Questions tagged [p2p]

A peer-to-peer (abbreviated to P2P) computer network is one in which each computer in the network can act as a client or server for the other computers in the network, allowing shared access to various resources such as files, peripherals, and sensors without the need for a central server.

70 questions
1
vote
1 answer

Secure (P2P) Client/Company File Sharing

my small web design company currently uses a cloud storage service to collaborate with our clients and I would like an easier (and more secure) way for files to be transferred-in and stored. The only reason we use cloud storage is because most of…
George
  • 13
  • 2
1
vote
0 answers

P2P sharing of uniquely encrypted files

I need a way to share large, uniquely encrypted files (AES256) that are actually the same file when decrypted, through P2P, to optimize download speeds. For instance, a centralized server would store the keys for each uniquely encrypted file (keys…
jrbaldwinn
  • 119
  • 3
1
vote
3 answers

Why does P2P need port forwarding when behind NAT?

Correct me if I'm wrong, but for a node to participate in peer-to-peer, if it's behind NAT, it must port forward to be able to connect. Why is the port forwarding necessary? I know there are exceptions to this i.e. NAT traversals, but I'd like to…
Celeritas
  • 10,039
  • 22
  • 77
  • 144
1
vote
1 answer

Can p2p use be traced by targeting a known individual rather than an offending IP Address?

My understanding of most filesharing lawsuits initiated by copyright holders is as follows: The monitoring agency will connect to a torrent swarm and collect the ip addresses of people downloading files to which they hold the copyright They…
user20204
  • 11
  • 1
  • 2
1
vote
1 answer

Protecting peers communicating with WebRTC

For reference: WebRTC Homepage I've been really interested in these new RTC technologies that are coming out, specifically the fact that use the PeerConnection API to establish a connection between two browsers and receive media via P2P. So I have a…
Josh Terrill
  • 303
  • 1
  • 3
  • 10
1
vote
1 answer

Can a client prove to a third party that they sent a message to another client in a P2P network?

Let's say Alice sends a message to Bob in their P2P chat app asking him to complete some work. Bob is lazy, so he deletes the message off his machine, does not complete the work, and just claims that he never received the message in the first place.…
JGut
  • 135
  • 4
1
vote
2 answers

Encrypt Text Message as Image

Is this a good idea to make the following text message encryption: accept text from the user 1 store the text into a document in the form of some handwritten font convert the document into an image apply noise to the image encrypt the image somehow…
display_info
  • 109
  • 6
1
vote
1 answer

How to protect certificates and keys in peer to peer application

I'm making a peer-to-peer cross-platform application (in Java & Kotlin), and I want to encrypt conversations between tens of users, concurrently. However, due to lack of knowledge in security good practices & protocols and due to this being my first…
g_elef
  • 13
  • 2
1
vote
2 answers

How are UUIDs assigned in P2P protocols

I am learning about P2P in general (mainly blockchain). I know many P2P protocols uses a distributed hash table for node lookup (kademlia) that maps UUIDs of nodes to their addresses. I am curious about the most common way of UUID assignment. Do…
1
vote
1 answer

Identifying torrented files by reversing info_hash

I've been lead to believe that if you decode the info_hash in a tracker GET request, you are left with the SHA1 hash of the file that is being downloaded. That makes sense to me but I'm not getting results here. Does anybody have any experience…
Sevaara
  • 181
  • 2
  • 8
1
vote
1 answer

Is WebRTC safe for connecting random clients to each other?

I am trying to implement a chatroulette-sque app, and WebRTC seems to be the best choice as far implementing something that doesn't take a vast amount of server resources. My current scheme is to create a WebSocket connection to my server to be able…
AlanZ2223
  • 119
  • 2
0
votes
1 answer

Alternative to ICANN?

What are major DNS services offered that aren't state-controlled. Better yet, why can't we take Bitcoin's model and create a truly decentralized system with P2P DNS? I see potential reasons behind P2P DNS: Logistical nightmare Endless domain…
Khang T
  • 36
  • 3
0
votes
1 answer

Safely creating and communicating within a fully decentralized p2p network

I'm not entirely sure if this is the right place to ask this, and I'm also slightly fuzzy on how the p2p system works, so correct me if I'm wrong. I've been looking into the practical implications of decentralized P2P networks, and there's a few…
Dylan Katz
  • 243
  • 1
  • 3
  • 9
0
votes
1 answer

Decentralized online shopping service

Would it be possible to create an online shopping service like Amazon (or Silk Road) but also to make it decentralized so there would no main server users would have to trust with their data? I imagine p2p approach could work here, although I have…
zduny
  • 101
  • 1
0
votes
2 answers

Is encryption of Onion Proxy possible?

I wanted to know that if we are using onion routing in P2P networks, and when the data comes from the provider to onion proxy(proxy connected with requester), the data is not any more encrypted, meaning after removal of its encryption layer, Onion…
Alexandera
  • 21
  • 1