ⓘ Anonymous P2P

WASTE

WASTE is a peer-to-peer and friend-to-friend protocol and software application developed by Justin Frankel at Nullsoft in 2003 that features instant messaging, chat rooms, and file browsing/sharing capabilities. The name WASTE is a reference to Thomas Pynchons novel The Crying of Lot 49. In the novel, W.A.S.T.E. is an underground postal service. In 2003, less than 24 hours after its release, WASTE was removed from distribution by AOL, Nullsofts parent company. The original page was replaced with a statement claiming that the posting of the software was unauthorized and that no lawful right ...

                                     

ⓘ Anonymous P2P

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

Interest in anonymous P2P systems has increased in recent years for many reasons, ranging from the desire to share files without revealing ones network identity and risking litigation to distrust in governments, concerns over mass surveillance and data retention, and lawsuits against bloggers.

                                     

1. Motivation for anonymity

There are many reasons to use anonymous P2P technology; most of them are generic to all forms of online anonymity.

P2P users who desire anonymity usually do so as they do not wish to be identified as a publisher sender, or reader receiver, of information. Common reasons include:

  • Personal privacy preferences such as preventing tracking or data mining activities
  • Censorship at the local, organizational, or national level
  • Fear of retribution
  • Material is legal but socially deplored, embarrassing or problematic in the individuals social world
  • The material or its distribution is considered illegal or incriminating by possible eavesdroppers

A particularly open view on legal and illegal content is given in The Philosophy Behind Freenet.

Governments are also interested in anonymous P2P technology. The United States Navy funded the original onion routing research that led to the development of the Tor network, which was later funded by the Electronic Frontier Foundation and is now developed by the non-profit organization The Tor Project, Inc.

                                     

2.1. Arguments for and against anonymous P2P communication General

While anonymous P2P systems may support the protection of unpopular speech, they may also protect illegal activities, such as fraud, libel, the exchange of illegal pornography, the unauthorized copying of copyrighted works, or the planning of criminal activities. Critics of anonymous P2P systems hold that these disadvantages outweigh the advantages offered by such systems, and that other communication channels are already sufficient for unpopular speech.

Proponents of anonymous P2P systems believe that all restrictions on free speech serve authoritarian interests, information itself is ethically neutral, and that it is the people acting upon the information that can be good or evil. Perceptions of good and evil can also change see moral panic; for example, if anonymous peer-to-peer networks had existed in the 1950s or 1960s, they might have been targeted for carrying information about civil rights or anarchism.

Easily accessible anonymous P2P networks are seen by some as a democratization of encryption technology, giving the general populace access to secure communications channels already used by governments. Supporters of this view, such as Phil Zimmermann, argue that anti-surveillance technologies help to equalize power between governments and their people, which is the actual reason for banning them. John Pilger opines that monitoring of the populace helps to contain threats to the "consensual view of established authority" or threats to the continuity of power structures and privilege.

                                     

2.2. Arguments for and against anonymous P2P communication Freedom of speech

Some claim that true freedom of speech, especially on controversial subjects, is difficult or impossible unless individuals can speak anonymously. If anonymity is not possible, one could be subjected to threats or reprisals for voicing an unpopular view. This is one reason why voting is done by secret ballot in many democracies. Controversial information which a party wants to keep hidden, such as details about corruption issues, is often published or leaked anonymously.

                                     

2.3. Arguments for and against anonymous P2P communication Anonymous blogging

Anonymous blogging is one widespread use of anonymous networks. While anonymous blogging is possible on the non-anonymous internet to some degree too, a provider hosting the blog in question might be forced to disclose the bloggers IP address as when Google revealed an anonymous bloggers identity. Anonymous networks provide a better degree of anonymity. Flogs anonymous blogs in Freenet, Syndie and other blogging tools in I2P and Osiris sps are some examples of anonymous blogging technologies.

One argument for anonymous blogging is a delicate nature of work situation. Sometimes a blogger writing under their real name faces a choice between either staying silent or causing a harm to themselves, their colleagues or the company they work for.

Another reason is risk of lawsuits. Some bloggers have faced multimillion-dollar lawsuits although they were later dropped completely; anonymous blogging provides protection against such risks.



                                     

2.4. Arguments for and against anonymous P2P communication Censorship via Internet domain names

On the non-anonymous Internet, a domain name like "example.com" is a key to accessing information. The censorship of the Wikileaks website shows that domain names are extremely vulnerable to censorship. Some domain registrars have suspended customers domain names even in the absence of a court order.

