
1908:
1824:
689:
network contained some form of malware, whereas only 3% of the content on
6572:
6540:
6457:
6295:
6254:
6224:
5847:
5767:
5712:
5632:
5136:
5018:
5000:
4762:
4578:
4501:
4426:
4211:
3993:
3896:
1334:
1289:
Pains were taken to remove effects of false and misremembered responses.
1237:
have used peer-to-peer platforms to carry out activities with anonymity.
1234:
1223:
1095:
1018:
966:
912:
602:
585:
was a proposed system for off-loading serving to peers who have recently
526:
443:
causes a very high amount of signaling traffic in the network, uses more
322:
245:
1493:"Why personal area networks are the best thing to happen to hotel Wi-Fi"
6385:
6325:
6264:
6249:
6239:
6169:
5953:
5897:
5827:
5702:
5697:
5647:
5612:
5605:
5567:
5557:
5496:
5282:
5193:
5183:
5092:
4978:
4963:
4925:
4661:
4562:
4484:
4436:
4431:
4394:
4346:
3978:
3876:
3846:
2286:
Kelaskar, M.; Matossian, V.; Mehra, P.; Paul, D.; Parashar, M. (2002).
2078:"A Survey of Structured P2P Systems for RDF Data Storage and Retrieval"
1884:
1315:
1305:) have been known to throttle P2P file-sharing traffic due to its high-
1211:
1164:
1131:
1111:
1103:
1091:
1080:
1064:
986:
825:
718:
611:
487:
337:
and their direct connections is strictly a client-server relationship.
225:
178:
160:
3510:"Free-rider detection and punishment in BitTorrent based P2P networks"
2505:"A Study on Peer-to-Peer Based Discovery of Grid Resource Information"
1613:
Saroiu, Stefan; Gummadi, Krishna P.; Gribble, Steven D. (2003-08-01).
1051:
capable of supporting many different types of applications, primarily
6209:
6184:
5784:
5772:
5762:
5727:
5692:
5687:
5600:
5506:
5408:
5340:
5277:
5188:
4984:
4878:
4823:
4260:
3891:
3836:
3577:
Vulnerabilities of P2P systems and a critical look at their solutions
2317:. Lecture Notes in Computer Science. Vol. 2735. pp. 33–44.
1781:
1252:
1203:
1115:
1107:
1056:
1010:
915:
is employed for multicasting streams. Additionally, a project called
875:
845:
705:
623:
267:
237:
224:, originally released in 1999. P2P is used in many protocols such as
3478:
3461:
1158:
24:
6411:
6310:
6204:
6194:
6153:
6148:
5969:
5943:
5872:
5732:
5722:
5707:
5652:
5529:
5481:
5448:
5423:
5403:
5388:
5233:
5198:
5074:
4902:
4896:
4712:
4590:
4388:
4188:
4183:
3921:
2434:
Li, Deng; et al. (2009). Vasilakos, A.V.; et al. (eds.).
1928:
1273:
1257:
1060:
1027:
is a directory-syncing app. Research includes projects such as the
880:
841:
686:
639:
626:
the previous stream, and then transmit it piece-wise to new nodes.
586:
542:
424:
252:
233:
217:
3370:"EU study finds piracy doesn't hurt game sales, may actually help"
2724:"Malware Propagation Modelling in Peer-to-Peer Networks: A Review"
2503:
Ranjan, Rajiv; Harwood, Aaron; Buyya, Rajkumar (1 December 2006).
1536:
756:
6525:
6520:
6484:
6462:
6320:
6279:
6259:
5992:
5987:
5938:
5752:
5486:
5453:
5443:
5418:
5350:
5330:
5272:
5213:
5207:
5122:
5080:
5068:
5062:
5050:
5028:
4817:
4792:
4655:
4623:
4595:
4572:
4363:
4173:
3856:
3779:
3534:
P2P-VoD Streaming: Design Issues & User Experience Challenges
2812:"A survey and comparison of peer-to-peer overlay network schemes"
1311:
1199:
1195:
1153:
784:
682:
676:
618:
it designates that the node choose the fastest of its neighbors.
570:
416:, illustrating the ad hoc nature of the connections between nodes
302:
279:
221:
3603:
Biddle, Peter, Paul England, Marcus Peinado, and Bryan Willman,
3189:
3187:
2828:
2229:
Shen, Xuemin; Yu, Heather; Buford, John; Akon, Mursalin (2009).
2114:
Building Next-Generation Converged Networks: Theory and Practice
1297:
Peer-to-peer applications present one of the core issues in the
1245:
989:
distribution protocol, with nodes in the IPFS network forming a
939:
6427:
6300:
6199:
6045:
5892:
5438:
5393:
5345:
5297:
5117:
5086:
4914:
4649:
4639:
4584:
4517:
4018:
2396:
Byung-Gon Chun, Ben Y. Zhao, John D. Kubiatowicz (2005-02-24).
1079:, testified that the United States military uses P2P networks.
1067:
applications are designed to power real-time marketplaces. The
1036:
777:
690:
550:
518:
384:
380:
375:
Peer-to-peer networks generally implement some form of virtual
310:
163:
participants in the network, forming a peer-to-peer network of
2622:
The Case for Cooperative Networking (PostScript with addendum)
1870:
1868:
1866:
1864:
1715:
Peer-to-peer: harnessing the benefits of disruptive technology
907:
protocols are used in various peer-to-peer applications. Some
353:
A peer-to-peer network is designed around the notion of equal
209:
in which the consumption and supply of resources are divided.
136:
6597:
6592:
6330:
6305:
6274:
6269:
6189:
5948:
5922:
5862:
5837:
5595:
5539:
5524:
5428:
5335:
5292:
5287:
5267:
4617:
4369:
4352:
4335:
4168:
4023:
3459:
3184:
2797:
Anonymous File Sharing in Peer to Peer System by Random Walks
1076:
900:
694:
432:
3671:
Peer-to-Peer Computing: Evolution of a Disruptive Technology
3636:
Djamal-Eddine Meddour, Mubashar Mushtaq, and Toufik Ahmed, "
2463:
IEEE Consumer Communications and Networking Conf. (CCNC '12)
2312:
2289:
A Study of Discovery Mechanisms for Peer-to-Peer Application
478:
The most common type of structured P2P networks implement a
6229:
5737:
5516:
4380:
2999:"The scalability of swarming peer-to-peer content delivery"
2619:
Padmanabhan, Venkata N.; Sripanidkulchai, Kunwadee (2002).
1861:
1302:
1002:
904:
804:
800:
792:
788:
765:
728:
709:
534:
329:
email in the sense that the core email-relaying network of
326:
3748:
3591:
A survey of peer-to-peer content distribution technologies
3589:
Stephanos Androutsellis-Theotokis and Diomidis Spinellis.
3300:
http://www.infosec.gov.hk/english/technical/files/peer.pdf
2618:
2285:
1226:
protocols (e.g. Tarzan) can be used to provide anonymity.
16:
Type of decentralized and distributed network architecture
6214:
5807:
5717:
5325:
2535:
954:
953:
is a distributed version-controlled publishing platform.
713:
607:
501:
444:
3394:"What is bandwidth throttling? How to stop it | NordVPN"
2918:
Sharma, Parul; Bhakuni, Anuja; Kaushal, Rishabh (2013).
2256:"Overview of Structured Peer-to-Peer Overlay Algorithms"
340:
In May 1999, with millions more people on the Internet,
3663:
P2P Computing: The Evolution of a Disruptive Technology
3345:"Does Video Game Piracy Actually Result in More Sales?"
2693:
2691:
2689:
1521:
1218:, authorization, and authentication for data/messages.
3600:. ACM Computing Surveys, 36(4):335–371, December 2004.
2809:
2744:. In Hämmerli, Bernhard Markus; Sommer, Robin (eds.).
1970:"Overlay Network - an overview | ScienceDirect Topics"
577:
3512:, International Advanced Computing Conference, 2014.
2159:
1360:
553:, a self-organized and emerging overlay network, and
333:
has a peer-to-peer character, while the periphery of
182:
The opposite of a peer-to-peer network: based on the
3682:, Idea Group Inc., Hershey, PA, United States, 2005.
2917:
2686:
2139:"Peer-to-peer Approaches to Grid Resource Discovery"
1612:
175:
peer-to-peer network typically between two devices.
3239:
Peer-to-Peer Computing: Principles and Applications
3205:
Peer-to-Peer Computing: Principles and Applications
2799:(Technical report). SRM University. 123456789/9306.
2700:
Peer-to-Peer Computing: Principles and Applications
2386:. Ph. D. Thesis (Stanford University), August 2004.
634:Peer-to-peer systems pose unique challenges from a
517:Notable distributed networks that use DHTs include
212:While P2P systems had previously been used in many
49:. Unsourced material may be challenged and removed.
5127:*Maintains additional presence on the surface web
3605:The Darknet and the Future of Content Distribution
2771:"Software Bullet Is Sought to Kill Musical Piracy"
2502:
717:security and file verification mechanisms. Modern
3281:http://www.ftc.gov/reports/p2p05/050623p2prpt.pdf
2803:
2589:
2460:
2233:(1st ed.). New York: Springer. p. 118.
2136:
2080:. In Hameurlain, Abdelkader; et al. (eds.).
1573:
1571:
751:
370:
6630:
3446:
3444:
3171:, 11 October 2017, Retrieved on 4 February 2019.
3102:
3100:
2924:2013 National Conference on Communications (NCC)
2476:Korzun, Dmitry; Gurtov, Andrei (November 2012).
2228:
1754:, S. Crocker, IETF Working Group (April 7, 1969)
251:that has emerged throughout society, enabled by
194:request services and resources from centralized
2254:Dhara, Krishna; Kolberg, Mario (January 2010).
1874:
1707:
1705:
1102:standalone version that bridges WebTorrent and
537:. Some prominent research projects include the
3690:Advanced Peer-Based Technology Business Models
3652:Core Concepts in Peer-to-Peer (P2P) Networking
3616:2002 ACM Workshop on Digital Rights Management
2049:"Optimal Topology Design for Overlay Networks"
1993:Ahson, Syed A.; Ilyas, Mohammad, eds. (2008).
1803:"The World Wide Web: Past, Present and Future"
1568:
1154:Incentivizing resource sharing and cooperation
1017:designed to be independent from the Internet.
