Knowledge

Peer-to-peer

Source 📝

795:, and entertainment industry to filter out copyrighted content. Although server-client networks are able to monitor and manage content availability, they can have more stability in the availability of the content they choose to host. A client should not have trouble accessing obscure content that is being shared on a stable centralized network. P2P networks, however, are more unreliable in sharing unpopular files because sharing files in a P2P network requires that at least one node in the network has the requested data, and that node must be able to connect to the node requesting the data. This requirement is occasionally hard to meet because users may delete or stop sharing data at any point. 456: 1346:
reproducible so that other researchers can replicate, validate, and extend existing work." If the research cannot be reproduced, then the opportunity for further research is hindered. "Even though new simulators continue to be released, the research community tends towards only a handful of open-source simulators. The demand for features in simulators, as shown by our criteria and survey, is high. Therefore, the community should work together to get these features in open-source software. This would reduce the need for custom simulators, and hence increase repeatability and reputability of experiments."
409: 447:/memory (by requiring every peer to process all search queries), and does not ensure that search queries will always be resolved. Furthermore, since there is no correlation between a peer and the content managed by it, there is no guarantee that flooding will find a peer that has the desired data. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing. But if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that the search will be successful. 1372: 264: 780:, recovery, and availability. In a centralized network, the system administrators are the only forces controlling the availability of files being shared. If the administrators decide to no longer distribute a file, they simply have to remove it from their servers, and it will no longer be available to users. Along with leaving the users powerless in deciding what is distributed throughout the community, this makes the entire system vulnerable to threats and requests from the government and other large forces. 799:
and available than files on central networks. In a centralized network, a simple loss of connection between the server and clients can cause a failure, but in P2P networks, the connections between every node must be lost to cause a data-sharing failure. In a centralized system, the administrators are responsible for all data recovery and backups, while in P2P systems, each node requires its backup system. Because of the lack of central authority in P2P networks, forces such as the recording industry,
179: 6060: 4314: 4236: 25: 4304: 757: 940: 137: 6070: 4246: 502: 282:. The peer-to-peer movement allowed millions of Internet users to connect "directly, forming groups and collaborating to become user-created search engines, virtual supercomputers, and filesystems". The basic concept of peer-to-peer computing was envisioned in earlier software systems and networking discussions, reaching back to principles stated in the first 1277:
networks regarding public safety and national security. When a file is downloaded through a peer-to-peer network, it is impossible to know who created the file or what users are connected to the network at a given time. Trustworthiness of sources is a potential security threat that can be seen with peer-to-peer systems.
514:(i.e. with large numbers of nodes frequently joining and leaving the network). More recent evaluation of P2P resource discovery solutions under real workloads have pointed out several issues in DHT-based solutions such as high cost of advertising/discovering resources and static and dynamic load imbalance. 344:
introduced the music and file-sharing application called Napster. Napster was the beginning of peer-to-peer networks, as we know them today, where "participating users establish a virtual network, entirely independent from the physical network, without having to obey any administrative authorities or
1250:
Although peer-to-peer networks can be used for legitimate purposes, rights holders have targeted peer-to-peer over the involvement with sharing copyrighted material. Peer-to-peer networking involves data transfer from one user to another without using an intermediate server. Companies developing P2P
1185:
Some researchers have explored the benefits of enabling virtual communities to self-organize and introduce incentives for resource sharing and cooperation, arguing that the social aspect missing from today's P2P systems should be seen both as a goal and a means for self-organized virtual communities
1276:
exceptions allow limited use of copyrighted material to be downloaded without acquiring permission from the rights holders. These documents are usually news reporting or under the lines of research and scholarly work. Controversies have developed over the concern of illegitimate use of peer-to-peer
798:
In a P2P network, the community of users is entirely responsible for deciding which content is available. Unpopular files eventually disappear and become unavailable as fewer people share them. Popular files, however, are highly and easily distributed. Popular files on a P2P network are more stable
747:
that can be inherent in a client–server based system. As nodes arrive and demand on the system increases, the total capacity of the system also increases, and the likelihood of failure decreases. If one peer on the network fails to function properly, the whole network is not compromised or damaged.
296:
was close to a P2P network in that it assumed each user of the web would be an active editor and contributor, creating and linking content to form an interlinked "web" of links. The early Internet was more open than the present day, where two machines connected to the Internet could send packets to
1159: 1309:
usage. Compared to Web browsing, e-mail or many other uses of the internet, where data is only transferred in short intervals and relative small quantities, P2P file-sharing often consists of relatively heavy bandwidth usage due to ongoing file transfers and swarm/network coordination packets. In
1288:
lead to an increase in overall video game sales because newer games charge for extra features or levels. The paper concluded that piracy had a negative financial impact on movies, music, and literature. The study relied on self-reported data about game purchases and use of illegal download sites.
1177:
Cooperation among a community of participants is key to the continued success of P2P systems aimed at casual human users; these reach their full potential only when large numbers of nodes contribute resources. But in current practice, P2P networks often contain large numbers of users who utilize
438:
Because there is no structure globally imposed upon them, unstructured networks are easy to build and allow for localized optimizations to different regions of the overlay. Also, because the role of all peers in the network is the same, unstructured networks are highly robust in the face of high
391:
peers can communicate with each other directly, via the logical overlay links (each of which corresponds to a path through the underlying physical network). Overlays are used for indexing and peer discovery, and make the P2P system independent from the physical network topology. Based on how the
716:
files). Files infected with the RIAA virus were unusable afterwards and contained malicious code. The RIAA is also known to have uploaded fake music and movies to P2P networks in order to deter illegal file sharing. Consequently, the P2P networks of today have seen an enormous increase of their
573:
was an example of a hybrid model . There are a variety of hybrid models, all of which make trade-offs between the centralized functionality provided by a structured server/client network and the node equality afforded by the pure peer-to-peer unstructured networks. Currently, hybrid models have
442:
However, the primary limitations of unstructured networks also arise from this lack of structure. In particular, when a peer wants to find a desired piece of data in the network, the search query must be flooded through the network to find as many peers as possible that share the data. Flooding
748:
In contrast, in a typical client–server architecture, clients share only their demands with the system, but not their resources. In this case, as more clients join the system, fewer resources are available to serve each client, and if the central server fails, the entire network is taken down.
1345:
Researchers have used computer simulations to aid in understanding and evaluating the complex behaviors of individuals within the network. "Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be
1181:
Freeloading can have a profound impact on the network and in some cases can cause the community to collapse. In these types of networks "users have natural disincentives to cooperate because cooperation consumes their own resources and may degrade their own performance". Studying the social
662:
attacks. Examples of common routing attacks include "incorrect lookup routing" whereby malicious nodes deliberately forward requests incorrectly or return false results, "incorrect routing updates" where malicious nodes corrupt the routing tables of neighboring nodes by sending them false
1114:, uses a proprietary peer-to-peer technology called "Delivery Optimization" to deploy operating system updates using end-users' PCs either on the local network or other PCs. According to Microsoft's Channel 9, this led to a 30%-50% reduction in Internet bandwidth usage. Artisoft's 3028:
Gareth Tyson, Andreas Mauthe, Sebastian Kaune, Mu Mu and Thomas Plagemann. Corelli: A Dynamic Replication Service for Supporting Latency-Dependent Content in Community Networks. In Proc. 16th ACM/SPIE Multimedia Computing and Networking Conference (MMCN), San Jose, CA
1333:. Techniques for achieving "protocol obfuscation" involves removing otherwise easily identifiable properties of protocols, such as deterministic byte sequences and packet sizes, by making the data look as if it were random. The ISP's solution to the high bandwidth is 574:
better performance than either pure unstructured networks or pure structured networks because certain functions, such as searching, do require a centralized functionality but benefit from the decentralized aggregation of nodes provided by unstructured networks.
305:
was a successful peer-to-peer network where "every participating node could request and serve content". However, ARPANET was not self-organized, and it could not "provide any means for context or content-based routing beyond 'simple' address-based routing."
873:
Peer-to-peer networking involves data transfer from one user to another without using an intermediate server. Companies developing P2P applications have been involved in numerous legal cases, primarily in the United States, over conflicts with
1182:
attributes of P2P networks is challenging due to large populations of turnover, asymmetry of interest and zero-cost identity. A variety of incentive mechanisms have been implemented to encourage or even force nodes to contribute resources.
1186:
to be built and fostered. Ongoing research efforts for designing effective incentive mechanisms in P2P systems, based on principles from game theory, are beginning to take on a more psychological and information-processing direction.
1271:
To establish criminal liability for the copyright infringement on peer-to-peer systems, the government must prove that the defendant infringed a copyright willingly for the purpose of personal financial gain or commercial advantage.
1169:: In this animation, the colored bars beneath all of the 7 clients in the upper region above represent the file being shared, with each color representing an individual piece of the file. After the initial pieces transfer from the 828:
that require users to share, refer a performance measurement study). This property is one of the major advantages of using P2P networks because it makes the setup and running costs very small for the original content distributor.
3180:
Krishnan, R., Smith, M. D., Tang, Z., & Telang, R. (2004, January). The impact of free-riding on peer-to-peer networks. In System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on (pp. 10-pp).
663:
information, and "incorrect routing network partition" where when new nodes are joining they bootstrap via a malicious node, which places the new node in a partition of the network that is populated by other malicious nodes.
856:
and services, including distributed caching systems like Correli Caches to enhance performance. Furthermore, peer-to-peer networks have made possible the software publication and distribution, enabling efficient sharing of
509:
However, in order to route traffic efficiently through the network, nodes in a structured overlay must maintain lists of neighbors that satisfy specific criteria. This makes them less robust in networks with a high rate of
1352:
Besides all the above stated facts, there has also been work done on ns-2 open source network simulators. One research issue related to free rider detection and punishment has been explored using ns-2 simulator here.
605:
the content, thus off-loading balance from the server. All of the information is retained at the server. This system makes use of the fact that the bottleneck is most likely in the outgoing bandwidth than the
205:, directly available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional 1325:-based application architecture. The client–server model provides financial barriers-to-entry to small publishers and individuals, and can be less efficient for sharing large files. As a reaction to this 3193:
Feldman, M., Lai, K., Stoica, I., & Chuang, J. (2004, May). Robust incentive techniques for peer-to-peer networks. In Proceedings of the 5th ACM conference on Electronic commerce (pp. 102-111). ACM.
2811: 1321:
Critics point out that P2P networking has legitimate legal uses, and that this is another way that large providers are trying to control use and content on the Internet, and direct people towards a
725:
and different encryption methods have made most networks resistant to almost any type of attack, even when major parts of the respective network have been replaced by faked or nonfunctional hosts.
693:
contained malware. In both cases, the top three most common types of malware accounted for the large majority of cases (99% in gnutella, and 65% in OpenFT). Another study analyzing traffic on the
2723: 1173:(large system at the bottom), the pieces are individually transferred from client to client. The original seeder only needs to send out one copy of the file for all the clients to receive a copy. 2143:
Making Grids Work: Proceedings of the CoreGRID Workshop on Programming Models Grid and P2P System Architecture Grid Systems, Tools and Environments 12-13 June 2007, Heraklion, Crete, Greece
475:
the overlay is organized into a specific topology, and the protocol ensures that any node can efficiently. search the network for a file/resource, even if the resource is extremely rare.
2053:
Networking 2007: Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet: 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007 Proceedings
2461:
Bandara, H. M. N. Dilum; Jayasumana, Anura P. (January 2012). "Evaluation of P2P Resource Discovery Architectures Using Real-Life Multi-Attribute Resource and Query Characteristics".
3227:
P. Antoniadis and B. Le Grand, "Incentives for resource sharing in self-organized communities: From economics to social psychology," Digital Information Management (ICDIM '07), 2007
646:. What makes this particularly dangerous for P2P software, however, is that peer-to-peer applications act as servers as well as clients, meaning that they can be more vulnerable to 2625:. Lecture Notes in Computer Science. Vol. Proceedings of the First International Workshop on Peer-to-Peer Systems. Cambridge, MA: Springer (published March 2002). pp.  685:
varies between different peer-to-peer protocols. Studies analyzing the spread of malware on P2P networks found, for example, that 63% of the answered download requests on the
1349:
Popular simulators that were widely used in the past are NS2, OMNeT++, SimPy, NetLogo, PlanetLab, ProtoPeer, QTM, PeerSim, ONE, P2PStrmSim, PlanetSim, GNUSim, and Bharambe.
891:. In the last case, the Court unanimously held that defendant peer-to-peer file sharing companies Grokster and Streamcast could be sued for inducing copyright infringement. 3450:
Basu, A., Fleming, S., Stanier, J., Naicken, S., Wakeman, I., & Gurbani, V. K. (2013). The state of peer-to-peer network simulators. ACM Computing Surveys, 45(4), 46.
820:
In P2P networks, clients both provide and use resources. This means that unlike client–server systems, the content-serving capacity of peer-to-peer networks can actually
3131: 313:, a distributed messaging system that is often described as an early peer-to-peer architecture, was established. It was developed in 1979 as a system that enforces a 1268:
In both of the cases the file sharing technology was ruled to be legal as long as the developers had no ability to prevent the sharing of the copyrighted material.
3006:
NETWORKING 2005 -- Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
3647:", in the proceedings of the 1st Multimedia Communications Workshop MULTICOMM 2006 held in conjunction with IEEE ICC 2006 pp 43–48, June 2006, Istanbul, Turkey. 3108: 2746:
Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings
569:
Hybrid models are a combination of peer-to-peer and client–server models. A common hybrid model is to have a central server that helps peers find each other.