For the affected customer, blocking of a domain name is a far bigger problem than a registrar refusing to provide a service; typically, the registrar keeps full control of the domain names in question. In the case of a European travel agency, more than 80.com websites were shut down without any court process and held by the registrar since then. The travel agency had to rebuild the sites under the.net top-level domain instead.

On the other hand, anonymous networks do not rely on domain name registrars. For example, Freenet, I2P and Tor hidden services implement censorship-resistant URLs based on public-key cryptography: only a person having the correct private key can update the URL or take it down.

                                     

2.5. Arguments for and against anonymous P2P communication Control over online tracking

Anonymous P2P also has value in normal daily communication. When communication is anonymous, the decision to reveal the identities of the communicating parties is left up to the parties involved and is not available to a third party. Often there is no need or desire by the communicating parties to reveal their identities. As a matter of personal freedom, many people do not want processes in place by default which supply unnecessary data. In some cases, such data could be compiled into histories of their activities.

For example, most current phone systems transmit caller ID information by default to the called party although this can be disabled either for a single call for all calls. If a person calls to make an inquiry about a product or the time of a movie, the party called has a record of the calling phone number, and may be able to obtain the name, address and other information about the caller. This information is not available about someone who walks into a store and makes a similar inquiry.



                                     

2.6. Arguments for and against anonymous P2P communication Effects of surveillance on lawful activity

Online surveillance, such as recording and retaining details of web and e-mail traffic, may have effects on lawful activities. People may be deterred from accessing or communicating legal information because they know of possible surveillance and believe that such communication may be seen as suspicious. According to law professor Daniel J. Solove, such effects "harm society because, among other things, they reduce the range of viewpoints being expressed and the degree of freedom with which to engage in political activity."

                                     

2.7. Arguments for and against anonymous P2P communication Access to censored and copyrighted material

Most countries ban or censor the publication of certain books and movies, and certain types of content. Other material is legal to possess but not to distribute; for example, copyright and software patent laws may forbid its distribution. These laws are difficult or impossible to enforce in anonymous P2P networks.

                                     

2.8. Arguments for and against anonymous P2P communication Anonymous online money

With anonymous money, it becomes possible to arrange anonymous markets where one can buy and sell just about anything anonymously. Anonymous money could be used to avoid tax collection. However, any transfer of physical goods between two parties could compromise anonymity.

Proponents argue that conventional cash provides a similar kind of anonymity, and that existing laws are adequate to combat crimes like tax evasion that might result from the use of anonymous cash, whether online or offline.

                                     

3.1. Functioning of anonymous P2P Anonymity and pseudonymity

Some of the networks commonly referred to as "anonymous P2P" are truly anonymous, in the sense that network nodes carry no identifiers. Others are actually pseudonymous: instead of being identified by their IP addresses, nodes are identified by pseudonyms such as cryptographic keys. For example, each node in the MUTE network has an overlay address that is derived from its public key. This overlay address functions as a pseudonym for the node, allowing messages to be addressed to it. In Freenet, on the other hand, messages are routed using keys that identify specific pieces of data rather than specific nodes; the nodes themselves are anonymous.

The term anonymous is used to describe both kinds of network because it is difficult - if not impossible - to determine whether a node that sends a message originated the message or is simply forwarding it on behalf of another node. Every node in an anonymous P2P network acts as a universal sender and universal receiver to maintain anonymity. If a node was only a receiver and did not send, then neighbouring nodes would know that the information it was requesting was for itself only, removing any plausible deniability that it was the recipient and consumer of the information. Thus, in order to remain anonymous, nodes must ferry information for others on the network.



                                     

3.2. Functioning of anonymous P2P Spam and DoS attacks in anonymous networks

Originally, anonymous networks were operated by small and friendly communities of developers. As interest in anonymous P2P increased and the user base grew, malicious users inevitably appeared and tried different attacks. This is similar to the Internet, where widespread use has been followed by waves of spam and distributed DoS Denial of Service attacks. Such attacks may require different solutions in anonymous networks. For example, blacklisting of originator network addresses does not work because anonymous networks conceal this information. These networks are more vulnerable to DoS attacks as well due to the smaller bandwidth, has been shown in examples on the Tor network.