278:systems such as the music-sharing application
6114:
6100:
5152:
4276:
3764:
3441:
3420:"Breaking and Improving Protocol Obfuscation"
3418:Hjelmvik, Erik; John, Wolfgang (2010-07-27).
3386:
3097:
2920:"Performance analysis of BitTorrent protocol"
2660:PDF (Springer, original, fee may be required)
2590:Yang, Beverly; Garcia-Molina, Hector (2001).
1246:Intellectual property law and illegal sharing
985:, peer-to-peer method of storing and sharing
666:
435:are examples of unstructured P2P protocols).
3668:Ramesh Subramanian and Brian Goodman (eds),
3661:". In: Subramanian, R.; Goodman, B. (eds.):
3417:
3106:
2565:. In Steinmetz, Ralf; Wehrle, Klaus (eds.).
2560:
2475:
2419:: CS1 maint: multiple names: authors list (
2253:
1702:
1490:
1005:is a peer-to-peer protocol designed for the
467:(DHT) to identify and locate nodes/resources
3074:
3072:
2141:. In Danelutto, Marco; et al. (eds.).
1822:
1800:
6107:
6093:
5166:
5159:
5145:
4303:
4283:
4269:
3771:
3757:
3621:John F. Buford, Heather Yu, Eng Keong Lua
3532:Ghosh Debjani, Rajan Payas, Pandey Mayank
2794:
2198:. In Druschel, Peter; et al. (eds.).
2189:
2187:
2137:Chervenak, Ann; Bharathi, Shishir (2008).
2108:Zulhasnine, Mohammed; et al. (2013).
2107:
1992:
1766:"Internet security enters the Middle Ages"
868:
216:, the architecture was popularized by the
3742:Max Planck Institute for Software Systems
3721:Harvard Business School Working Knowledge
3477:
3004:. In Boutaba, Raouf; et al. (eds.).
2996:
2849:
2322:
2196:"Can Heterogeneity Make Gnutella Stable?"
1950:SimpleSwap | Cryptocurrency exchange blog
1535:
1301:controversy. Internet service providers (
1240:
934:
109:Learn how and when to remove this message
3411:
3078:
3069:
2964:Peer-to-Peer Networking and Applications
2957:"On peer-to-peer (P2P) content delivery"
2377:Dipsea: A Modular Distributed Hash Table
2292:. IEEE Computer Society. pp. 444–.
1763:
1524:Peer-to-Peer Networking and Applications
1402:Distributed Data Management Architecture
1189:
1157:
938:
832:
755:
729:Resilient and scalable computer networks
500:
454:
407:
403:
262:
177:
135:
3958:List of people in blockchain technology
3709:Music Downloads: Pirates- or Customers?
3638:Open Issues in P2P Multimedia Streaming
3343:Polgar, David Ryan (October 15, 2017).
3317:
2997:Stutzbach, Daniel; et al. (2005).
2592:"Comparing Hybrid Peer-to-Peer Systems"
2306:
2184:
2165:
1934:. SWAMI VIVEKANAND SUBHARTI UNIVERSITY.
1909:https://www.hjp.at/doc/rfc/rfc1036.html
6631:
6506:
4290:
3367:
3342:
3154:Hammerksjold Andreas; Engler, Narkis,
3129:
3109:"Judge: File-Swapping Tools are Legal"
3061:: CS1 maint: archived copy as title (
2768:
2739:
2075:
1577:
1517:
1515:
1468:"What's a Peer-to-Peer (P2P) Network?"
1148:
854:Peer-to-peer content delivery networks
450:
228:file sharing over the Internet and in
6088:
5140:
4264:
3752:
3156:"Delivery Optimization - a deep dive"
2567:Peer-to-Peer Systems and Applications
2103:
2101:
2046:
1999:. Taylor & Francis. p. 204.
1877:Peer-to-Peer Systems and Applications
1292:
629:
6069:
4245:
3558:
3553:Foundation of Peer-to-Peer Computing
2795:Singh, Vivek; Gupta, Himani (2012).
1711:
1661:"What Is BitTorrent and Is It Safe?"
1465:
638:perspective. Like any other form of
47:adding citations to reliable sources
18:
3650:Detlef Schoder and Kai Fischbach, "
3368:Orland, Kyle (September 26, 2017).
3081:Handbook of Peer-to-Peer Networking
2276:archive, vol. 23, no. 7, Aug. 2007.
2231:Handbook of Peer-to-Peer Networking
2168:Handbook of Peer-to-Peer Networking
2020:Zhu, Ce; et al., eds. (2010).
2019:
1512:
1396:Cultural-historical activity theory
1340:
1265:MGM Studios, Inc. v. Grokster, Ltd.
1041:CoopNet content distribution system
888:MGM Studios, Inc. v. Grokster, Ltd.
815:
578:CoopNet content distribution system
555:CoopNet content distribution system
13:
3237:Vu, Quang H.; et al. (2010).
3236:
3203:Vu, Quang H.; et al. (2010).
3202:
2954:
2769:Sorkin, Andrew Ross (4 May 2003).
2698:Vu, Quang H.; et al. (2010).
2697:
2433:
2274:Future Generation Computer Systems
2193:
2098:
2076:Filali, Imen; et al. (2011).
1926:
981:and network designed to create a
653:
421:Unstructured peer-to-peer networks
400:(or as a hybrid between the two).
171:(PAN) is also in nature a type of
14:
6670:
3525:
2740:Goebel, Jan; et al. (2007).
2679:"CoopNet: Cooperative Networking"
2112:. In Pathan; et al. (eds.).
2047:Kamel, Mina; et al. (2007).
1194:Some peer-to-peer networks (e.g.
1059:is also a directory-syncing app.
622:is transmitted by having clients
317:of control. The basic model is a
6659:Software engineering terminology
6068:
6059:
6058:
4313:
4312:
4302:
4244:
4235:
4234:
3633:, Morgan Kaufmann, December 2008
3575:Marling Engle & J. I. Khan.
2831:"Looking up data in P2P systems"
1801:Berners-Lee, Tim (August 1996).
1370:
583:CoopNet (Cooperative Networking)
564:
473:structured peer-to-peer networks
23:
4855:Freedom of the Press Foundation
4449:Radio Free Europe/Radio Liberty
3665:, Idea Group Inc, Hershey. 2005
3623:P2P Networking and Applications
3543:Springer Proceedings, June 2014
3508:A Bhakuni, P Sharma, R Kaushal
3502:
3453:
3361:
3336:
3311:
3292:
3273:
3255:
3230:
3221:
3196:
3174:
3148:
3123:
3107:John Borland (April 25, 2003).
3022:
2990:
2948:
2911:
2881:
2822:
2788:
2762:
2733:
2716:
2671:
2612:
2583:
2561:Darlagiannis, Vasilios (2005).
2554:
2529:
2496:
2469:
2454:
2427:
2389:
2369:
2349:
2279:
2262:
2247:
2222:
2130:
2069:
2040:
2013:
1986:
1962:
1938:
1920:
1901:
1816:
1794:
1757:
1744:
1284:found that illegal downloading
810:
642:, P2P applications can contain
412:Overlay network diagram for an
348:
155:) computing or networking is a
127:Point-to-point (disambiguation)
34:needs additional citations for
6588:BitTorrent protocol encryption
4849:Electronic Frontier Foundation
4110:2020 Twitter account hijacking
3701:MIT Sloan School of Management
3318:Sanders, Linley (2017-09-22).
3241:. Springer. pp. 179–181.
2895:. 14 June 2012. Archived from
2650:PDF (Microsoft, with addendum)
1823:Sandhu, R.; Zhang, X. (2005).
1678:
1653:
1606:
1584:. Hillsboro, OR: Intel Press.
1499:
1484:
1459:
1331:BitTorrent protocol encryption
965:. Unlike the related I2P, the
760:Search results for the query "
752:Distributed storage and search
459:Overlay network diagram for a
371:Routing and resource discovery
258:
1:
5099:Terms of Service; Didn't Read
4953:Distributed Denial of Secrets
4768:Russian Anonymous Marketplace
3953:List of bitcoin organizations
3130:Walker, Leslie (2001-11-08).
2563:"Hybrid Peer-to-Peer Systems"
2194:Lv, Qin; et al. (2002).
2051:. In Akyildiz, Ian F. (ed.).
1491:Desire Athow (12 July 2016).
1453:
921:Pennsylvania State University
894:
482:(DHT), in which a variant of
123:Peer-to-peer (disambiguation)
4127:The Rise and Rise of Bitcoin
3008:. Springer. pp. 15–26.
1198:) place a heavy emphasis on
997:is a peer-to-peer chat and
961:used to browse the Internet
7:
6024:Cryptographic hash function
4934:Central Intelligence Agency
4090:Bitcoin scalability problem
3778:
2333:10.1007/978-3-540-45172-3_3
2026:. IGI Global. p. 265.
1422:Peer-to-peer energy trading
1356:
1231:live streaming sexual abuse
10:
6675:
3518:10.1109/IAdCC.2014.6779311
3132:"Uncle Sam Wants Napster!"
2355:Moni Naor and Udi Wieder.
1929:"CLIENT SERVER TECHNOLOGY"
1712:Oram, Andrew, ed. (2001).
1466:Cope, James (2002-04-08).
1069:U.S. Department of Defense
1015:Wireless community network
975:InterPlanetary File System
787:has been pressured by the
732:
670:
667:Corrupted data and malware
595:Carnegie Mellon University
142:peer-to-peer (P2P) network
120:
6558:
6499:
6420:
6394:
6343:
6288:
6162:
6136:
6122:
6116:Peer-to-peer file sharing
6054:
6001:
5978:
5962:
5931:
5906:
5846:
5793:
5670:
5581:
5548:
5515:
5462:
5359:
5311:
5258:
5247:
5174:
5108:
5043:
4999:
4943:
4924:
4887:
4833:
4791:
4698:
4676:
4604:
4548:
4500:
4379:
4326:
4298:
4230:
4202:
4145:
4118:
4105:2018 Bitcoin bomb threats
4100:2018 cryptocurrency crash
4082:
4057:
4041:
4032:
3966:
3943:List of bitcoin companies
3935:
3814:
3786:
3207:. Springer. p. 172.
2976:10.1007/s12083-007-0003-1
2838:Communications of the ACM
2748:. Springer. p. 112.
2440:. Springer. p. 329.
2170:. Springer. p. 119.
2116:. CRC Press. p. 99.
2055:. Springer. p. 714.
1631:10.1007/s00530-003-0088-1
1554:10.1007/s12083-012-0157-3
1386:Client-to-client protocol
1255:law. Two major cases are
878:law. Two major cases are
861:and various games though
838:Peer-to-peer file sharing
770:distributed search engine
525:distributed tracker, the
255:technologies in general.
6618:Micro Transport Protocol
6014:Timeline of cryptography
4463:Independent Media Center
3083:. Springer. p. 48.
2932:10.1109/NCC.2013.6488040
2635:10.1007/3-540-45748-8_17
2145:. Springer. p. 67.
2084:. Springer. p. 21.
1138:List of cryptocurrencies
414:unstructured P2P network
270:was established in 1999.
6356:Advanced Direct Connect
6009:Outline of cryptography
5980:Anti–computer forensics
4835:Nonprofit organizations
2702:. Springer. p. 8.
2315:Peer-to-Peer Systems II
1837:10.1145/1063979.1064005
1447:Wireless ad hoc network
1280:A study ordered by the
1210:can be used to provide
1208:Public key cryptography
1126:are peer-to-peer-based
991:distributed file system
925:Simon Fraser University
869:Copyright infringements
745:single point of failure
505:Distributed hash tables
157:distributed application
6644:Peer-to-peer computing
6568:Distributed hash table
6443:Game and video sharing
6036:Homomorphic encryption
6029:List of hash functions
5168:Cryptographic software
4204:Bitcoin in El Salvador
3561:"The eternity service"
1720:Sebastopol, California
1578:Barkai, David (2001).
1241:Political implications
1174:
1120:Hotline Communications
947:
935:Other P2P applications
773:
701:that were tested for.
506:
480:distributed hash table
468:
465:distributed hash table
461:structured P2P network
417:
365:File Transfer Protocol
271:
242:peer-to-peer as a meme
198:
145:
6649:File sharing networks
6041:End-to-end encryption
4873:Privacy International
4843:Amnesty International
4723:Black Market Reloaded
3989:Cryptocurrency wallet
3948:List of bitcoin forks
3806:Environmental effects
3466:ACM Computing Surveys
2860:10.1145/606272.606299
2681:. Microsoft Research.
2599:Very Large Data Bases
2375:Gurmeet Singh Manku.
1974:www.sciencedirect.com
1764:Oppliger, R. (1995).
1505:Rüdiger Schollmeier,
1427:Semantic P2P networks
1417:List of P2P protocols
1190:Privacy and anonymity
1161:
1106:serverless networks.
942:
833:File-sharing networks
759:
739:Distributed computing
735:Wireless mesh network
504:
458:
411:
404:Unstructured networks
266:
181:
169:personal area network
139:
4867:La Quadrature du Net
4861:Front Line Defenders
3827:Andreas Antonopoulos
3706:Silverthorne, Sean.
3686:Shuman Ghosemajumder
2204:. Springer. p.
1831:. pp. 147–158.
1686:"האוניברסיטה הפתוחה"
1407:End-to-end principle
1327:bandwidth throttling
1098:, as well as in the
1033:PAST storage utility
547:PAST storage utility
521:, an alternative to
387:network, but at the
331:mail transfer agents
284:Request for Comments
220:file sharing system
131:P2P (disambiguation)
121:For other uses, see
43:improve this article
4738:The Farmer's Market
3136:The Washington Post
2366:. Proc. SPAA, 2003.
1546:2012arXiv1207.0790D
1391:Client–queue–client
1149:Social implications
1143:List of blockchains
1075:, then director of
983:content-addressable
451:Structured networks
315:decentralized model
214:application domains
207:client–server model
188:, where individual
185:client–server model
6608:BitTorrent tracker
5628:Facebook Messenger
4783:White House Market
4529:Free Haven Project
4478:The New York Times
4292:Tor onion services
4157:Bitcoin Foundation
4095:History of bitcoin
3902:Cameron Winklevoss
3732:2014-10-05 at the
3714:2006-06-30 at the
3695:2012-10-13 at the
3657:2011-09-15 at the
3643:2011-08-22 at the
3610:2011-07-27 at the
3596:2020-11-09 at the
3582:2007-06-15 at the
3559:Anderson, Ross J.
3549:of P2P terminology
3539:2017-02-19 at the
3305:2019-12-09 at the
3286:2012-11-01 at the
3161:2019-02-04 at the
2889:"Art thou a Peer?"
2683:Project home page.
2665:2023-01-01 at the
2655:2007-04-17 at the
2382:2004-09-10 at the
2362:2019-12-09 at the
2270:IEEE Commun. Surv.
1914:2021-06-12 at the
1885:10.1007/11530657_2
1619:Multimedia Systems
1299:network neutrality
1293:Network neutrality
1175:
1128:digital currencies
1100:WebTorrent Desktop
1047:is a peer-to-peer
1045:Secure Scuttlebutt
948:
859:Linux distribution
774:
723:chunk verification
681:The prevalence of
630:Security and trust
591:Microsoft Research
507:
484:consistent hashing
469:
418:
292:'s vision for the
272:
199:
146:
6626:
6625:
6613:UDP hole punching
6554:
6553:
6339:
6338:
6082:
6081:
5932:Service providers
5666:
5665:
5472:Check Point VPN-1
5134:
5133:
4889:Operating systems
4793:Document archives
4773:Tor Carding Forum
4753:Sheep Marketplace
4555:instant messaging
4420:The Daily Stormer
4258:
4257:
4150:
4078:
4077:
4049:Bitcoin Unlimited
4004:Lightning Network
3248:978-3-642-03513-5
3214:978-3-642-03513-5
3090:978-0-387-09750-3
3015:978-3-540-25809-4
2941:978-1-4673-5952-8
2899:on 6 October 2013
2709:978-3-642-03513-5
2644:978-3-540-44179-3
2489:978-1-4614-5482-3
2447:978-0-387-09752-7
2342:978-3-540-40724-9
2240:978-0-387-09750-3
2177:978-0-387-09750-3
1665:www.kaspersky.com
1053:social networking
840:networks such as
660:denial of service
636:computer security
389:application layer
249:social networking
230:personal networks
203:network bandwidth
167:. In addition, a
119:
118:
111:
93:
6666:
6536:Open music model
6531:Friend-to-friend
6504:
6503:
6468:Sharing software
6134:
6133:
6109:
6102:
6095:
6086:
6085:
6072:
6071:
6062:
6061:
5910:operating system
5908:Security-focused
5856:
5681:
5256:
5255:
5161:
5154:
5147:
5138:
5137:
5035:Welcome to Video
4812:Internet Archive
4807:Doxbin (darknet)
4491:Voice of America
4407:Die Tageszeitung
4316:
4315:
4306:
4305:
4285:
4278:
4271:
4262:
4261:
4248:
4247:
4238:
4237:
4163:Bitcoin Magazine
4148:
4039:
4038:
3907:Tyler Winklevoss
3867:Satoshi Nakamoto
3773:
3766:
3759:
3750:
3749:
3618:, November 2002.
3572:
3520:
3506:
3500:
3499:
3481:
3457:
3451:
3448:
3439:
3438:
3427:Technical Report
3424:
3415:
3409:
3408:
3406:
3405:
3390:
3384:
3383:
3381:
3380:
3365:
3359:
3358:
3356:
3355:
3340:
3334:
3333:
3331:
3330:
3315:
3309:
3296:
3290:
3277:
3271:
3270:
3269:. March 3, 2020.
3259:
3253:
3252:
3234:
3228:
3225:
3219:
3218:
3200:
3194:
3191:
3182:
3178:
3172:
3152:
3146:
3145:
3143:
3142:
3127:
3121:
3120:
3115:. Archived from
3104:
3095:
3094:
3076:
3067:
3066:
3060:
3052:
3050:
3049:
3043:
3037:. Archived from
3036:
3026:
3020:
3019:
3003:
2994:
2988:
2987:
2961:
2955:Li, Jin (2008).
2952:
2946:
2945:
2926:. pp. 1–5.