2815: 2652: 3654: 3158: 1206:—that is, ensuring that the contents of communications are hidden from eavesdroppers, and that the identities/locations of the participants are concealed. 1318:. Their rationale was that P2P is mostly used to share illegal content, and their infrastructure is not designed for continuous, high-bandwidth traffic. 359:
nodes simultaneously functioning as both "clients" and "servers" to the other nodes on the network. This model of network arrangement differs from the
2537: 1945: 423:
do not impose a particular structure on the overlay network by design, but rather are formed by nodes that randomly form connections to each other. (
325:
communicate with one another as peers to propagate Usenet news articles over the entire group of network servers. The same consideration applies to
5158: 3552: 2420: 3579: 3279:
Majoras, D. B. (2005). Peer-to-peer file-sharing technology consumer protection and competition issues. Federal Trade Commission, Retrieved from
363:
model where communication is usually to and from a central server. A typical example of a file transfer that uses the client-server model is the
367:(FTP) service in which the client and server programs are distinct: the clients initiate the transfer, and the servers satisfy these requests. 2313:
Dabek, Frank; Zhao, Ben; Druschel, Peter; Kubiatowicz, John; Stoica, Ion (2003). "Towards a Common API for Structured Peer-to-Peer Overlays".
3593: 2255: 2082:
Transactions on Large-Scale Data- and Knowledge-Centered Systems III: Special Issue on Data and Knowledge Management in Grid and PSP Systems
704:
Corrupted data can also be distributed on P2P networks by modifying files that are already being shared on the network. For example, on the
4282: 3536: 911:
multimedia applications leverage a peer-to-peer network in conjunction with streaming servers to stream audio and video to their clients.
3800: 3369: 3302: 916: 2662: 1492: 1122:
Hotline Client was built with decentralized servers and tracker software dedicated to any type of files and continues to operate today.
3998: 3062: 3711: 3555:, Special Issue, Elsevier Journal of Computer Communication, (Ed) Javed I. Khan and Adam Wierzbicki, Volume 31, Issue 2, February 2008 6658: 3741: 3720: 3031: 658:
Since each node plays a role in routing traffic through the network, malicious users can perform a variety of "routing attacks", or
1401: 3729: 2359: 392:
nodes are linked to each other within the overlay network, and how resources are indexed and located, we can classify networks as
6073: 3957: 1522:
Bandara, H. M. N. D; A. P. Jayasumana (2012). "Collaborative Applications over Peer-to-Peer Systems – Challenges and Solutions".
486:
is used to assign ownership of each file to a particular peer. This enables peers to search for resources on the network using a
144:
in which interconnected nodes ("peers") share resources amongst each other without the use of a centralized administrative system
2888: 6106: 5882: 5677: 3640: 3670: 2379: 6365: 3607: 3246: 3212: 3088: 3013: 2939: 2707: 2642: 2487: 2445: 2340: 2238: 2175: 240:
radio. The concept has inspired new structures and philosophies in many areas of human interaction. In such social contexts,
3344: 5302: 5151: 3283: 1251:
applications have been involved in numerous legal cases, primarily in the United States, primarily over issues surrounding
1178:
resources shared by other nodes, but who do not share anything themselves (often referred to as the "freeloader problem").
89: 4958: 1118:
was built as a peer-to-peer operating system where machines can function as both servers and workstations simultaneously.
498:) pairs are stored in the DHT, and any participating node can efficiently retrieve the value associated with a given key. 5433: 2504: 1395: 1264: 1040: 887: 554: 61: 6355: 5852: 4968: 1589: 3692: 5907: 3770: 3679: 3298:
The Government of the Hong Kong Special Administrative Region, (2008). Peer-to-peer network. Retrieved from website:
2753: 2574: 2297: 2213: 2150: 2121: 2089: 2060: 2031: 2004: 1892: 1727: 1467: 928: 108: 3116: 2956: 2166:
Jin, Xing; Chan, S.-H. Gary (2010). "Unstructured Peer-to-Peer Network Architectures". In Shen; et al. (eds.).
68: 6507: 6360: 5098: 4275: 3805: 2201:
Peer-to-Peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers
355: 2649: 1314:, one of the largest broadband Internet providers in the United States, started blocking P2P applications such as 6643: 6063: 5144: 4990: 4854: 4448: 3851: 1911: 126: 3651: 3546: 3155: 931:, enables users to create anonymous and autonomous web portals that are distributed via a peer-to-peer network. 321:
model from the user or client perspective that offers a self-organizing approach to newsgroup servers. However,
6648: 6587: 6370: 4848: 4109: 3700: 3630: 1844: 1330: 46: 1337:, where an ISP stores the part of files most accessed by P2P clients in order to save access to the Internet. 75: 6490: 4952: 4767: 3952: 1507:
A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications
1021:
is a connection-sharing application that shares Internet access with other devices using Wi-Fi or Bluetooth.
920: 122: 42: 5398: 5373: 4126: 2544: 3509: 2268:
R. Ranjan, A. Harwood, and R. Buyya, "Peer-to-peer based resource discovery in global grids: a tutorial,"
969:
is not itself peer-to-peer; however, it can enable peer-to-peer applications to be built on top of it via
697:
network found that 15% of the 500,000 file sample taken were infected by one or more of the 365 different
6023: 5979: 5383: 4933: 4317: 4268: 4089: 1421: 1390: 1230: 998: 982: 589:
content, proposed by computer scientists Venkata N. Padmanabhan and Kunwadee Sripanidkulchai, working at
57: 2397: 1969: 6480: 6219: 6099: 4707: 4307: 3576: 3079:
Glorioso, Andrea; et al. (2010). "The Social Impact of P2P Systems". In Shen; et al. (eds.).
1946:"Practical Applications of Peer-to-Peer Networks in File Sharing and Content Distribution | SimpleSwap" 1362: 1068: 1014: 974: 594: 557:. DHT-based networks have also been widely utilized for accomplishing efficient resource discovery for 274:
While P2P systems had previously been used in many application domains, the concept was popularized by
852:
have been useful in popularizing peer-to-peer technologies. These advancements have paved the way for
439:
rates of "churn"—that is, when large numbers of peers are frequently joining and leaving the network.
6143: 6115: 5777: 5413: 4104: 3942: 3320:"Illegal downloads may not actually harm sales, but the European Union doesn't want you to know that" 1385: 1052: 837: 769: 643: 3319: 1071:
is conducting research on P2P networks as part of its modern network warfare strategy. In May 2003,
927:, aims to facilitate file sharing among educational institutions globally. Another notable program, 6617: 6472: 6013: 5917: 5887: 5582: 5360: 5259: 4908: 4462: 4249: 3533: 2323: 1660: 1137: 853: 6467: 3590: 2850: 2272:, vol. 10, no. 2. and P. Trunfio, "Peer-to-Peer resource discovery in Grids: Models and systems," 6008: 5877: 5747: 5463: 4757: 4732: 3460:
Ihle, Cornelius; Trautwein, Dennis; Schubotz, Moritz; Meuschke, Norman; Gipp, Bela (2023-01-24).
2479:
Structured P2P Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
1446: 1207: 990: 978: 924: 744: 314: 206: 184: 172: 156: 35: 2626: 2620: 455: 6567: 6128: 6035: 6028: 5867: 5794: 5642: 4834: 4737: 4633: 4203: 3622: 2845: 2318: 2205: 2199: 1719: 1119: 479: 464: 364: 301:-like structure of the web as it has developed over the years. As a precursor to the Internet, 2741: 2562: 2435: 2048: 2021: 1994: 601:
experiences an increase in load it redirects incoming peers to other peers who have agreed to
6653: 6638: 6442: 6092: 6040: 5034: 5013: 4872: 4842: 4722: 4099: 4033: 3988: 3947: 3831: 3763: 3560: 3299: 3167: 2591: 2195: 2138: 2109: 2077: 1426: 1416: 1306: 738: 734: 614:' to its neighbors in an attempt to use locality. If multiple peers are found with the same 522: 229: 168: 159:
architecture that partitions tasks or workloads between peers. Peers are equally privileged,
5112: 4291: 408: 5248: 4866: 4860: 4777: 3826: 3795: 3708: 3685: 2829:
Balakrishnan, Hari; Kaashoek, M. Frans; Karger, David; Morris, Robert; Stoica, Ion (2003).
1541: 1509:, Proceedings of the First International Conference on Peer-to-Peer Computing, IEEE (2002). 1406: 1326: 1032: 908: 772:
that runs on a peer-to-peer network instead of making requests to centralized index servers
546: 383:
of the nodes in the physical network. Data is still exchanged directly over the underlying
283: 130: 2770: 82: 8: 6315: 5832: 5320: 5238: 5228: 5223: 5167: 5056: 3911: 3393: 3038: 2830: 1142: 807:, and the government are unable to delete or stop the sharing of content on P2P systems. 776:
There are both advantages and disadvantages in P2P networks related to the topic of data
330: 241: 3726: 1907:
Horton, Mark, and Rick Adams. "Standard for interchange of USENET messages." (1987): 1.
1545: 6607: 6347: 6244: 5822: 5627: 5617: 5008: 4782: 4528: 4477: 4156: 4094: 3901: 3790: 3491: 3263:"No country is free from child sexual abuse, exploitation, UN's top rights forum hears" 2979: 2863: 2398:"Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks" 2356: 1850: 1713: 1642: 1557: 1531: 1298: 1127: 1099: 1084: 1044: 962: 858: 598: 590: 483: 213: 195: 189: 2998: 2742:"Measurement and Analysis of Autonomous Spreading Malware in a University Environment" 6612: 6406: 6375: 5590: 5471: 5218: 5203: 5023: 4772: 4752: 4717: 4689: 4554: 4419: 4327: 4048: 4003: 3675: 3626: 3495: 3483: 3430: 3280: 3242: 3208: 3084: 3056: 3009: 2935: 2896: 2749: 2703: 2638: 2570: 2483: 2441: 2414: 2336: 2293: 2234: 2209: 2171: 2146: 2117: 2085: 2056: 2027: 2000: 1888: 1840: 1802: 1733: 1723: 1634: 1595: 1585: 1579: 1322: 1170: 743:
The decentralized nature of P2P networks increases robustness because it removes the
722: 659: 635: 610:, hence its server-centric design. It assigns peers to other peers who are 'close in 388: 360: 318: 202: 164: 3637: 2983: 1646: 1561: 1371: 201:
Peers make a portion of their resources, such as processing power, disk storage, or
6535: 6530: 6123: 5562: 4888: 4811: 4806: 4567: 4549: 4490: 4406: 4239: 4162: 3906: 3866: 3756: 3513: 3473: 2971: 2927: 2867: 2855: 2630: 2536:
Ranjan, Rajiv; Chan, Lipo; Harwood, Aaron; Karunasekera, Shanika; Buyya, Rajkumar.
2376: 2328: 1880: 1854: 1832: 1777: 1685: 1626: 1581:
Peer-to-peer computing : technologies for sharing and collaborating on the net
1549: 1411: 1123: 698: 263: 3861: 3604: 2678: 1879:. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. pp. 9–16. 1329:, several P2P applications started implementing protocol obfuscation, such as the 297:
each other without firewalls and other security measures. This contrasts with the
6437: 6401: 6179: 5812: 5742: 5671: 5637: 5622: 5534: 5501: 5476: 4667: 4644: 4533: 4523: 4442: 4400: 4178: 4134: 3973: 3881: 3737: 3733: 3715: 3696: 3658: 3644: 3611: 3597: 3583: 3540: 3306: 3287: 3162: 2810:
Lua, Eng Keong; Crowcroft, Jon; Pias, Marcelo; Sharma, Ravi; Lim, Steven (2005).
2666: 2656: 2477: 2383: 2363: 1996:
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
1915: 1431: 1376: 1215: 1048: 994: 958: 849: 672: 647: 619: 428: 376: 289: 6380: 3462:"Incentive Mechanisms in Peer-to-Peer Networks — A Systematic Literature Review" 2395: 2332: 1875:
Steinmetz, Ralf; Wehrle, Klaus (2005). "2. What Is This "Peer-to-Peer" About?".
1829:
Proceedings of the tenth ACM symposium on Access control models and technologies
6452: 6174: 5572: 5368: 4742: 4699: 4683: 4609: 4538: 4412: 4358: 4216: 4193: 3983: 3841: 3821: 3517: 3419: 3262: 2919: 2287: 1281: 1087: 1072: 970: 950: 761: 558: 379:
on top of the physical network topology, where the nodes in the overlay form a
293: 248: 2975: 2511: 1765: 1630: 1553: 712:
managed to introduce faked chunks into downloads and downloaded files (mostly
6632: 6602: 6582: 6577: 6545: 6515: 6447: 6432: 6018: 5817: 5491: 4944: 4800: 4628: 4469: 4013: 3926: 3886: 3871: 3487: 3434: 2931: 2659: 2634: 2110:"P2P Streaming Over Cellular Networks: Issues, Challenges, and Opportunities" 1825:"Peer-to-peer access control architecture using trusted computing technology" 1737: 1638: 1441: 1436: 1219: 1028: 1006: 824:
as more users begin to access the content (especially with protocols such as
615: 538: 341: 6084: 5802: 1836: 1614: 1599: 6234: 5757: 5378: 5312: 5175: 4973: 4747: 4727: 4605: 4509: 4455: 4340: 4221: 4069: 4064: 3916: 3689: 2023:
Streaming Media Architectures: Techniques and Applications: Recent Advances
1615:"Measuring and analyzing the characteristics of Napster and Gnutella hosts" 1024: 943: 862: 561:
systems, as it aids in resource management and scheduling of applications.
530: 334: 298: 275: 6476: 2859: 2538:"Decentralised Resource Discovery Service for Large Scale Federated Grids" 2437:
An Efficient, Scalable, and Robust P2P Overlay for Autonomic Communication
2357:
Novel Architectures for P2P Applications: the Continuous-Discrete Approach
1908: 1824: 689:
network contained some form of malware, whereas only 3% of the content on
6572: 6540: 6457: 6295: 6254: 6224: 5847: 5767: 5712: 5632: 5136: 5018: 5000: 4762: 4578: 4501: 4426: 4211: 3993: 3896: 1334: 1289:
Pains were taken to remove effects of false and misremembered responses.
