Questions tagged [p2p]

A peer-to-peer (abbreviated to P2P) computer network is one in which each computer in the network can act as a client or server for the other computers in the network, allowing shared access to various resources such as files, peripherals, and sensors without the need for a central server.

70 questions
25
votes
2 answers

What are the TCP/UDP ports used by torrent applications?

I want to block torrent traffic on my network because it is utilizing too much bandwidth and disrupted my network traffic. What port range should I use and what protocol TCP or UDP?
hodl
  • 351
  • 1
  • 3
  • 5
17
votes
7 answers

Stopping ill-mannered use of guest wifi

I support a small business' tech issues including setting up a guest WiFi network. The WiFi is important since they want people sitting around and consuming their product. Over the past months they've received numerous DMCA notices from their ISP…
uSlackr
  • 291
  • 2
  • 7
14
votes
2 answers

How does the Copyright Alert System work? Who has implemented it?

Some ISPs are participating in a Copyright Alert System that notifies content authors of violations of their copyright. I'm concerned how this oversight relates to my private traffic, and what laws and permissions allow this type of monitoring. Can…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
13
votes
1 answer

Torrent "bad seed" attack by Sony, how does it work?

Sony recently saw a large amount of data stolen. In order to prevent the stolen data from being spread using torrents, they are doing what was called a bad seed attack. What is this attack? Is this a known attack or some term they coined for what is…
Daniel
  • 627
  • 5
  • 16
11
votes
1 answer

Do software companies intentionally upload fake/infected versions of their own software to file sharing networks as a means to combat piracy?

Disclaimer: No illegal activity is condoned in this post. The legality of the described activity varies from country to country. I remember in the early 00's, when peer to peer file sharing was booming. I would download music from Kazaa. After a few…
Fiksdal
  • 3,076
  • 3
  • 18
  • 29
9
votes
3 answers

Bittorrent Sync encryption

Sync, a new product from BitTorrent, Inc., has been cited as a viable alternative to other cloud-storage platforms. The Sync FAQ indicates that an encryption scheme is being used, but does not comment on specifics. Does there exist any information…
nitrl
  • 3,003
  • 4
  • 20
  • 23
9
votes
8 answers

How to block some websites and torrent usage in a small office?

In my office there are approaximately 25 systems are connected through network and all having internet accessibility.but some people are missusing this facilities like downloading films from torrent websites and accessing facebook during the work…
shibinlal
  • 297
  • 2
  • 3
  • 5
8
votes
4 answers

Is webRTC safe against man in the middle attacks?

We are implementing an open source software package (copay, a multisig bitcoin wallet), that uses peerJS, which uses webRTC to allow peer-to-peer communication between browsers. peerJS (and webRTC) use a signaling server to help the peers establish…
ematiu
  • 95
  • 1
  • 6
8
votes
4 answers

How effectively can ISPs detect illegal file sharing?

Recently the USA passed a law requiring ISPs to spy on their customers' internet connections to check for illegal file sharing. I assume that they would do this by sniffing packets, but doesn't this all go down the drain if packets are encrypted?…
Rob
  • 89
  • 1
  • 3
7
votes
4 answers

How far can we go in preventing videos from spreading out using P2P networks like BitTorrent?

Everyday, I see many of my friends downloading movies off P2P networks like BitTorrent. Isn't there any way for those hardworking movie producers to save their work from being distributed like this? As a security enthusiast, I'm interested in…
claws
  • 2,145
  • 5
  • 19
  • 22
7
votes
1 answer

WebRTC P2P SSL - Where are the keys generated?

My understanding is that with the WebRTC peer-to-peer data API, communications between peers are encrypted via a modified form of SSL. Where are the keys for the peer-to-peer SSL connection generated, though? On the original web server that unites…
John
  • 2,242
  • 2
  • 28
  • 45
6
votes
3 answers

Why is DARPA interested in secure messaging platform using blockchain technology?

DARPA (US Defense Advanced Research Projects Agency) has released a Request for Proposal for a Secure Messaging Platform using a blockchain framework. The following is the Objective paragraph from DARPA's call for proposal: OBJECTIVE: Create a…
user2065276
  • 193
  • 5
6
votes
2 answers

Are ZeroNet websites susceptible to 51% control attack?

I've been reading about ZeroNet and thought about putting a site together but have concerns that it may be vulnerable to the issue laid out in What can an attacker with 51% of hash power do?. From what I understand, if a majority of peers decide to…
user72066
6
votes
2 answers

Securing Peer to Peer communication

Is there a standard way to secure peer to peer communication? I'm currently using HTTP to transfer data from peer to peer, however, securing with TLS/SSL normally requires a certificate authority to authenticate identity, and using a self-signed…
yincrash
  • 303
  • 3
  • 9
5
votes
3 answers

What is a reasonable expiry for user authentication certificates?

This question is about a nearly decentralized P2P system with a centralized certificate authority where users can authenticate and receive a certificate on their public key and then can authenticate with peers using that certificate - independently…
orlp
  • 391
  • 2
  • 15
1
2 3 4 5