2915:
2909:
2908:
2906:
2904:
2885:
2879:
2878:
2876:
2874:
2853:
2835:
2826:
2820:
2819:
2814:. Archived from
2807:
2801:
2800:
2792:
2786:
2785:
2783:
2781:
2766:
2760:
2759:
2737:
2731:
2730:
2728:
2720:
2714:
2713:
2695:
2684:
2682:
2675:
2669:
2648:
2616:
2610:
2609:
2607:
2605:
2596:
2587:
2581:
2580:
2558:
2552:
2551:
2549:
2543:. Archived from
2542:
2533:
2527:
2526:
2524:
2522:
2516:
2510:. Archived from
2509:
2500:
2494:
2493:
2473:
2467:
2466:
2458:
2452:
2451:
2431:
2425:
2424:
2418:
2410:
2408:
2407:
2402:
2393:
2387:
2373:
2367:
2353:
2347:
2346:
2326:
2310:
2304:
2303:
2283:
2277:
2266:
2260:
2259:
2251:
2245:
2244:
2226:
2220:
2219:
2191:
2182:
2181:
2163:
2157:
2156:
2134:
2128:
2127:
2105:
2096:
2095:
2073:
2067:
2066:
2044:
2038:
2037:
2017:
2011:
2010:
1990:
1984:
1983:
1981:
1980:
1966:
1960:
1959:
1957:
1956:
1942:
1936:
1935:
1933:
1924:
1918:
1905:
1899:
1898:
1872:
1859:
1858:
1820:
1814:
1813:
1811:
1809:
1798:
1792:
1791:
1789:
1788:
1782:10.1109/2.467613
1761:
1755:
1748:
1742:
1741:
1709:
1700:
1699:
1697:
1696:
1682:
1676:
1675:
1673:
1672:
1657:
1651:
1650:
1610:
1604:
1603:
1575:
1566:
1565:
1539:
1519:
1510:
1503:
1497:
1496:
1488:
1482:
1481:
1479:
1478:
1463:
1412:Friend-to-friend
1375:
1374:
1366:
1341:Current research
1229:Perpetrators of
1124:Cryptocurrencies
919:, undertaken by
816:Content delivery
699:computer viruses
114:
107:
103:
100:
94:
92:
51:
27:
19:
6674:
6673:
6669:
6668:
6667:
6665:
6664:
6663:
6629:
6628:
6627:
6622:
6560:
6550:
6495:
6416:
6390:
6345:
6335:
6284:
6158:
6127:
6118:
6113:
6083:
6078:
6050:
5997:
5974:
5958:
5927:
5909:
5902:
5850:
5842:
5813:Java Anon Proxy
5789:
5675:
5674:
5672:Disk encryption
5662:
5638:Google Messages
5623:Signal Protocol
5577:
5544:
5511:
5458:
5355:
5307:
5250:
5243:
5170:
5165:
5135:
5130:
5104:
5039:
4995:
4939:
4920:
4883:
4829:
4787:
4700:Darknet markets
4694:
4672:
4668:The Hidden Wiki
4600:
4553:
4544:
4534:KickassTorrents
4524:Freedom Hosting
4508:
4496:
4443:Radio Free Asia
4401:Current Time TV
4375:
4322:
4294:
4289:
4259:
4254:
4226:
4198:
4179:Canaan Creative
4149:(not exchanges)
4147:
4141:
4114:
4074:
4053:
4028:
3974:Bitcoin network
3962:
3931:
3882:Vitalik Buterin
3832:Brian Armstrong
3810:
3782:
3777:
3747:
3738:traffic shaping
3734:Wayback Machine
3716:Wayback Machine
3697:Wayback Machine
3659:Wayback Machine
3645:Wayback Machine
3612:Wayback Machine
3598:Wayback Machine
3584:Wayback Machine
3541:Wayback Machine
3528:
3523:
3507:
3503:
3479:10.1145/3578581
3458:
3454:
3449:
3442:
3422:
3416:
3412:
3403:
3401:
3392:
3391:
3387:
3378:
3376:
3366:
3362:
3353:
3351:
3341:
3337:
3328:
3326:
3316:
3312:
3307:Wayback Machine
3297:
3293:
3288:Wayback Machine
3278:
3274:
3261:
3260:
3256:
3249:
3235:
3231:
3226:
3222:
3215:
3201:
3197:
3192:
3185:
3179:
3175:
3163:Wayback Machine
3153:
3149:
3140:
3138:
3128:
3124:
3105:
3098:
3091:
3077:
3070:
3054:
3053:
3047:
3045:
3041:
3034:
3032:"Archived copy"
3030:
3027:
3023:
3016:
3001:
2995:
2991:
2970:(1): 45–63 ≤≥.
2959:
2953:
2949:
2942:
2916:
2912:
2902:
2900:
2893:www.p2pnews.net
2887:
2886:
2882:
2872:
2870:
2833:
2827:
2823:
2808:
2804:
2793:
2789:
2779:
2777:
2767:
2763:
2756:
2738:
2734:
2726:
2722:
2721:
2717:
2710:
2696:
2687:
2677:
2676:
2672:
2667:Wayback Machine
2657:Wayback Machine
2645:
2617:
2613:
2603:
2601:
2594:
2588:
2584:
2577:
2559:
2555:
2547:
2540:
2534:
2530:
2520:
2518:
2514:
2507:
2501:
2497:
2490:
2474:
2470:
2459:
2455:
2448:
2432:
2428:
2412:
2411:
2405:
2403:
2400:
2394:
2390:
2384:Wayback Machine
2374:
2370:
2364:Wayback Machine
2354:
2350:
2343:
2311:
2307:
2300:
2284:
2280:
2267:
2263:
2258:. ResearchGate.
2252:
2248:
2241:
2227:
2223:
2216:
2192:
2185:
2178:
2164:
2160:
2153:
2135:
2131:
2124:
2106:
2099:
2092:
2074:
2070:
2063:
2045:
2041:
2034:
2018:
2014:
2007:
1991:
1987:
1978:
1976:
1968:
1967:
1963:
1954:
1952:
1944:
1943:
1939:
1931:
1925:
1921:
1916:Wayback Machine
1906:
1902:
1895:
1873:
1862:
1847:
1821:
1817:
1807:
1805:
1799:
1795:
1786:
1784:
1776:(10): 100–101.
1762:
1758:
1749:
1745:
1730:
1710:
1703:
1694:
1692:
1690:www.openu.ac.il
1684:
1683:
1679:
1670:
1668:
1659:
1658:
1654:
1611:
1607:
1592:
1576:
1569:
1520:
1513:
1504:
1500:
1489:
1485:
1476:
1474:
1464:
1460:
1456:
1451:
1432:Sharing economy
1381:
1369:
1361:
1359:
1343:
1295:
1248:
1243:
1216:data validation
1192:
1156:
1151:
1049:gossip protocol
959:overlay network
937:
897:
871:
850:eDonkey network
835:
818:
813:
754:
741:
731:
679:
673:Data validation
669:
656:
654:Routing attacks
648:remote exploits
644:vulnerabilities
632:
620:Streaming media
580:
567:
453:
406:
377:overlay network
373:
351:
345:restrictions".
290:Tim Berners-Lee
261:
236:displaying and
134:
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
6672:
6662:
6661:
6656:
6651:
6646:
6641:
6624:
6623:
6621:
6620:
6615:
6610:
6605:
6600:
6595:
6590:
6585:
6580:
6575:
6570:
6564:
6562:
6556:
6555:
6552:
6551:
6549:
6548:
6543:
6538:
6533:
6528:
6523:
6518:
6512:
6510:
6501:
6497:
6496:
6494:
6493:
6488:
6470:
6465:
6460:
6455:
6450:
6445:
6440:
6435:
6430:
6424:
6422:
6418:
6417:
6415:
6414:
6409:
6404:
6398:
6396:
6392:
6391:
6389:
6388:
6383:
6378:
6373:
6368:
6366:Direct Connect
6363:
6358:
6352:
6350:
6341:
6340:
6337:
6336:
6334:
6333:
6328:
6323:
6318:
6313:
6308:
6303:
6298:
6292:
6290:
6286:
6285:
6283:
6282:
6277:
6272:
6267:
6262:
6257:
6252:
6247:
6242:
6237:
6232:
6227:
6222:
6217:
6212:
6207:
6202:
6197:
6192:
6187:
6182:
6177:
6172:
6166:
6164:
6160:
6159:
6157:
6156:
6151:
6146:
6144:Direct Connect
6140:
6138:
6131:
6120:
6119:
6112:
6111:
6104:
6097:
6089:
6080:
6079:
6077:
6076:
6066:
6055:
6052:
6051:
6049:
6048:
6043:
6038:
6033:
6032:
6031:
6026:
6019:Hash functions
6016:
6011:
6005:
6003:
6002:Related topics
5999:
5998:
5996:
5995:
5990:
5984:
5982:
5976:
5975:
5973:
5972:
5966:
5964:
5960:
5959:
5957:
5956:
5951:
5946:
5941:
5935:
5933:
5929:
5928:
5926:
5925:
5920:
5914:
5912:
5904:
5903:
5901:
5900:
5895:
5890:
5885:
5880:
5875:
5870:
5865:
5859:
5857:
5844:
5843:
5841:
5840:
5835:
5830:
5825:
5820:
5815:
5810:
5805:
5799:
5797:
5791:
5790:
5788:
5787:
5782:
5781:
5780:
5770:
5765:
5760:
5755:
5750:
5745:
5740:
5735:
5730:
5725:
5720:
5715:
5710:
5705:
5700:
5695:
5690:
5684:
5682:
5668:
5667:
5664:
5663:
5661:
5660:
5657:
5656:
5655:
5650:
5645:
5640:
5635:
5630:
5620:
5615:
5610:
5609:
5608:
5603:
5593:
5587:
5585:
5579:
5578:
5576:
5575:
5570:
5565:
5560:
5554:
5552:
5546:
5545:
5543:
5542:
5537:
5532:
5527:
5521:
5519:
5513:
5512:
5510:
5509:
5504:
5499:
5494:
5489:
5484:
5479:
5474:
5468:
5466:
5460:
5459:
5457:
5456:
5451:
5446:
5441:
5436:
5431:
5426:
5421:
5416:
5411:
5406:
5401:
5396:
5391:
5386:
5381:
5376:
5371:
5369:BBM Enterprise
5365:
5363:
5357:
5356:
5354:
5353:
5348:
5343:
5338:
5333:
5328:
5323:
5317:
5315:
5309:
5308:
5306:
5305:
5300:
5295:
5290:
5285:
5280:
5275:
5270:
5264:
5262:
5253:
5245:
5244:
5242:
5241:
5236:
5231:
5226:
5221:
5216:
5211:
5201:
5196:
5191:
5186:
5180:
5178:
5172:
5171:
5164:
5163:
5156:
5149:
5141:
5132:
5131:
5129:
5128:
5125:
5120:
5115:
5109:
5106:
5105:
5103:
5102:
5096:
5090:
5084:
5078:
5072:
5066:
5060:
5054:
5047:
5045:
5041:
5040:
5038:
5037:
5032:
5026:
5021:
5016:
5011:
5005:
5003:
4997:
4996:
4994:
4993:
4988:
4982:
4976:
4971:
4966:
4961:
4956:
4949:
4947:
4945:Whistleblowing
4941:
4940:
4938:
4937:
4930:
4928:
4922:
4921:
4919:
4918:
4912:
4906:
4900:
4893:
4891:
4885:
4884:
4882:
4881:
4876:
4870:
4864:
4858:
4852:
4846:
4839:
4837:
4831:
4830:
4828:
4827:
4821:
4815:
4809:
4804:
4797:
4795:
4789:
4788:
4786:
4785:
4780:
4775:
4770:
4765:
4760:
4755:
4750:
4745:
4740:
4735:
4730:
4725:
4720:
4715:
4710:
4704:
4702:
4696:
4695:
4693:
4692:
4687:
4684:Blockchain.com
4680:
4678:
4674:
4673:
4671:
4670:
4665:
4659:
4653:
4647:
4642:
4637:
4631:
4626:
4621:
4614:
4612:
4602:
4601:
4599:
4598:
4593:
4588:
4582:
4576:
4570:
4565:
4559:
4557:
4546:
4545:
4543:
4542:
4539:The Pirate Bay
4536:
4531:
4526:
4521:
4514:
4512:
4498:
4497:
4495:
4494:
4488:
4482:
4474:
4466:
4460:
4452:
4446:
4440:
4434:
4429:
4424:
4416:
4413:Deutsche Welle
4410:
4404:
4398:
4392:
4385:
4383:
4377:
4376:
4374:
4373:
4367:
4361:
4356:
4350:
4344:
4338:
4332:
4330:
4328:Search engines
4324:
4323:
4321:
4320:
4310:
4299:
4296:
4295:
4288:
4287:
4280:
4273:
4265:
4256:
4255:
4253:
4252:
4242:
4231:
4228:
4227:
4225:
4224:
4219:
4214:
4208:
4206:
4200:
4199:
4197:
4196:
4191:
4186:
4181:
4176:
4171:
4166:
4159:
4153:
4151:
4146:Legal entities
4143:
4142:
4140:
4139:
4131:
4122:
4120:
4116:
4115:
4113:
4112:
4107:
4102:
4097:
4092:
4086:
4084:
4080:
4079:
4076:
4075:
4073:
4072:
4067:
4061:
4059:
4055:
4054:
4052:
4051:
4045:
4043:
4036:
4030:
4029:
4027:
4026:
4021:
4016:
4011:
4006:
4001:
3996:
3991:
3986:
3984:Cryptocurrency
3981:
3976:
3970:
3968:
3964:
3963:
3961:
3960:
3955:
3950:
3945:
3939:
3937:
3933:
3932:
3930:
3929:
3924:
3919:
3914:
3909:
3904:
3899:
3894:
3889:
3884:
3879:
3874:
3869:
3864:
3859:
3854:
3849:
3844:
3842:Wences Casares
3839:
3834:
3829:
3824:
3822:Gavin Andresen
3818:
3816:
3812:
3811:
3809:
3808:
3803:
3798:
3793:
3787:
3784:
3783:
3776:
3775:
3768:
3761:
3753:
3746:
3745:
3724:
3704:
3683:
3666:
3648:
3634:
3619:
3601:
3587:
3573:
3556:
3550:
3544:
3529:
3527:
3526:External links
3524:
3522:
3521:
3501:
3452:
3440:
3410:
3385:
3360:
3335:
3310:
3291:
3272:
3254:
3247:
3229:
3220:
3213:
3195:
3183:
3173:
3147:
3122:
3119:on 2012-03-10.