1237:
have used peer-to-peer platforms to carry out activities with anonymity.
1234: 1223: 1095: 1018: 966: 912: 602: 585:
was a proposed system for off-loading serving to peers who have recently
526: 443:
causes a very high amount of signaling traffic in the network, uses more
322: 245: 1493:"Why personal area networks are the best thing to happen to hotel Wi-Fi" 6385: 6325: 6264: 6249: 6239: 6169: 5953: 5897: 5827: 5702: 5697: 5647: 5612: 5605: 5567: 5557: 5496: 5282: 5193: 5183: 5092: 4978: 4963: 4925: 4661: 4562: 4484: 4436: 4431: 4394: 4346: 3978: 3876: 3846: 2286:
Kelaskar, M.; Matossian, V.; Mehra, P.; Paul, D.; Parashar, M. (2002).
2078:"A Survey of Structured P2P Systems for RDF Data Storage and Retrieval" 1884: 1315: 1305:) have been known to throttle P2P file-sharing traffic due to its high- 1211: 1164: 1131: 1111: 1103: 1091: 1080: 1064: 986: 825: 718: 611: 487: 337:
and their direct connections is strictly a client-server relationship.
225: 178: 160: 3510:"Free-rider detection and punishment in BitTorrent based P2P networks" 2505:"A Study on Peer-to-Peer Based Discovery of Grid Resource Information" 1613:
Saroiu, Stefan; Gummadi, Krishna P.; Gribble, Steven D. (2003-08-01).
1051:
capable of supporting many different types of applications, primarily
6209: 6184: 5784: 5772: 5762: 5727: 5692: 5687: 5600: 5506: 5408: 5340: 5277: 5188: 4984: 4878: 4823: 4260: 3891: 3836: 3577:
Vulnerabilities of P2P systems and a critical look at their solutions
2317:. Lecture Notes in Computer Science. Vol. 2735. pp. 33–44. 1781: 1252: 1203: 1115: 1107: 1056: 1010: 915:
is employed for multicasting streams. Additionally, a project called
875: 845: 705: 623: 267: 237: 224:, originally released in 1999. P2P is used in many protocols such as 3478: 3461: 1158: 24: 6411: 6310: 6204: 6194: 6153: 6148: 5969: 5943: 5872: 5732: 5722: 5707: 5652: 5529: 5481: 5448: 5423: 5403: 5388: 5233: 5198: 5074: 4902: 4896: 4712: 4590: 4388: 4188: 4183: 3921: 2434:
Li, Deng; et al. (2009). Vasilakos, A.V.; et al. (eds.).
1928: 1273: 1257: 1060: 1027:
is a directory-syncing app. Research includes projects such as the
880: 841: 686: 639: 626:
the previous stream, and then transmit it piece-wise to new nodes.
586: 542: 424: 252: 233: 217: 3370:"EU study finds piracy doesn't hurt game sales, may actually help" 2724:"Malware Propagation Modelling in Peer-to-Peer Networks: A Review" 2503:
Ranjan, Rajiv; Harwood, Aaron; Buyya, Rajkumar (1 December 2006).
1536: 756: 6525: 6520: 6484: 6462: 6320: 6279: 6259: 5992: 5987: 5938: 5752: 5486: 5453: 5443: 5418: 5350: 5330: 5272: 5213: 5207: 5122: 5080: 5068: 5062: 5050: 5028: 4817: 4792: 4655: 4623: 4595: 4572: 4363: 4173: 3856: 3779: 3534:
P2P-VoD Streaming: Design Issues & User Experience Challenges
2812:"A survey and comparison of peer-to-peer overlay network schemes" 1311: 1199: 1195: 1153: 784: 682: 676: 618:
it designates that the node choose the fastest of its neighbors.
570: 416:, illustrating the ad hoc nature of the connections between nodes 302: 279: 221: 3603:
Biddle, Peter, Paul England, Marcus Peinado, and Bryan Willman,
3189: 3187: 2828: 2229:
Shen, Xuemin; Yu, Heather; Buford, John; Akon, Mursalin (2009).
2114:
Building Next-Generation Converged Networks: Theory and Practice
1297:
Peer-to-peer applications present one of the core issues in the
1245: 989:
distribution protocol, with nodes in the IPFS network forming a
939: 6427: 6300: 6199: 6045: 5892: 5438: 5393: 5345: 5297: 5117: 5086: 4914: 4649: 4639: 4584: 4517: 4018: 2396:
Byung-Gon Chun, Ben Y. Zhao, John D. Kubiatowicz (2005-02-24).
1079:, testified that the United States military uses P2P networks. 1067:
applications are designed to power real-time marketplaces. The
1036: 777: 690: 550: 518: 384: 380: 375:
Peer-to-peer networks generally implement some form of virtual
310: 163:
participants in the network, forming a peer-to-peer network of
2622:
The Case for Cooperative Networking (PostScript with addendum)
1870: 1868: 1866: 1864: 1715:
Peer-to-peer: harnessing the benefits of disruptive technology
907:
protocols are used in various peer-to-peer applications. Some
353:
A peer-to-peer network is designed around the notion of equal
209:
in which the consumption and supply of resources are divided.
136: 6597: 6592: 6330: 6305: 6274: 6269: 6189: 5948: 5922: 5862: 5837: 5595: 5539: 5524: 5428: 5335: 5292: 5287: 5267: 4617: 4369: 4352: 4335: 4168: 4023: 3459: 3184: 2797:
Anonymous File Sharing in Peer to Peer System by Random Walks
1076: 900: 694: 432: 3671:
Peer-to-Peer Computing: Evolution of a Disruptive Technology
3636:
Djamal-Eddine Meddour, Mubashar Mushtaq, and Toufik Ahmed, "
2463:
IEEE Consumer Communications and Networking Conf. (CCNC '12)
2312: 2289:
A Study of Discovery Mechanisms for Peer-to-Peer Application
478:
The most common type of structured P2P networks implement a
6229: 5737: 5516: 4380: 2999:"The scalability of swarming peer-to-peer content delivery" 2619:
Padmanabhan, Venkata N.; Sripanidkulchai, Kunwadee (2002).
1861: 1302: 1002: 904: 804: 800: 792: 788: 765: 728: 709: 534: 329:
email in the sense that the core email-relaying network of
326: 3748: 3591:
A survey of peer-to-peer content distribution technologies
3589:
Stephanos Androutsellis-Theotokis and Diomidis Spinellis.
3300:
http://www.infosec.gov.hk/english/technical/files/peer.pdf
2618: 2285: 1226:
protocols (e.g. Tarzan) can be used to provide anonymity.
16:
Type of decentralized and distributed network architecture
6214: 5807: 5717: 5325: 2535: 954: 953:
is a distributed version-controlled publishing platform.
713: 607: 501: 444: 3394:"What is bandwidth throttling? How to stop it | NordVPN" 2918:
Sharma, Parul; Bhakuni, Anuja; Kaushal, Rishabh (2013).
2256:"Overview of Structured Peer-to-Peer Overlay Algorithms" 340:
In May 1999, with millions more people on the Internet,
3663:
P2P Computing: The Evolution of a Disruptive Technology
3345:"Does Video Game Piracy Actually Result in More Sales?" 2693: 2691: 2689: 1521: 1218:, authorization, and authentication for data/messages. 3600:. ACM Computing Surveys, 36(4):335–371, December 2004. 2809: 2744:. In Hämmerli, Bernhard Markus; Sommer, Robin (eds.). 1970:"Overlay Network - an overview | ScienceDirect Topics" 577: 3512:, International Advanced Computing Conference, 2014. 2159: 1360: 553:, a self-organized and emerging overlay network, and 333:
has a peer-to-peer character, while the periphery of
182:
The opposite of a peer-to-peer network: based on the
3682:, Idea Group Inc., Hershey, PA, United States, 2005. 2917: 2686: 2139:"Peer-to-peer Approaches to Grid Resource Discovery" 1612: 175:
peer-to-peer network typically between two devices.
3239:
Peer-to-Peer Computing: Principles and Applications
3205:
Peer-to-Peer Computing: Principles and Applications
2799:(Technical report). SRM University. 123456789/9306. 2700:
Peer-to-Peer Computing: Principles and Applications
2386:. Ph. D. Thesis (Stanford University), August 2004. 634:Peer-to-peer systems pose unique challenges from a 517:Notable distributed networks that use DHTs include 212:While P2P systems had previously been used in many 49:. Unsourced material may be challenged and removed. 5127:*Maintains additional presence on the surface web 3605:The Darknet and the Future of Content Distribution 2771:"Software Bullet Is Sought to Kill Musical Piracy" 2502: 717:security and file verification mechanisms. Modern 3281:http://www.ftc.gov/reports/p2p05/050623p2prpt.pdf 2803: 2589: 2460: 2233:(1st ed.). New York: Springer. p. 118. 2136: 2080:. In Hameurlain, Abdelkader; et al. (eds.). 1573: 1571: 751: 370: 6630: 3446: 3444: 3171:, 11 October 2017, Retrieved on 4 February 2019. 3102: 3100: 2924:2013 National Conference on Communications (NCC) 2476:Korzun, Dmitry; Gurtov, Andrei (November 2012). 2228: 1754:, S. Crocker, IETF Working Group (April 7, 1969) 251:that has emerged throughout society, enabled by 194:request services and resources from centralized 2254:Dhara, Krishna; Kolberg, Mario (January 2010). 1874: 1707: 1705: 1102:standalone version that bridges WebTorrent and 537:. Some prominent research projects include the 3690:Advanced Peer-Based Technology Business Models 3652:Core Concepts in Peer-to-Peer (P2P) Networking 3616:2002 ACM Workshop on Digital Rights Management 2049:"Optimal Topology Design for Overlay Networks" 1993:Ahson, Syed A.; Ilyas, Mohammad, eds. (2008). 1803:"The World Wide Web: Past, Present and Future" 1568: 1154:Incentivizing resource sharing and cooperation 1017:designed to be independent from the Internet. 278:systems such as the music-sharing application 6114: 6100: 5152: 4276: 3764: 3441: 3420:"Breaking and Improving Protocol Obfuscation" 3418:Hjelmvik, Erik; John, Wolfgang (2010-07-27). 3386: 3097: 2920:"Performance analysis of BitTorrent protocol" 2660:PDF (Springer, original, fee may be required) 2590:Yang, Beverly; Garcia-Molina, Hector (2001). 1246:Intellectual property law and illegal sharing 985:, peer-to-peer method of storing and sharing 666: 435:are examples of unstructured P2P protocols). 3668:Ramesh Subramanian and Brian Goodman (eds), 3661:". In: Subramanian, R.; Goodman, B. (eds.): 3417: 3106: 2565:. In Steinmetz, Ralf; Wehrle, Klaus (eds.). 2560: 2475: 2419:: CS1 maint: multiple names: authors list ( 2253: 1702: 1490: 1005:is a peer-to-peer protocol designed for the 467:(DHT) to identify and locate nodes/resources 3074: 3072: 2141:. In Danelutto, Marco; et al. (eds.). 1822: 1800: 6107: 6093: 5166: 5159: 5145: 4303: 4283: 4269: 3771: 3757: 3621:John F. Buford, Heather Yu, Eng Keong Lua 3532:Ghosh Debjani, Rajan Payas, Pandey Mayank 2794: 2198:. In Druschel, Peter; et al. (eds.). 2189: 2187: 2137:Chervenak, Ann; Bharathi, Shishir (2008). 2108:Zulhasnine, Mohammed; et al. (2013). 2107: 1992: 1766:"Internet security enters the Middle Ages" 868: 216:, the architecture was popularized by the 3742:Max Planck Institute for Software Systems 3721:Harvard Business School Working Knowledge 3477: 3004:. In Boutaba, Raouf; et al. (eds.). 2996: 2849: 2322: 2196:"Can Heterogeneity Make Gnutella Stable?" 1950:SimpleSwap | Cryptocurrency exchange blog 1535: 1301:controversy. Internet service providers ( 1240: 934: 109:Learn how and when to remove this message 3411: 3078: 3069: 2964:Peer-to-Peer Networking and Applications 2957:"On peer-to-peer (P2P) content delivery" 2377:Dipsea: A Modular Distributed Hash Table 2292:. IEEE Computer Society. pp. 444–. 1763: 1524:Peer-to-Peer Networking and Applications 1402:Distributed Data Management Architecture 1189: 1157: 938: 832: 755: 729:Resilient and scalable computer networks 500: 454: 407: 403: 262: 177: 135: 3958:List of people in blockchain technology 3709:Music Downloads: Pirates- or Customers? 3638:Open Issues in P2P Multimedia Streaming 3343:Polgar, David Ryan (October 15, 2017). 3317: 2997:Stutzbach, Daniel; et al. (2005). 2592:"Comparing Hybrid Peer-to-Peer Systems" 2306: 2184: 2165: 1934:. SWAMI VIVEKANAND SUBHARTI UNIVERSITY. 1909:https://www.hjp.at/doc/rfc/rfc1036.html 6631: 6506: 4290: 3367: 3342: 3154:Hammerksjold Andreas; Engler, Narkis, 3129: 3109:"Judge: File-Swapping Tools are Legal" 3061:: CS1 maint: archived copy as title ( 2768: 2739: 2075: 1577: 1517: 1515: 1468:"What's a Peer-to-Peer (P2P) Network?" 1148: 854:Peer-to-peer content delivery networks 450: 228:file sharing over the Internet and in 6088: 5140: 4264: 3752: 3156:"Delivery Optimization - a deep dive" 2567:Peer-to-Peer Systems and Applications 2103: 2101: 2046: 1999:. Taylor & Francis. p. 204. 1877:Peer-to-Peer Systems and Applications 1292: 629: 6069: 4245: 3558: 3553:Foundation of Peer-to-Peer Computing 2795:Singh, Vivek; Gupta, Himani (2012). 1711: 1661:"What Is BitTorrent and Is It Safe?" 1465: 638:perspective. Like any other form of 47:adding citations to reliable sources 18: 3650:Detlef Schoder and Kai Fischbach, " 3368:Orland, Kyle (September 26, 2017). 3081:Handbook of Peer-to-Peer Networking 2276:archive, vol. 23, no. 7, Aug. 2007. 2231:Handbook of Peer-to-Peer Networking 2168:Handbook of Peer-to-Peer Networking 2020:Zhu, Ce; et al., eds. (2010). 2019: 1512: 1396:Cultural-historical activity theory 1340: 1265:MGM Studios, Inc. v. Grokster, Ltd. 1041:CoopNet content distribution system 888:MGM Studios, Inc. v. Grokster, Ltd. 815: 578:CoopNet content distribution system 555:CoopNet content distribution system 13: 3237:Vu, Quang H.; et al. (2010). 3236: 3203:Vu, Quang H.; et al. (2010). 3202: 2954: 2769:Sorkin, Andrew Ross (4 May 2003). 2698:Vu, Quang H.; et al. (2010). 2697: 2433: 2274:Future Generation Computer Systems 2193: 2098: 2076:Filali, Imen; et al. (2011). 1926: 981:and network designed to create a 653: 421:Unstructured peer-to-peer networks 400:(or as a hybrid between the two). 171:(PAN) is also in nature a type of 14: 6670: 3525: 2740:Goebel, Jan; et al. (2007). 2679:"CoopNet: Cooperative Networking" 2112:. In Pathan; et al. (eds.). 2047:Kamel, Mina; et al. (2007). 1194:Some peer-to-peer networks (e.g. 1059:is also a directory-syncing app. 622:is transmitted by having clients 317:of control. The basic model is a 6659:Software engineering terminology 6068: 6059: 6058: 4313: 4312: 4302: 4244: 4235: 4234: 3633:, Morgan Kaufmann, December 2008 3575:Marling Engle & J. I. Khan. 2831:"Looking up data in P2P systems" 1801:Berners-Lee, Tim (August 1996). 1370: 583:CoopNet (Cooperative Networking) 564: 473:structured peer-to-peer networks 23: 4855:Freedom of the Press Foundation 4449:Radio Free Europe/Radio Liberty 3665:, Idea Group Inc, Hershey. 2005 3623:P2P Networking and Applications 3543:Springer Proceedings, June 2014 3508:A Bhakuni, P Sharma, R Kaushal 3502: 3453: 3361: 3336: 3311: 3292: 3273: 3255: 3230: 3221: 3196: 3174: 3148: 3123: 3107:John Borland (April 25, 2003). 3022: 2990: 2948: 2911: 2881: 2822: 2788: 2762: 2733: 2716: 2671: 2612: 2583: 2561:Darlagiannis, Vasilios (2005). 2554: 2529: 2496: 2469: 2454: 2427: 2389: 2369: 2349: 2279: 2262: 2247: 2222: 2130: 2069: 2040: 2013: 1986: 1962: 1938: 1920: 1901: 1816: 1794: 1757: 1744: 1284:found that illegal downloading 810: 642:, P2P applications can contain 412:Overlay network diagram for an 348: 155:) computing or networking is a 127:Point-to-point (disambiguation) 34:needs additional citations for 6588:BitTorrent protocol encryption 4849:Electronic Frontier Foundation 4110:2020 Twitter account hijacking 3701:MIT Sloan School of Management 3318:Sanders, Linley (2017-09-22). 3241:. Springer. pp. 179–181. 2895:. 14 June 2012. Archived from 2650:PDF (Microsoft, with addendum) 1823:Sandhu, R.; Zhang, X. (2005). 1678: 1653: 1606: 1584:. Hillsboro, OR: Intel Press. 1499: 1484: 1459: 1331:BitTorrent protocol encryption 965:. Unlike the related I2P, the 760:Search results for the query " 752:Distributed storage and search 459:Overlay network diagram for a 371:Routing and resource discovery 258: 1: 5099:Terms of Service; Didn't Read 4953:Distributed Denial of Secrets 4768:Russian Anonymous Marketplace 3953:List of bitcoin organizations 3130:Walker, Leslie (2001-11-08). 2563:"Hybrid Peer-to-Peer Systems" 2194:Lv, Qin; et al. (2002). 2051:. In Akyildiz, Ian F. (ed.). 1491:Desire Athow (12 July 2016). 1453: 921:Pennsylvania State University 894: 482:(DHT), in which a variant of 123:Peer-to-peer (disambiguation) 4127:The Rise and Rise of Bitcoin 3008:. Springer. pp. 15–26. 1198:) place a heavy emphasis on 997:is a peer-to-peer chat and 961:used to browse the Internet 7: 6024:Cryptographic hash function 4934:Central Intelligence Agency 4090:Bitcoin scalability problem 3778: 2333:10.1007/978-3-540-45172-3_3 2026:. IGI Global. p. 265. 1422:Peer-to-peer energy trading 1356: 1231:live streaming sexual abuse 10: 6675: 3518:10.1109/IAdCC.2014.6779311 3132:"Uncle Sam Wants Napster!" 2355:Moni Naor and Udi Wieder. 1929:"CLIENT SERVER TECHNOLOGY" 1712:Oram, Andrew, ed. (2001). 1466:Cope, James (2002-04-08). 1069:U.S. Department of Defense 1015:Wireless community network 975:InterPlanetary File System 787:has been pressured by the 732: 670: 667:Corrupted data and malware 595:Carnegie Mellon University 142:peer-to-peer (P2P) network 120: 6558: 6499: 6420: 6394: 6343: 6288: 6162: 6136: 6122: 6116:Peer-to-peer file sharing 6054: 6001: 5978: 5962: 5931: 5906: 5846: 5793: 5670: 5581: 5548: 5515: 5462: 5359: 5311: 5258: 5247: 5174: 5108: 5043: 4999: 4943: 4924: 4887: 4833: 4791: 4698: 4676: 4604: 4548: 4500: 4379: 4326: 4298: 4230: 4202: 4145: 4118: 4105:2018 Bitcoin bomb threats 4100:2018 cryptocurrency crash 4082: 4057: 4041: 4032: 3966: 3943:List of bitcoin companies 3935: 3814: 3786: 3207:. Springer. p. 172. 2976:10.1007/s12083-007-0003-1 2838:Communications of the ACM 2748:. Springer. p. 112. 2440:. Springer. p. 329. 2170:. Springer. p. 119. 2116:. CRC Press. p. 99. 2055:. Springer. p. 714. 1631:10.1007/s00530-003-0088-1 1554:10.1007/s12083-012-0157-3 1386:Client-to-client protocol 1255:law. Two major cases are 878:law. Two major cases are 861:and various games though 838:Peer-to-peer file sharing 770:distributed search engine 525:distributed tracker, the 255:technologies in general. 6618:Micro Transport Protocol 6014:Timeline of cryptography 4463:Independent Media Center 3083:. Springer. p. 48. 2932:10.1109/NCC.2013.6488040 2635:10.1007/3-540-45748-8_17 2145:. Springer. p. 67. 2084:. Springer. p. 21. 1138:List of cryptocurrencies 414:unstructured P2P network 270:was established in 1999. 6356:Advanced Direct Connect 6009:Outline of cryptography 5980:Anti–computer forensics 4835:Nonprofit organizations 2702:. Springer. p. 8. 2315:Peer-to-Peer Systems II 1837:10.1145/1063979.1064005 1447:Wireless ad hoc network 1280:A study ordered by the 1210:can be used to provide 1208:Public key cryptography 1126:are peer-to-peer-based 991:distributed file system 925:Simon Fraser University 869:Copyright infringements 745:single point of failure 505:Distributed hash tables 157:distributed application 6644:Peer-to-peer computing 6568:Distributed hash table 6443:Game and video sharing 6036:Homomorphic encryption 6029:List of hash functions 5168:Cryptographic software 4204:Bitcoin in El Salvador 3561:"The eternity service" 1720:Sebastopol, California 1578:Barkai, David (2001). 1241:Political implications 1174: 1120:Hotline Communications 947: 935:Other P2P applications 773: 701:that were tested for. 506: 480:distributed hash table 468: 465:distributed hash table 461:structured P2P network 417: 365:File Transfer Protocol 271: 242:peer-to-peer as a meme 198: 145: 6649:File sharing networks 6041:End-to-end encryption 4873:Privacy International 4843:Amnesty International 4723:Black Market Reloaded 3989:Cryptocurrency wallet 3948:List of bitcoin forks 3806:Environmental effects 3466:ACM Computing Surveys 2860:10.1145/606272.606299 2681:. Microsoft Research. 2599:Very Large Data Bases 2375:Gurmeet Singh Manku. 1974:www.sciencedirect.com 1764:Oppliger, R. (1995). 1505:Rüdiger Schollmeier, 1427:Semantic P2P networks 1417:List of P2P protocols 1190:Privacy and anonymity 1161: 1106:serverless networks. 942: 833:File-sharing networks 759: 739:Distributed computing 735:Wireless mesh network 504: 458: 411: 404:Unstructured networks 266: 181: 169:personal area network 139: 4867:La Quadrature du Net 4861:Front Line Defenders 3827:Andreas Antonopoulos 3706:Silverthorne, Sean. 3686:Shuman Ghosemajumder 2204:. Springer. p.  1831:. pp. 147–158. 1686:"האוניברסיטה הפתוחה" 1407:End-to-end principle 1327:bandwidth throttling 1098:, as well as in the 1033:PAST storage utility 547:PAST storage utility 521:, an alternative to 387:network, but at the 331:mail transfer agents 284:Request for Comments 220:file sharing system 131:P2P (disambiguation) 121:For other uses, see 43:improve this article 4738:The Farmer's Market 3136:The Washington Post 2366:. Proc. SPAA, 2003. 1546:2012arXiv1207.0790D 1391:Client–queue–client 1149:Social implications 1143:List of blockchains 1075:, then director of 983:content-addressable 451:Structured networks 315:decentralized model 214:application domains 207:client–server model 188:, where individual 185:client–server model 6608:BitTorrent tracker 5628:Facebook Messenger 4783:White House Market 4529:Free Haven Project 4478:The New York Times 4292:Tor onion services 4157:Bitcoin Foundation 4095:History of bitcoin 3902:Cameron Winklevoss 3732:2014-10-05 at the 3714:2006-06-30 at the 3695:2012-10-13 at the 3657:2011-09-15 at the 3643:2011-08-22 at the 3610:2011-07-27 at the 3596:2020-11-09 at the 3582:2007-06-15 at the 3559:Anderson, Ross J. 3549:of P2P terminology 3539:2017-02-19 at the 3305:2019-12-09 at the 3286:2012-11-01 at the 3161:2019-02-04 at the 2889:"Art thou a Peer?" 2683:Project home page. 2665:2023-01-01 at the 2655:2007-04-17 at the 2382:2004-09-10 at the 2362:2019-12-09 at the 2270:IEEE Commun. Surv. 1914:2021-06-12 at the 1885:10.1007/11530657_2 1619:Multimedia Systems 1299:network neutrality 1293:Network neutrality 1175: 1128:digital currencies 1100:WebTorrent Desktop 1047:is a peer-to-peer 1045:Secure Scuttlebutt 948: 859:Linux distribution 774: 723:chunk verification 681:The prevalence of 630:Security and trust 591:Microsoft Research 507: 484:consistent hashing 469: 418: 292:'s vision for the 272: 199: 146: 6626: 6625: 6613:UDP hole punching 6554: 6553: 6339: 6338: 6082: 6081: 5932:Service providers 5666: 5665: 5472:Check Point VPN-1 5134: 5133: 4889:Operating systems 4793:Document archives 4773:Tor Carding Forum 4753:Sheep Marketplace 4555:instant messaging 4420:The Daily Stormer 4258: 4257: 4150: 4078: 4077: 4049:Bitcoin Unlimited 4004:Lightning Network 3248:978-3-642-03513-5 3214:978-3-642-03513-5 3090:978-0-387-09750-3 3015:978-3-540-25809-4 2941:978-1-4673-5952-8 2899:on 6 October 2013 2709:978-3-642-03513-5 2644:978-3-540-44179-3 2489:978-1-4614-5482-3 2447:978-0-387-09752-7 2342:978-3-540-40724-9 2240:978-0-387-09750-3 2177:978-0-387-09750-3 1665:www.kaspersky.com 1053:social networking 840:networks such as 660:denial of service 636:computer security 389:application layer 249:social networking 230:personal networks 203:network bandwidth 167:. In addition, a 119: 118: 111: 93: 6666: 6536:Open music model 6531:Friend-to-friend 6504: 6503: 6468:Sharing software 6134: 6133: 6109: 6102: 6095: 6086: 6085: 6072: 6071: 6062: 6061: 5910:operating system 5908:Security-focused 5856: 5681: 5256: 5255: 5161: 5154: 5147: 5138: 5137: 5035:Welcome to Video 4812:Internet Archive 4807:Doxbin (darknet) 4491:Voice of America 4407:Die Tageszeitung 4316: 4315: 4306: 4305: 4285: 4278: 4271: 4262: 4261: 4248: 4247: 4238: 4237: 4163:Bitcoin Magazine 4148: 4039: 4038: 3907:Tyler Winklevoss 3867:Satoshi Nakamoto 3773: 3766: 3759: 3750: 3749: 3618:, November 2002. 3572: 3520: 3506: 3500: 3499: 3481: 3457: 3451: 3448: 3439: 3438: 3427:Technical Report 3424: 3415: 3409: 3408: 3406: 3405: 3390: 3384: 3383: 3381: 3380: 3365: 3359: 3358: 3356: 3355: 3340: 3334: 3333: 3331: 3330: 3315: 3309: 3296: 3290: 3277: 3271: 3270: 3269:. March 3, 2020. 3259: 3253: 3252: 3234: 3228: 3225: 3219: 3218: 3200: 3194: 3191: 3182: 3178: 3172: 3152: 3146: 3145: 3143: 3142: 3127: 3121: 3120: 3115:. Archived from 3104: 3095: 3094: 3076: 3067: 3066: 3060: 3052: 3050: 3049: 3043: 3037:. Archived from 3036: 3026: 3020: 3019: 3003: 2994: 2988: 2987: 2961: 2955:Li, Jin (2008). 2952: 2946: 2945: 2926:. pp. 1–5. 2915: 2909: 2908: 2906: 2904: 2885: 2879: 2878: 2876: 2874: 2853: 2835: 2826: 2820: 2819: 2814:. Archived from 2807: 2801: 2800: 2792: 2786: 2785: 2783: 2781: 2766: 2760: 2759: 2737: 2731: 2730: 2728: 2720: 2714: 2713: 2695: 2684: 2682: 2675: 2669: 2648: 2616: 2610: 2609: 2607: 2605: 2596: 2587: 2581: 2580: 2558: 2552: 2551: 2549: 2543:. Archived from 2542: 2533: 2527: 2526: 2524: 2522: 2516: 2510:. Archived from 2509: 2500: 2494: 2493: 2473: 2467: 2466: 2458: 2452: 2451: 2431: 2425: 2424: 2418: 2410: 2408: 2407: 2402: 2393: 2387: 2373: 2367: 2353: 2347: 2346: 2326: 2310: 2304: 2303: 2283: 2277: 2266: 2260: 2259: 2251: 2245: 2244: 2226: 2220: 2219: 2191: 2182: 2181: 2163: 2157: 2156: 2134: 2128: 2127: 2105: 2096: 2095: 2073: 2067: 2066: 2044: 2038: 2037: 2017: 2011: 2010: 1990: 1984: 1983: 1981: 1980: 1966: 1960: 1959: 1957: 1956: 1942: 1936: 1935: 1933: 1924: 1918: 1905: 1899: 1898: 1872: 1859: 1858: 1820: 1814: 1813: 1811: 1809: 1798: 1792: 1791: 1789: 1788: 1782:10.1109/2.467613 1761: 1755: 1748: 1742: 1741: 1709: 1700: 1699: 1697: 1696: 1682: 1676: 1675: 1673: 1672: 1657: 1651: 1650: 1610: 1604: 1603: 1575: 1566: 1565: 1539: 1519: 1510: 1503: 1497: 1496: 1488: 1482: 1481: 1479: 1478: 1463: 1412:Friend-to-friend 1375: 1374: 1366: 1341:Current research 1229:Perpetrators of 1124:Cryptocurrencies 919:, undertaken by 816:Content delivery 699:computer viruses 114: 107: 103: 100: 94: 92: 51: 27: 19: 6674: 6673: 6669: 6668: 6667: 6665: 6664: 6663: 6629: 6628: 6627: 6622: 6560: 6550: 6495: 6416: 6390: 6345: 6335: 6284: 6158: 6127: 6118: 6113: 6083: 6078: 6050: 5997: 5974: 5958: 5927: 5909: 5902: 5850: 5842: 5813:Java Anon Proxy 5789: 5675: 5674: 5672:Disk encryption 5662: 5638:Google Messages 5623:Signal Protocol 5577: 5544: 5511: 5458: 5355: 5307: 5250: 5243: 5170: 5165: 5135: 5130: 5104: 5039: 4995: 4939: 4920: 4883: 4829: 4787: 4700:Darknet markets 4694: 4672: 4668:The Hidden Wiki 4600: 4553: 4544: 4534:KickassTorrents 4524:Freedom Hosting 4508: 4496: 4443:Radio Free Asia 4401:Current Time TV 4375: 4322: 4294: 4289: 4259: 4254: 4226: 4198: 4179:Canaan Creative 4149:(not exchanges) 4147: 4141: 4114: 4074: 4053: 4028: 3974:Bitcoin network 3962: 3931: 3882:Vitalik Buterin 3832:Brian Armstrong 3810: 3782: 3777: 3747: 3738:traffic shaping 3734:Wayback Machine 3716:Wayback Machine 3697:Wayback Machine 3659:Wayback Machine 3645:Wayback Machine 3612:Wayback Machine 3598:Wayback Machine 3584:Wayback Machine 3541:Wayback Machine 3528: 3523: 3507: 3503: 3479:10.1145/3578581 3458: 3454: 3449: 3442: 3422: 3416: 3412: 3403: 3401: 3392: 3391: 3387: 3378: 3376: 3366: 3362: 3353: 3351: 3341: 3337: 3328: 3326: 3316: 3312: 3307:Wayback Machine 3297: 3293: 3288:Wayback Machine 3278: 3274: 3261: 3260: 3256: 3249: 3235: 3231: 3226: 3222: 3215: 3201: 3197: 3192: 3185: 3179: 3175: 3163:Wayback Machine 3153: 3149: 3140: 3138: 3128: 3124: 3105: 3098: 3091: 3077: 3070: 3054: 3053: 3047: 3045: 3041: 3034: 3032:"Archived copy" 3030: 3027: 3023: 3016: 3001: 2995: 2991: 2970:(1): 45–63 ≤≥. 2959: 2953: 2949: 2942: 2916: 2912: 2902: 2900: 2893:www.p2pnews.net 2887: 2886: 2882: 2872: 2870: 2833: 2827: 2823: 2808: 2804: 2793: 2789: 2779: 2777: 2767: 2763: 2756: 2738: 2734: 2726: 2722: 2721: 2717: 2710: 2696: 2687: 2677: 2676: 2672: 2667:Wayback Machine 2657:Wayback Machine 2645: 2617: 2613: 2603: 2601: 2594: 2588: 2584: 2577: 2559: 2555: 2547: 2540: 2534: 2530: 2520: 2518: 2514: 2507: 2501: 2497: 2490: 2474: 2470: 2459: 2455: 2448: 2432: 2428: 2412: 2411: 2405: 2403: 2400: 2394: 2390: 2384:Wayback Machine 2374: 2370: 2364:Wayback Machine 2354: 2350: 2343: 2311: 2307: 2300: 2284: 2280: 2267: 2263: 2258:. ResearchGate. 2252: 2248: 2241: 2227: 2223: 2216: 2192: 2185: 2178: 2164: 2160: 2153: 2135: 2131: 2124: 2106: 2099: 2092: 2074: 2070: 2063: 2045: 2041: 2034: 2018: 2014: 2007: 1991: 1987: 1978: 1976: 1968: 1967: 1963: 1954: 1952: 1944: 1943: 1939: 1931: 1925: 1921: 1916:Wayback Machine 1906: 1902: 1895: 1873: 1862: 1847: 1821: 1817: 1807: 1805: 1799: 1795: 1786: 1784: 1776:(10): 100–101. 1762: 1758: 1749: 1745: 1730: 1710: 1703: 1694: 1692: 1690:www.openu.ac.il 1684: 1683: 1679: 1670: 1668: 1659: 1658: 1654: 1611: 1607: 1592: 1576: 1569: 1520: 1513: 1504: 1500: 1489: 1485: 1476: 1474: 1464: 1460: 1456: 1451: 1432:Sharing economy 1381: 1369: 1361: 1359: 1343: 1295: 1248: 1243: 1216:data validation 1192: 1156: 1151: 1049:gossip protocol 959:overlay network 937: 897: 871: 850:eDonkey network 835: 818: 813: 754: 741: 731: 679: 673:Data validation 669: 656: 654:Routing attacks 648:remote exploits 644:vulnerabilities 632: 620:Streaming media 580: 567: 453: 406: 377:overlay network 373: 351: 345:restrictions". 