Your Ad Here Your Ad Here
Results 1 to 6 of 6

Thread: Information concerning I2P filesharing

  1. #1
    There are already a few options for filesharing over the i2p network. These options are gnutella, bittorrent and waste.

    For i2p bittorrent, there are several clients. For i2p gnutella, there is just i2phex, so far.

    In addition to those options, you can do streaming music and video, and just host files on internal websites.

    All of which are anonymous and secure.

    More clients are likely to be ported to the network.

    Shared content and resources already surpass other simular solutions such as antsp2p. With 1.5 to 2 terabytes of shared content or more.

    Transfer speeds are good, with both the network and clients being rapidly developed. I2P is shaping up to be a very nice network for filesharers to hang out and share content.

    Anyone looking for a safe place to share content, needs to look no further than i2p and its clients.

    Here are a few related links.
    i2p website
    i2phex information, downloads and more
    A blog with related filesharing news and information

  2. File Sharing   -   #2
    antony
    Guest

    Tongue

    want to know how to get free downloads without paying please help me

  3. File Sharing   -   #3
    >All of which are anonymous and secure.

    It's a bit early to make claim's about I2p's anonymity.
    It needs much more review before it's reasonable to encourage people
    to rely on it.

    The developers would prefer not to have a flood of people starting to use i2phex. They request that people do not promote i2phex on filesharing sites at this point in time.
    "I went over to a friend's house the other day. He was having problems with his computer and he asked me to look at it, and I realized he had Windows Me and it's like, oh no—that's your first problem."-Michael Dell, founder and CEO of Dell.

  4. File Sharing   -   #4
    Quote Originally Posted by zaphodiv
    >

    It's a bit early to make claim's about I2p's anonymity.
    It needs much more review before it's reasonable to encourage people
    to rely on it.

    The developers would prefer not to have a flood of people starting to use i2phex. They request that people do not promote i2phex on filesharing sites at this point in time.
    Yes, sure the developers would prefer not to have a flood of people starting to use i2p, which I guess would make i2phex included as well.

    However both i2p and i2phex currently exceed any anonymity that average filesharers would need.

    Unless you can even come up with a theory as to how to identify a i2phex peer and maybe even what they are sharing/downloading. Never mind if you can actually do it or not (I won't even require that much from you). Cause I'm hard pressed to come up with even a theory and I'm no security newbie, I've probably forgotten more concerning security than most people will ever know (of course even if I was bullshitting about that, I still dare anyone to beat this challenge).

    Even then, keep in mind that many such theories and possible weaknesses have been considered and already addressed.

    Just how much anonymity and security do you need anyways? Currently I'd rank i2p as possibly having less than freenet but more than ants and mute.

    Ok sure wait till 2007 or later if you like till a major review might have been conducted, I've absolutely no idea when and if one is going to happen or not, do you?

    From where I stand and the testing that has already been done, it is still far better than just using regular old gnutella and other such networks.

    I see that the software is ready, even if the developers may not be. They may prefer to keep the network small, but then again I'd prefer to be handed a billion dollars and a plane ticket to paradise, but that sure as heck isn't going to happen. Just to be clear, my point is the software is out there, ready and waiting. How much do most people respect some developers wishes? What if bittorrent's developer had said "here it is, but don't use it, I prefer you not to"?

    Let me get this straight, you are seriously respecting their preferences? Besides just being nice, could you explain why we should respect them?

    Consider all the millions of unprotected filesharers, they should remain vulnerable just because of developers preferences and to be nice?

    Quote Originally Posted by antony
    want to know how to get free downloads without paying please help me
    What do you mean without paying? All the software and networks mentioned here are free.

    As to installation and user guides, check out their official websites and forums.

  5. File Sharing   -   #5
    Unless you can even come up with a theory as to how to identify a i2phex peer and maybe even what they are sharing/downloading.
    The most obvious way is to try contact all known i2p nodes and try to open tunnels to iphex peers frequently and record when they are online. i2p nodes that are offline when target i2p uploaders are online can be eliminated.
    i2p dosn't allways use all it's available upload bandwidth paticularly for a few hours after being started up. Ping i2p nodes that you suspect are i2phex uploaders and look for a higher ping time when you are uploading from them.
    Flood machines running i2p and watch for i2phex transfers stalling.

    The i2p network is not very big with lots of nodes coming and going as people try it out and restart it to fiddle with settings. The is only a handfull of people using i2phex at any paticular time.

    I think an attacker with plenty of bandwidth, ip adresses and machines would have a good chance of identifying i2phex users with high confidence at the current time.
    "I went over to a friend's house the other day. He was having problems with his computer and he asked me to look at it, and I realized he had Windows Me and it's like, oh no—that's your first problem."-Michael Dell, founder and CEO of Dell.

  6. File Sharing   -   #6
    Quote Originally Posted by zaphodiv

    The most obvious way is to try contact all known i2p nodes and try to open tunnels to iphex peers frequently and record when they are online. i2p nodes that are offline when target i2p uploaders are online can be eliminated.
    i2p dosn't allways use all it's available upload bandwidth paticularly for a few hours after being started up. Ping i2p nodes that you suspect are i2phex uploaders and look for a higher ping time when you are uploading from them.
    Flood machines running i2p and watch for i2phex transfers stalling.

    The i2p network is not very big with lots of nodes coming and going as people try it out and restart it to fiddle with settings. The is only a handfull of people using i2phex at any paticular time.

    I think an attacker with plenty of bandwidth, ip adresses and machines would have a good chance of identifying i2phex users with high confidence at the current time.
    Ok, great you've come up with a theory. Yes flood and overpower the network. Though this theory has already been discussed on the i2p forums, nobody concluded that any such identification with high confidence was likely. Still any such identification is not anywhere near as certain as it is with the plain old p2p networks.

    Also this possible attack is already very costly and would become much higher with more users. In fact with just a few thousand peers such chances are reduced greatly. With even more peers it would take far more effort and resources to possibly identify peers, even then making the arguement that any such identification is valid enough to hold up in any court, well that is another very unlikely thing. Peers notified and taken to court can simply argue that the validity of such proof is questionable at best, if not complete bunk.

    So again I must point out, i2phex is a huge step up from kazaa, gnutella, bittorrent in the way of privacy and safety. One that doesn't have too high costs in resources, performance and end user complexity.

    Do you honestly think that filesharers need anything with more certain security and anonymity? Just wtf do you guys intend on sharing that would require more? Nuke secrets, terrorist communications? Kiddie porn? Well let me save you the trouble of further arguement, i2p and i2phex were not designed for such purposes and they do not provide that kind of security at least not just yet, if ever. If you are looking for that kind of anonymity, just stick with freenet.

    However is it enough to avoid isp notifications and being sued? I think it is far more than enough.

    Also I'm not advocating using it for anything illegal, just that it provides strong enough security and anonymity features already to discourage anyone from trying. After all why go after hard targets when there are millions of easy ones? Also by the time there are millions of hard targets, it will be far harder to identify anyone just through a brute force network flood type attack.

    Right now I guess there to be around 10 million easy targets online at any given time divided amoungst the old networks. Then probably millions more using bittorrent, most of which are also easy targets. Then an unknown additional number which are not online and sharing 24/7.

    So again I point out is it perfect uber strong freenet anonymity, no, but then again most filesharers don't need it to be. They would rather have something that protects them better than peerguardian, protowall and safepeer, which is also not very slow and is not too hard to use. I'm sure they would prefer something easy, reasonably fast and familiar.

    Still kudos to zaphodiv for taking the time to read through the i2p forums.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •