Questions tagged [p2p]

A peer-to-peer (abbreviated to P2P) computer network is one in which each computer in the network can act as a client or server for the other computers in the network, allowing shared access to various resources such as files, peripherals, and sensors without the need for a central server.

70 questions
2
votes
0 answers

How do I allow for anonymous encryption?

I have a protocol I am designing that requires anonymity and privacy. My idea is to have a minimum number of hops in the network before the message can be sent to its intended destination. The response can then somehow be encrypted such that only…
Tyler Scott
  • 121
  • 3
2
votes
1 answer

Mitigating DDOS in P2P systems

In P2P systems where performance and response times are critical individual clients are susceptible to DDOS by publicly exposing their IPs. While there are various mitigation solutions available at ISP level or with paid for VPNs (e.g. for pro…
2
votes
1 answer

How can the sybil attack be used on a P2P system that implements DHT?

I was reading about the sybil attack and am unclear on some details. After becoming part of the peer-to-peer network, the adversary may then overhear communications or act maliciously. By masquerading and presenting multiple identities, the…
Celeritas
  • 10,039
  • 22
  • 77
  • 144
2
votes
3 answers

How do bots communicate in the zeus botnet?

I read on http://www.abuse.ch/?p=3499 that: ZeuS is now using an “IP list” which contains the IP addresses of other drones participating in the P2P botnet. An initial list of IP addresses is hardcoded in the ZeuS binary. From what I understand, the…
user43493
  • 21
  • 2
2
votes
3 answers

Is a file hash checking system 100% secure and non-bypassable/fakable?

I'm building an open source distributed (and partly offline replicated, as it's assumed that the network will be unstable) CMS and one of the core system 'job' will be to group all the files and generate a unique hash from them. This special hash…
gw0
  • 123
  • 3
2
votes
0 answers

Duration of torrent activity and ISP tracking

The only reason I use BitTorrent is to download Linux distros, Open source apps and large documentation files. My ISP contacted me once and warned me: Ok, you aren't downloading anything illegal or pirated, but our network traffic doesn't allow p2p…
Renae Lider
  • 135
  • 1
  • 7
2
votes
1 answer

Danger of peer to peer software

I wanted to ask what are the risks of using P2P software. I found a lot of information on-line regarding the danger of file sharing but not about the software by itself. I am writing a mobile application which will connect users in to a p2p network…
Alex
  • 412
  • 1
  • 8
  • 14
2
votes
1 answer

How are passwords stored in the database of a decentralized peer to peer system?

I want to use username and password instead of public key cryptography for a decentralized peer-to-peer application, but since the passwords are stored on users' computers, there is a possibility of being stolen. How do I store the passwords…
coderdd
  • 21
  • 1
2
votes
3 answers

Repudiation in Copyright Infringement (BitTorrent)

Seeing this question : How can alleged illegal downloading be detected? sparked a question I have had for a long time. How does repudiation/non-repudiation work in such cases ? Argument: It is known that violators are determined from Peer-lists of…
sudhacker
  • 4,260
  • 5
  • 23
  • 34
2
votes
1 answer

Possible public/private identity recovery after compromise without a centeral authority?

I’ve been thinking about P2P systems using asymmetric keys and wondering if there is anyway to recover an identity in the event it was compromised using some kind of web-of-trust. This seems to be a large issue compared to a regular system (using a…
2
votes
4 answers

Detecting malware hidden in P2P traffic

Consider a network situation involving (only) Peer to Peer traffic in medium sized network. For the sake of convenience, a simple P2P application like DC++ may be assumed, although I am aiming at a broader set involving torrents etc. too. Peer A…
pnp
  • 1,818
  • 2
  • 26
  • 42
2
votes
1 answer

proxy services for torrents vs encrypting data

I've noticed growing popularity in proxy services for torrent clients; such as BTGuard. Most torrent clients encrypt traffic so aren't these services pointless? I read that it's because the encryption is only for obfuscation, but how does this make…
Celeritas
  • 10,039
  • 22
  • 77
  • 144
2
votes
2 answers

Suspected fake torrent peers with "client_test" ID

For a fair number of torrents I'm dealing with (qBittorrent 3.3.7 here), I see a number of entries in the "Peers" list (it apparently only shows peers that are currently connected) with client_test/1.0.6.0 in the "Client" column. They appear to stay…
ivan_pozdeev
  • 131
  • 1
  • 9
2
votes
1 answer

What privacy methods exist for P2P transfers?

I love my VPN, it gives me to a certain extent privacy from isp & to what I connect. I also use P2P to get & provide data, but I would like to create a level of privacy. What methods exist for P2P anonymity and privacy?
1
vote
1 answer

Is it possible to secure an Android Intent from other calls from apps?

I'm looking at the architecture of Android and want to come up with a service that allows for multiple applications (3rd party) to call a local android service and fetch data. Think of this as a partitioned dropbox service, where each app saves a…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536