290:Tim Berners-Lee 261: 236:displaying and 134: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 6672: 6662: 6661: 6656: 6651: 6646: 6641: 6624: 6623: 6621: 6620: 6615: 6610: 6605: 6600: 6595: 6590: 6585: 6580: 6575: 6570: 6564: 6562: 6556: 6555: 6552: 6551: 6549: 6548: 6543: 6538: 6533: 6528: 6523: 6518: 6512: 6510: 6501: 6497: 6496: 6494: 6493: 6488: 6470: 6465: 6460: 6455: 6450: 6445: 6440: 6435: 6430: 6424: 6422: 6418: 6417: 6415: 6414: 6409: 6404: 6398: 6396: 6392: 6391: 6389: 6388: 6383: 6378: 6373: 6368: 6366:Direct Connect 6363: 6358: 6352: 6350: 6341: 6340: 6337: 6336: 6334: 6333: 6328: 6323: 6318: 6313: 6308: 6303: 6298: 6292: 6290: 6286: 6285: 6283: 6282: 6277: 6272: 6267: 6262: 6257: 6252: 6247: 6242: 6237: 6232: 6227: 6222: 6217: 6212: 6207: 6202: 6197: 6192: 6187: 6182: 6177: 6172: 6166: 6164: 6160: 6159: 6157: 6156: 6151: 6146: 6144:Direct Connect 6140: 6138: 6131: 6120: 6119: 6112: 6111: 6104: 6097: 6089: 6080: 6079: 6077: 6076: 6066: 6055: 6052: 6051: 6049: 6048: 6043: 6038: 6033: 6032: 6031: 6026: 6019:Hash functions 6016: 6011: 6005: 6003: 6002:Related topics 5999: 5998: 5996: 5995: 5990: 5984: 5982: 5976: 5975: 5973: 5972: 5966: 5964: 5960: 5959: 5957: 5956: 5951: 5946: 5941: 5935: 5933: 5929: 5928: 5926: 5925: 5920: 5914: 5912: 5904: 5903: 5901: 5900: 5895: 5890: 5885: 5880: 5875: 5870: 5865: 5859: 5857: 5844: 5843: 5841: 5840: 5835: 5830: 5825: 5820: 5815: 5810: 5805: 5799: 5797: 5791: 5790: 5788: 5787: 5782: 5781: 5780: 5770: 5765: 5760: 5755: 5750: 5745: 5740: 5735: 5730: 5725: 5720: 5715: 5710: 5705: 5700: 5695: 5690: 5684: 5682: 5668: 5667: 5664: 5663: 5661: 5660: 5657: 5656: 5655: 5650: 5645: 5640: 5635: 5630: 5620: 5615: 5610: 5609: 5608: 5603: 5593: 5587: 5585: 5579: 5578: 5576: 5575: 5570: 5565: 5560: 5554: 5552: 5546: 5545: 5543: 5542: 5537: 5532: 5527: 5521: 5519: 5513: 5512: 5510: 5509: 5504: 5499: 5494: 5489: 5484: 5479: 5474: 5468: 5466: 5460: 5459: 5457: 5456: 5451: 5446: 5441: 5436: 5431: 5426: 5421: 5416: 5411: 5406: 5401: 5396: 5391: 5386: 5381: 5376: 5371: 5369:BBM Enterprise 5365: 5363: 5357: 5356: 5354: 5353: 5348: 5343: 5338: 5333: 5328: 5323: 5317: 5315: 5309: 5308: 5306: 5305: 5300: 5295: 5290: 5285: 5280: 5275: 5270: 5264: 5262: 5253: 5245: 5244: 5242: 5241: 5236: 5231: 5226: 5221: 5216: 5211: 5201: 5196: 5191: 5186: 5180: 5178: 5172: 5171: 5164: 5163: 5156: 5149: 5141: 5132: 5131: 5129: 5128: 5125: 5120: 5115: 5109: 5106: 5105: 5103: 5102: 5096: 5090: 5084: 5078: 5072: 5066: 5060: 5054: 5047: 5045: 5041: 5040: 5038: 5037: 5032: 5026: 5021: 5016: 5011: 5005: 5003: 4997: 4996: 4994: 4993: 4988: 4982: 4976: 4971: 4966: 4961: 4956: 4949: 4947: 4945:Whistleblowing 4941: 4940: 4938: 4937: 4930: 4928: 4922: 4921: 4919: 4918: 4912: 4906: 4900: 4893: 4891: 4885: 4884: 4882: 4881: 4876: 4870: 4864: 4858: 4852: 4846: 4839: 4837: 4831: 4830: 4828: 4827: 4821: 4815: 4809: 4804: 4797: 4795: 4789: 4788: 4786: 4785: 4780: 4775: 4770: 4765: 4760: 4755: 4750: 4745: 4740: 4735: 4730: 4725: 4720: 4715: 4710: 4704: 4702: 4696: 4695: 4693: 4692: 4687: 4684:Blockchain.com 4680: 4678: 4674: 4673: 4671: 4670: 4665: 4659: 4653: 4647: 4642: 4637: 4631: 4626: 4621: 4614: 4612: 4602: 4601: 4599: 4598: 4593: 4588: 4582: 4576: 4570: 4565: 4559: 4557: 4546: 4545: 4543: 4542: 4539:The Pirate Bay 4536: 4531: 4526: 4521: 4514: 4512: 4498: 4497: 4495: 4494: 4488: 4482: 4474: 4466: 4460: 4452: 4446: 4440: 4434: 4429: 4424: 4416: 4413:Deutsche Welle 4410: 4404: 4398: 4392: 4385: 4383: 4377: 4376: 4374: 4373: 4367: 4361: 4356: 4350: 4344: 4338: 4332: 4330: 4328:Search engines 4324: 4323: 4321: 4320: 4310: 4299: 4296: 4295: 4288: 4287: 4280: 4273: 4265: 4256: 4255: 4253: 4252: 4242: 4231: 4228: 4227: 4225: 4224: 4219: 4214: 4208: 4206: 4200: 4199: 4197: 4196: 4191: 4186: 4181: 4176: 4171: 4166: 4159: 4153: 4151: 4146:Legal entities 4143: 4142: 4140: 4139: 4131: 4122: 4120: 4116: 4115: 4113: 4112: 4107: 4102: 4097: 4092: 4086: 4084: 4080: 4079: 4076: 4075: 4073: 4072: 4067: 4061: 4059: 4055: 4054: 4052: 4051: 4045: 4043: 4036: 4030: 4029: 4027: 4026: 4021: 4016: 4011: 4006: 4001: 3996: 3991: 3986: 3984:Cryptocurrency 3981: 3976: 3970: 3968: 3964: 3963: 3961: 3960: 3955: 3950: 3945: 3939: 3937: 3933: 3932: 3930: 3929: 3924: 3919: 3914: 3909: 3904: 3899: 3894: 3889: 3884: 3879: 3874: 3869: 3864: 3859: 3854: 3849: 3844: 3842:Wences Casares 3839: 3834: 3829: 3824: 3822:Gavin Andresen 3818: 3816: 3812: 3811: 3809: 3808: 3803: 3798: 3793: 3787: 3784: 3783: 3776: 3775: 3768: 3761: 3753: 3746: 3745: 3724: 3704: 3683: 3666: 3648: 3634: 3619: 3601: 3587: 3573: 3556: 3550: 3544: 3529: 3527: 3526:External links 3524: 3522: 3521: 3501: 3452: 3440: 3410: 3385: 3360: 3335: 3310: 3291: 3272: 3254: 3247: 3229: 3220: 3213: 3195: 3183: 3173: 3147: 3122: 3119:on 2012-03-10. 3096: 3089: 3068: 3021: 3014: 2989: 2947: 2940: 2910: 2880: 2821: 2818:on 2012-07-24. 2802: 2787: 2775:New York Times 2761: 2754: 2732: 2715: 2708: 2685: 2670: 2643: 2611: 2582: 2575: 2553: 2550:on 2008-09-10. 2528: 2517:on 14 May 2011 2495: 2488: 2468: 2453: 2446: 2426: 2388: 2368: 2348: 2341: 2324:10.1.1.12.5548 2305: 2298: 2278: 2261: 2246: 2239: 2221: 2214: 2183: 2176: 2158: 2151: 2129: 2122: 2097: 2090: 2068: 2061: 2039: 2032: 2012: 2005: 1985: 1961: 1937: 1927:Sharma, M. K. 1919: 1900: 1893: 1860: 1845: 1815: 1793: 1756: 1743: 1728: 1701: 1677: 1652: 1625:(2): 170–184. 1605: 1591:978-0970284679 1590: 1567: 1530:(3): 257–276. 1511: 1498: 1483: 1457: 1455: 1452: 1450: 1449: 1444: 1439: 1434: 1429: 1424: 1419: 1414: 1409: 1404: 1399: 1393: 1388: 1382: 1380: 1379: 1358: 1355: 1342: 1339: 1310:October 2007, 1294: 1291: 1282:European Union 1247: 1244: 1242: 1239: 1191: 1188: 1155: 1152: 1150: 1147: 1146: 1145: 1140: 1088:torrent client 1073:Anthony Tether 971:onion services 936: 933: 896: 893: 870: 867: 834: 831: 817: 814: 812: 809: 762:software libre 753: 750: 730: 727: 668: 665: 655: 652: 631: 628: 579: 576: 566: 563: 559:grid computing 452: 449: 405: 402: 372: 369: 350: 347: 294:World Wide Web 260: 257: 244:refers to the 117: 116: 58:"Peer-to-peer" 31: 29: 22: 15: 9: 6: 4: 3: 2: 6671: 6660: 6657: 6655: 6652: 6650: 6647: 6645: 6642: 6640: 6637: 6636: 6634: 6619: 6616: 6614: 6611: 6609: 6606: 6604: 6603:Super-seeding 6601: 6599: 6596: 6594: 6591: 6589: 6586: 6584: 6583:Peer exchange 6581: 6579: 6578:NAT traversal 6576: 6574: 6571: 6569: 6566: 6565: 6563: 6557: 6547: 6544: 6542: 6539: 6537: 6534: 6532: 6529: 6527: 6524: 6522: 6519: 6517: 6516:Anonymous P2P 6514: 6513: 6511: 6509: 6505: 6502: 6498: 6492: 6491:Legal aspects 6489: 6486: 6482: 6478: 6474: 6471: 6469: 6466: 6464: 6461: 6459: 6456: 6454: 6453:Music sharing 6451: 6449: 6448:Image sharing 6446: 6444: 6441: 6439: 6436: 6434: 6433:Broadcatching 6431: 6429: 6426: 6425: 6423: 6419: 6413: 6410: 6408: 6405: 6403: 6400: 6399: 6397: 6393: 6387: 6384: 6382: 6379: 6377: 6374: 6372: 6369: 6367: 6364: 6362: 6359: 6357: 6354: 6353: 6351: 6349: 6342: 6332: 6329: 6327: 6324: 6322: 6319: 6317: 6314: 6312: 6309: 6307: 6304: 6302: 6299: 6297: 6294: 6293: 6291: 6287: 6281: 6278: 6276: 6273: 6271: 6268: 6266: 6263: 6261: 6258: 6256: 6253: 6251: 6248: 6246: 6243: 6241: 6238: 6236: 6233: 6231: 6228: 6226: 6223: 6221: 6218: 6216: 6213: 6211: 6208: 6206: 6203: 6201: 6198: 6196: 6193: 6191: 6188: 6186: 6183: 6181: 6178: 6176: 6173: 6171: 6168: 6167: 6165: 6163:Decentralized 6161: 6155: 6152: 6150: 6147: 6145: 6142: 6141: 6139: 6135: 6132: 6130: 6125: 6121: 6117: 6110: 6105: 6103: 6098: 6096: 6091: 6090: 6087: 6075: 6067: 6065: 6057: 6056: 6053: 6047: 6044: 6042: 6039: 6037: 6034: 6030: 6027: 6025: 6022: 6021: 6020: 6017: 6015: 6012: 6010: 6007: 6006: 6004: 6000: 5994: 5991: 5989: 5986: 5985: 5983: 5981: 5977: 5971: 5968: 5967: 5965: 5961: 5955: 5952: 5950: 5947: 5945: 5942: 5940: 5937: 5936: 5934: 5930: 5924: 5921: 5919: 5916: 5915: 5913: 5911: 5905: 5899: 5896: 5894: 5891: 5889: 5886: 5884: 5881: 5879: 5876: 5874: 5871: 5869: 5866: 5864: 5861: 5860: 5858: 5854: 5849: 5845: 5839: 5836: 5834: 5831: 5829: 5826: 5824: 5821: 5819: 5816: 5814: 5811: 5809: 5806: 5804: 5801: 5800: 5798: 5796: 5792: 5786: 5783: 5779: 5776: 5775: 5774: 5771: 5769: 5766: 5764: 5761: 5759: 5756: 5754: 5751: 5749: 5746: 5744: 5741: 5739: 5736: 5734: 5731: 5729: 5726: 5724: 5721: 5719: 5716: 5714: 5711: 5709: 5706: 5704: 5701: 5699: 5696: 5694: 5691: 5689: 5686: 5685: 5683: 5679: 5673: 5669: 5658: 5654: 5651: 5649: 5646: 5644: 5641: 5639: 5636: 5634: 5631: 5629: 5626: 5625: 5624: 5621: 5619: 5616: 5614: 5611: 5607: 5604: 5602: 5599: 5598: 5597: 5594: 5592: 5589: 5588: 5586: 5584: 5580: 5574: 5571: 5569: 5566: 5564: 5561: 5559: 5556: 5555: 5553: 5551: 5547: 5541: 5538: 5536: 5533: 5531: 5528: 5526: 5523: 5522: 5520: 5518: 5514: 5508: 5505: 5503: 5500: 5498: 5495: 5493: 5492:SoftEther VPN 5490: 5488: 5485: 5483: 5480: 5478: 5475: 5473: 5470: 5469: 5467: 5465: 5461: 5455: 5452: 5450: 5447: 5445: 5442: 5440: 5437: 5435: 5432: 5430: 5427: 5425: 5422: 5420: 5417: 5415: 5412: 5410: 5407: 5405: 5402: 5400: 5397: 5395: 5392: 5390: 5387: 5385: 5382: 5380: 5377: 5375: 5374:Bouncy Castle 5372: 5370: 5367: 5366: 5364: 5362: 5361:TLS & SSL 5358: 5352: 5349: 5347: 5344: 5342: 5339: 5337: 5334: 5332: 5329: 5327: 5324: 5322: 5319: 5318: 5316: 5314: 5310: 5304: 5301: 5299: 5296: 5294: 5291: 5289: 5286: 5284: 5281: 5279: 5276: 5274: 5271: 5269: 5266: 5265: 5263: 5261: 5257: 5254: 5252: 5251:communication 5246: 5240: 5237: 5235: 5232: 5230: 5227: 5225: 5222: 5220: 5217: 5215: 5212: 5209: 5205: 5202: 5200: 5197: 5195: 5192: 5190: 5187: 5185: 5182: 5181: 5179: 5177: 5176:Email clients 5173: 5169: 5162: 5157: 5155: 5150: 5148: 5143: 5142: 5139: 5126: 5124: 5121: 5119: 5118:.onion domain 5116: 5114: 5111: 5110: 5107: 5100: 5097: 5094: 5091: 5088: 5085: 5082: 5079: 5076: 5073: 5070: 5067: 5064: 5061: 5058: 5055: 5052: 5049: 5048: 5046: 5042: 5036: 5033: 5030: 5027: 5025: 5022: 5020: 5017: 5015: 5012: 5010: 5007: 5006: 5004: 5002: 4998: 4992: 4989: 4986: 4983: 4980: 4977: 4975: 4972: 4970: 4967: 4965: 4962: 4960: 4957: 4954: 4951: 4950: 4948: 4946: 4942: 4935: 4932: 4931: 4929: 4927: 4923: 4916: 4913: 4910: 4907: 4904: 4901: 4898: 4895: 4894: 4892: 4890: 4886: 4880: 4877: 4874: 4871: 4868: 4865: 4862: 4859: 4856: 4853: 4850: 4847: 4844: 4841: 4840: 4838: 4836: 4832: 4825: 4822: 4819: 4816: 4813: 4810: 4808: 4805: 4802: 4801:Archive.today 4799: 4798: 4796: 4794: 4790: 4784: 4781: 4779: 4776: 4774: 4771: 4769: 4766: 4764: 4761: 4759: 4756: 4754: 4751: 4749: 4746: 4744: 4741: 4739: 4736: 4734: 4731: 4729: 4726: 4724: 4721: 4719: 4716: 4714: 4711: 4709: 4706: 4705: 4703: 4701: 4697: 4691: 4688: 4685: 4682: 4681: 4679: 4675: 4669: 4666: 4663: 4660: 4657: 4654: 4651: 4648: 4646: 4643: 4641: 4638: 4635: 4632: 4630: 4627: 4625: 4622: 4619: 4616: 4615: 4613: 4611: 4607: 4603: 4597: 4594: 4592: 4589: 4586: 4583: 4580: 4577: 4574: 4571: 4569: 4566: 4564: 4563:Bitmessage.ch 4561: 4560: 4558: 4556: 4551: 4547: 4540: 4537: 4535: 4532: 4530: 4527: 4525: 4522: 4519: 4516: 4515: 4513: 