A conspiracy to attack an anonymous network could be considered criminal computer hacking, though the nature of the network makes this impossible to prosecute without compromising the anonymity of data in the network.



                                     

4. Opennet and darknet network types

Like conventional P2P networks, anonymous P2P networks can implement either opennet or darknet often named friend-to-friend network type. This describes how a node on the network selects peer nodes:

  • In a darknet network, users manually establish connections with nodes run by people they know. Darknet typically needs more effort to set up but a node only has trusted nodes as peers.
  • In opennet network, peer nodes are discovered automatically. There is no configuration required but little control available over which nodes become peers.

Some networks like Freenet support both network types simultaneously a node can have some manually added darknet peer nodes and some automatically selected opennet peers.

In a friend-to-friend or F2F network, users only make direct connections with people they know. Many F2F networks support indirect anonymous or pseudonymous communication between users who do not know or trust one another. For example, a node in a friend-to-friend overlay can automatically forward a file or a request for a file anonymously between two "friends", without telling either of them the others name or IP address. These "friends" can in turn forward the same file or request to their own "friends", and so on. Users in a friend-to-friend network cannot find out who else is participating beyond their own circle of friends, so F2F networks can grow in size without compromising their users anonymity.

Some friend-to-friend networks allow the user to control what kind of files can be exchanged with "friends" within the node, in order to stop them from exchanging files that user disapproves of.

Advantages and disadvantages of opennet compared to darknet are disputed, see friend-to-friend article for summary.



                                     

5.1. List of anonymous P2P networks and clients Public P2P clients

  • Perfect Dark - a Japanese filesharing client modeled on Share
  • Netsukuku - a peer-to-peer routing system aiming to build a free and independent Internet
  • Freenet - a censorship-resistant distributed file system for anonymous publishing open source, written in Java
  • Classified-ads - an open source DHT-based decentralized messaging and voice app. Allows users to not expose any personal details but does not hide network addresses of nodes.
  • Share - a Japanese filesharing client modeled on Winny
  • NeoLoader - a filesharing software compatible with bittorrent and edonkey2000. Anonymous when used with the "NeoShare" feature that use the proprietary "NeoKad" network
  • Bitmessage - an anonymous decentralized messaging system serving as a secure replacement for email
  • ZeroNet - a decentralized Internet-like network of peer-to-peer users. Allows tunneling of HTTP-traffic through Tor.
  • DigitalNote XDN - an open-source anonymous decentralized encrypted messaging system based on blockchain technology
  • Osiris Serverless Portal System - an anonymous and distributed web portals creator.
  • GNUnet - a P2P framework, includes anonymous file sharing as its primary application
  • Winny - a Japanese filesharing program modeled on Freenet which relies on a mixnet and distributed datastore to provide anonymity
  • Syndie - a content mainly forums syndication program that operates over numerous anonymous and non-anonymous networks open source, written in Java
  • Tribler - an open source BitTorrent client. Nodes forward files within the network, but only the IP address of the exit node can be associated with a file.
                                     

5.2. List of anonymous P2P networks and clients I2P clients

  • Robert P2P Software - another anonymous BitTorrent client for the I2P network
  • Vuze formerly Azureus - a BitTorrent client with the option of using I2P Tor open source, written in Java
  • I2P-Messenger an anonymous, secure end-to-end encrypted, serverless instant messenger for the I2P network
  • I2PSnark - an anonymous BitTorrent client for the I2P network
  • iMule - an aMule port running under I2P network
  • I2Phex - a Gnutella client which communicates anonymously through I2P
  • I2P-Tahoe-LAFS - a censorship-resistant distributed file system for anonymous publishing and file sharing
  • I2P-Bote an anonymous, secure end-to-end encrypted, serverless mail application with remailer functionality for the I2P network
  • I2P - a fully decentralized overlay network for strong anonymity and end-to-end encryption, with many applications running on top of it free/open source, platform-independent
                                     

5.3. List of anonymous P2P networks and clients Defunct or no longer developed

  • RShare 2006-2007 - file sharing
  • Herbivore 2003-2005 - file sharing and messaging. Used the Dining cryptographers problem.
  • StealthNet 2007-2011 - the successor to RShare
  • OFF System 2006-2010 - a P2P distributed file system through which all shared files are represented by randomized data blocks
  • Nodezilla 2004-2010 - an anonymizing, closed source network layer upon which applications can be built
  • Entropy 2003-2005 - Freenet compatible
  • EarthStation 5 2003-2005 - anonymity controverted
  • Marabunta 2005-2006 - distributed chat
  • Bitblinder 2009-2010 - file sharing
  • Cashmere 2005 - resilient anonymous routing
  • MUTE 2003-2009 - file sharing
                                     

5.4. List of anonymous P2P networks and clients Private P2P clients

Private P2P networks are P2P networks that only allow some mutually trusted computers to share files. This can be achieved by using a central server or hub to authenticate clients, in which case the functionality is similar to a private FTP server, but with files transferred directly between the clients. Alternatively, users can exchange passwords or keys with their friends to form a decentralized network.

                                     

5.5. List of anonymous P2P networks and clients Private F2F friend-to-friend clients

Friend-to-friend networks are P2P networks that allows users only to make direct connections with people they know. Passwords or digital signatures can be used for authentication.

Examples include:

  • Filetopia - not anonymous but encrypted friend-to-friend. File sharing, chat, internal mail service
  • Retroshare - filesharing, serverless email, instant messaging, VoIP, chatrooms, and decentralized forums.
  • OneSwarm - a backwards compatible BitTorrent client with privacy-preserving sharing options, aims to create a large F2F network.
                                     

5.6. List of anonymous P2P networks and clients Hypothetical

The following networks only exist as design or are in development

  • Phantom Anonymity Protocol - a fully decentralized high-throughput anonymization network no longer in development
  • P2PRIV - Peer-to-Peer diRect and anonymous dIstribution oVerlay - anonymity via virtual links parallelization - currently in development and has significant, unsolved problems in a real world environment
  • Crowds - Reiter and Rubins system for "blending into a crowd" has a known attack
  • anoNet - extensible IP anonymizer with steganography support in development
                                     

5.7. List of anonymous P2P networks and clients Defunct or dormant

  • Mnet formerly MojoNation - a distributed file system
  • Invisible IRC Project - anonymous IRC, inspired by Freenet, which later became I2P Invisible Internet Project.
  • Bitblinder - a decentralised P2P anonymity software program which included Tor but with increased speed. Website is down and clients are no longer functional.
                                     

5.8. List of anonymous P2P networks and clients Anonymous P2P in a wireless mesh network

It is possible to implement anonymous P2P on a wireless mesh network; unlike fixed Internet connections, users dont need to sign up with an ISP to participate in such a network, and are only identifiable through their hardware.

Protocols for wireless mesh networks are Optimized Link State Routing Protocol OLSR and the follow-up protocol B.A.T.M.A.N., which is designed for decentralized auto-IP assignment. See also Netsukuku.

Even if a government were to outlaw the use of wireless P2P software, it would be difficult to enforce such a ban without a considerable infringement of personal freedoms. Alternatively, the government could outlaw the purchase of the wireless hardware itself.

                                     
  • professor Andrew Tanenbaum. It is not developed anymore. Like other anonymous P2P software, it allows users to share files and otherwise communicate without
  • invisible Mule is a free and open - source anonymous P2P file sharing utility which connects through the anonymous I 2 P network and the Kad network. iMule is
  • Project I 2 P is an anonymous network layer implemented as a Mix Network that allows for censorship - resistant, peer to peer communication. Anonymous connections
  • open - source software portal I 2 P Anonymous P2P Crypto - anarchism BitTorrent List of Developers Homepage Installation Notes How I 2 P Torrents Work Archived 2011 - 11 - 03
  • Perfect Dark パーフェクトダーク is a peer - to - peer file - sharing P2P application from Japan designed for use with Microsoft Windows. It was launched in 2006
  • Private peer - to - peer P2P systems are peer - to - peer P2P systems that allow only mutually trusted peers to participate. This can be achieved by using
  • data and an anonymous blog to see how similar they are. In this way, anonymous bloggers can tentatively be deanonymized. Anonymous P2P Anonymous web browsing
  • anonymous user of that service had made concerning key figures in Islam. Anonymity Anonymity application Anonymous blogging Anonymous P2P Anonymous remailer
  • potentially be breached. Anonymity Anonymity application Anonymous blogging Anonymous P2P Anonymous remailer Data privacy HTTP cookie HTTP tunnel Internet
  • kinds of private P2P users in a friend - to - friend network cannot find out who else is participating beyond their own circle of friends, so F 2 F networks can