806:, and entertainment industry to filter out copyrighted content. Although server-client networks are able to monitor and manage content availability, they can have more stability in the availability of the content they choose to host. A client should not have trouble accessing obscure content that is being shared on a stable centralized network. P2P networks, however, are more unreliable in sharing unpopular files because sharing files in a P2P network requires that at least one node in the network has the requested data, and that node must be able to connect to the node requesting the data. This requirement is occasionally hard to meet because users may delete or stop sharing data at any point.
1357:
reproducible so that other researchers can replicate, validate, and extend existing work." If the research cannot be reproduced, then the opportunity for further research is hindered. "Even though new simulators continue to be released, the research community tends towards only a handful of open-source simulators. The demand for features in simulators, as shown by our criteria and survey, is high. Therefore, the community should work together to get these features in open-source software. This would reduce the need for custom simulators, and hence increase repeatability and reputability of experiments."
467:
458:/memory (by requiring every peer to process all search queries), and does not ensure that search queries will always be resolved. Furthermore, since there is no correlation between a peer and the content managed by it, there is no guarantee that flooding will find a peer that has the desired data. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing. But if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that the search will be successful.
420:
791:, recovery, and availability. In a centralized network, the system administrators are the only forces controlling the availability of files being shared. If the administrators decide to no longer distribute a file, they simply have to remove it from their servers, and it will no longer be available to users. Along with leaving the users powerless in deciding what is distributed throughout the community, this makes the entire system vulnerable to threats and requests from the government and other large forces.
1383:
810:
and available than files on central networks. In a centralized network, a simple loss of connection between the server and clients can cause a failure, but in P2P networks, the connections between every node must be lost to cause a data-sharing failure. In a centralized system, the administrators are responsible for all data recovery and backups, while in P2P systems, each node requires its backup system. Because of the lack of central authority in P2P networks, forces such as the recording industry,
275:
190:
6071:
4325:
4247:
36:
4315:
768:
951:
148:
6081:
4257:
293:. The peer-to-peer movement allowed millions of Internet users to connect "directly, forming groups and collaborating to become user-created search engines, virtual supercomputers, and filesystems". The basic concept of peer-to-peer computing was envisioned in earlier software systems and networking discussions, reaching back to principles stated in the first
513:
1288:
networks regarding public safety and national security. When a file is downloaded through a peer-to-peer network, it is impossible to know who created the file or what users are connected to the network at a given time. Trustworthiness of sources is a potential security threat that can be seen with peer-to-peer systems.
525:(i.e. with large numbers of nodes frequently joining and leaving the network). More recent evaluation of P2P resource discovery solutions under real workloads have pointed out several issues in DHT-based solutions such as high cost of advertising/discovering resources and static and dynamic load imbalance.
355:
introduced the music and file-sharing application called
Napster. Napster was the beginning of peer-to-peer networks, as we know them today, where "participating users establish a virtual network, entirely independent from the physical network, without having to obey any administrative authorities or
1261:
Although peer-to-peer networks can be used for legitimate purposes, rights holders have targeted peer-to-peer over the involvement with sharing copyrighted material. Peer-to-peer networking involves data transfer from one user to another without using an intermediate server. Companies developing P2P
1196:
Some researchers have explored the benefits of enabling virtual communities to self-organize and introduce incentives for resource sharing and cooperation, arguing that the social aspect missing from today's P2P systems should be seen both as a goal and a means for self-organized virtual communities
1287:
exceptions allow limited use of copyrighted material to be downloaded without acquiring permission from the rights holders. These documents are usually news reporting or under the lines of research and scholarly work. Controversies have developed over the concern of illegitimate use of peer-to-peer
809:
In a P2P network, the community of users is entirely responsible for deciding which content is available. Unpopular files eventually disappear and become unavailable as fewer people share them. Popular files, however, are highly and easily distributed. Popular files on a P2P network are more stable
758:
that can be inherent in a client–server based system. As nodes arrive and demand on the system increases, the total capacity of the system also increases, and the likelihood of failure decreases. If one peer on the network fails to function properly, the whole network is not compromised or damaged.
307:
was close to a P2P network in that it assumed each user of the web would be an active editor and contributor, creating and linking content to form an interlinked "web" of links. The early
Internet was more open than the present day, where two machines connected to the Internet could send packets to
1320:
usage. Compared to Web browsing, e-mail or many other uses of the internet, where data is only transferred in short intervals and relative small quantities, P2P file-sharing often consists of relatively heavy bandwidth usage due to ongoing file transfers and swarm/network coordination packets. In
1299:
lead to an increase in overall video game sales because newer games charge for extra features or levels. The paper concluded that piracy had a negative financial impact on movies, music, and literature. The study relied on self-reported data about game purchases and use of illegal download sites.
1188:
Cooperation among a community of participants is key to the continued success of P2P systems aimed at casual human users; these reach their full potential only when large numbers of nodes contribute resources. But in current practice, P2P networks often contain large numbers of users who utilize
449:
Because there is no structure globally imposed upon them, unstructured networks are easy to build and allow for localized optimizations to different regions of the overlay. Also, because the role of all peers in the network is the same, unstructured networks are highly robust in the face of high
402:
peers can communicate with each other directly, via the logical overlay links (each of which corresponds to a path through the underlying physical network). Overlays are used for indexing and peer discovery, and make the P2P system independent from the physical network topology. Based on how the
727:
files). Files infected with the RIAA virus were unusable afterwards and contained malicious code. The RIAA is also known to have uploaded fake music and movies to P2P networks in order to deter illegal file sharing. Consequently, the P2P networks of today have seen an enormous increase of their
584:
was an example of a hybrid model . There are a variety of hybrid models, all of which make trade-offs between the centralized functionality provided by a structured server/client network and the node equality afforded by the pure peer-to-peer unstructured networks. Currently, hybrid models have
453:
However, the primary limitations of unstructured networks also arise from this lack of structure. In particular, when a peer wants to find a desired piece of data in the network, the search query must be flooded through the network to find as many peers as possible that share the data. Flooding
759:
In contrast, in a typical client–server architecture, clients share only their demands with the system, but not their resources. In this case, as more clients join the system, fewer resources are available to serve each client, and if the central server fails, the entire network is taken down.
1356:
Researchers have used computer simulations to aid in understanding and evaluating the complex behaviors of individuals within the network. "Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be
1192:
Freeloading can have a profound impact on the network and in some cases can cause the community to collapse. In these types of networks "users have natural disincentives to cooperate because cooperation consumes their own resources and may degrade their own performance". Studying the social
673:
attacks. Examples of common routing attacks include "incorrect lookup routing" whereby malicious nodes deliberately forward requests incorrectly or return false results, "incorrect routing updates" where malicious nodes corrupt the routing tables of neighboring nodes by sending them false
1125:, uses a proprietary peer-to-peer technology called "Delivery Optimization" to deploy operating system updates using end-users' PCs either on the local network or other PCs. According to Microsoft's Channel 9, this led to a 30%-50% reduction in Internet bandwidth usage. Artisoft's
3039:
Gareth Tyson, Andreas Mauthe, Sebastian Kaune, Mu Mu and Thomas
Plagemann. Corelli: A Dynamic Replication Service for Supporting Latency-Dependent Content in Community Networks. In Proc. 16th ACM/SPIE Multimedia Computing and Networking Conference (MMCN), San Jose, CA
1344:. Techniques for achieving "protocol obfuscation" involves removing otherwise easily identifiable properties of protocols, such as deterministic byte sequences and packet sizes, by making the data look as if it were random. The ISP's solution to the high bandwidth is
585:
better performance than either pure unstructured networks or pure structured networks because certain functions, such as searching, do require a centralized functionality but benefit from the decentralized aggregation of nodes provided by unstructured networks.
316:
was a successful peer-to-peer network where "every participating node could request and serve content". However, ARPANET was not self-organized, and it could not "provide any means for context or content-based routing beyond 'simple' address-based routing."
1170:
884:
Peer-to-peer networking involves data transfer from one user to another without using an intermediate server. Companies developing P2P applications have been involved in numerous legal cases, primarily in the United States, over conflicts with
1193:
attributes of P2P networks is challenging due to large populations of turnover, asymmetry of interest and zero-cost identity. A variety of incentive mechanisms have been implemented to encourage or even force nodes to contribute resources.
1197:
to be built and fostered. Ongoing research efforts for designing effective incentive mechanisms in P2P systems, based on principles from game theory, are beginning to take on a more psychological and information-processing direction.
1282:
To establish criminal liability for the copyright infringement on peer-to-peer systems, the government must prove that the defendant infringed a copyright willingly for the purpose of personal financial gain or commercial advantage.
1180:: In this animation, the colored bars beneath all of the 7 clients in the upper region above represent the file being shared, with each color representing an individual piece of the file. After the initial pieces transfer from the
839:
that require users to share, refer a performance measurement study). This property is one of the major advantages of using P2P networks because it makes the setup and running costs very small for the original content distributor.
3191:
Krishnan, R., Smith, M. D., Tang, Z., & Telang, R. (2004, January). The impact of free-riding on peer-to-peer networks. In System
Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on (pp. 10-pp).
674:
information, and "incorrect routing network partition" where when new nodes are joining they bootstrap via a malicious node, which places the new node in a partition of the network that is populated by other malicious nodes.
867:
and services, including distributed caching systems like
Correli Caches to enhance performance. Furthermore, peer-to-peer networks have made possible the software publication and distribution, enabling efficient sharing of
520:
However, in order to route traffic efficiently through the network, nodes in a structured overlay must maintain lists of neighbors that satisfy specific criteria. This makes them less robust in networks with a high rate of
1363:
Besides all the above stated facts, there has also been work done on ns-2 open source network simulators. One research issue related to free rider detection and punishment has been explored using ns-2 simulator here.
616:
the content, thus off-loading balance from the server. All of the information is retained at the server. This system makes use of the fact that the bottleneck is most likely in the outgoing bandwidth than the
216:, directly available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional
1336:-based application architecture. The client–server model provides financial barriers-to-entry to small publishers and individuals, and can be less efficient for sharing large files. As a reaction to this
3204:
Feldman, M., Lai, K., Stoica, I., & Chuang, J. (2004, May). Robust incentive techniques for peer-to-peer networks. In
Proceedings of the 5th ACM conference on Electronic commerce (pp. 102-111). ACM.
2822:
1332:
Critics point out that P2P networking has legitimate legal uses, and that this is another way that large providers are trying to control use and content on the
Internet, and direct people towards a
736:
and different encryption methods have made most networks resistant to almost any type of attack, even when major parts of the respective network have been replaced by faked or nonfunctional hosts.
704:
contained malware. In both cases, the top three most common types of malware accounted for the large majority of cases (99% in gnutella, and 65% in OpenFT). Another study analyzing traffic on the
2734:
1184:(large system at the bottom), the pieces are individually transferred from client to client. The original seeder only needs to send out one copy of the file for all the clients to receive a copy.
2154:
Making Grids Work: Proceedings of the CoreGRID Workshop on
Programming Models Grid and P2P System Architecture Grid Systems, Tools and Environments 12-13 June 2007, Heraklion, Crete, Greece
486:
the overlay is organized into a specific topology, and the protocol ensures that any node can efficiently. search the network for a file/resource, even if the resource is extremely rare.
2064:
Networking 2007: Ad Hoc and Sensor
Networks, Wireless Networks, Next Generation Internet: 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007 Proceedings
2472:
Bandara, H. M. N. Dilum; Jayasumana, Anura P. (January 2012). "Evaluation of P2P Resource
Discovery Architectures Using Real-Life Multi-Attribute Resource and Query Characteristics".
3238:
P. Antoniadis and B. Le Grand, "Incentives for resource sharing in self-organized communities: From economics to social psychology," Digital Information Management (ICDIM '07), 2007
657:. What makes this particularly dangerous for P2P software, however, is that peer-to-peer applications act as servers as well as clients, meaning that they can be more vulnerable to
2636:. Lecture Notes in Computer Science. Vol. Proceedings of the First International Workshop on Peer-to-Peer Systems. Cambridge, MA: Springer (published March 2002). pp.
696:
varies between different peer-to-peer protocols. Studies analyzing the spread of malware on P2P networks found, for example, that 63% of the answered download requests on the
1360:
Popular simulators that were widely used in the past are NS2, OMNeT++, SimPy, NetLogo, PlanetLab, ProtoPeer, QTM, PeerSim, ONE, P2PStrmSim, PlanetSim, GNUSim, and Bharambe.
902:. In the last case, the Court unanimously held that defendant peer-to-peer file sharing companies Grokster and Streamcast could be sued for inducing copyright infringement.
3461:
Basu, A., Fleming, S., Stanier, J., Naicken, S., Wakeman, I., & Gurbani, V. K. (2013). The state of peer-to-peer network simulators. ACM Computing Surveys, 45(4), 46.
831:
In P2P networks, clients both provide and use resources. This means that unlike client–server systems, the content-serving capacity of peer-to-peer networks can actually
3142:
5169:
2431:
324:, a distributed messaging system that is often described as an early peer-to-peer architecture, was established. It was developed in 1979 as a system that enforces a
1279:
In both of the cases the file sharing technology was ruled to be legal as long as the developers had no ability to prevent the sharing of the copyrighted material.
3017:
NETWORKING 2005 -- Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
3658:", in the proceedings of the 1st Multimedia Communications Workshop MULTICOMM 2006 held in conjunction with IEEE ICC 2006 pp 43–48, June 2006, Istanbul, Turkey.
3119:
2757:
Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings
580:
Hybrid models are a combination of peer-to-peer and client–server models. A common hybrid model is to have a central server that helps peers find each other.
4293:
2826:
2663:
3811:
3665:
3169:
1217:—that is, ensuring that the contents of communications are hidden from eavesdroppers, and that the identities/locations of the participants are concealed.
4009:
3073:
1329:. Their rationale was that P2P is mostly used to share illegal content, and their infrastructure is not designed for continuous, high-bandwidth traffic.
370:
nodes simultaneously functioning as both "clients" and "servers" to the other nodes on the network. This model of network arrangement differs from the
6669:
3752:
3731:
2548:
1956:
434:
do not impose a particular structure on the overlay network by design, but rather are formed by nodes that randomly form connections to each other. (
1412:
336:
communicate with one another as peers to propagate Usenet news articles over the entire group of network servers. The same consideration applies to
3563:
3968:
3590:
3290:
Majoras, D. B. (2005). Peer-to-peer file-sharing technology consumer protection and competition issues. Federal Trade Commission, Retrieved from
374:
model where communication is usually to and from a central server. A typical example of a file transfer that uses the client-server model is the
6117:
5688:
378:(FTP) service in which the client and server programs are distinct: the clients initiate the transfer, and the servers satisfy these requests.
2324:
Dabek, Frank; Zhao, Ben; Druschel, Peter; Kubiatowicz, John; Stoica, Ion (2003). "Towards a Common API for Structured Peer-to-Peer Overlays".
6376:
3604:
3257:
3223:
3099:
3024:
2950:
2718:
2653:
2498:
2456:
2351:
2249:
2186:
2266:
2093:
Transactions on Large-Scale Data- and Knowledge-Centered Systems III: Special Issue on Data and Knowledge Management in Grid and PSP Systems
715:
Corrupted data can also be distributed on P2P networks by modifying files that are already being shared on the network. For example, on the
5313:
5162:
3547:
922:
multimedia applications leverage a peer-to-peer network in conjunction with streaming servers to stream audio and video to their clients.
3380:
3313:
5444:
2673:
1503:
1406:
1275:
1133:
Hotline Client was built with decentralized servers and tracker software dedicated to any type of files and continues to operate today.
1051:
898:
565:
5863:
3722:
3566:, Special Issue, Elsevier Journal of Computer Communication, (Ed) Javed I. Khan and Adam Wierzbicki, Volume 31, Issue 2, February 2008
1600:
5918:
3781:
3690:
3042:
2764:
2585:
2308:
2224:
2161:
2132:
2100:
2071:
2042:
2015:
1903:
1738:
939:
669:
Since each node plays a role in routing traffic through the network, malicious users can perform a variety of "routing attacks", or
119:
3740:
2370:
403:
nodes are linked to each other within the overlay network, and how resources are indexed and located, we can classify networks as
6518:
6371:
6084:
5109:
4286:
3816:
1533:
Bandara, H. M. N. D; A. P. Jayasumana (2012). "Collaborative Applications over Peer-to-Peer Systems – Challenges and Solutions".
497:
is used to assign ownership of each file to a particular peer. This enables peers to search for resources on the network using a
366:
155:
in which interconnected nodes ("peers") share resources amongst each other without the use of a centralized administrative system
2899:
6654:
6074:
5155:
4979:
4969:
4865:
4459:
3862:
3651:
137:
3681:
2390:
6659:
6598:
6381:
4859:
4120:
3711:
3641:
3618:
1855:
1341:
251:
radio. The concept has inspired new structures and philosophies in many areas of human interaction. In such social contexts,
57:
3355:
3294:
1262:
applications have been involved in numerous legal cases, primarily in the United States, primarily over issues surrounding
1189:
resources shared by other nodes, but who do not share anything themselves (often referred to as the "freeloader problem").
100:
6501:
4963:
4778:
3963:
1129:
was built as a peer-to-peer operating system where machines can function as both servers and workstations simultaneously.
931:
509:) pairs are stored in the DHT, and any participating node can efficiently retrieve the value associated with a given key.
133:
53:
2515:
1373:
72:
5409:
5384:
4137:
1401:
5990:
6034:
5394:
4944:
4328:
4279:
4100:
3703:
1432:
1241:
1009:
993:
466:
3309:
The Government of the Hong Kong Special Administrative Region, (2008). Peer-to-peer network. Retrieved from website:
1478:
3127:
2967:
2177:
Jin, Xing; Chan, S.-H. Gary (2010). "Unstructured Peer-to-Peer Network Architectures". In Shen; et al. (eds.).
79:
6491:
6366:
6230:
6110:
4718:
4318:
2212:
Peer-to-Peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers
1079:
1025:
985:
605:
2660:
1325:, one of the largest broadband Internet providers in the United States, started blocking P2P applications such as
46:
6154:
6126:
5788:
5424:
4115:
3953:
1922:
1396:
1063:
848:
780:
654:
3662:
3557:
3166:
942:, enables users to create anonymous and autonomous web portals that are distributed via a peer-to-peer network.
419:
332:
model from the user or client perspective that offers a self-organizing approach to newsgroup servers. However,
6628:
6483:
6024:
5928:
5898:
5593:
5371:
5270:
4919:
4473:
1148:
864:
1348:, where an ISP stores the part of files most accessed by P2P clients in order to save access to the Internet.
217:
195:
86:
1518:
A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications
1032:
is a connection-sharing application that shares Internet access with other devices using Wi-Fi or Bluetooth.
6019:
5888:
5758:
5474:
4768:
4743:
1457:
1218:
1001:
989:
935:
755:
325:
183:
167:
2555:
6578:
6139:
6046:
6039:
5878:
5653:
5001:
4845:
4748:
4644:
4214:
3520:
2856:
2329:
2279:
R. Ranjan, A. Harwood, and R. Buyya, "Peer-to-peer based resource discovery in global grids: a tutorial,"
1730:
1130:
980:
is not itself peer-to-peer; however, it can enable peer-to-peer applications to be built on top of it via
708:
network found that 15% of the 500,000 file sample taken were infected by one or more of the 365 different
490:
475:
375:
600:
content, proposed by computer scientists Venkata N. Padmanabhan and Kunwadee Sripanidkulchai, working at
68:
6664:
6649:
6453:
6103:
6051:
5045:
5024:
4883:
4853:
4733:
4110:
4044:
3999:
3958:
3842:
3774:
3178:
2408:
1980:
1437:
1427:
1317:
749:
745:
533:
240:
179:
3587:
3090:
Glorioso, Andrea; et al. (2010). "The Social Impact of P2P Systems". In Shen; et al. (eds.).
1957:"Practical Applications of Peer-to-Peer Networks in File Sharing and Content Distribution | SimpleSwap"
568:. DHT-based networks have also been widely utilized for accomplishing efficient resource discovery for
285:
While P2P systems had previously been used in many application domains, the concept was popularized by
1382:
863:
have been useful in popularizing peer-to-peer technologies. These advancements have paved the way for
450:
rates of "churn"—that is, when large numbers of peers are frequently joining and leaving the network.
5259:
4877:
4871:
4788:
3837:
3806:
3696:
3331:"Illegal downloads may not actually harm sales, but the European Union doesn't want you to know that"
1552:
1417:
1337:
1043:
919:
557:
294:
141:
3330:
1082:
is conducting research on P2P networks as part of its modern network warfare strategy. In May 2003,
938:, aims to facilitate file sharing among educational institutions globally. Another notable program,
274:
6326:
5843:
5331:
5249:
5239:
5234:
5178:
5067:
4260:
3922:
3544:
2334:
1671:
1153:
341:
252:
3601:
2861:
2283:, vol. 10, no. 2. and P. Trunfio, "Peer-to-Peer resource discovery in Grids: Models and systems,"
6618:
6358:
6255:
5833:
5638:
5628:
5019:
4793:
4539:
4488:
4167:
4105:
3912:
3801:
3502:
3471:
Ihle, Cornelius; Trautwein, Dennis; Schubotz, Moritz; Meuschke, Norman; Gipp, Bela (2023-01-24).
2990:
2874:
2490:
Structured P2P Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
1861:
1653:
1568:
1542:
1309:
1138:
1110:
1095:
1055:
973:
869:
609:
601:
494:
224:
206:
200:
2637:
2631:
1333:
371:
329:
3633:
2216:
2210:
927:
312:-like structure of the web as it has developed over the years. As a precursor to the Internet,
6623:
6417:
5601:
5482:
5229:
5214:
5034:
4783:
4763:
4728:
4565:
4430:
4338:
4059:
4014:
3686:
3637:
3494:
3441:
3253:
3219:
3095:
3067:
3020:
2946:
2760:
2752:
2714:
2649:
2581:
2573:
2494:
2452:
2446:
2425:
2347:
2304:
2245:
2220:
2182:
2157:
2128:
2096:
2067:
2059:
2038:
2032:
2011:
2005:
1899:
1851:
1744:
1734:
1645:
1606:
1596:
1181:
733:
670:
646:
612:
experiences an increase in load it redirects incoming peers to other peers who have agreed to
399:
213:
175:
3571:
3310:
2602:
2206:
2149:
2120:
2088:
625:' to its neighbors in an attempt to use locality. If multiple peers are found with the same
170:
architecture that partitions tasks or workloads between peers. Peers are equally privileged,
6546:
6541:
6134:
5573:
4899:
4822:
4817:
4578:
4560:
4501:
4417:
4250:
4173:
3917:
3877:
3872:
3767:
3524:
3484:
2982:
2938:
2866:
2641:
2339:
1891:
1843:
1788:
1637:
1560:
1422:
1134:
709:
3719:
2840:
Balakrishnan, Hari; Kaashoek, M. Frans; Karger, David; Morris, Robert; Stoica, Ion (2003).
1520:, Proceedings of the First International Conference on Peer-to-Peer Computing, IEEE (2002).
783:
that runs on a peer-to-peer network instead of making requests to centralized index servers
394:
of the nodes in the physical network. Data is still exchanged directly over the underlying
6448:
6412:
6190:
5893:
5823:
5753:
5682:
5648:
5633:
5545:
5512:
5487:
4678:
4655:
4544:
4534:
4453:
4411:
4189:
4145:
3984:
3892:
3748:
3744:
3726:
3707:
3669:
3655:
3622:
3608:
3594:
3551:
3317:
3298:
3173:
2781:
2677:
2667:
2394:
2374:
1926:
1442:
1387:
1226:
1059:
1005:
969:
860:
683:
658:
630:
439:
387:
300:
93:
3404:
3049:
2841:
818:, and the government are unable to delete or stop the sharing of content on P2P systems.
787:
There are both advantages and disadvantages in P2P networks related to the topic of data
3737:
1918:
Horton, Mark, and Rick Adams. "Standard for interchange of USENET messages." (1987): 1.
1556:
6463:
6185:
5583:
5379:
4753:
4710:
4700:
4694:
4620:
4549:
4423:
4369:
4227:
4204:
3994:
3852:
3832:
3274:"No country is free from child sexual abuse, exploitation, UN's top rights forum hears"
2409:"Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks"
2367:
1724:
1292:
1098:
1083:
981:
961:
772:
569:
304:
259:
3009:
2753:"Measurement and Analysis of Autonomous Spreading Malware in a University Environment"
6643:
6613:
6593:
6588:
6556:
6526:
6458:
6443:
6029:
5828:
5502:
5123:
4955:
4811:
4639:
4480:
4302:
4024:
3937:
3897:
3882:
3506:
3291:
2907:
1813:
1590:
1452:
1447:
1230:
1039:
1017:
754:
The decentralized nature of P2P networks increases robustness because it removes the
626:
621:, hence its server-centric design. It assigns peers to other peers who are 'close in
549:
352:
3648:
2994:
1657:
1572:
212:
Peers make a portion of their resources, such as processing power, disk storage, or
189:
5768:
5323:
5186:
4758:
4738:
4616:
4520:
4466:
4351:
4232:
4080:
4075:
3927:
2878:
2547:
Ranjan, Rajiv; Chan, Lipo; Harwood, Aaron; Karunasekera, Shanika; Buyya, Rajkumar.
2387:
1865:
1696:
1592:
Peer-to-peer computing : technologies for sharing and collaborating on the net
1035:
954:
873:
541:
345:
309:
286:
3615:
2689:
1890:. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. pp. 9–16.
1340:, several P2P applications started implementing protocol obfuscation, such as the
308:
each other without firewalls and other security measures. This contrasts with the
2821:
Lua, Eng Keong; Crowcroft, Jon; Pias, Marcelo; Sharma, Ravi; Lim, Steven (2005).
2488:
2007:
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
6583:
6551:
6468:
6306:
6265:
6235:
5858:
5778:
5723:
5643:
5029:
5011:
4773:
4589:
4512:
4437:
4222:
4004:
3907:
3473:"Incentive Mechanisms in Peer-to-Peer Networks — A Systematic Literature Review"
2343:
1886:
Steinmetz, Ralf; Wehrle, Klaus (2005). "2. What Is This "Peer-to-Peer" About?".
1840:
Proceedings of the tenth ACM symposium on Access control models and technologies
1345:
1245:
1234:
1169:
1106:
1029:
977:
923:
613:
537:
333:
256:
35:
3528:
3430:
3273:
2930:
2298:
390:
on top of the physical network topology, where the nodes in the overlay form a
6396:
6336:
6275:
6260:
6250:
6180:
5964:
5908:
5838:
5713:
5708:
5658:
5623:
5616:
5578:
5568:
5507:
5293:
5204:
5194:
5103:
4989:
4974:
4936:
4672:
4573:
4495:
4447:
4442:
4405:
4357:
3989:
3887:
3857:
2986:
2522:
1776:
1641:
1564:
1326:
1222:
1175:
1142:
1122:
1114:
1102:
1091:
1075:
997:
836:
767:
729:
723:
managed to introduce faked chunks into downloads and downloaded files (mostly
622:
498:
236:
171:
3498:
3445:
2942:
2670:
2645:
2121:"P2P Streaming Over Cellular Networks: Issues, Challenges, and Opportunities"
1836:"Peer-to-peer access control architecture using trusted computing technology"
1748:
1649:
835:
as more users begin to access the content (especially with protocols such as
6391:
6220:
6195:
6095:
5805:
5795:
5783:
5773:
5738:
5703:
5698:
5611:
5517:
5419:
5351:
5288:
5199:
4995:
4889:
4834:
3902:
3847:
1847:
1625:
1610:
1263:
1214:
1126:
1118:
1067:
1021:
886:
856:
716:
634:
278:
248:
3700:
2034:
Streaming Media Architectures: Techniques and Applications: Recent Advances
1626:"Measuring and analyzing the characteristics of Napster and Gnutella hosts"
950:
572:
systems, as it aids in resource management and scheduling of applications.