3096:
3089:
3068:
3021:
3014:
2989:
2947:
2940:
2910:
2880:
2821:
2818:on 2012-07-24.
2802:
2787:
2775:New York Times
2761:
2754:
2732:
2715:
2708:
2685:
2670:
2643:
2611:
2582:
2575:
2553:
2550:on 2008-09-10.
2528:
2517:on 14 May 2011
2495:
2488:
2468:
2453:
2446:
2426:
2388:
2368:
2348:
2341:
2324:10.1.1.12.5548
2305:
2298:
2278:
2261:
2246:
2239:
2221:
2214:
2183:
2176:
2158:
2151:
2129:
2122:
2097:
2090:
2068:
2061:
2039:
2032:
2012:
2005:
1985:
1961:
1937:
1927:Sharma, M. K.
1919:
1900:
1893:
1860:
1845:
1815:
1793:
1756:
1743:
1728:
1701:
1677:
1652:
1625:(2): 170–184.
1605:
1591:978-0970284679
1590:
1567:
1530:(3): 257–276.
1511:
1498:
1483:
1457:
1455:
1452:
1450:
1449:
1444:
1439:
1434:
1429:
1424:
1419:
1414:
1409:
1404:
1399:
1393:
1388:
1382:
1380:
1379:
1358:
1355:
1342:
1339:
1310:October 2007,
1294:
1291:
1282:European Union
1247:
1244:
1242:
1239:
1191:
1188:
1155:
1152:
1150:
1147:
1146:
1145:
1140:
1088:torrent client
1073:Anthony Tether
971:onion services
936:
933:
896:
893:
870:
867:
834:
831:
817:
814:
812:
809:
762:software libre
753:
750:
730:
727:
668:
665:
655:
652:
631:
628:
579:
576:
566:
563:
559:grid computing
452:
449:
405:
402:
372:
369:
350:
347:
294:World Wide Web
260:
257:
244:refers to the
117:
116:
58:"Peer-to-peer"
31:
29:
22:
15:
9:
6:
4:
3:
2:
6671:
6660:
6657:
6655:
6652:
6650:
6647:
6645:
6642:
6640:
6637:
6636:
6634:
6619:
6616:
6614:
6611:
6609:
6606:
6604:
6603:Super-seeding
6601:
6599:
6596:
6594:
6591:
6589:
6586:
6584:
6583:Peer exchange
6581:
6579:
6578:NAT traversal
6576:
6574:
6571:
6569:
6566:
6565:
6563:
6557:
6547:
6544:
6542:
6539:
6537:
6534:
6532:
6529:
6527:
6524:
6522:
6519:
6517:
6516:Anonymous P2P
6514:
6513:
6511:
6509:
6505:
6502:
6498:
6492:
6491:Legal aspects
6489:
6486:
6482:
6478:
6474:
6471:
6469:
6466:
6464:
6461:
6459:
6456:
6454:
6453:Music sharing
6451:
6449:
6448:Image sharing
6446:
6444:
6441:
6439:
6436:
6434:
6433:Broadcatching
6431:
6429:
6426:
6425:
6423:
6419:
6413:
6410:
6408:
6405:
6403:
6400:
6399:
6397:
6393:
6387:
6384:
6382:
6379:
6377:
6374:
6372:
6369:
6367:
6364:
6362:
6359:
6357:
6354:
6353:
6351:
6349:
6342:
6332:
6329:
6327:
6324:
6322:
6319:
6317:
6314:
6312:
6309:
6307:
6304:
6302:
6299:
6297:
6294:
6293:
6291:
6287:
6281:
6278:
6276:
6273:
6271:
6268:
6266:
6263:
6261:
6258:
6256:
6253:
6251:
6248:
6246:
6243:
6241:
6238:
6236:
6233:
6231:
6228:
6226:
6223:
6221:
6218:
6216:
6213:
6211:
6208:
6206:
6203:
6201:
6198:
6196:
6193:
6191:
6188:
6186:
6183:
6181:
6178:
6176:
6173:
6171:
6168:
6167:
6165:
6163:Decentralized
6161:
6155:
6152:
6150:
6147:
6145:
6142:
6141:
6139:
6135:
6132:
6130:
6125:
6121:
6117:
6110:
6105:
6103:
6098:
6096:
6091:
6090:
6087:
6075:
6067:
6065:
6057:
6056:
6053:
6047:
6044:
6042:
6039:
6037:
6034:
6030:
6027:
6025:
6022:
6021:
6020:
6017:
6015:
6012:
6010:
6007:
6006:
6004:
6000:
5994:
5991:
5989:
5986:
5985:
5983:
5981:
5977:
5971:
5968:
5967:
5965:
5961:
5955:
5952:
5950:
5947:
5945:
5942:
5940:
5937:
5936:
5934:
5930:
5924:
5921:
5919:
5916:
5915:
5913:
5911:
5905:
5899:
5896:
5894:
5891:
5889:
5886:
5884:
5881:
5879:
5876:
5874:
5871:
5869:
5866:
5864:
5861:
5860:
5858:
5854:
5849:
5845:
5839:
5836:
5834:
5831:
5829:
5826:
5824:
5821:
5819:
5816:
5814:
5811:
5809:
5806:
5804:
5801:
5800:
5798:
5796:
5792:
5786:
5783:
5779:
5776:
5775:
5774:
5771:
5769:
5766:
5764:
5761:
5759:
5756:
5754:
5751:
5749:
5746:
5744:
5741:
5739:
5736:
5734:
5731:
5729:
5726:
5724:
5721:
5719:
5716:
5714:
5711:
5709:
5706:
5704:
5701:
5699:
5696:
5694:
5691:
5689:
5686:
5685:
5683:
5679:
5673:
5669:
5658:
5654:
5651:
5649:
5646:
5644:
5641:
5639:
5636:
5634:
5631:
5629:
5626:
5625:
5624:
5621:
5619:
5616:
5614:
5611:
5607:
5604:
5602:
5599:
5598:
5597:
5594:
5592:
5589:
5588:
5586:
5584:
5580:
5574:
5571:
5569:
5566:
5564:
5561:
5559:
5556:
5555:
5553:
5551:
5547:
5541:
5538:
5536:
5533:
5531:
5528:
5526:
5523:
5522:
5520:
5518:
5514:
5508:
5505:
5503:
5500:
5498:
5495:
5493:
5492:SoftEther VPN
5490:
5488:
5485:
5483:
5480:
5478:
5475:
5473:
5470:
5469:
5467:
5465:
5461:
5455:
5452:
5450:
5447:
5445:
5442:
5440:
5437:
5435:
5432:
5430:
5427:
5425:
5422:
5420:
5417:
5415:
5412:
5410:
5407:
5405:
5402:
5400:
5397:
5395:
5392:
5390:
5387:
5385:
5382:
5380:
5377:
5375:
5374:Bouncy Castle
5372:
5370:
5367:
5366:
5364:
5362:
5361:TLS & SSL
5358:
5352:
5349:
5347:
5344:
5342:
5339:
5337:
5334:
5332:
5329:
5327:
5324:
5322:
5319:
5318:
5316:
5314:
5310:
5304:
5301:
5299:
5296:
5294:
5291:
5289:
5286:
5284:
5281:
5279:
5276:
5274:
5271:
5269:
5266:
5265:
5263:
5261:
5257:
5254:
5252:
5251:communication
5246:
5240:
5237:
5235:
5232:
5230:
5227:
5225:
5222:
5220:
5217:
5215:
5212:
5209:
5205:
5202:
5200:
5197:
5195:
5192:
5190:
5187:
5185:
5182:
5181:
5179:
5177:
5176:Email clients
5173:
5169:
5162:
5157:
5155:
5150:
5148:
5143:
5142:
5139:
5126:
5124:
5121:
5119:
5118:.onion domain
5116:
5114:
5111:
5110:
5107:
5100:
5097:
5094:
5091:
5088:
5085:
5082:
5079:
5076:
5073:
5070:
5067:
5064:
5061:
5058:
5055:
5052:
5049:
5048:
5046:
5042:
5036:
5033:
5030:
5027:
5025:
5022:
5020:
5017:
5015:
5012:
5010:
5007:
5006:
5004:
5002:
4998:
4992:
4989:
4986:
4983:
4980:
4977:
4975:
4972:
4970:
4967:
4965:
4962:
4960:
4957:
4954:
4951:
4950:
4948:
4946:
4942:
4935:
4932:
4931:
4929:
4927:
4923:
4916:
4913:
4910:
4907:
4904:
4901:
4898:
4895:
4894:
4892:
4890:
4886:
4880:
4877:
4874:
4871:
4868:
4865:
4862:
4859:
4856:
4853:
4850:
4847:
4844:
4841:
4840:
4838:
4836:
4832:
4825:
4822:
4819:
4816:
4813:
4810:
4808:
4805:
4802:
4801:Archive.today
4799:
4798:
4796:
4794:
4790:
4784:
4781:
4779:
4776:
4774:
4771:
4769:
4766:
4764:
4761:
4759:
4756:
4754:
4751:
4749:
4746:
4744:
4741:
4739:
4736:
4734:
4731:
4729:
4726:
4724:
4721:
4719:
4716:
4714:
4711:
4709:
4706:
4705:
4703:
4701:
4697:
4691:
4688:
4685:
4682:
4681:
4679:
4675:
4669:
4666:
4663:
4660:
4657:
4654:
4651:
4648:
4646:
4643:
4641:
4638:
4635:
4632:
4630:
4627:
4625:
4622:
4619:
4616:
4615:
4613:
4611:
4607:
4603:
4597:
4594:
4592:
4589:
4586:
4583:
4580:
4577:
4574:
4571:
4569:
4566:
4564:
4563:Bitmessage.ch
4561:
4560:
4558:
4556:
4551:
4547:
4540:
4537:
4535:
4532:
4530:
4527:
4525:
4522:
4519:
4516:
4515:
4513:
4511:
4507:
4503:
4499:
4492:
4489:
4486:
4483:
4480:
4479:
4475:
4472:
4471:
4470:The Intercept
4467:
4464:
4461:
4458:
4457:
4453:
4450:
4447:
4444:
4441:
4438:
4435:
4433:
4430:
4428:
4425:
4422:
4421:
4417:
4414:
4411:
4408:
4405:
4402:
4399:
4396:
4393:
4390:
4387:
4386:
4384:
4382:
4378:
4371:
4368:
4365:
4362:
4360:
4357:
4354:
4351:
4348:
4345:
4342:
4339:
4337:
4334:
4333:
4331:
4329:
4325:
4319:
4311:
4309:
4301:
4300:
4297:
4293:
4286:
4281:
4279:
4274:
4272:
4267:
4266:
4263:
4251:
4243:
4241:
4233:
4232:
4229:
4223:
4220:
4218:
4217:Bitcoin Beach
4215:
4213:
4210:
4209:
4207:
4205:
4201:
4195:
4192:
4190:
4187:
4185:
4182:
4180:
4177:
4175:
4172:
4170:
4167:
4165:
4164:
4160:
4158:
4155:
4154:
4152:
4144:
4137:
4136:
4132:
4129:
4128:
4124:
4123:
4121:
4117:
4111:
4108:
4106:
4103:
4101:
4098:
4096:
4093:
4091:
4088:
4087:
4085:
4081:
4071:
4068:
4066:
4063:
4062:
4060:
4056:
4050:
4047:
4046:
4044:
4040:
4037:
4035:
4031:
4025:
4022:
4020:
4017:
4015:
4014:Proof of work
4012:
4010:
4007:
4005:
4002:
4000:
3997:
3995:
3992:
3990:
3987:
3985:
3982:
3980:
3977:
3975:
3972:
3971:
3969:
3965:
3959:
3956:
3954:
3951:
3949:
3946:
3944:
3941:
3940:
3938:
3934:
3928:
3927:Erik Voorhees
3925:
3923:
3920:
3918:
3915:
3913:
3910:
3908:
3905:
3903:
3900:
3898:
3895:
3893:
3890:
3888:
3887:Ross Ulbricht
3885:
3883:
3880:
3878:
3875:
3873:
3872:Charlie Shrem
3870:
3868:
3865:
3863:
3862:Mark Karpelès
3860:
3858:
3855:
3853:
3850:
3848:
3845:
3843:
3840:
3838:
3835:
3833:
3830:
3828:
3825:
3823:
3820:
3819:
3817:
3813:
3807:
3804:
3802:
3799:
3797:
3794:
3792:
3789:
3788:
3785:
3781:
3774:
3769:
3767:
3762:
3760:
3755:
3754:
3751:
3743:
3739:
3735:
3731:
3728:
3725:
3722:
3718:
3717:
3713:
3710:
3705:
3702:
3698:
3694:
3691:
3687:
3684:
3681:
3680:1-59140-429-0
3677:
3673:
3672:
3667:
3664:
3660:
3656:
3653:
3649:
3646:
3642:
3639:
3635:
3632:
3628:
3624:
3620:
3617:
3613:
3609:
3606:
3602:
3599:
3595:
3592:
3588:
3585:
3581:
3578:
3574:
3570:
3566:
3562:
3557:
3554:
3551:
3548:
3545:
3542:
3538:
3535:
3531:
3530:
3519:
3515:
3511:
3505:
3497:
3493:
3489:
3485:
3480:
3475:
3472:(14s): 1–69.
3471:
3467:
3463:
3456:
3447:
3445:
3436:
3432:
3428:
3421:
3414:
3399:
3395:
3389:
3375:
3371:
3364:
3350:
3346:
3339:
3325:
3321:
3314:
3308:
3304:
3301:
3295:
3289:
3285:
3282:
3276:
3268:
3264:
3258:
3250:
3244:
3240:
3233:
3224:
3216:
3210:
3206:
3199:
3190:
3188:
3177:
3170:
3169:
3164:
3160:
3157:
3151:
3137:
3133:
3126:
3118:
3114:
3113:news.cnet.com
3110:
3103:
3101:
3092:
3086:
3082:
3075:
3073:
3064:
3058:
3044:on 2011-04-29
3040:
3033:
3025:
3017:
3011:
3007:
3000:
2993:
2985:
2981:
2977:
2973:
2969:
2965:
2958:
2951:
2943:
2937:
2933:
2929:
2925:
2921:
2914:
2898:
2894:
2890:
2884:
2869:
2865:
2861:
2857:
2852:
2851:10.1.1.5.3597
2847:
2843:
2839:
2832:
2825:
2817:
2813:
2806:
2798:
2791:
2776:
2772:
2765:
2757:
2755:9783540736134
2751:
2747:
2743:
2736:
2725:
2719:
2711:
2705:
2701:
2694:
2692:
2690:
2680:
2674:
2668:
2664:
2661:
2658:
2654:
2651:
2646:
2640:
2636:
2632:
2628:
2624:
2623:
2615:
2600:
2593:
2586:
2578:
2576:9783540291923
2572:
2568:
2564:
2557:
2546:
2539:
2532:
2513:
2506:
2499:
2491:
2485:
2481:
2480:
2472:
2464:
2457:
2449:
2443:
2439:
2438:
2430:
2422:
2416:
2399:
2392:
2385:
2381:
2378:
2372:
2365:
2361:
2358:
2352:
2344:
2338:
2334:
2330:
2325:
2320:
2316:
2309:
2301:
2299:9780769515823
2295:
2291:
2290:
2282:
2275:
2271:
2265:
2257:
2250:
2242:
2236:
2232:
2225:
2217:
2215:9783540441793
2211:
2207:
2203:
2202:
2197:
2190:
2188:
2179:
2173:
2169:
2162:
2154:
2152:9780387784489
2148:
2144:
2140:
2133:
2125:
2123:9781466507616
2119:
2115:
2111:
2104:
2102:
2093:
2091:9783642230738
2087:
2083:
2079:
2072:
2064:
2062:9783540726050
2058:
2054:
2050:
2043:
2035:
2033:9781616928339
2029:
2025:
2024:
2016:
2008:
2006:9781420066043
2002:
1998:
1997:
1989:
1975:
1971:
1965:
1951:
1947:
1941:
1930:
1923:
1917:
1913:
1910:
1904:
1896:
1894:9783540291923
1890:
1886:
1882:
1878:
1871:
1869:
1867:
1865:
1856:
1852:
1848:
1842:
1838:
1834:
1830:
1826:
1819:
1804:
1797:
1783:
1779:
1775:
1771:
1767:
1760:
1753:
1752:Host Software
1747:
1739:
1735:
1731:
1729:9780596001100
1725:
1721:
1717:
1716:
1708:
1706:
1691:
1687:
1681:
1666:
1662:
1656:
1648:
1644:
1640:
1636:
1632:
1628:
1624:
1620:
1616:
1609:
1601:
1597:
1593:
1587:
1583:
1582:
1574:
1572:
1563:
1559:
1555:
1551:
1547:
1543:
1538:
1533:
1529:
1525:
1518:
1516:
1508:
1502:
1494:
1487:
1473:
1472:Computerworld
1469:
1462:
1458:
1448:
1445:
1443:
1442:USB dead drop
1440:
1438:
1437:SponsorChange
1435:
1433:
1430:
1428:
1425:
1423:
1420:
1418:
1415:
1413:
1410:
1408:
1405:
1403:
1400:
1397:
1394:
1392:
1389:
1387:
1384:
1383:
1378:
1373:
1368:
1367:
1364:
1354:
1350:
1347:
1338:
1336:
1332:
1328:
1324:
1323:client–server
1319:
1317:
1313:
1308:
1304:
1300:
1290:
1287:
1283:
1278:
1275:
1269:
1267:
1266:
1261:
1259:
1254:
1238:
1236:
1232:
1227:
1225:
1221:
1220:Onion routing
1217:
1213:
1209:
1205:
1201:
1197:
1187:
1183:
1179:
1172:
1168:
1166:
1160:
1144:
1141:
1139:
1136:
1135:
1134:
1133:
1129:
1125:
1121:
1117:
1113:
1109:
1105:
1101:
1097:
1093:
1089:
1086:
1082:
1078:
1074:
1070:
1066:
1062:
1058:
1054:
1050:
1046:
1042:
1038:
1034:
1030:
1029:Chord project
1026:
1022:
1020:
1016:
1012:
1008:
1007:Java platform
1004:
1000:
996:
992:
988:
984:
980:
976:
972:
968:
964:
960:
956:
952:
946:connect peers
945:
941:
932:
930:
926:
922:
918:
914:
910:
906:
902:
892:
890:
889:
884:
882:
877:
866:
864:
860:
855:
851:
847:
843:
839:
830:
827:
823:
808:
806:
802:
796:
794:
790:
786:
783:For example,
781:
779:
771:
767:
763:
758:
749:
746:
740:
736:
726:
724:
720:
715:
711:
708:network, the
707:
702:
700:
696:
692:
688:
684:
678:
674:
664:
661:
651:
649:
645:
641:
637:
627:
625:
621:
617:
613:
609:
604:
600:
596:
592:
588:
584:
575:
572:
565:Hybrid models
562:
560:
556:
552:
548:
544:
540:
539:Chord project
536:
532:
528:
524:
520:
515:
513:
503:
499:
497:
493:
489:
485:
481:
476:
474:
466:
462:
457:
448:
446:
440:
436:
434:
430:
426:
422:
415:
410:
401:
399:
395:
390:
386:
382:
378:
368:
366:
362:
361:client–server
358:
357:
346:
343:
342:Shawn Fanning
338:
336:
335:Email clients
332:
328:
324:
320:
319:client–server
316:
312:
307:
304:
300:
295:
291:
287:
285:
281:
277:
269:
265:
256:
254:
250:
247:
243:
239:
235:
231:
227:
223:
219:
215:
210:
208:
204:
197:
193:
192:
187:
186:
180:
176:
174:
173:decentralized
170:
166:
162:
158:
154:
150:
143:
138:
132:
128:
124:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
6654:File sharing
6639:Peer-to-peer
6561:technologies
6438:Disk sharing
6245:Perfect Dark
5848:File systems
5758:Private Disk
5549:
4748:Hydra Market
4728:Dream Market
4606:Social media
4510:file sharing
4506:peer-to-peer
4505:
4502:File storage
4476:
4468:
4456:The Guardian
4454:
4418:
4341:Brave Search
4222:Bitcoin City
4161:
4133:
4125:
4070:Bitcoin Gold
4065:Bitcoin Cash
4008:
3967:Technologies
3917:Dave Kleiman
3912:Craig Wright
3801:Legal status
3707:
3669:
3662:
3615:
3568:
3564:
3504:
3469:
3465:
3455:
3426:
3413:
3402:. Retrieved
3400:. 2022-07-01
3397:
3388:
3377:. Retrieved
3374:Ars Technica
3373:
3363:
3352:. Retrieved
3348:
3338:
3327:. Retrieved
3323:
3313:
3294:
3275:
3266:
3257:
3238:
3232:
3223:
3204:
3198:
3176:
3166:
3150:
3139:. Retrieved
3135:
3125:
3117:the original
3112:
3080:
3046:. Retrieved
3039:the original
3024:
3005:
2992:
2967:
2963:
2950:
2923:
2913:
2901:. Retrieved
2897:the original
2892:
2883:
2871:. Retrieved
2844:(2): 43–48.