4511: 4507: 4503: 4499: 4492: 4489: 4486: 4483: 4480: 4479: 4475: 4472: 4471: 4470:The Intercept 4467: 4464: 4461: 4458: 4457: 4453: 4450: 4447: 4444: 4441: 4438: 4435: 4433: 4430: 4428: 4425: 4422: 4421: 4417: 4414: 4411: 4408: 4405: 4402: 4399: 4396: 4393: 4390: 4387: 4386: 4384: 4382: 4378: 4371: 4368: 4365: 4362: 4360: 4357: 4354: 4351: 4348: 4345: 4342: 4339: 4337: 4334: 4333: 4331: 4329: 4325: 4319: 4311: 4309: 4301: 4300: 4297: 4293: 4286: 4281: 4279: 4274: 4272: 4267: 4266: 4263: 4251: 4243: 4241: 4233: 4232: 4229: 4223: 4220: 4218: 4217:Bitcoin Beach 4215: 4213: 4210: 4209: 4207: 4205: 4201: 4195: 4192: 4190: 4187: 4185: 4182: 4180: 4177: 4175: 4172: 4170: 4167: 4165: 4164: 4160: 4158: 4155: 4154: 4152: 4144: 4137: 4136: 4132: 4129: 4128: 4124: 4123: 4121: 4117: 4111: 4108: 4106: 4103: 4101: 4098: 4096: 4093: 4091: 4088: 4087: 4085: 4081: 4071: 4068: 4066: 4063: 4062: 4060: 4056: 4050: 4047: 4046: 4044: 4040: 4037: 4035: 4031: 4025: 4022: 4020: 4017: 4015: 4014:Proof of work 4012: 4010: 4007: 4005: 4002: 4000: 3997: 3995: 3992: 3990: 3987: 3985: 3982: 3980: 3977: 3975: 3972: 3971: 3969: 3965: 3959: 3956: 3954: 3951: 3949: 3946: 3944: 3941: 3940: 3938: 3934: 3928: 3927:Erik Voorhees 3925: 3923: 3920: 3918: 3915: 3913: 3910: 3908: 3905: 3903: 3900: 3898: 3895: 3893: 3890: 3888: 3887:Ross Ulbricht 3885: 3883: 3880: 3878: 3875: 3873: 3872:Charlie Shrem 3870: 3868: 3865: 3863: 3862:Mark Karpelès 3860: 3858: 3855: 3853: 3850: 3848: 3845: 3843: 3840: 3838: 3835: 3833: 3830: 3828: 3825: 3823: 3820: 3819: 3817: 3813: 3807: 3804: 3802: 3799: 3797: 3794: 3792: 3789: 3788: 3785: 3781: 3774: 3769: 3767: 3762: 3760: 3755: 3754: 3751: 3743: 3739: 3735: 3731: 3728: 3725: 3722: 3718: 3717: 3713: 3710: 3705: 3702: 3698: 3694: 3691: 3687: 3684: 3681: 3680:1-59140-429-0 3677: 3673: 3672: 3667: 3664: 3660: 3656: 3653: 3649: 3646: 3642: 3639: 3635: 3632: 3628: 3624: 3620: 3617: 3613: 3609: 3606: 3602: 3599: 3595: 3592: 3588: 3585: 3581: 3578: 3574: 3570: 3566: 3562: 3557: 3554: 3551: 3548: 3545: 3542: 3538: 3535: 3531: 3530: 3519: 3515: 3511: 3505: 3497: 3493: 3489: 3485: 3480: 3475: 3472:(14s): 1–69. 3471: 3467: 3463: 3456: 3447: 3445: 3436: 3432: 3428: 3421: 3414: 3399: 3395: 3389: 3375: 3371: 3364: 3350: 3346: 3339: 3325: 3321: 3314: 3308: 3304: 3301: 3295: 3289: 3285: 3282: 3276: 3268: 3264: 3258: 3250: 3244: 3240: 3233: 3224: 3216: 3210: 3206: 3199: 3190: 3188: 3177: 3170: 3169: 3164: 3160: 3157: 3151: 3137: 3133: 3126: 3118: 3114: 3113:news.cnet.com 3110: 3103: 3101: 3092: 3086: 3082: 3075: 3073: 3064: 3058: 3044:on 2011-04-29 3040: 3033: 3025: 3017: 3011: 3007: 3000: 2993: 2985: 2981: 2977: 2973: 2969: 2965: 2958: 2951: 2943: 2937: 2933: 2929: 2925: 2921: 2914: 2898: 2894: 2890: 2884: 2869: 2865: 2861: 2857: 2852: 2851:10.1.1.5.3597 2847: 2843: 2839: 2832: 2825: 2817: 2813: 2806: 2798: 2791: 2776: 2772: 2765: 2757: 2755:9783540736134 2751: 2747: 2743: 2736: 2725: 2719: 2711: 2705: 2701: 2694: 2692: 2690: 2680: 2674: 2668: 2664: 2661: 2658: 2654: 2651: 2646: 2640: 2636: 2632: 2628: 2624: 2623: 2615: 2600: 2593: 2586: 2578: 2576:9783540291923 2572: 2568: 2564: 2557: 2546: 2539: 2532: 2513: 2506: 2499: 2491: 2485: 2481: 2480: 2472: 2464: 2457: 2449: 2443: 2439: 2438: 2430: 2422: 2416: 2399: 2392: 2385: 2381: 2378: 2372: 2365: 2361: 2358: 2352: 2344: 2338: 2334: 2330: 2325: 2320: 2316: 2309: 2301: 2299:9780769515823 2295: 2291: 2290: 2282: 2275: 2271: 2265: 2257: 2250: 2242: 2236: 2232: 2225: 2217: 2215:9783540441793 2211: 2207: 2203: 2202: 2197: 2190: 2188: 2179: 2173: 2169: 2162: 2154: 2152:9780387784489 2148: 2144: 2140: 2133: 2125: 2123:9781466507616 2119: 2115: 2111: 2104: 2102: 2093: 2091:9783642230738 2087: 2083: 2079: 2072: 2064: 2062:9783540726050 2058: 2054: 2050: 2043: 2035: 2033:9781616928339 2029: 2025: 2024: 2016: 2008: 2006:9781420066043 2002: 1998: 1997: 1989: 1975: 1971: 1965: 1951: 1947: 1941: 1930: 1923: 1917: 1913: 1910: 1904: 1896: 1894:9783540291923 1890: 1886: 1882: 1878: 1871: 1869: 1867: 1865: 1856: 1852: 1848: 1842: 1838: 1834: 1830: 1826: 1819: 1804: 1797: 1783: 1779: 1775: 1771: 1767: 1760: 1753: 1752:Host Software 1747: 1739: 1735: 1731: 1729:9780596001100 1725: 1721: 1717: 1716: 1708: 1706: 1691: 1687: 1681: 1666: 1662: 1656: 1648: 1644: 1640: 1636: 1632: 1628: 1624: 1620: 1616: 1609: 1601: 1597: 1593: 1587: 1583: 1582: 1574: 1572: 1563: 1559: 1555: 1551: 1547: 1543: 1538: 1533: 1529: 1525: 1518: 1516: 1508: 1502: 1494: 1487: 1473: 1472:Computerworld 1469: 1462: 1458: 1448: 1445: 1443: 1442:USB dead drop 1440: 1438: 1437:SponsorChange 1435: 1433: 1430: 1428: 1425: 1423: 1420: 1418: 1415: 1413: 1410: 1408: 1405: 1403: 1400: 1397: 1394: 1392: 1389: 1387: 1384: 1383: 1378: 1373: 1368: 1367: 1364: 1354: 1350: 1347: 1338: 1336: 1332: 1328: 1324: 1323:client–server 1319: 1317: 1313: 1308: 1304: 1300: 1290: 1287: 1283: 1278: 1275: 1269: 1267: 1266: 1261: 1259: 1254: 1238: 1236: 1232: 1227: 1225: 1221: 1220:Onion routing 1217: 1213: 1209: 1205: 1201: 1197: 1187: 1183: 1179: 1172: 1168: 1166: 1160: 1144: 1141: 1139: 1136: 1135: 1134: 1133: 1129: 1125: 1121: 1117: 1113: 1109: 1105: 1101: 1097: 1093: 1089: 1086: 1082: 1078: 1074: 1070: 1066: 1062: 1058: 1054: 1050: 1046: 1042: 1038: 1034: 1030: 1029:Chord project 1026: 1022: 1020: 1016: 1012: 1008: 1007:Java platform 1004: 1000: 996: 992: 988: 984: 980: 976: 972: 968: 964: 960: 956: 952: 946:connect peers 945: 941: 932: 930: 926: 922: 918: 914: 910: 906: 902: 892: 890: 889: 884: 882: 877: 866: 864: 860: 855: 851: 847: 843: 839: 830: 827: 823: 808: 806: 802: 796: 794: 790: 786: 783:For example, 781: 779: 771: 767: 763: 758: 749: 746: 740: 736: 726: 724: 720: 715: 711: 708:network, the 707: 702: 700: 696: 692: 688: 684: 678: 674: 664: 661: 651: 649: 645: 641: 637: 627: 625: 621: 617: 613: 609: 604: 600: 596: 592: 588: 584: 575: 572: 565:Hybrid models 562: 560: 556: 552: 548: 544: 540: 539:Chord project 536: 532: 528: 524: 520: 515: 513: 503: 499: 497: 493: 489: 485: 481: 476: 474: 466: 462: 457: 448: 446: 440: 436: 434: 430: 426: 422: 415: 410: 401: 399: 395: 390: 386: 382: 378: 368: 366: 362: 361:client–server 358: 357: 346: 343: 342:Shawn Fanning 338: 336: 335:Email clients 332: 328: 324: 320: 319:client–server 316: 312: 307: 304: 300: 295: 291: 287: 285: 281: 277: 269: 265: 256: 254: 250: 247: 243: 239: 235: 231: 227: 223: 219: 215: 210: 208: 204: 197: 193: 192: 187: 186: 180: 176: 174: 173:decentralized 170: 166: 162: 158: 154: 150: 143: 138: 132: 128: 124: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 6654:File sharing 6639:Peer-to-peer 6561:technologies 6438:Disk sharing 6245:Perfect Dark 5848:File systems 5758:Private Disk 5549: 4748:Hydra Market 4728:Dream Market 4606:Social media 4510:file sharing 4506:peer-to-peer 4505: 4502:File storage 4476: 4468: 4456:The Guardian 4454: 4418: 4341:Brave Search 4222:Bitcoin City 4161: 4133: 4125: 4070:Bitcoin Gold 4065:Bitcoin Cash 4008: 3967:Technologies 3917:Dave Kleiman 3912:Craig Wright 3801:Legal status 3707: 3669: 3662: 3615: 3568: 3564: 3504: 3469: 3465: 3455: 3426: 3413: 3402:. Retrieved 3400:. 2022-07-01 3397: 3388: 3377:. Retrieved 3374:Ars Technica 3373: 3363: 3352:. Retrieved 3348: 3338: 3327:. Retrieved 3323: 3313: 3294: 3275: 3266: 3257: 3238: 3232: 3223: 3204: 3198: 3176: 3166: 3150: 3139:. Retrieved 3135: 3125: 3117:the original 3112: 3080: 3046:. Retrieved 3039:the original 3024: 3005: 2992: 2967: 2963: 2950: 2923: 2913: 2901:. Retrieved 2897:the original 2892: 2883: 2871:. Retrieved 2844:(2): 43–48. 2841: 2837: 2824: 2816:the original 2805: 2796: 2790: 2778:. Retrieved 2774: 2764: 2745: 2735: 2718: 2699: 2673: 2621: 2614: 2602:. Retrieved 2598: 2585: 2569:. Springer. 2566: 2556: 2545:the original 2531: 2519:. Retrieved 2512:the original 2498: 2482:. Springer. 2478: 2471: 2462: 2456: 2436: 2429: 2404:. Retrieved 2391: 2371: 2351: 2314: 2308: 2288: 2281: 2273: 2269: 2264: 2249: 2230: 2224: 2200: 2167: 2161: 2142: 2132: 2113: 2081: 2071: 2052: 2042: 2022: 2015: 1995: 1988: 1977:. Retrieved 1973: 1964: 1953:. Retrieved 1949: 1940: 1922: 1903: 1876: 1828: 1818: 1806:. Retrieved 1796: 1785:. Retrieved 1773: 1769: 1759: 1751: 1746: 1722:: O'Reilly. 1714: 1693:. Retrieved 1689: 1680: 1669:. Retrieved 1667:. 2023-04-19 1664: 1655: 1622: 1618: 1608: 1580: 1527: 1523: 1506: 1501: 1486: 1475:. Retrieved 1471: 1461: 1351: 1348: 1344: 1320: 1296: 1285: 1279: 1270: 1263: 1256: 1249: 1228: 1193: 1184: 1180: 1176: 1162: 1096:web browsers 1025:Resilio Sync 1023: 977:(IPFS) is a 949: 944:Torrent file 898: 886: 879: 872: 863:file sharing 836: 821: 819: 811:Applications 797: 782: 775: 742: 703: 680: 657: 633: 582: 581: 568: 531:Storm botnet 523:BitTorrent's 516: 511: 508: 495: 491: 490:: that is, ( 477: 472: 470: 460: 441: 437: 420: 419: 413: 397: 394:unstructured 393: 374: 354: 352: 349:Architecture 339: 323:news servers 308: 299:broadcasting 288: 276:file sharing 273: 211: 200: 190: 183: 152: 149:Peer-to-peer 148: 147: 141: 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 6573:Merkle tree 6541:Private P2P 6473:Web hosting 6458:Peercasting 6344:Comparisons 6296:Audiogalaxy 6137:Centralized 5963:Educational 5768:Sentry 2020 5713:DriveSentry 5633:Google Allo 5239:Thunderbird 5019:Lolita City 5014:Childs Play 5001:Pornography 4974:NawaatLeaks 4763:TheRealDeal 4579:Proton Mail 4427:Darknetlive 4212:Bitcoin Law 4138:(2015 film) 4130:(2014 film) 3994:Bitcoin ATM 3897:Cody Wilson 3398:nordvpn.com 1335:P2P caching 1235:cybercrimes 1224:mix network 1132:blockchains 1094:for use in 1019:Open Garden 967:Tor network 963:anonymously 923:, MIT, and 913:Peercasting 909:proprietary 527:Kad network 309:Therefore, 259:Development 246:egalitarian 99:August 2024 6633:Categories 6395:Hyperlinks 6386:WebTorrent 6361:BitTorrent 6265:WebTorrent 6250:Retroshare 6240:OnionShare 6170:BitTorrent 5954:NordLocker 5898:Tahoe-LAFS 5888:Rubberhose 5828:RetroShare 5703:Cryptoloop 5698:CrossCrypt 5678:Comparison 5648:TextSecure 5606:ChatSecure 5568:RetroShare 5558:Bitmessage 5497:strongSwan 5283:ChatSecure 5194:Claws Mail 5184:Apple Mail 5093:OnionShare 4979:SecureDrop 4964:GlobaLeaks 4926:Government 4662:Kiwi Farms 4485:ProPublica 4437:ProPublica 4432:DeepDotWeb 4395:Bellingcat 4347:DuckDuckGo 3979:Blockchain 3877:Nick Szabo 3852:Hal Finney 3847:Tim Draper 3631:0123742145 3586:, May 2006 3565:Pragocrypt 3404:2024-08-21 3379:2018-03-29 3354:2018-03-29 3329:2018-03-29 3141:2010-05-22 3048:2011-03-12 2903:10 October 2780:5 November 2406:2019-08-24 1979:2024-08-21 1955:2024-08-21 1846:1595930450 1808:5 November 1787:2023-12-14 1695:2024-07-15 1671:2023-10-24 1477:2021-12-21 1454:References 1316:BitTorrent 1233:and other 1222:and other 1212:encryption 1165:BitTorrent 1112:Windows 10 1104:BitTorrent 1092:JavaScript 1081:WebTorrent 1065:M-commerce 987:hypermedia 895:Multimedia 865:networks. 