17:
2870:
2549:"Decentralised Resource Discovery Service for Large Scale Federated Grids"
2448:
An Efficient, Scalable, and Robust P2P Overlay for Autonomic Communication
2368:
Novel Architectures for P2P Applications: the Continuous-Discrete Approach
1919:
1835:
700:
network contained some form of malware, whereas only 3% of the content on
6422:
6386:
6321:
6215:
6205:
6164:
6159:
5980:
5954:
5883:
5743:
5733:
5718:
5663:
5540:
5492:
5459:
5434:
5414:
5399:
5244:
5209:
5147:
5085:
4913:
4907:
4723:
4601:
4399:
4199:
4194:
3932:
1300:
Pains were taken to remove effects of false and misremembered responses.
1284:
1268:
1248:
have used peer-to-peer platforms to carry out activities with anonymity.
1071:
891:
852:
697:
650:
597:
596:
was a proposed system for off-loading serving to peers who have recently
553:
454:
causes a very high amount of signaling traffic in the network, uses more
435:
263:
244:
228:
1504:"Why personal area networks are the best thing to happen to hotel Wi-Fi"
147:
6536:
6531:
6495:
6487:
6478:
6473:
6331:
6290:
6270:
6003:
5998:
5949:
5763:
5497:
5464:
5454:
5429:
5389:
5361:
5341:
5283:
5224:
5218:
5133:
5091:
5079:
5073:
5061:
5039:
4828:
4803:
4666:
4634:
4606:
4583:
4374:
4184:
3867:
3790:
2297:
Kelaskar, M.; Matossian, V.; Mehra, P.; Paul, D.; Parashar, M. (2002).
2089:"A Survey of Structured P2P Systems for RDF Data Storage and Retrieval"
1895:
1322:
1316:) have been known to throttle P2P file-sharing traffic due to its high-
1210:
1206:
795:
693:
687:
581:
348:
and their direct connections is strictly a client-server relationship.
313:
290:
232:
3521:"Free-rider detection and punishment in BitTorrent based P2P networks"
2516:"A Study on Peer-to-Peer Based Discovery of Grid Resource Information"
1624:
Saroiu, Stefan; Gummadi, Krishna P.; Gribble, Steven D. (2003-08-01).
1062:
capable of supporting many different types of applications, primarily
6438:
6311:
6210:
6056:
5903:
5813:
5449:
5404:
5356:
5308:
5128:
5097:
4984:
4925:
4660:
4650:
4595:
4528:
4271:
4029:
3588:
Vulnerabilities of P2P systems and a critical look at their solutions
2328:. Lecture Notes in Computer Science. Vol. 2735. pp. 33–44.
1792:
1047:
926:
is employed for multicasting streams. Additionally, a project called
788:
701:
561:
529:
395:
391:
321:
235:, originally released in 1999. P2P is used in many protocols such as
3489:
3472:
2445:
Li, Deng; et al. (2009). Vasilakos, A.V.; et al. (eds.).
1939:
1038:
is a directory-syncing app. Research includes projects such as the
637:
the previous stream, and then transmit it piece-wise to new nodes.
6608:
6603:
6341:
6316:
6285:
6280:
6200:
5959:
5933:
5873:
5848:
5606:
5550:
5535:
5439:
5346:
5303:
5298:
5278:
4628:
4380:
4363:
4346:
4179:
4034:
3381:"EU study finds piracy doesn't hurt game sales, may actually help"
2735:"Malware Propagation Modelling in Peer-to-Peer Networks: A Review"
2514:
Ranjan, Rajiv; Harwood, Aaron; Buyya, Rajkumar (1 December 2006).
1547:
1168:
1087:
949:
911:
766:
705:
512:
511:
465:
443:
418:
273:
188:
146:
3545:
P2P-VoD Streaming: Design Issues & User Experience Challenges
2823:"A survey and comparison of peer-to-peer overlay network schemes"
629:
it designates that the node choose the fastest of its neighbors.
427:, illustrating the ad hoc nature of the connections between nodes
6245:
6240:
5748:
5527:
4391:
3614:
Biddle, Peter, Paul England, Marcus Peinado, and Bryan Willman,
3200:
3198:
2240:
Shen, Xuemin; Yu, Heather; Buford, John; Akon, Mursalin (2009).
2125:
Building Next-Generation Converged Networks: Theory and Practice
1313:
1308:
Peer-to-peer applications present one of the core issues in the
1013:
1000:
distribution protocol, with nodes in the IPFS network forming a
915:
815:
811:
803:
799:
776:
720:
545:
337:
6099:
5151:
4275:
3763:
2407:
Byung-Gon Chun, Ben Y. Zhao, John D. Kubiatowicz (2005-02-24).
1090:, testified that the United States military uses P2P networks.
1078:
applications are designed to power real-time marketplaces. The
386:
Peer-to-peer networks generally implement some form of virtual
174:
participants in the network, forming a peer-to-peer network of
6225:
5818:
5728:
5336:
2633:
The Case for Cooperative Networking (PostScript with addendum)
1881:
1879:
1877:
1875:
1726:
Peer-to-peer: harnessing the benefits of disruptive technology
965:
918:
protocols are used in various peer-to-peer applications. Some
724:
618:
455:
364:
A peer-to-peer network is designed around the notion of equal
220:
in which the consumption and supply of resources are divided.
29:
2808:
Anonymous File Sharing in Peer to Peer System by Random Walks
3682:
Peer-to-Peer Computing: Evolution of a Disruptive Technology
3647:
Djamal-Eddine Meddour, Mubashar Mushtaq, and Toufik Ahmed, "
2474:
IEEE Consumer Communications and Networking Conf. (CCNC '12)
2300:
A Study of Discovery Mechanisms for Peer-to-Peer Application
489:
The most common type of structured P2P networks implement a
3010:"The scalability of swarming peer-to-peer content delivery"
2630:
Padmanabhan, Venkata N.; Sripanidkulchai, Kunwadee (2002).
340:
email in the sense that the core email-relaying network of
3759:
3602:
A survey of peer-to-peer content distribution technologies
3600:
Stephanos Androutsellis-Theotokis and Diomidis Spinellis.
3311:
http://www.infosec.gov.hk/english/technical/files/peer.pdf
1237:
protocols (e.g. Tarzan) can be used to provide anonymity.
27:
Type of decentralized and distributed network architecture
964:
is a distributed version-controlled publishing platform.
3405:"What is bandwidth throttling? How to stop it | NordVPN"
2929:
Sharma, Parul; Bhakuni, Anuja; Kaushal, Rishabh (2013).
2267:"Overview of Structured Peer-to-Peer Overlay Algorithms"
351:
In May 1999, with millions more people on the Internet,
3674:
P2P Computing: The Evolution of a Disruptive Technology
3356:"Does Video Game Piracy Actually Result in More Sales?"
2704:
2702:
2700:
1229:, authorization, and authentication for data/messages.
3611:. ACM Computing Surveys, 36(4):335–371, December 2004.
2755:. In Hämmerli, Bernhard Markus; Sommer, Robin (eds.).
1981:"Overlay Network - an overview | ScienceDirect Topics"
3523:, International Advanced Computing Conference, 2014.
1371:
564:, a self-organized and emerging overlay network, and
344:
has a peer-to-peer character, while the periphery of
193:
The opposite of a peer-to-peer network: based on the
3693:, Idea Group Inc., Hershey, PA, United States, 2005.
2150:"Peer-to-peer Approaches to Grid Resource Discovery"
186:
peer-to-peer network typically between two devices.
6569:
6517:
6510:
6431:
6405:
6354:
6299:
6173:
6147:
6133:
6012:
5989:
5973:
5942:
5917:
5857:
5804:
5681:
5592:
5559:
5526:
5473:
5370:
5322:
5269:
5258:
5185:
5054:
5010:
4954:
4935:
4898:
4844:
4802:
4709:
4687:
4615:
4559:
4511:
4390:
4337:
4213:
4156:
4129:
4093:
4068:
4052:
4043:
3977:
3946:
3825:
3250:
Peer-to-Peer Computing: Principles and Applications
3216:
Peer-to-Peer Computing: Principles and Applications
2810:(Technical report). SRM University. 123456789/9306.
2711:
Peer-to-Peer Computing: Principles and Applications
2397:. Ph. D. Thesis (Stanford University), August 2004.
645:Peer-to-peer systems pose unique challenges from a
528:Notable distributed networks that use DHTs include
223:While P2P systems had previously been used in many
60:. Unsourced material may be challenged and removed.
5138:*Maintains additional presence on the surface web
3616:The Darknet and the Future of Content Distribution
2782:"Software Bullet Is Sought to Kill Musical Piracy"
728:security and file verification mechanisms. Modern
3292:http://www.ftc.gov/reports/p2p05/050623p2prpt.pdf
2244:(1st ed.). New York: Springer. p. 118.
2091:. In Hameurlain, Abdelkader; et al. (eds.).
1584:
1582:
3457:
3455:
3182:, 11 October 2017, Retrieved on 4 February 2019.
3113:
3111:
2935:2013 National Conference on Communications (NCC)
2487:Korzun, Dmitry; Gurtov, Andrei (November 2012).
1765:, S. Crocker, IETF Working Group (April 7, 1969)
262:that has emerged throughout society, enabled by
205:request services and resources from centralized
2265:Dhara, Krishna; Kolberg, Mario (January 2010).
1718:
1716:
1113:standalone version that bridges WebTorrent and
548:. Some prominent research projects include the
3701:Advanced Peer-Based Technology Business Models
3663:Core Concepts in Peer-to-Peer (P2P) Networking
3627:2002 ACM Workshop on Digital Rights Management
2060:"Optimal Topology Design for Overlay Networks"
2004:Ahson, Syed A.; Ilyas, Mohammad, eds. (2008).
1814:"The World Wide Web: Past, Present and Future"
1165:Incentivizing resource sharing and cooperation
1028:designed to be independent from the Internet.
289:systems such as the music-sharing application
6111:
5163:
4287:
3775:
3431:"Breaking and Improving Protocol Obfuscation"
3429:Hjelmvik, Erik; John, Wolfgang (2010-07-27).
2931:"Performance analysis of BitTorrent protocol"
2671:PDF (Springer, original, fee may be required)
2601:Yang, Beverly; Garcia-Molina, Hector (2001).
1257:Intellectual property law and illegal sharing
996:, peer-to-peer method of storing and sharing
446:are examples of unstructured P2P protocols).
8:
3679:Ramesh Subramanian and Brian Goodman (eds),
3672:". In: Subramanian, R.; Goodman, B. (eds.):
2576:. In Steinmetz, Ralf; Wehrle, Klaus (eds.).
2430:: CS1 maint: multiple names: authors list (
1016:is a peer-to-peer protocol designed for the
478:(DHT) to identify and locate nodes/resources
3085:
3083:
2152:. In Danelutto, Marco; et al. (eds.).
6514:
6144:
6118:
6104:
6096:
5266:
5170:
5156:
5148:
4314:
4294:
4280:
4272:
4049:
3782:
3768:
3760:
3632:John F. Buford, Heather Yu, Eng Keong Lua
3543:Ghosh Debjani, Rajan Payas, Pandey Mayank
2209:. In Druschel, Peter; et al. (eds.).
2200:
2198:
2148:Chervenak, Ann; Bharathi, Shishir (2008).
2119:Zulhasnine, Mohammed; et al. (2013).
1777:"Internet security enters the Middle Ages"
227:, the architecture was popularized by the
3753:Max Planck Institute for Software Systems
3732:Harvard Business School Working Knowledge
3488:
3015:. In Boutaba, Raouf; et al. (eds.).
2860:
2333:
2207:"Can Heterogeneity Make Gnutella Stable?"
1961:SimpleSwap | Cryptocurrency exchange blog
1546:
1312:controversy. Internet service providers (
120:Learn how and when to remove this message
2975:Peer-to-Peer Networking and Applications
2968:"On peer-to-peer (P2P) content delivery"
2388:Dipsea: A Modular Distributed Hash Table
2303:. IEEE Computer Society. pp. 444–.
1535:Peer-to-Peer Networking and Applications
1413:Distributed Data Management Architecture
740:Resilient and scalable computer networks
3969:List of people in blockchain technology
3720:Music Downloads: Pirates- or Customers?
3649:Open Issues in P2P Multimedia Streaming
3354:Polgar, David Ryan (October 15, 2017).
3008:Stutzbach, Daniel; et al. (2005).
2603:"Comparing Hybrid Peer-to-Peer Systems"
1945:. SWAMI VIVEKANAND SUBHARTI UNIVERSITY.
1920:https://www.hjp.at/doc/rfc/rfc1036.html
1469:
1378:
3165:Hammerksjold Andreas; Engler, Narkis,
3120:"Judge: File-Swapping Tools are Legal"
3072:: CS1 maint: archived copy as title (
3065:
2423:
1528:
1526:
1479:"What's a Peer-to-Peer (P2P) Network?"
865:Peer-to-peer content delivery networks
239:file sharing over the Internet and in
3167:"Delivery Optimization - a deep dive"
2578:Peer-to-Peer Systems and Applications
2114:
2112:
2010:. Taylor & Francis. p. 204.
1888:Peer-to-Peer Systems and Applications
7:
6080:
4256:
3564:Foundation of Peer-to-Peer Computing
2806:Singh, Vivek; Gupta, Himani (2012).
1672:"What Is BitTorrent and Is It Safe?"
649:perspective. Like any other form of
58:adding citations to reliable sources
3661:Detlef Schoder and Kai Fischbach, "
3379:Orland, Kyle (September 26, 2017).
3092:Handbook of Peer-to-Peer Networking
2287:archive, vol. 23, no. 7, Aug. 2007.
2242:Handbook of Peer-to-Peer Networking
2179:Handbook of Peer-to-Peer Networking
2031:Zhu, Ce; et al., eds. (2010).
1407:Cultural-historical activity theory
1276:MGM Studios, Inc. v. Grokster, Ltd.
1052:CoopNet content distribution system
899:MGM Studios, Inc. v. Grokster, Ltd.
589:CoopNet content distribution system
566:CoopNet content distribution system
3248:Vu, Quang H.; et al. (2010).
3214:Vu, Quang H.; et al. (2010).
2780:Sorkin, Andrew Ross (4 May 2003).
2709:Vu, Quang H.; et al. (2010).
2285:Future Generation Computer Systems
2087:Filali, Imen; et al. (2011).
992:and network designed to create a
432:Unstructured peer-to-peer networks
411:(or as a hybrid between the two).
182:(PAN) is also in nature a type of
25:
2751:Goebel, Jan; et al. (2007).
2690:"CoopNet: Cooperative Networking"
2123:. In Pathan; et al. (eds.).
2058:Kamel, Mina; et al. (2007).
1205:Some peer-to-peer networks (e.g.
1070:is also a directory-syncing app.
633:is transmitted by having clients
328:of control. The basic model is a
6670:Software engineering terminology
6079:
6070:
6069:
4324:
4323:
4313:
4255:
4246:
4245:
3644:, Morgan Kaufmann, December 2008
3586:Marling Engle & J. I. Khan.
2842:"Looking up data in P2P systems"
1812:Berners-Lee, Tim (August 1996).
1381:
594:CoopNet (Cooperative Networking)
484:structured peer-to-peer networks
34:
4866:Freedom of the Press Foundation
4460:Radio Free Europe/Radio Liberty
3676:, Idea Group Inc, Hershey. 2005
3634:P2P Networking and Applications
3554:Springer Proceedings, June 2014
3519:A Bhakuni, P Sharma, R Kaushal
3118:John Borland (April 25, 2003).
2572:Darlagiannis, Vasilios (2005).
1295:found that illegal downloading
653:, P2P applications can contain
423:Overlay network diagram for an
166:) computing or networking is a
138:Point-to-point (disambiguation)
45:needs additional citations for
6599:BitTorrent protocol encryption
4860:Electronic Frontier Foundation
4121:2020 Twitter account hijacking
3712:MIT Sloan School of Management
3329:Sanders, Linley (2017-09-22).
3252:. Springer. pp. 179–181.
2906:. 14 June 2012. Archived from
2661:PDF (Microsoft, with addendum)
1834:Sandhu, R.; Zhang, X. (2005).
1595:. Hillsboro, OR: Intel Press.
1342:BitTorrent protocol encryption
976:. Unlike the related I2P, the
771:Search results for the query "
763:Distributed storage and search
470:Overlay network diagram for a
382:Routing and resource discovery
1:
5110:Terms of Service; Didn't Read
4964:Distributed Denial of Secrets
4779:Russian Anonymous Marketplace
3964:List of bitcoin organizations
3141:Walker, Leslie (2001-11-08).
2574:"Hybrid Peer-to-Peer Systems"
2205:Lv, Qin; et al. (2002).
2062:. In Akyildiz, Ian F. (ed.).
1502:Desire Athow (12 July 2016).
932:Pennsylvania State University
493:(DHT), in which a variant of
134:Peer-to-peer (disambiguation)
4138:The Rise and Rise of Bitcoin
3019:. Springer. pp. 15–26.
1209:) place a heavy emphasis on
1008:is a peer-to-peer chat and
972:used to browse the Internet
6035:Cryptographic hash function
4945:Central Intelligence Agency
4101:Bitcoin scalability problem
2344:10.1007/978-3-540-45172-3_3
2037:. IGI Global. p. 265.
1433:Peer-to-peer energy trading
1242:live streaming sexual abuse
6686:
3529:10.1109/IAdCC.2014.6779311
3143:"Uncle Sam Wants Napster!"
2366:Moni Naor and Udi Wieder.
1940:"CLIENT SERVER TECHNOLOGY"
1723:Oram, Andrew, ed. (2001).
1477:Cope, James (2002-04-08).
1080:U.S. Department of Defense
1026:Wireless community network
986:InterPlanetary File System
798:has been pressured by the
743:
681:
678:Corrupted data and malware
606:Carnegie Mellon University
153:peer-to-peer (P2P) network
131:
6127:Peer-to-peer file sharing
6065:
5119:
4309:
4241:
4116:2018 Bitcoin bomb threats
4111:2018 cryptocurrency crash
3954:List of bitcoin companies
3797:
3218:. Springer. p. 172.
2987:10.1007/s12083-007-0003-1
2849:Communications of the ACM
2759:. Springer. p. 112.
2451:. Springer. p. 329.
2181:. Springer. p. 119.
2127:. CRC Press. p. 99.
2066:. Springer. p. 714.
1642:10.1007/s00530-003-0088-1
1565:10.1007/s12083-012-0157-3
1397:Client-to-client protocol
1266:law. Two major cases are
889:law. Two major cases are
872:and various games though
849:Peer-to-peer file sharing
781:distributed search engine
536:distributed tracker, the
266:technologies in general.
6629:Micro Transport Protocol
6025:Timeline of cryptography
4474:Independent Media Center
3094:. Springer. p. 48.
2943:10.1109/NCC.2013.6488040
2646:10.1007/3-540-45748-8_17
2156:. Springer. p. 67.
2095:. Springer. p. 21.
1149:List of cryptocurrencies
425:unstructured P2P network
281:was established in 1999.
6367:Advanced Direct Connect
6020:Outline of cryptography
5991:Anti–computer forensics
4846:Nonprofit organizations
2713:. Springer. p. 8.
2326:Peer-to-Peer Systems II
1848:10.1145/1063979.1064005
1458:Wireless ad hoc network
1291:A study ordered by the
1221:can be used to provide
1219:Public key cryptography
1137:are peer-to-peer-based
1002:distributed file system
936:Simon Fraser University
880:Copyright infringements
756:single point of failure
516:Distributed hash tables
168:distributed application
6655:Peer-to-peer computing
6579:Distributed hash table
6454:Game and video sharing
6047:Homomorphic encryption
6040:List of hash functions
5179:Cryptographic software
4215:Bitcoin in El Salvador
3572:"The eternity service"
1731:Sebastopol, California
1589:Barkai, David (2001).
1252:Political implications
1185:
1131:Hotline Communications
958:
946:Other P2P applications
784:
712:that were tested for.
517:
491:distributed hash table
479:
476:distributed hash table
472:structured P2P network
428:
376:File Transfer Protocol
282:
253:peer-to-peer as a meme
209:
156:
6660:File sharing networks
6052:End-to-end encryption
4884:Privacy International
4854:Amnesty International
4734:Black Market Reloaded
4000:Cryptocurrency wallet
3959:List of bitcoin forks
3817:Environmental effects
3477:ACM Computing Surveys
2871:10.1145/606272.606299
2692:. Microsoft Research.
2610:Very Large Data Bases
2386:Gurmeet Singh Manku.
1985:www.sciencedirect.com
1775:Oppliger, R. (1995).
1516:Rüdiger Schollmeier,
1438:Semantic P2P networks
1428:List of P2P protocols
1201:Privacy and anonymity
1172:
1117:serverless networks.
953:
844:File-sharing networks
770:
750:Distributed computing
746:Wireless mesh network
515:
469:
422:
415:Unstructured networks
277:
192:
180:personal area network
150:
4878:La Quadrature du Net
4872:Front Line Defenders
3838:Andreas Antonopoulos
3717:Silverthorne, Sean.
3697:Shuman Ghosemajumder
2215:. Springer. p.
1842:. pp. 147–158.
1697:"האוניברסיטה הפתוחה"
1418:End-to-end principle
1338:bandwidth throttling
1109:, as well as in the
1044:PAST storage utility
558:PAST storage utility
532:, an alternative to
398:network, but at the
342:mail transfer agents
295:Request for Comments
231:file sharing system
142:P2P (disambiguation)
132:For other uses, see
54:improve this article
4749:The Farmer's Market
3147:The Washington Post
2377:. Proc. SPAA, 2003.
1557:2012arXiv1207.0790D
1402:Client–queue–client
1160:Social implications
1154:List of blockchains
1086:, then director of
994:content-addressable
462:Structured networks
326:decentralized model
225:application domains
218:client–server model
199:, where individual
196:client–server model
6619:BitTorrent tracker
5639:Facebook Messenger
4794:White House Market
4540:Free Haven Project
4489:The New York Times
4303:Tor onion services
4168:Bitcoin Foundation
4106:History of bitcoin
3913:Cameron Winklevoss
3743:2014-10-05 at the
3725:2006-06-30 at the
3706:2012-10-13 at the
3668:2011-09-15 at the
3654:2011-08-22 at the
3621:2011-07-27 at the
3607:2020-11-09 at the
3593:2007-06-15 at the
3570:Anderson, Ross J.
3560:of P2P terminology
3550:2017-02-19 at the
3316:2019-12-09 at the
3297:2012-11-01 at the
3172:2019-02-04 at the
2900:"Art thou a Peer?"
2694:Project home page.
2676:2023-01-01 at the
2666:2007-04-17 at the
2393:2004-09-10 at the
2373:2019-12-09 at the
2281:IEEE Commun. Surv.
1925:2021-06-12 at the
1896:10.1007/11530657_2
1630:Multimedia Systems
1310:network neutrality
1304:Network neutrality
1186:
1139:digital currencies
1111:WebTorrent Desktop
1058:is a peer-to-peer
1056:Secure Scuttlebutt
959:
870:Linux distribution
785:
734:chunk verification
692:The prevalence of
641:Security and trust
602:Microsoft Research
518:
495:consistent hashing
480:
429:
303:'s vision for the
283:
210:
157:
6637:
6636:
6624:UDP hole punching
6565:
6564:
6350:
6349:
6093:
6092:
5943:Service providers
5677:
5676:
5483:Check Point VPN-1
5145:
5144:
4900:Operating systems
4804:Document archives
4784:Tor Carding Forum
4764:Sheep Marketplace
4566:instant messaging
4431:The Daily Stormer
4269:
4268:
4161:
4089:
4088:
4060:Bitcoin Unlimited
4015:Lightning Network
3259:978-3-642-03513-5
3225:978-3-642-03513-5
3101:978-0-387-09750-3
3026:978-3-540-25809-4
2952:978-1-4673-5952-8
2910:on 6 October 2013
2720:978-3-642-03513-5
2655:978-3-540-44179-3
2500:978-1-4614-5482-3
2458:978-0-387-09752-7
2353:978-3-540-40724-9
2251:978-0-387-09750-3
2188:978-0-387-09750-3
1676:www.kaspersky.com
1064:social networking
851:networks such as
671:denial of service
647:computer security
400:application layer
260:social networking
241:personal networks
214:network bandwidth
178:. In addition, a
130:
129:
122:
104:
16:(Redirected from
6677:
6547:Open music model
6542:Friend-to-friend
6515:
6479:Sharing software
6145:
6120:
6113:
6106:
6097:
6083:
6082:
6073:
6072:
5921:operating system
5919:Security-focused
5867:
5692:
5267:
5172:
5165:
5158:
5149:
5046:Welcome to Video
4823:Internet Archive
4818:Doxbin (darknet)
4502:Voice of America
4418:Die Tageszeitung
4327:
4326:
4317:
4316:
4296:
4289:
4282:
4273:
4259:
4258:
4249:
4248:
4174:Bitcoin Magazine
4159:
4050:
3918:Tyler Winklevoss
3878:Satoshi Nakamoto
3784:
3777:
3770:
3761:
3629:, November 2002.
3583:
3531:
3517:
3511:
3510:
3492:
3468:
3462:
3459:
3450:
3449:
3438:Technical Report
3435:
3426:
3420:
3419:
3417:
3416:
3401:
3395:
3394:
3392:
3391:
3376:
3370:
3369:
3367:
3366:
3351:
3345:
3344:
3342:
3341:
3326:
3320:
3307:
3301:
3288:
3282:
3281:
3280:. March 3, 2020.
3270:
3264:
3263:
3245:
3239:
3236:
3230:
3229:
3211:
3205:
3202:
3193:
3189:
3183:
3163:
3157:
3156:
3154:
3153:
3138:
3132:
3131:
3126:. Archived from
3115:
3106:
3105:
3087:
3078:
3077:
3071:
3063:
3061:
3060:
3054:
3048:. Archived from
3047:
3037:
3031:
3030:
3014:
3005:
2999:
2998:
2972:
2966:Li, Jin (2008).
2963:
2957:
2956:
2937:. pp. 1–5.
2926:
2920:
2919:
2917:
2915:
2896:
2890:
2889:
2887:
2885:
2864:
2846:
2837:
2831:
2830:
2825:. Archived from
2818:
2812:
2811:
2803:
2797:
2796:
2794:
2792:
2777:
2771:
2770:
2748:
2742:
2741:
2739:
2731:
2725:
2724:
2706:
2695:
2693:
2686:
2680:
2659:
2627:
2621:
2620:
2618:
2616:
2607:
2598:
2592:
2591:
2569:
2563:
2562:
2560:
2554:. Archived from
2553:
2544:
2538:
2537:
2535:
2533:
2527:
2521:. Archived from
2520:
2511:
2505:
2504:
2484:
2478:
2477:
2469:
2463:
2462:
2442:
2436:
2435:
2429:
2421:
2419:
2418:
2413:
2404:
2398:
2384:
2378:
2364:
2358:
2357:
2337:
2321:
2315:
2314:
2294:
2288:
2277:
2271:
2270:
2262:
2256:
2255:
2237:
2231:
2230:
2202:
2193:
2192:
2174:
2168:
2167:
2145:
2139:
2138:
2116:
2107:
2106:
2084:
2078:
2077:
2055:
2049:
2048:
2028:
2022:
2021:
2001:
1995:
1994:
1992:
1991:
1977:
1971:
1970:
1968:
1967:
1953:
1947:
1946:
1944:
1935:
1929:
1916:
1910:
1909:
1883:
1870:
1869:
1831:
1825:
1824:
1822:
1820:
1809:
1803:
1802:
1800:
1799:
1793:10.1109/2.467613
1772:
1766:
1759:
1753:
1752:
1720:
1711:
1710:
1708:
1707:
1693:
1687:
1686:
1684:
1683:
1668:
1662:
1661:
1621:
1615:
1614:
1586:
1577:
1576:
1550:
1530:
1521:
1514:
1508:
1507:
1499:
1493:
1492:
1490:
1489:
1474:
1423:Friend-to-friend
1386:
1385:
1377:
1352:Current research
1240:Perpetrators of
1135:Cryptocurrencies
930:, undertaken by
827:Content delivery
710:computer viruses
125:
118:
114:
111:
105:
103:
62:
38:
30:
21:
6685:
6684:
6680:
6679:
6678:
6676:
6675:
6674:
6640:
6639:
6638:
6633:
6571:
6561:
6506:
6427:
6401:
6356:
6346:
6295:
6169:
6138:
6129:
6124:
6094:
6089:
6061:
6008:
5985:
5969:
5938:
5920:
5913:
5861:
5853:
5824:Java Anon Proxy
5800:
5686:
5685:
5683:Disk encryption
5673:
5649:Google Messages
5634:Signal Protocol
5588:
5555:
5522:
5469:
5366:
5318:
5261:
5254:
5181:
5176:
5146:
5141:
5115:
5050:
5006:
4950:
4931:
4894:
4840:
4798:
4711:Darknet markets
4705:
4683:
4679:The Hidden Wiki
4611:
4564:
4555:
4545:KickassTorrents
4535:Freedom Hosting
4519:
4507:
4454:Radio Free Asia
4412:Current Time TV
4386:
4333:
4305:
4300:
4270:
4265:
4237:
4209:
4190:Canaan Creative
4160:(not exchanges)
4158:
4152:
4125:
4085:
4064:
4039:
3985:Bitcoin network
3973:
3942:
3893:Vitalik Buterin
3843:Brian Armstrong
3821:
3793:
3788:
3758:
3749:traffic shaping
3745:Wayback Machine
3727:Wayback Machine
3708:Wayback Machine
3670:Wayback Machine
3656:Wayback Machine
3623:Wayback Machine
3609:Wayback Machine
3595:Wayback Machine
3569:
3552:Wayback Machine
3539:
3534:
3518:
3514:
3490:10.1145/3578581
3470:
3469:
3465:
3460:
3453:
3433:
3428:
3427:
3423:
3414:
3412:
3403:
3402:
3398:
3389:
3387:
3378:
3377:
3373:
3364:
3362:
3353:
3352:
3348:
3339:
3337:
3328:
3327:
3323:
3318:Wayback Machine
3308:
3304:
3299:Wayback Machine
3289:
3285:
3272:
3271:
3267:
3260:
3247:
3246:
3242:
3237:
3233:
3226:
3213:
3212:
3208:
3203:
3196:
3190:
3186:
3174:Wayback Machine
3164:
3160:
3151:
3149:
3140:
3139:
3135:
3117:
3116:
3109:
3102:
3089:
3088:
3081:
3064:
3058:
3056:
3052:
3045:
3043:"Archived copy"
3041:
3038:
3034:
3027:
3012:
3007:
3006:
3002:
2981:(1): 45–63 ≤≥.
2970:
2965:
2964:
2960:
2953:
2928:
2927:
2923:
2913:
2911:
2904:www.p2pnews.net
2898:
2897:
2893:
2883:
2881:
2844:
2839:
2838:
2834:
2820:
2819:
2815:
2805:
2804:
2800:
2790:
2788:
2779:
2778:
2774:
2767:
2750:
2749:
2745:
2737:
2733:
2732:
2728:
2721:
2708:
2707:
2698:
2688:
2687:
2683:
2678:Wayback Machine
2668:Wayback Machine
2656:
2629:
2628:
2624:
2614:
2612:
2605:
2600:
2599:
2595:
2588:
2571:
2570:
2566:
2558:
2551:
2546:
2545:
2541:
2531:
2529:
2525:
2518:
2513:
2512:
2508:
2501:
2486:
2485:
2481:
2471:
2470:
2466:
2459:
2444:
2443:
2439:
2422:
2416:
2414:
2411:
2406:
2405:
2401:
2395:Wayback Machine
2385:
2381:
2375:Wayback Machine
2365:
2361:
2354:
2323:
2322:
2318:
2311:
2296:
2295:
2291:
2278:
2274:
2269:. ResearchGate.
2264:
2263:
2259:
2252:
2239:
2238:
2234:
2227:
2204:
2203:
2196:
2189:
2176:
2175:
2171:
2164:
2147:
2146:
2142:
2135:
2118:
2117:
2110:
2103:
2086:
2085:
2081:
2074:
2057:
2056:
2052:
2045:
2030:
2029:
2025:
2018:
2003:
2002:
1998:
1989:
1987:
1979:
1978:
1974:
1965:
1963:
1955:
1954:
1950:
1942:
1937:
1936:
1932:
1927:Wayback Machine
1917:
1913:
1906:
1885:
1884:
1873:
1858:
1833:
1832:
1828:
1818:
1816:
1811:
1810:
1806:
1797:
1795:
1787:(10): 100–101.
1774:
1773:
1769:
1760:
1756:
1741:
1722:
1721:
1714:
1705:
1703:
1701:www.openu.ac.il
1695:
1694:
1690:
1681:
1679:
1670:
1669:
1665:
1623:
1622:
1618:
1603:
1588:
1587:
1580:
1532:
1531:
1524:
1515:
1511:
1501:
1500:
1496:
1487:
1485:
1476:
1475:
1471:
1467:
1462:
1443:Sharing economy
1392:
1380:
1372:
1370:
1354:
1306:
1259:
1254:
1227:data validation
1203:
1167:
1162:
1060:gossip protocol
970:overlay network
948:
908:
882:
861:eDonkey network
846:
829:
824:
765:
752:
742:
690:
684:Data validation
680:
667:
665:Routing attacks
659:remote exploits
655:vulnerabilities
643:
631:Streaming media
591:
578:
464:
417:
388:overlay network
384:
362:
356:restrictions".
301:Tim Berners-Lee
272:
247:displaying and
145:
126:
115:
109:
106:
63:
61:
51:
39:
28:
23:
22:
15:
12:
11:
5:
6683:
6681:
6673:
6672:
6667:
6662:
6657:
6652:
6642:
6641:
6635:
6634:
6632:
6631:
6626:
6621:
6616:
6611:
6606:
6601:
6596:
6591:
6586:
6581:
6575:
6573:
6567:
6566:
6563:
6562:
6560:
6559:
6554:
6549:
6544:
6539:
6534:
6529:
6523:
6521:
6512:
6508:
6507:
6505:
6504:
6499:
6481:
6476:
6471:
6466:
6461:
6456:
6451:
6446:
6441:
6435:
6433:
6429:
6428:
6426:
6425:
6420:
6415:
6409:
6407:
6403:
6402:
6400:
6399:
6394:
6389:
6384:
6379:
6377:Direct Connect
6374:
6369:
6363:
6361:
6352:
6351:
6348:
6347:
6345:
6344:
6339:
6334:
6329:
6324:
6319:
6314:
6309:
6303:
6301:
6297:
6296:
6294:
6293:
6288:
6283:
6278:
6273:
6268:
6263:
6258:
6253:
6248:
6243:
6238:
6233:
6228:
6223:
6218:
6213:
6208:
6203:
6198:
6193:
6188:
6183:
6177:
6175:
6171:
6170:
6168:
6167:
6162:
6157:
6155:Direct Connect
6151:
6149:
6142:
6131:
6130:
6125:
6123:
6122:
6115:
6108:
6100:
6091:
6090:
6088:
6087:
6077:
6066:
6063:
6062:
6060:
6059:
6054:
6049:
6044:
6043:
6042:
6037:
6030:Hash functions
6027:
6022:
6016:
6014:
6013:Related topics
6010:
6009:
6007:
6006:
6001:
5995:
5993:
5987:
5986:
5984:
5983:
5977:
5975:
5971:
5970:
5968:
5967:
5962:
5957:
5952:
5946:
5944:
5940:
5939:
5937:
5936:
5931:
5925:
5923:
5915:
5914:
5912:
5911:
5906:
5901:
5896:
5891:
5886:
5881:
5876:
5870:
5868:
5855:
5854:
5852:
5851:
5846:
5841:
5836:
5831:
5826:
5821:
5816:
5810:
5808:
5802:
5801:
5799:
5798:
5793:
5792:
5791:
5781:
5776:
5771:
5766:
5761:
5756:
5751:
5746:
5741:
5736:
5731:
5726:
5721:
5716:
5711:
5706:
5701:
5695:
5693:
5679:
5678:
5675:
5674:
5672:
5671:
5668:
5667:
5666:
5661:
5656:
5651:
5646:
5641:
5631:
5626:
5621:
5620:
5619:
5614:
5604:
5598:
5596:
5590:
5589:
5587:
5586:
5581:
5576:
5571:
5565:
5563:
5557:
5556:
5554:
5553:
5548:
5543:
5538:
5532:
5530:
5524:
5523:
5521:
5520:
5515:
5510:
5505:
5500:
5495:
5490:
5485:
5479:
5477:
5471:
5470:
5468:
5467:
5462:
5457:
5452:
5447:
5442:
5437:
5432:
5427:
5422:
5417:
5412:
5407:
5402:
5397:
5392:
5387:
5382:
5380:BBM Enterprise
5376:
5374:
5368:
5367:
5365:
5364:
5359:
5354:
5349:
5344:
5339:
5334:
5328:
5326:
5320:
5319:
5317:
5316:
5311:
5306:
5301:
5296:
5291:
5286:
5281:
5275:
5273:
5264:
5256:
5255:
5253:
5252:
5247:
5242:
5237:
5232:
5227:
5222:
5212:
5207:
5202:
5197:
5191:
5189:
5183:
5182:
5177:
5175:
5174:
5167:
5160:
5152:
5143:
5142:
5140:
5139:
5136:
5131:
5126:
5120:
5117:
5116:
5114:
5113:
5107:
5101:
5095:
5089:
5083:
5077:
5071:
5065:
5058:
5056:
5052:
5051:
5049:
5048:
5043:
5037:
5032:
5027:
5022:
5016:
5014:
5008:
5007:
5005:
5004:
4999:
4993:
4987:
4982:
4977:
4972:
4967:
4960:
4958:
4956:Whistleblowing
4952:
4951:
4949:
4948:
4941:
4939:
4933:
4932:
4930:
4929:
4923:
4917:
4911:
4904:
4902:
4896:
4895:
4893:
4892:
4887:
4881:
4875:
4869:
4863:
4857:
4850:
4848:
4842:
4841:
4839:
4838:
4832:
4826:
4820:
4815:
4808:
4806:
4800:
4799:
4797:
4796:
4791:
4786:
4781:
4776:
4771:
4766:
4761:
4756:
4751:
4746:
4741:
4736:
4731:
4726:
4721:
4715:
4713:
4707:
4706:
4704:
4703:
4698:
4695:Blockchain.com
4691:
4689:
4685:
4684:
4682:
4681:
4676:
4670:
4664:
4658:
4653:
4648:
4642:
4637:
4632:
4625:
4623:
4613:
4612:
4610:
4609:
4604:
4599:
4593:
4587:
4581:
4576:
4570:
4568:
4557:
4556:
4554:
4553:
4550:The Pirate Bay
4547:
4542:
4537:
4532:
4525:
4523:
4509:
4508:
4506:
4505:
4499:
4493:
4485:
4477:
4471:
4463:
4457:
4451:
4445:
4440:
4435:
4427:
4424:Deutsche Welle
4421:
4415:
4409:
4403:
4396:
4394:
4388:
4387:
4385:
4384:
4378:
4372:
4367:
4361:
4355:
4349:
4343:
4341:
4339:Search engines
4335:
4334:
4332:
4331:
4321:
4310:
4307:
4306:
4301:
4299:
4298:
4291:
4284:
4276:
4267:
4266:
4264:
4263:
4253:
4242:
4239:
4238:
4236:
4235:
4230:
4225:
4219:
4217:
4211:
4210:
4208:
4207:
4202:
4197:
4192:
4187:
4182:
4177:
4170:
4164:
4162:
4157:Legal entities
4154:
4153:
4151:
4150:
4142:
4133:
4131:
4127:
4126:
4124:
4123:
4118:
4113:
4108:
4103:
4097:
4095:
4091:
4090:
4087:
4086:
4084:
4083:
4078:
4072:
4070:
4066:
4065:
4063:
4062:
4056:
4054:
4047:
4041:
4040:
4038:
4037:
4032:
4027:
4022:
4017:
4012:
4007:
4002:
3997:
3995:Cryptocurrency
3992:
3987:
3981:
3979:
3975:
3974:
3972:
3971:
3966:
3961:
3956:
3950:
3948:
3944:
3943:
3941:
3940:
3935:
3930:
3925:
3920:
3915:
3910:
3905:
3900:
3895:
3890:
3885:
3880:
3875:
3870:
3865:
3860:
3855:
3853:Wences Casares
3850:
3845:
3840:
3835:
3833:Gavin Andresen
3829:
3827:
3823:
3822:
3820:
3819:
3814:
3809:
3804:
3798:
3795:
3794:
3789:
3787:
3786:
3779:
3772:
3764:
3757:
3756:
3735:
3715:
3694:
3677:
3659:
3645:
3630:
3612:
3598:
3584:
3567:
3561:
3555:
3540:
3538:
3537:External links
3535:
3533:
3532:
3512:
3463:
3451:
3421:
3396:
3371:
3346:
3321:
3302:
3283:
3265:
3258:
3240:
3231:
3224:
3206:
3194:
3184:
3158:
3133:
3130:on 2012-03-10.
3107:
3100:
3079:
3032:
3025:
3000:
2958:
2951:
2921:
2891:
2832:
2829:on 2012-07-24.
2813:
2798:
2786:New York Times
2772:
2765:
2743:
2726:
2719:
2696:
2681:
2654:
2622:
2593:
2586:
2564:
2561:on 2008-09-10.
2539:
2528:on 14 May 2011
2506:
2499:
2479:
2464:
2457:
2437:
2399:
2379:
2359:
2352:
2335:10.1.1.12.5548
2316:
2309:
2289:
2272:
2257:
2250:
2232:
2225:
2194:
2187:
2169:
2162:
2140:
2133:
2108:
2101:
2079:
2072:
2050:
2043:
2023:
2016:
1996:
1972:
1948:
1938:Sharma, M. K.
1930:
1911:
1904:
1871:
1856:
1826:
1804:
1767:
1754:
1739:
1712:
1688:
1663:
1636:(2): 170–184.
1616:
1602:978-0970284679
1601:
1578:
1541:(3): 257–276.
1522:
1509:
1494:
1468:
1466:
1463:
1461:
1460:
1455:
1450:
1445:
1440:
1435:
1430:
1425:
1420:
1415:
1410:
1404:
1399:
1393:
1391:
1390:
1369:
1366:
1353:
1350:
1321:October 2007,
1305:
1302:
1293:European Union
1258:
1255:
1253:
1250:
1202:
1199:
1166:
1163:
1161:
1158:
1157:
1156:
1151:
1099:torrent client
1084:Anthony Tether
982:onion services
947:
944:
907:
904:
881:
878:
845:
842:
828:
825:
823:
820:
773:software libre
764:
761:
741:
738:
679:
676:
666:
663:
642:
639:
590:
587:
577:
574:
570:grid computing
463:
460:
416:
413:
383:
380:
361:
358:
305:World Wide Web
271:
268:
255:refers to the
128:
127:
69:"Peer-to-peer"
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
6682:
6671:
6668:
6666:
6663:
6661:
6658:
6656:
6653:
6651:
6648:
6647:
6645:
6630:
6627:
6625:
6622:
6620:
6617:
6615:
6614:Super-seeding
6612:
6610:
6607:
6605:
6602:
6600:
6597:
6595:
6594:Peer exchange
6592:
6590:
6589:NAT traversal
6587:
6585:
6582:
6580:
6577:
6576:
6574:
6568:
6558:
6555:
6553:
6550:
6548:
6545:
6543:
6540:
6538:
6535:
6533:
6530:
6528:
6527:Anonymous P2P
6525:
6524:
6522:
6520:
6516:
6513:
6509:
6503:
6502:Legal aspects
6500:
6497:
6493:
6489:
6485:
6482:
6480:
6477:
6475:
6472:
6470:
6467:
6465:
6464:Music sharing
6462:
6460:
6459:Image sharing
6457:
6455:
6452:
6450:
6447:
6445:
6444:Broadcatching
6442:
6440:
6437:
6436:
6434:
6430:
6424:
6421:
6419:
6416:
6414:
6411:
6410:
6408:
6404:
6398:
6395:
6393:
6390:
6388:
6385:
6383:
6380:
6378:
6375:
6373:
6370:
6368:
6365:
6364:
6362:
6360:
6353:
6343:
6340:
6338:
6335:
6333:
6330:
6328:
6325:
6323:
6320:
6318:
6315:
6313:
6310:
6308:
6305:
6304:
6302:
6298:
6292:
6289:
6287:
6284:
6282:
6279:
6277:
6274:
6272:
6269:
6267:
6264:
6262:
6259:
6257:
6254:
6252:
6249:
6247:
6244:
6242:
6239:
6237:
6234:
6232:
6229:
6227:
6224:
6222:
6219:
6217:
6214:
6212:
6209:
6207:
6204:
6202:
6199:
6197:
6194:
6192:
6189:
6187:
6184:
6182:
6179:
6178:
6176:
6174:Decentralized
6172:
6166:
6163:
6161:
6158:
6156:
6153:
6152:
6150:
6146:
6143:
6141:
6136:
6132:
6128:
6121:
6116:
6114:
6109:
6107:
6102:
6101:
6098:
6086:
6078:
6076:
6068:
6067:
6064:
6058:
6055:
6053:
6050:
6048:
6045:
6041:
6038:
6036:
6033:
6032:
6031:
6028:
6026:
6023:
6021:
6018:
6017:
6015:
6011:
6005:
6002:
6000:
5997:
5996:
5994:
5992:
5988:
5982:
5979:
5978:
5976:
5972:
5966:
5963:
5961:
5958:
5956:
5953:
5951:
5948:
5947:
5945:
5941:
5935:
5932:
5930:
5927:
5926:
5924:
5922:
5916:
5910:
5907:
5905:
5902:
5900:
5897:
5895:
5892:
5890:
5887:
5885:
5882:
5880:
5877:
5875:
5872:
5871:
5869:
5865:
5860:
5856:
5850:
5847:
5845:
5842:
5840:
5837:
5835:
5832:
5830:
5827:
5825:
5822:
5820:
5817:
5815:
5812:
5811:
5809:
5807:
5803:
5797:
5794:
5790:
5787:
5786:
5785:
5782:
5780:
5777:
5775:
5772:
5770:
5767:
5765:
5762:
5760:
5757:
5755:
5752:
5750:
5747:
5745:
5742:
5740:
5737:
5735:
5732:
5730:
5727:
5725:
5722:
5720:
5717:
5715:
5712:
5710:
5707:
5705:
5702:
5700:
5697:
5696:
5694:
5690:
5684:
5680:
5669:
5665:
5662:
5660:
5657:
5655:
5652:
5650:
5647:
5645:
5642:
5640:
5637:
5636:
5635:
5632:
5630:
5627:
5625:
5622:
5618:
5615:
5613:
5610:
5609:
5608:
5605:
5603:
5600:
5599:
5597:
5595:
5591:
5585:
5582:
5580:
5577:
5575:
5572:
5570:
5567:
5566:
5564:
5562:
5558:
5552:
5549:
5547:
5544:
5542:
5539:
5537:
5534:
5533:
5531:
5529:
5525:
5519:
5516:
5514:
5511:
5509:
5506:
5504:
5503:SoftEther VPN
5501:
5499:
5496:
5494:
5491:
5489:
5486:
5484:
5481:
5480:
5478:
5476:
5472:
5466:
5463:
5461:
5458:
5456:
5453:
5451:
5448:
5446:
5443:
5441:
5438:
5436:
5433:
5431:
5428:
5426:
5423:
5421:
5418:
5416:
5413:
5411:
5408:
5406:
5403:
5401:
5398:
5396:
5393:
5391:
5388:
5386:
5385:Bouncy Castle
5383:
5381:
5378:
5377:
5375:
5373:
5372:TLS & SSL
5369:
5363:
5360:
5358:
5355:
5353:
5350:
5348:
5345:
5343:
5340:
5338:
5335:
5333:
5330:
5329:
5327:
5325:
5321:
5315:
5312:
5310:
5307:
5305:
5302:
5300:
5297:
5295:
5292:
5290:
5287:
5285:
5282:
5280:
5277:
5276:
5274:
5272:
5268:
5265:
5263:
5262:communication
5257:
5251:
5248:
5246:
5243:
5241:
5238:
5236:
5233:
5231:
5228:
5226:
5223:
5220:
5216:
5213:
5211:
5208:
5206:
5203:
5201:
5198:
5196:
5193:
5192:
5190:
5188:
5187:Email clients
5184:
5180:
5173:
5168:
5166:
5161:
5159:
5154:
5153:
5150:
5137:
5135:
5132:
5130:
5129:.onion domain
5127:
5125:
5122:
5121:
5118:
5111:
5108:
5105:
5102:
5099:
5096:
5093:
5090:
5087:
5084:
5081:
5078:
5075:
5072:
5069:
5066:
5063:
5060:
5059:
5057:
5053:
5047:
5044:
5041:
5038:
5036:
5033:
5031:
5028:
5026:
5023:
5021:
5018:
5017:
5015:
5013:
5009:
5003:
5000:
4997:
4994:
4991:
4988:
4986:
4983:
4981:
4978:
4976:
4973:
4971:
4968:
4965:
4962:
4961:
4959:
4957:
4953:
4946:
4943:
4942:
4940:
4938:
4934:
4927:
4924:
4921:
4918:
4915:
4912:
4909:
4906:
4905:
4903:
4901:
4897:
4891:
4888:
4885:
4882:
4879:
4876:
4873:
4870:
4867:
4864:
4861:
4858:
4855:
4852:
4851:
4849:
4847:
4843:
4836:
4833:
4830:
4827:
4824:
4821:
4819:
4816:
4813:
4812:Archive.today
4810:
4809:
4807:
4805:
4801:
4795:
4792:
4790:
4787:
4785:
4782:
4780:
4777:
4775:
4772:
4770:
4767:
4765:
4762:
4760:
4757:
4755:
4752:
4750:
4747:
4745:
4742:
4740:
4737:
4735:
4732:
4730:
4727:
4725:
4722:
4720:
4717:
4716:
4714:
4712:
4708:
4702:
4699:
4696:
4693:
4692:
4690:
4686:
4680:
4677:
4674:
4671:
4668:
4665:
4662:
4659:
4657:
4654:
4652:
4649:
4646:
4643:
4641:
4638:
4636:
4633:
4630:
4627:
4626:
4624:
4622:
4618:
4614:
4608:
4605:
4603:
4600:
4597:
4594:
4591:
4588:
4585:
4582:
4580:
4577:
4575:
4574:Bitmessage.ch
4572:
4571:
4569:
4567:
4562:
4558:
4551:
4548:
4546:
4543:
4541:
4538:
4536:
4533:
4530:
4527:
4526:
4524:
4522:
4518:
4514:
4510:
4503:
4500:
4497:
4494:
4491:
4490:
4486:
4483:
4482:
4481:The Intercept
4478:
4475:
4472:
4469:
4468:
4464:
4461:
4458:
4455:
4452:
4449:
4446:
4444:
4441:
4439:
4436:
4433:
4432:
4428:
4425:
4422:
4419:
4416:
4413:
4410:
4407:
4404:
4401:
4398:
4397:
4395:
4393:
4389:
4382:
4379:
4376:
4373:
4371:
4368:
4365:
4362:
4359:
4356:
4353:
4350:
4348:
4345:
4344:
4342:
4340:
4336:
4330:
4322:
4320:
4312:
4311:
4308:
4304:
4297:
4292:
4290:
4285:
4283:
4278:
4277:
4274:
4262:
4254:
4252:
4244:
4243:
4240:
4234:
4231:
4229:
4228:Bitcoin Beach
4226:
4224:
4221:
4220:
4218:
4216:
4212:
4206:
4203:
4201:
4198:
4196:
4193:
4191:
4188:
4186:
4183:
4181:
4178:
4176:
4175:
4171:
4169:
4166:
4165:
4163:
4155:
4148:
4147:
4143:
4140:
4139:
4135:
4134:
4132:
4128:
4122:
4119:
4117:
4114:
4112:
4109:
4107:
4104:
4102:
4099:
4098:
4096:
4092:
4082:
4079:
4077:
4074:
4073:
4071:
4067:
4061:
4058:
4057:
4055:
4051:
4048:
4046:
4042:
4036:
4033:
4031:
4028:
4026:
4025:Proof of work
4023:
4021:
4018:
4016:
4013:
4011:
4008:
4006:
4003:
4001:
3998:
3996:
3993:
3991:
3988:
3986:
3983:
3982:
3980:
3976:
3970:
3967:
3965:
3962:
3960:
3957:
3955:
3952:
3951:
3949:
3945:
3939:
3938:Erik Voorhees
3936:
3934:
3931:
3929:
3926:
3924:
3921:
3919:
3916:
3914:
3911:
3909:
3906:
3904:
3901:
3899:
3898:Ross Ulbricht
3896:
3894:
3891:
3889:
3886:
3884:
3883:Charlie Shrem
3881:
3879:
3876:
3874:
3873:Mark Karpelès
3871:
3869:
3866:
3864:
3861:
3859:
3856:
3854:
3851:
3849:
3846:
3844:
3841:
3839:
3836:
3834:
3831:
3830:
3828:
3824:
3818:
3815:
3813:
3810:
3808:
3805:
3803:
3800:
3799:
3796:
3792:
3785:
3780:
3778:
3773:
3771:
3766:
3765:
3762:
3754:
3750:
3746:
3742:
3739:
3736:
3733:
3729:
3728:
3724:
3721:
3716:
3713:
3709:
3705:
3702:
3698:
3695:
3692:
3691:1-59140-429-0
3688:
3684:
3683:
3678:
3675:
3671:
3667:
3664:
3660:
3657:
3653:
3650:
3646:
3643:
3639:
3635:
3631:
3628:
3624:
3620:
3617:
3613:
3610:
3606:
3603:
3599:
3596:
3592:
3589:
3585:
3581:
3577:
3573:
3568:
3565:
3562:
3559:
3556:
3553:
3549:
3546:
3542:
3541:
3536:
3530:
3526:
3522:
3516:
3513:
3508:
3504:
3500:
3496:
3491:
3486:
3483:(14s): 1–69.
3482:
3478:
3474:
3467:
3464:
3458:
3456:
3452:
3447:
3443:
3439:
3432:
3425:
3422:
3410:
3406:
3400:
3397:
3386:
3382:
3375:
3372:
3361:
3357:
3350:
3347:
3336:
3332:
3325:
3322:
3319:
3315:
3312:
3306:
3303:
3300:
3296:
3293:
3287:
3284:
3279:
3275:
3269:
3266:
3261:
3255:
3251:
3244:
3241:
3235:
3232:
3227:
3221:
3217:
3210:
3207:
3201:
3199:
3195:
3188:
3185:
3181:
3180:
3175:
3171:
3168:
3162:
3159:
3148:
3144:
3137:
3134:
3129:
3125:
3124:news.cnet.com
3121:
3114:
3112:
3108:
3103:
3097:
3093:
3086:
3084:
3080:
3075:
3069:
3055:on 2011-04-29
3051:
3044:
3036:
3033:
3028:
3022:
3018:
3011:
3004:
3001:
2996:
2992:
2988:
2984:
2980:
2976:
2969:
2962:
2959:
2954:
2948:
2944:
2940:
2936:
2932:
2925:
2922:
2909:
2905:
2901:
2895:
2892:
2880:
2876:
2872:
2868:
2863:
2862:10.1.1.5.3597
2858:
2854:
2850:
2843:
2836:
2833:
2828:
2824:
2817:
2814:
2809:
2802:
2799:
2787:
2783:
2776:
2773:
2768:
2766:9783540736134
2762:
2758:
2754:
2747:
2744:
2736:
2730:
2727:
2722:
2716:
2712:
2705:
2703:
2701:
2697:
2691:
2685:
2682:
2679:
2675:
2672:
2669:
2665:
2662:
2657:
2651:
2647:
2643:
2639:
2635:
2634:
2626:
2623:
2611:
2604:
2597:
2594:
2589:
2587:9783540291923
2583:
2579:
2575:
2568:
2565:
2557:
2550:
2543:
2540:
2524:
2517:
2510:
2507:
2502:
2496:
2492:
2491:
2483:
2480:
2475:
2468:
2465:
2460:
2454:
2450:
2449:
2441:
2438:
2433:
2427:
2410:
2403:
2400:
2396:
2392:
2389:
2383:
2380:
2376:
2372:
2369:
2363:
2360:
2355:
2349:
2345:
2341:
2336:
2331:
2327:
2320:
2317:
2312:
2310:9780769515823
2306:
2302:
2301:
2293:
2290:
2286:
2282:
2276:
2273:
2268:
2261:
2258:
2253:
2247:
2243:
2236:
2233:
2228:
2226:9783540441793
2222:
2218:
2214:
2213:
2208:
2201:
2199:
2195:
2190:
2184:
2180:
2173:
2170:
2165:
2163:9780387784489
2159:
2155:
2151:
2144:
2141:
2136:
2134:9781466507616
2130:
2126:
2122:
2115:
2113:
2109:
2104:
2102:9783642230738
2098:
2094:
2090:
2083:
2080:
2075:
2073:9783540726050
2069:
2065:
2061:
2054:
2051:
2046:
2044:9781616928339
2040:
2036:
2035:
2027:
2024:
2019:
2017:9781420066043
2013:
2009:
2008:
2000:
1997:
1986:
1982:
1976:
1973:
1962:
1958:
1952:
1949:
1941:
1934:
1931:
1928:
1924:
1921:
1915:
1912:
1907:
1905:9783540291923
1901:
1897:
1893:
1889:
1882:
1880:
1878:
1876:
1872:
1867:
1863:
1859:
1853:
1849:
1845:
1841:
1837:
1830:
1827:
1815:
1808:
1805:
1794:
1790:
1786:
1782:
1778:
1771:
1768:
1764:
1763:Host Software
1758:
1755:
1750:
1746:
1742:
1740:9780596001100
1736:
1732:
1728:
1727:
1719:
1717:
1713:
1702:
1698:
1692:
1689:
1677:
1673:
1667:
1664:
1659:
1655:
1651:
1647:
1643:
1639:
1635:
1631:
1627:
1620:
1617:
1612:
1608:
1604:
1598:
1594:
1593:
1585:
1583:
1579:
1574:
1570:
1566:
1562:
1558:
1554:
1549:
1544:
1540:
1536:
1529:
1527:
1523:
1519:
1513:
1510:
1505:
1498:
1495:
1484:
1483:Computerworld
1480:
1473:
1470:
1464:
1459:
1456:
1454:
1453:USB dead drop
1451:
1449:
1448:SponsorChange
1446:
1444:
1441:
1439:
1436:
1434:
1431:
1429:
1426:
1424:
1421:
1419:
1416:
1414:
1411:
1408:
1405:
1403:
1400:
1398:
1395:
1394:
1389:
1384:
1379:
1375:
1367:
1365:
1361:
1358:
1351:
1349:
1347:
1343:
1339:
1335:
1334:client–server
1330:
1328:
1324:
1319:
1315:
1311:
1303:
1301:
1298:
1294:
1289:
1286:
1280:
1278:
1277:
1272:
1270:
1265:
1256:
1251:
1249:
1247:
1243:
1238:
1236:
1232:
1231:Onion routing
1228:
1224:
1220:
1216:
1212:
1208:
1200:
1198:
1194:
1190:
1183:
1179:
1177:
1171:
1164:
1159:
1155:
1152:
1150:
1147:
1146:
1145:
1144:
1140:
1136:
1132:
1128:
1124:
1120:
1116:
1112:
1108:
1104:
1100:
1097:
1093:
1089:
1085:
1081:
1077:
1073:
1069:
1065:
1061:
1057:
1053:
1049:
1045:
1041:
1040:Chord project
1037:
1033:
1031:
1027:
1023:
1019:
1018:Java platform
1015:
1011:
1007:
1003:
999:
995:
991:
987:
983:
979:
975:
971:
967:
963:
957:connect peers
956:
952:
945:
943:
941:
937:
933:
929:
925:
921:
917:
913:
905:
903:
901:
900:
895:
893:
888:
879:
877:
875:
871:
866:
862:
858:
854:
850:
843:
841:
838:
834:
826:
821:
819:
817:
813:
807:
805:
801:
797:
794:For example,
792:
790:
782:
778:
774:
769:
762:
760:
757:
751:
747:
739:
737:
735:
731:
726:
722:
719:network, the
718:
713:
711:
707:
703:
699:
695:
689:
685:
677:
675:
672:
664:
662:
660:
656:
652:
648:
640:
638:
636:
632:
628:
624:
620:
615:
611:
607:
603:
599:
595:
588:
586:
583:
576:Hybrid models
575:
573:
571:
567:
563:
559:
555:
551:
550:Chord project
547:
543:
539:
535:
531:
526:
524:
514:
510:
508:
504:
500:
496:
492:
487:
485:
477:
473:
468:
461:
459:
457:
451:
447:
445:
441:
437:
433:
426:
421:
414:
412:
410:
406:
401:
397:
393:
389:
381:
379:
377:
373:
372:client–server
369:
368:
359:
357:
354:
353:Shawn Fanning
349:
347:
346:Email clients
343:
339:
335:
331:
330:client–server
327:
323:
318:
315:
311:
306:
302:
298:
296:
292:
288:
280:
276:
269:
267:
265:
261:
258:
254:
250:
246:
242:
238:
234:
230:
226:
221:
219:
215:
208:
204:
203:
198:
197:
191:
187:
185:
184:decentralized
181:
177:
173:
169:
165:
161:
154:
149:
143:
139:
135:
124:
121:
113:
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
55:
49:
48:
43:This article
41:
37:
32:
31:
19:
6665:File sharing
6650:Peer-to-peer
6572:technologies
6449:Disk sharing
6256:Perfect Dark
5859:File systems
5769:Private Disk
5560:
4759:Hydra Market
4739:Dream Market
4617:Social media
4521:file sharing
4517:peer-to-peer
4516:
4513:File storage
4487:
4479:
4467:The Guardian
4465:
4429:
4352:Brave Search
4233:Bitcoin City
4172:
4144:
4136:
4081:Bitcoin Gold
4076:Bitcoin Cash
4019:
3978:Technologies
3928:Dave Kleiman
3923:Craig Wright
3812:Legal status
3718:
3680:
3673:
3626:
3579:
3575:
3515:
3480:
3476:
3466:
3437:
3424:
3413:. Retrieved
3411:. 2022-07-01
3408:
3399:
3388:. Retrieved
3385:Ars Technica
3384:
3374:
3363:. Retrieved
3359:
3349:
3338:. Retrieved
3334:
3324:
3305:
3286:
3277:
3268:
3249:
3243:
3234:
3215:
3209:
3187:
3177:
3161:
3150:. Retrieved
3146:
3136:
3128:the original
3123:
3091:
3057:. Retrieved
3050:the original
3035:
3016:
3003:
2978:
2974:
2961:
2934:
2924:
2912:. Retrieved
2908:the original
2903:
2894:
2882:. Retrieved
2855:(2): 43–48.
2852:
2848:
2835:
2827:the original
2816:
2807:
2801:
2789:. Retrieved
2785:
2775:
2756:
2746:
2729:
2710:
2684:
2632:
2625:
2613:. Retrieved
2609:
2596:
2580:. Springer.
2577:
2567:
2556:the original
2542:
2530:. Retrieved
2523:the original
2509:
2493:. Springer.
2489:
2482:
2473:
2467:
2447:
2440:
2415:. Retrieved
2402:
2382:
2362:
2325:
2319:
2299:
2292:
2284:
2280:
2275:
2260:
2241:
2235:
2211:
2178:
2172:
2153:
2143:
2124:
2092:
2082:
2063:
2053:
2033:
2026:
2006:
1999:
1988:. Retrieved
1984:
1975:
1964:. Retrieved
1960:
1951:
1933:
1914:
1887:
1839:
1829:
1817:. Retrieved
1807:
1796:. Retrieved
1784:
1780:
1770:
1762:
1757:
1733:: O'Reilly.
1725:
1704:. Retrieved
1700:
1691:
1680:. Retrieved
1678:. 2023-04-19
1675:
1666:
1633:
1629:
1619:
1591:
1538:
1534:
1517:
1512:
1497:
1486:. Retrieved
1482:
1472:
1362:
1359:
1355:
1331:
1307:
1296:
1290:
1281:
1274:
1267:
1260:
1239:
1204:
1195:
1191:
1187:
1173:
1107:web browsers
1036:Resilio Sync
1034:
988:(IPFS) is a
960:
955:Torrent file
909:
897:
890:
883:
874:file sharing
847:
832:
830:
822:Applications
808:
793:
786:
753:
714:
691:
668:
644:
593:
592:
579:
542:Storm botnet
534:BitTorrent's
527:
522:
519:
506:
502:
501:: that is, (
488:
483:
481:
471:
452:
448:
431:
430:
424:
408:
405:unstructured
404:
385:
365:
363:
360:Architecture
350:
334:news servers
319:
310:broadcasting
299:
287:file sharing
284:
222:
211:
201:
194:
163:
160:Peer-to-peer
159:
158:
152:
116:
107:
97:
90:
83:
76:
64:
52:Please help
47:verification
44:
6584:Merkle tree
6552:Private P2P
6484:Web hosting
6469:Peercasting
6355:Comparisons
6307:Audiogalaxy
6148:Centralized
5974:Educational
5779:Sentry 2020
5724:DriveSentry
5644:Google Allo
5250:Thunderbird
5030:Lolita City
5025:Childs Play
5012:Pornography
4985:NawaatLeaks
4774:TheRealDeal
4590:Proton Mail
4438:Darknetlive
4223:Bitcoin Law
4149:(2015 film)
4141:(2014 film)
4005:Bitcoin ATM
3908:Cody Wilson
3409:nordvpn.com
1346:P2P caching
1246:cybercrimes
1235:mix network
1143:blockchains
1105:for use in
1030:Open Garden
978:Tor network
974:anonymously
934:, MIT, and
924:Peercasting
920:proprietary
538:Kad network
320:Therefore,
270:Development
257:egalitarian
110:August 2024
18:P2P network
6644:Categories
6406:Hyperlinks
6397:WebTorrent
6372:BitTorrent
6276:WebTorrent
6261:Retroshare
6251:OnionShare
6181:BitTorrent
5965:NordLocker
5909:Tahoe-LAFS
5899:Rubberhose
5839:RetroShare
5714:Cryptoloop
5709:CrossCrypt
5689:Comparison
5659:TextSecure
5617:ChatSecure
5579:RetroShare
5569:Bitmessage
5508:strongSwan
5294:ChatSecure
5205:Claws Mail
5195:Apple Mail
5104:OnionShare
4990:SecureDrop
4975:GlobaLeaks
4937:Government
4673:Kiwi Farms
4496:ProPublica
4448:ProPublica
4443:DeepDotWeb
4406:Bellingcat
4358:DuckDuckGo
3990:Blockchain
3888:Nick Szabo
3863:Hal Finney
3858:Tim Draper
3642:0123742145
3597:, May 2006
3576:Pragocrypt
3415:2024-08-21
3390:2018-03-29
3365:2018-03-29
3340:2018-03-29
3152:2010-05-22
3059:2011-03-12
2914:10 October
2791:5 November
2417:2019-08-24
1990:2024-08-21
1966:2024-08-21
1857:1595930450
1819:5 November
1798:2023-12-14
1706:2024-07-15
1682:2023-10-24
1488:2021-12-21
1465:References
1327:BitTorrent
1244:and other
1233:and other
1223:encryption
1176:BitTorrent
1123:Windows 10
1115:BitTorrent
1103:JavaScript
1092:WebTorrent
1076:M-commerce
998:hypermedia
906:Multimedia
876:networks.