2841:
2837:
2824:
2816:the original
2805:
2796:
2790:
2778:. Retrieved
2774:
2764:
2745:
2735:
2718:
2699:
2673:
2621:
2614:
2602:. Retrieved
2598:
2585:
2569:. Springer.
2566:
2556:
2545:the original
2531:
2519:. Retrieved
2512:the original
2498:
2482:. Springer.
2478:
2471:
2462:
2456:
2436:
2429:
2404:. Retrieved
2391:
2371:
2351:
2314:
2308:
2288:
2281:
2273:
2269:
2264:
2249:
2230:
2224:
2200:
2167:
2161:
2142:
2132:
2113:
2081:
2071:
2052:
2042:
2022:
2015:
1995:
1988:
1977:. Retrieved
1973:
1964:
1953:. Retrieved
1949:
1940:
1922:
1903:
1876:
1828:
1818:
1806:. Retrieved
1796:
1785:. Retrieved
1773:
1769:
1759:
1751:
1746:
1722:: O'Reilly.
1714:
1693:. Retrieved
1689:
1680:
1669:. Retrieved
1667:. 2023-04-19
1664:
1655:
1622:
1618:
1608:
1580:
1527:
1523:
1506:
1501:
1486:
1475:. Retrieved
1471:
1461:
1351:
1348:
1344:
1320:
1296:
1285:
1279:
1270:
1263:
1256:
1249:
1228:
1193:
1184:
1180:
1176:
1162:
1096:web browsers
1025:Resilio Sync
1023:
977:(IPFS) is a
949:
944:Torrent file
898:
886:
879:
872:
863:file sharing
836:
821:
819:
811:Applications
797:
782:
775:
742:
703:
680:
657:
633:
582:
581:
568:
531:Storm botnet
523:BitTorrent's
516:
511:
508:
495:
491:
490:: that is, (
477:
472:
470:
460:
441:
437:
420:
419:
413:
397:
394:unstructured
393:
374:
354:
352:
349:Architecture
339:
323:news servers
308:
299:broadcasting
288:
276:file sharing
273:
211:
200:
190:
183:
152:
149:Peer-to-peer
148:
147:
141:
105:
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
6573:Merkle tree
6541:Private P2P
6473:Web hosting
6458:Peercasting
6344:Comparisons
6296:Audiogalaxy
6137:Centralized
5963:Educational
5768:Sentry 2020
5713:DriveSentry
5633:Google Allo
5239:Thunderbird
5019:Lolita City
5014:Childs Play
5001:Pornography
4974:NawaatLeaks
4763:TheRealDeal
4579:Proton Mail
4427:Darknetlive
4212:Bitcoin Law
4138:(2015 film)
4130:(2014 film)
3994:Bitcoin ATM
3897:Cody Wilson
3398:nordvpn.com
1335:P2P caching
1235:cybercrimes
1224:mix network
1132:blockchains
1094:for use in
1019:Open Garden
967:Tor network
963:anonymously
923:, MIT, and
913:Peercasting
909:proprietary
527:Kad network
309:Therefore,
259:Development
246:egalitarian
99:August 2024
6633:Categories
6395:Hyperlinks
6386:WebTorrent
6361:BitTorrent
6265:WebTorrent
6250:Retroshare
6240:OnionShare
6170:BitTorrent
5954:NordLocker
5898:Tahoe-LAFS
5888:Rubberhose
5828:RetroShare
5703:Cryptoloop
5698:CrossCrypt
5678:Comparison
5648:TextSecure
5606:ChatSecure
5568:RetroShare
5558:Bitmessage
5497:strongSwan
5283:ChatSecure
5194:Claws Mail
5184:Apple Mail
5093:OnionShare
4979:SecureDrop
4964:GlobaLeaks
4926:Government
4662:Kiwi Farms
4485:ProPublica
4437:ProPublica
4432:DeepDotWeb
4395:Bellingcat
4347:DuckDuckGo
3979:Blockchain
3877:Nick Szabo
3852:Hal Finney
3847:Tim Draper
3631:0123742145
3586:, May 2006
3565:Pragocrypt
3404:2024-08-21
3379:2018-03-29
3354:2018-03-29
3329:2018-03-29
3141:2010-05-22
3048:2011-03-12
2903:10 October
2780:5 November
2406:2019-08-24
1979:2024-08-21
1955:2024-08-21
1846:1595930450
1808:5 November
1787:2023-12-14
1695:2024-07-15
1671:2023-10-24
1477:2021-12-21
1454:References
1316:BitTorrent
1233:and other
1222:and other
1212:encryption
1165:BitTorrent
1112:Windows 10
1104:BitTorrent
1092:JavaScript
1081:WebTorrent
1065:M-commerce
987:hypermedia
895:Multimedia
865:networks.
848:, and the
826:Bittorrent
733:See also:
671:See also:
587:downloaded
533:, and the
488:hash table
463:, using a
398:structured
226:BitTorrent
161:equipotent
69:newspapers
6463:Seedboxes
6381:Gnutella2
6210:Gnutella2
6185:FastTrack
6129:protocols
5795:Anonymity
5785:VeraCrypt
5773:TrueCrypt
5763:Scramdisk
5728:FileVault
5693:BitLocker
5688:BestCrypt
5601:Cryptocat
5507:WireGuard
5409:MatrixSSL
5379:BoringSSL
5341:SecureCRT
5303:Profanity
5278:Centericq
5189:Autocrypt
4991:WildLeaks
4985:WikiLeaks
4879:Telecomix
4824:Z-Library
4758:Silk Road
4733:Evolution
4677:Financial
3892:Roger Ver
3837:Adam Back
3796:Economics
3736:test P2P
3496:256106264
3488:0360-0300
3435:1652-926X
3349:Big Think
3168:Channel 9
2873:8 October
2846:CiteSeerX
2604:8 October
2521:25 August
2319:CiteSeerX
1738:123103147
1639:1432-1882
1537:1207.0790
1307:bandwidth
1253:copyright
1204:anonymity
1130:that use
1116:LANtastic
1108:Microsoft
1085:streaming
1083:is a P2P
1057:Syncthing
1039:,and the
1011:Netsukuku
917:LionShare
876:copyright
768:, a free
706:FastTrack
597:. When a
286:, RFC 1.
268:SETI@home
238:Bluetooth
6559:Internal
6500:Concepts
6477:Freesite
6412:Metalink
6376:Gnutella
6316:Morpheus
6311:LimeWire
6289:Historic
6205:Gnutella
6195:Hyphanet
6154:Soulseek
6149:Soribada
6124:Networks
6064:Category
5970:CrypTool
5944:Tresorit
5873:eCryptfs
5833:Ricochet
5733:FreeOTFE
5723:eCryptfs
5708:dm-crypt
5653:WhatsApp
5530:Linphone
5482:Openswan
5449:TeamNote
5434:SChannel
5424:mbed TLS
5404:LibreSSL
5389:cryptlib
5321:Dropbear
5234:Sylpheed
5199:Enigmail
5075:Mailpile
5009:Boystown
4959:Filtrala
4903:Qubes OS
4897:DivestOS
4718:Atlantis
4713:AlphaBay
4634:Facebook
4591:Tor Mail
4389:BBC News
4318:Category
4240:Category
4189:GHash.io
4184:CoinDesk
4135:Deep Web
4058:Currency
3922:Jihan Wu
3730:Archived
3727:Glasnost
3712:Archived
3693:Archived
3655:Archived
3641:Archived
3608:Archived
3594:Archived
3580:Archived
3547:Glossary
3537:Archived
3324:Newsweek
3303:Archived
3284:Archived
3159:Archived
3057:cite web
2984:16438304
2663:Archived
2653:Archived
2415:cite web
2380:Archived
2360:Archived
1912:Archived
1770:Computer
1647:15963045
1600:49354877
1562:14008541
1377:Internet
1357:See also
1274:Fair use
1258:Grokster
1167:protocol
1061:Tradepal
979:protocol
957:, is an
881:Grokster
842:Gnutella
822:increase
764:" using
687:gnutella
640:software
543:Kademlia
425:Gnutella
253:Internet
234:Miracast
218:Internet
6526:Darkweb
6521:Darknet
6508:Privacy
6485:ZeroNet
6371:eDonkey
6348:clients
6321:Napster
6280:ZeroNet
6260:Tribler
6180:eDonkey
6074:Commons
5993:BusKill
5988:USBKill
5939:Freenet
5823:Vidalia
5778:History
5753:PGPDisk
5659:SimpleX
5618:Session
5613:Proteus
5487:OpenVPN
5477:Hamachi
5454:wolfSSL
5444:stunnel
5419:OpenSSL
5351:wolfSSH
5331:OpenSSH
5273:BitlBee
5219:Outlook
5214:Kontact
5208:Gpg4win
5123:Tor2web
5081:Mullvad
5069:F-Droid
5063:DEF CON
5051:1.1.1.1
5029:Pornhub
5024:Playpen
4818:Sci-Hub
4656:Twitter
4645:The Hub
4624:Dark0de
4596:TorChat
4573:Keybase
4364:MetaGer
4250:Commons
4174:Bitmain
4083:History
3857:Wei Dai
3791:History
3780:Bitcoin
3723:, 2004.
3703:, 2002.
3267:UN News
3029:(2009).
2868:2731647
1855:1478064
1750:RFC 1,
1542:Bibcode
1312:Comcast
1260:vs RIAA
1200:privacy
1196:Freenet
1063:l and
883:vs RIAA
785:YouTube
719:hashing
683:malware
677:Malware
571:Spotify
303:ARPANET
280:Napster
222:Napster
196:servers
191:clients
83:scholar
6428:Backup
6407:Magnet
6301:CuteMX
6235:OpenFT
6200:GNUnet
6046:S/MIME
5893:StegFS
5803:GNUnet
5643:Signal
5591:Matrix
5439:SSLeay
5394:GnuTLS
5346:WinSCP
5298:Kopete
5249:Secure
5087:Njalla
4915:Whonix
4778:Utopia
4650:Reddit
4640:HackBB
4610:forums
4585:Riseup
4518:BTDigg
4119:Movies
4042:Client
4019:SegWit
3815:People
3678:
3629:
3494:
3486:
3433:
3245:
3211:
3087:
3012:
2982:
2938:
2866:
2848:
2752:
2706:
2641:
2573:
2486:
2444:
2339:
2321:
2296:
2237:
2212:
2174:
2149:
2120:
2088:
2059:
2030:
2003:
1891:
1853:
1843:
1736:
1726:
1645:
1637:
1598:
1588:
1560:
1398:(CHAT)
1363:Portal
1037:P-Grid
1035:, the
1031:, the
973:. The
929:Osiris
778:backup
691:OpenFT
603:mirror
599:server
551:P-Grid
529:, the
519:Tixati
431:, and
429:Gossip
385:TCP/IP
381:subset
311:Usenet
129:, and
85:
78:
71:
64:
56:
6598:SHA-2
6593:SHA-1
6331:WASTE
6326:Scour
6306:Kazaa
6275:Winny
6270:WinMX
6255:Share
6190:Fopnu
5949:Wuala
5923:Qubes
5918:Tails
5863:EncFS
5838:Wickr
5596:OMEMO
5563:Briar
5540:Zfone
5525:Jitsi
5429:BSAFE
5384:Botan
5336:PuTTY
5293:Jitsi
5288:climm
5268:Adium
5057:Brave
5044:Other
4969:Ljost
4909:Tails
4743:Hansa
4708:Agora
4690:Helix
4629:Dread
4618:8chan
4568:Briar
4550:Email
4370:Searx
4359:Grams
4353:Cliqz
4336:Ahmia
4169:BitGo
4034:Forks
4024:SHA-2
3999:ECDSA
3936:Lists
3614:. In
3492:S2CID
3423:(PDF)
3181:IEEE.
3042:(PDF)
3035:(PDF)
3002:(PDF)
2980:S2CID
2960:(PDF)
2864:S2CID
2834:(PDF)
2727:(PDF)
2595:(PDF)
2548:(PDF)
2541:(PDF)
2515:(PDF)
2508:(PDF)
2401:(PDF)
1932:(PDF)
1851:S2CID
1643:S2CID
1558:S2CID
1532:arXiv
1110:, in
1077:DARPA
1013:is a
1001:app.
901:P2PTV
695:Kazaa
624:cache
512:churn
496:value
433:Kazaa
232:like
165:nodes
90:JSTOR
76:books
6481:IPFS
6421:Uses
6402:eD2k
6230:LBRY
6220:IPFS
5883:PEFS
5878:LUKS
5853:List
5748:LUKS
5743:geli
5738:GBDE
5535:Jami
5517:ZRTP
5502:Tinc
5399:JSSE
4608:and
4504:and
4381:News
4308:List
4194:Nuri
3676:ISBN
3627:ISBN
3569:1996
3484:ISSN
3431:ISSN
3243:ISBN
3209:ISBN
3085:ISBN
3063:link
3010:ISBN
2936:ISBN
2905:2013
2875:2013
2782:2011
2750:ISBN
2704:ISBN
2639:ISBN
2606:2013
2571:ISBN
2523:2008
2484:ISBN
2442:ISBN
2421:link
2337:ISBN
2294:ISBN
2235:ISBN
2210:ISBN
2172:ISBN
2147:ISBN
2118:ISBN
2086:ISBN
2057:ISBN
2028:ISBN
2001:ISBN
1889:ISBN
1841:ISBN
1810:2011
1734:OCLC
1724:ISBN
1635:ISSN
1596:OCLC
1586:ISBN
1303:ISPs
1262:and
1202:and
1171:seed
1163:The
1003:JXTA
995:Jami
905:PDTP
903:and
899:The
885:and
805:MPAA
801:RIAA
793:MPAA
789:RIAA
766:YaCy
737:and
710:RIAA
675:and
616:file
593:and
535:YaCy
356:peer
327:SMTP
62:news
6546:Tor
6346:of
6225:Kad
6215:I2P
6175:DAT
5868:EFS
5818:Tor
5808:I2P
5718:E4M
5583:DRA
5573:Tox
5550:P2P
5464:VPN
5414:NSS
5326:lsh
5313:SSH
5260:OTR
5229:PGP
5224:p≡p
5204:GPG
5113:Tor
4552:and
4009:P2P
3514:doi
3474:doi
2972:doi
2928:doi
2856:doi
2631:doi
2627:178
2329:doi
1881:doi
1833:doi
1778:doi
1627:doi
1550:doi
1286:may
1090:in
999:SIP
955:I2P
951:Dat
714:MP3
608:CPU
492:key
471:In
445:CPU
396:or
153:P2P
45:by
6635::
6483:,
6479:,
3719:.
3699:.
3688:.
3674:,
3625:.
3567:.
3563:.
3490:.
3482:.
3470:55
3468:.
3464:.
3443:^
3429:.
3425:.
3396:.
3372:.
3347:.
3322:.
3265:.
3186:^
3165:,
3134:.
3111:.
3099:^
3071:^
3059:}}
3055:{{
2978:.
2966:.
2962:.
2934:.
2922:.
2891:.
2862:.
2854:.
2842:46
2840:.
2836:.
2773:.
2688:^
2637:.
2629:.
2597:.
2417:}}
2413:{{
2335:.
2327:.
2208:.
2206:94
2186:^
2100:^
1972:.
1948:.
1887:.
1863:^
1849:.
1839:.
1827:.
1774:28
1772:.
1768:.
1732:.
1718:.
1704:^
1688:.
1663:.
1641:.
1633:.
1621:.
1617:.
1594:.
1570:^
1556:.
1548:.
1540:.
1526:.
1514:^
1470:.
1214:,
1055:.
1043:.
1009:.
993:.
846:G2
844:,
803:,
791:,
721:,
650:.
612:IP
549:,
545:,
541:,
494:,
427:,
125:,
6487:)
6475:(
6126:,
6108:e
6101:t
6094:v
5855:)
5851:(
5680:)
5676:(
5210:)
5206:(
5160:e
5153:t
5146:v
5101:*
5095:*
5089:*
5083:*
5077:*
5071:*
5065:*
5059:*
5053:*
5031:*
4987:*
4981:*
4955:*
4936:*
4917:*
4911:*
4905:*
4899:*
4875:*
4869:*
4863:*
4857:*
4851:*
4845:*
4826:*
4820:*
4814:*
4803:*
4686:*
4664:*
4658:*
4652:*
4636:*
4620:*
4587:*
4581:*
4575:*
4541:*
4520:*
4493:*
4487:*
4481:*
4473:*
4465:*
4459:*
4451:*
4445:*
4439:*
4423:*
4415:*
4409:*
4403:*
4397:*
4391:*
4372:*
4366:*
4355:*
4349:*
4343:*
4284:e
4277:t
4270:v
3772:e
3765:t
3758:v
3744:)
3740:(
3571:.
3516::
3498:.
3476::
3437:.
3407:.
3382:.
3357:.
3332:.
3251:.
3217:.
3144:.
3093:.
3065:)
3051:.
3018:.
2986:.
2974::
2968:1
2944:.
2930::
2907:.
2877:.
2858::
2784:.
2758:.
2729:.
2712:.
2647:.
2633::
2608:.
2579:.
2525:.
2492:.
2465:.
2450:.
2423:)
2409:.
2345:.
2331::
2302:.
2243:.
2218:.
2180:.
2155:.
2126:.
2094:.
2065:.
2036:.
2009:.
1982:.
1958:.
1897:.
1883::
1857:.
1835::
1812:.
1790:.
1780::
1740:.
1698:.
1674:.
1649:.
1629::
1623:9
1602:.
1564:.
1552::
1544::
1534::
1528:6
1495:.
1480:.
1365::
151:(
140:A
133:.
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.