848:, and the 826:Bittorrent 733:See also: 671:See also: 587:downloaded 533:, and the 488:hash table 463:, using a 398:structured 226:BitTorrent 161:equipotent 69:newspapers 6463:Seedboxes 6381:Gnutella2 6210:Gnutella2 6185:FastTrack 6129:protocols 5795:Anonymity 5785:VeraCrypt 5773:TrueCrypt 5763:Scramdisk 5728:FileVault 5693:BitLocker 5688:BestCrypt 5601:Cryptocat 5507:WireGuard 5409:MatrixSSL 5379:BoringSSL 5341:SecureCRT 5303:Profanity 5278:Centericq 5189:Autocrypt 4991:WildLeaks 4985:WikiLeaks 4879:Telecomix 4824:Z-Library 4758:Silk Road 4733:Evolution 4677:Financial 3892:Roger Ver 3837:Adam Back 3796:Economics 3736:test P2P 3496:256106264 3488:0360-0300 3435:1652-926X 3349:Big Think 3168:Channel 9 2873:8 October 2846:CiteSeerX 2604:8 October 2521:25 August 2319:CiteSeerX 1738:123103147 1639:1432-1882 1537:1207.0790 1307:bandwidth 1253:copyright 1204:anonymity 1130:that use 1116:LANtastic 1108:Microsoft 1085:streaming 1083:is a P2P 1057:Syncthing 1039:,and the 1011:Netsukuku 917:LionShare 876:copyright 768:, a free 706:FastTrack 597:. When a 286:, RFC 1. 268:SETI@home 238:Bluetooth 6559:Internal 6500:Concepts 6477:Freesite 6412:Metalink 6376:Gnutella 6316:Morpheus 6311:LimeWire 6289:Historic 6205:Gnutella 6195:Hyphanet 6154:Soulseek 6149:Soribada 6124:Networks 6064:Category 5970:CrypTool 5944:Tresorit 5873:eCryptfs 5833:Ricochet 5733:FreeOTFE 5723:eCryptfs 5708:dm-crypt 5653:WhatsApp 5530:Linphone 5482:Openswan 5449:TeamNote 5434:SChannel 5424:mbed TLS 5404:LibreSSL 5389:cryptlib 5321:Dropbear 5234:Sylpheed 5199:Enigmail 5075:Mailpile 5009:Boystown 4959:Filtrala 4903:Qubes OS 4897:DivestOS 4718:Atlantis 4713:AlphaBay 4634:Facebook 4591:Tor Mail 4389:BBC News 4318:Category 4240:Category 4189:GHash.io 4184:CoinDesk 4135:Deep Web 4058:Currency 3922:Jihan Wu 3730:Archived 3727:Glasnost 3712:Archived 3693:Archived 3655:Archived 3641:Archived 3608:Archived 3594:Archived 3580:Archived 3547:Glossary 3537:Archived 3324:Newsweek 3303:Archived 3284:Archived 3159:Archived 3057:cite web 2984:16438304 2663:Archived 2653:Archived 2415:cite web 2380:Archived 2360:Archived 1912:Archived 1770:Computer 1647:15963045 1600:49354877 1562:14008541 1377:Internet 1357:See also 1274:Fair use 1258:Grokster 1167:protocol 1061:Tradepal 979:protocol 957:, is an 881:Grokster 842:Gnutella 822:increase 764:" using 687:gnutella 640:software 543:Kademlia 425:Gnutella 253:Internet 234:Miracast 218:Internet 6526:Darkweb 6521:Darknet 6508:Privacy 6485:ZeroNet 6371:eDonkey 6348:clients 6321:Napster 6280:ZeroNet 6260:Tribler 6180:eDonkey 6074:Commons 5993:BusKill 5988:USBKill 5939:Freenet 5823:Vidalia 5778:History 5753:PGPDisk 5659:SimpleX 5618:Session 5613:Proteus 5487:OpenVPN 5477:Hamachi 5454:wolfSSL 5444:stunnel 5419:OpenSSL 5351:wolfSSH 5331:OpenSSH 5273:BitlBee 5219:Outlook 5214:Kontact 5208:Gpg4win 5123:Tor2web 5081:Mullvad 5069:F-Droid 5063:DEF CON 5051:1.1.1.1 5029:Pornhub 5024:Playpen 4818:Sci-Hub 4656:Twitter 4645:The Hub 4624:Dark0de 4596:TorChat 4573:Keybase 4364:MetaGer 4250:Commons 4174:Bitmain 4083:History 3857:Wei Dai 3791:History 3780:Bitcoin 3723:, 2004. 3703:, 2002. 3267:UN News 3029:(2009). 2868:2731647 1855:1478064 1750:RFC 1, 1542:Bibcode 1312:Comcast 1260:vs RIAA 1200:privacy 1196:Freenet 1063:l and 883:vs RIAA 785:YouTube 719:hashing 683:malware 677:Malware 571:Spotify 303:ARPANET 280:Napster 222:Napster 196:servers 191:clients 83:scholar 6428:Backup 6407:Magnet 6301:CuteMX 6235:OpenFT 6200:GNUnet 6046:S/MIME 5893:StegFS 5803:GNUnet 5643:Signal 5591:Matrix 5439:SSLeay 5394:GnuTLS 5346:WinSCP 5298:Kopete 5249:Secure 5087:Njalla 4915:Whonix 4778:Utopia 4650:Reddit 4640:HackBB 4610:forums 4585:Riseup 4518:BTDigg 4119:Movies 4042:Client 4019:SegWit 3815:People 3678:  3629:  3494:  3486:  3433:  3245:  3211:  3087:  3012:  2982:  2938:  2866:  2848:  2752:  2706:  2641:  2573:  2486:  2444:  2339:  2321:  2296:  2237:  2212:  2174:  2149:  2120:  2088:  2059:  2030:  2003:  1891:  1853:  1843:  1736:  1726:  1645:  1637:  1598:  1588:  1560:  1398:(CHAT) 1363:Portal 1037:P-Grid 1035:, the 1031:, the 973:. The 929:Osiris 778:backup 691:OpenFT 603:mirror 599:server 551:P-Grid 529:, the 519:Tixati 431:, and 429:Gossip 385:TCP/IP 381:subset 311:Usenet 129:, and 85:  78:  71:  64:  56:  6598:SHA-2 6593:SHA-1 6331:WASTE 6326:Scour 6306:Kazaa 6275:Winny 6270:WinMX 6255:Share 6190:Fopnu 5949:Wuala 5923:Qubes 5918:Tails 5863:EncFS 5838:Wickr 5596:OMEMO 5563:Briar 5540:Zfone 5525:Jitsi 5429:BSAFE 5384:Botan 5336:PuTTY 5293:Jitsi 5288:climm 5268:Adium 5057:Brave 5044:Other 4969:Ljost 4909:Tails 4743:Hansa 4708:Agora 4690:Helix 4629:Dread 4618:8chan 4568:Briar 4550:Email 4370:Searx 4359:Grams 4353:Cliqz 4336:Ahmia 4169:BitGo 4034:Forks 4024:SHA-2 3999:ECDSA 3936:Lists 3614:. In 3492:S2CID 3423:(PDF) 3181:IEEE. 3042:(PDF) 3035:(PDF) 3002:(PDF) 2980:S2CID 2960:(PDF) 2864:S2CID 2834:(PDF) 2727:(PDF) 2595:(PDF) 2548:(PDF) 2541:(PDF) 2515:(PDF) 2508:(PDF) 2401:(PDF) 1932:(PDF) 1851:S2CID 1643:S2CID 1558:S2CID 1532:arXiv 1110:, in 1077:DARPA 1013:is a 1001:app. 901:P2PTV 695:Kazaa 624:cache 512:churn 496:value 433:Kazaa 232:like 165:nodes 90:JSTOR 76:books 6481:IPFS 6421:Uses 6402:eD2k 6230:LBRY 6220:IPFS 5883:PEFS 5878:LUKS 5853:List 5748:LUKS 5743:geli 5738:GBDE 5535:Jami 5517:ZRTP 5502:Tinc 5399:JSSE 4608:and 4504:and 4381:News 4308:List 4194:Nuri 3676:ISBN 3627:ISBN 3569:1996 3484:ISSN 3431:ISSN 3243:ISBN 3209:ISBN 3085:ISBN 3063:link 3010:ISBN 2936:ISBN 2905:2013 2875:2013 2782:2011 2750:ISBN 2704:ISBN 2639:ISBN 2606:2013 2571:ISBN 2523:2008 2484:ISBN 2442:ISBN 2421:link 2337:ISBN 2294:ISBN 2235:ISBN 2210:ISBN 2172:ISBN 2147:ISBN 2118:ISBN 2086:ISBN 2057:ISBN 2028:ISBN 2001:ISBN 1889:ISBN 1841:ISBN 1810:2011 1734:OCLC 1724:ISBN 1635:ISSN 1596:OCLC 1586:ISBN 1303:ISPs 1262:and 1202:and 1171:seed 1163:The 1003:JXTA 995:Jami 905:PDTP 903:and 899:The 885:and 805:MPAA 801:RIAA 793:MPAA 789:RIAA 766:YaCy 737:and 710:RIAA 675:and 616:file 593:and 535:YaCy 356:peer 327:SMTP 62:news 6546:Tor 6346:of 6225:Kad 6215:I2P 6175:DAT 5868:EFS 5818:Tor 5808:I2P 5718:E4M 5583:DRA 5573:Tox 5550:P2P 5464:VPN 5414:NSS 5326:lsh 5313:SSH 5260:OTR 5229:PGP 5224:p≡p 5204:GPG 5113:Tor 4552:and 4009:P2P 3514:doi 3474:doi 2972:doi 2928:doi 2856:doi 2631:doi 2627:178 2329:doi 1881:doi 1833:doi 1778:doi 1627:doi 1550:doi 1286:may 1090:in 999:SIP 955:I2P 951:Dat 714:MP3 608:CPU 492:key 471:In 445:CPU 396:or 153:P2P 45:by 6635:: 6483:, 6479:, 3719:. 3699:. 3688:. 3674:, 3625:. 3567:. 3563:. 3490:. 3482:. 3470:55 3468:. 3464:. 3443:^ 3429:. 3425:. 3396:. 3372:. 3347:. 3322:. 3265:. 3186:^ 3165:, 3134:. 3111:. 3099:^ 3071:^ 3059:}} 3055:{{ 2978:. 2966:. 2962:. 2934:. 2922:. 2891:. 2862:. 2854:. 2842:46 2840:. 2836:. 2773:. 2688:^ 2637:. 2629:. 2597:. 2417:}} 2413:{{ 2335:. 2327:. 2208:. 2206:94 2186:^ 2100:^ 1972:. 1948:. 1887:. 1863:^ 1849:. 1839:. 1827:. 1774:28 1772:. 1768:. 1732:. 1718:. 1704:^ 1688:. 1663:. 1641:. 1633:. 1621:. 1617:. 1594:. 1570:^ 1556:. 1548:. 1540:. 1526:. 1514:^ 1470:. 1214:, 1055:. 1043:. 1009:. 993:. 846:G2 844:, 803:, 791:, 721:, 650:. 612:IP 549:, 545:, 541:, 494:, 427:, 125:, 6487:) 6475:( 6126:, 6108:e 6101:t 6094:v 5855:) 5851:( 5680:) 5676:( 5210:) 5206:( 5160:e 5153:t 5146:v 5101:* 5095:* 5089:* 5083:* 5077:* 5071:* 5065:* 5059:* 5053:* 5031:* 4987:* 4981:* 4955:* 4936:* 4917:* 4911:* 4905:* 4899:* 4875:* 4869:* 4863:* 4857:* 4851:* 4845:* 4826:* 4820:* 4814:* 4803:* 4686:* 4664:* 4658:* 4652:* 4636:* 4620:* 4587:* 4581:* 4575:* 4541:* 4520:* 4493:* 4487:* 4481:* 4473:* 4465:* 4459:* 4451:* 4445:* 4439:* 4423:* 4415:* 4409:* 4403:* 4397:* 4391:* 4372:* 4366:* 4355:* 4349:* 4343:* 4284:e 4277:t 4270:v 3772:e 3765:t 3758:v 3744:) 3740:( 3571:. 3516:: 3498:. 3476:: 3437:. 3407:. 3382:. 3357:. 3332:. 3251:. 3217:. 3144:. 3093:. 3065:) 3051:. 3018:. 2986:. 2974:: 2968:1 2944:. 2930:: 2907:. 2877:. 2858:: 2784:. 2758:. 2729:. 2712:. 2647:. 2633:: 2608:. 2579:. 2525:. 2492:. 2465:. 2450:. 2423:) 2409:. 2345:. 2331:: 2302:. 2243:. 2218:. 2180:. 2155:. 2126:. 2094:. 2065:. 2036:. 2009:. 1982:. 1958:. 1897:. 1883:: 1857:. 1835:: 1812:. 1790:. 1780:: 1740:. 1698:. 1674:. 1649:. 1629:: 1623:9 1602:. 1564:. 1552:: 1544:: 1534:: 1528:6 1495:. 1480:. 1365:: 151:( 140:A 133:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Peer-to-peer"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Peer-to-peer (disambiguation)
Point-to-point (disambiguation)
P2P (disambiguation)

distributed application
equipotent
nodes
personal area network
decentralized

client–server model
clients
servers
network bandwidth
client–server model
application domains
Internet
Napster
BitTorrent

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.