859:, and the
837:Bittorrent
744:See also:
682:See also:
598:downloaded
544:, and the
499:hash table
474:, using a
409:structured
237:BitTorrent
172:equipotent
80:newspapers
6474:Seedboxes
6392:Gnutella2
6221:Gnutella2
6196:FastTrack
6140:protocols
5806:Anonymity
5796:VeraCrypt
5784:TrueCrypt
5774:Scramdisk
5739:FileVault
5704:BitLocker
5699:BestCrypt
5612:Cryptocat
5518:WireGuard
5420:MatrixSSL
5390:BoringSSL
5352:SecureCRT
5314:Profanity
5289:Centericq
5200:Autocrypt
5002:WildLeaks
4996:WikiLeaks
4890:Telecomix
4835:Z-Library
4769:Silk Road
4744:Evolution
4688:Financial
3903:Roger Ver
3848:Adam Back
3807:Economics
3747:test P2P
3507:256106264
3499:0360-0300
3446:1652-926X
3360:Big Think
3179:Channel 9
2884:8 October
2857:CiteSeerX
2615:8 October
2532:25 August
2330:CiteSeerX
1749:123103147
1650:1432-1882
1548:1207.0790
1318:bandwidth
1264:copyright
1215:anonymity
1141:that use
1127:LANtastic
1119:Microsoft
1096:streaming
1094:is a P2P
1068:Syncthing
1050:,and the
1022:Netsukuku
928:LionShare
887:copyright
779:, a free
717:FastTrack
608:. When a
297:, RFC 1.
279:SETI@home
249:Bluetooth
6570:Internal
6511:Concepts
6488:Freesite
6423:Metalink
6387:Gnutella
6327:Morpheus
6322:LimeWire
6300:Historic
6216:Gnutella
6206:Hyphanet
6165:Soulseek
6160:Soribada
6135:Networks
6075:Category
5981:CrypTool
5955:Tresorit
5884:eCryptfs
5844:Ricochet
5744:FreeOTFE
5734:eCryptfs
5719:dm-crypt
5664:WhatsApp
5541:Linphone
5493:Openswan
5460:TeamNote
5445:SChannel
5435:mbed TLS
5415:LibreSSL
5400:cryptlib
5332:Dropbear
5245:Sylpheed
5210:Enigmail
5086:Mailpile
5020:Boystown
4970:Filtrala
4914:Qubes OS
4908:DivestOS
4729:Atlantis
4724:AlphaBay
4645:Facebook
4602:Tor Mail
4400:BBC News
4329:Category
4251:Category
4200:GHash.io
4195:CoinDesk
4146:Deep Web
4069:Currency
3933:Jihan Wu
3741:Archived
3738:Glasnost
3723:Archived
3704:Archived
3666:Archived
3652:Archived
3619:Archived
3605:Archived
3591:Archived
3558:Glossary
3548:Archived
3335:Newsweek
3314:Archived
3295:Archived
3170:Archived
3068:cite web
2995:16438304
2674:Archived
2664:Archived
2426:cite web
2391:Archived
2371:Archived
1923:Archived
1781:Computer
1658:15963045
1611:49354877
1573:14008541
1388:Internet
1368:See also
1285:Fair use
1269:Grokster
1178:protocol
1072:Tradepal
990:protocol
968:, is an
892:Grokster
853:Gnutella
833:increase
775:" using
698:gnutella
651:software
554:Kademlia
436:Gnutella
264:Internet
245:Miracast
229:Internet
6537:Darkweb
6532:Darknet
6519:Privacy
6496:ZeroNet
6382:eDonkey
6359:clients
6332:Napster
6291:ZeroNet
6271:Tribler
6191:eDonkey
6085:Commons
6004:BusKill
5999:USBKill
5950:Freenet
5834:Vidalia
5789:History
5764:PGPDisk
5670:SimpleX
5629:Session
5624:Proteus
5498:OpenVPN
5488:Hamachi
5465:wolfSSL
5455:stunnel
5430:OpenSSL
5362:wolfSSH
5342:OpenSSH
5284:BitlBee
5230:Outlook
5225:Kontact
5219:Gpg4win
5134:Tor2web
5092:Mullvad
5080:F-Droid
5074:DEF CON
5062:1.1.1.1
5040:Pornhub
5035:Playpen
4829:Sci-Hub
4667:Twitter
4656:The Hub
4635:Dark0de
4607:TorChat
4584:Keybase
4375:MetaGer
4261:Commons
4185:Bitmain
4094:History
3868:Wei Dai
3802:History
3791:Bitcoin
3734:, 2004.
3714:, 2002.
3278:UN News
3040:(2009).
2879:2731647
1866:1478064
1761:RFC 1,
1553:Bibcode
1323:Comcast
1271:vs RIAA
1211:privacy
1207:Freenet
1074:l and
894:vs RIAA
796:YouTube
730:hashing
694:malware
688:Malware
582:Spotify
314:ARPANET
291:Napster
233:Napster
207:servers
202:clients
94:scholar
6439:Backup
6418:Magnet
6312:CuteMX
6246:OpenFT
6211:GNUnet
6057:S/MIME
5904:StegFS
5814:GNUnet
5654:Signal
5602:Matrix
5450:SSLeay
5405:GnuTLS
5357:WinSCP
5309:Kopete
5260:Secure
5098:Njalla
4926:Whonix
4789:Utopia
4661:Reddit
4651:HackBB
4621:forums
4596:Riseup
4529:BTDigg
4130:Movies
4053:Client
4030:SegWit
3826:People
3689:
3640:
3505:
3497:
3444:
3256:
3222:
3098:
3023:
2993:
2949:
2877:
2859:
2763:
2717:
2652:
2584:
2497:
2455:
2350:
2332:
2307:
2248:
2223:
2185:
2160:
2131:
2099:
2070:
2041:
2014:
1902:
1864:
1854:
1747:
1737:
1656:
1648:
1609:
1599:
1571:
1409:(CHAT)
1374:Portal
1048:P-Grid
1046:, the
1042:, the
984:. The
940:Osiris
789:backup
702:OpenFT
614:mirror
610:server
562:P-Grid
540:, the
530:Tixati
442:, and
440:Gossip
396:TCP/IP
392:subset
322:Usenet
140:, and
96:
89:
82:
75:
67:
6609:SHA-2
6604:SHA-1
6342:WASTE
6337:Scour
6317:Kazaa
6286:Winny
6281:WinMX
6266:Share
6201:Fopnu
5960:Wuala
5934:Qubes
5929:Tails
5874:EncFS
5849:Wickr
5607:OMEMO
5574:Briar
5551:Zfone
5536:Jitsi
5440:BSAFE
5395:Botan
5347:PuTTY
5304:Jitsi
5299:climm
5279:Adium
5068:Brave
5055:Other
4980:Ljost
4920:Tails
4754:Hansa
4719:Agora
4701:Helix
4640:Dread
4629:8chan
4579:Briar
4561:Email
4381:Searx
4370:Grams
4364:Cliqz
4347:Ahmia
4180:BitGo
4045:Forks
4035:SHA-2
4010:ECDSA
3947:Lists
3625:. In
3503:S2CID
3434:(PDF)
3192:IEEE.
3053:(PDF)
3046:(PDF)
3013:(PDF)
2991:S2CID
2971:(PDF)
2875:S2CID
2845:(PDF)
2738:(PDF)
2606:(PDF)
2559:(PDF)
2552:(PDF)
2526:(PDF)
2519:(PDF)
2412:(PDF)
1943:(PDF)
1862:S2CID
1654:S2CID
1569:S2CID
1543:arXiv
1121:, in
1088:DARPA
1024:is a
1012:app.
912:P2PTV
706:Kazaa
635:cache
523:churn
507:value
444:Kazaa
243:like
176:nodes
101:JSTOR
87:books
6492:IPFS
6432:Uses
6413:eD2k
6241:LBRY
6231:IPFS
5894:PEFS
5889:LUKS
5864:List
5759:LUKS
5754:geli
5749:GBDE
5546:Jami
5528:ZRTP
5513:Tinc
5410:JSSE
4619:and
4515:and
4392:News
4319:List
4205:Nuri
3687:ISBN
3638:ISBN
3580:1996
3495:ISSN
3442:ISSN
3254:ISBN
3220:ISBN
3096:ISBN
3074:link
3021:ISBN
2947:ISBN
2916:2013
2886:2013
2793:2011
2761:ISBN
2715:ISBN
2650:ISBN
2617:2013
2582:ISBN
2534:2008
2495:ISBN
2453:ISBN
2432:link
2348:ISBN
2305:ISBN
2246:ISBN
2221:ISBN
2183:ISBN
2158:ISBN
2129:ISBN
2097:ISBN
2068:ISBN
2039:ISBN
2012:ISBN
1900:ISBN
1852:ISBN
1821:2011
1745:OCLC
1735:ISBN
1646:ISSN
1607:OCLC
1597:ISBN
1314:ISPs
1273:and
1213:and
1182:seed
1174:The
1014:JXTA
1006:Jami
916:PDTP
914:and
910:The
896:and
816:MPAA
812:RIAA
804:MPAA
800:RIAA
777:YaCy
748:and
721:RIAA
686:and
627:file
604:and
546:YaCy
367:peer
338:SMTP
73:news
6557:Tor
6357:of
6236:Kad
6226:I2P
6186:DAT
5879:EFS
5829:Tor
5819:I2P
5729:E4M
5594:DRA
5584:Tox
5561:P2P
5475:VPN
5425:NSS
5337:lsh
5324:SSH
5271:OTR
5240:PGP
5235:p≡p
5215:GPG
5124:Tor
4563:and
4020:P2P
3525:doi
3485:doi
2983:doi
2939:doi
2867:doi
2642:doi
2638:178
2340:doi
1892:doi
1844:doi
1789:doi
1638:doi
1561:doi
1297:may
1101:in
1010:SIP
966:I2P
962:Dat
725:MP3
619:CPU
503:key
482:In
456:CPU
407:or
164:P2P
56:by
6646::
6494:,
6490:,
3730:.
3710:.
3699:.
3685:,
3636:.
3578:.
3574:.
3501:.
3493:.
3481:55
3479:.
3475:.
3454:^
3440:.
3436:.
3407:.
3383:.
3358:.
3333:.
3276:.
3197:^
3176:,
3145:.
3122:.
3110:^
3082:^
3070:}}
3066:{{
2989:.
2977:.
2973:.
2945:.
2933:.
2902:.
2873:.
2865:.
2853:46
2851:.
2847:.
2784:.
2699:^
2648:.
2640:.
2608:.
2428:}}
2424:{{
2346:.
2338:.
2219:.
2217:94
2197:^
2111:^
1983:.
1959:.
1898:.
1874:^
1860:.
1850:.
1838:.
1785:28
1783:.
1779:.
1743:.
1729:.
1715:^
1699:.
1674:.
1652:.
1644:.
1632:.
1628:.
1605:.
1581:^
1567:.
1559:.
1551:.
1537:.
1525:^
1481:.
1225:,
1066:.
1054:.
1020:.
1004:.
857:G2
855:,
814:,
802:,
732:,
661:.
623:IP
560:,
556:,
552:,
505:,
438:,
136:,
6498:)
6486:(
6137:,
6119:e
6112:t
6105:v
5866:)
5862:(
5691:)
5687:(
5221:)
5217:(
5171:e
5164:t
5157:v
5112:*
5106:*
5100:*
5094:*
5088:*
5082:*
5076:*
5070:*
5064:*
5042:*
4998:*
4992:*
4966:*
4947:*
4928:*
4922:*
4916:*
4910:*
4886:*
4880:*
4874:*
4868:*
4862:*
4856:*
4837:*
4831:*
4825:*
4814:*
4697:*
4675:*
4669:*
4663:*
4647:*
4631:*
4598:*
4592:*
4586:*
4552:*
4531:*
4504:*
4498:*
4492:*
4484:*
4476:*
4470:*
4462:*
4456:*
4450:*
4434:*
4426:*
4420:*
4414:*
4408:*
4402:*
4383:*
4377:*
4366:*
4360:*
4354:*
4295:e
4288:t
4281:v
3783:e
3776:t
3769:v
3755:)
3751:(
3582:.
3527::
3509:.
3487::
3448:.
3418:.
3393:.
3368:.
3343:.
3262:.
3228:.
3155:.
3104:.
3076:)
3062:.
3029:.
2997:.
2985::
2979:1
2955:.
2941::
2918:.
2888:.
2869::
2795:.
2769:.
2740:.
2723:.
2658:.
2644::
2619:.
2590:.
2536:.
2503:.
2476:.
2461:.
2434:)
2420:.
2356:.
2342::
2313:.
2254:.
2229:.
2191:.
2166:.
2137:.
2105:.
2076:.
2047:.
2020:.
1993:.
1969:.
1908:.
1894::
1868:.
1846::
1823:.
1801:.
1791::
1751:.
1709:.
1685:.
1660:.
1640::
1634:9
1613:.
1575:.
1563::
1555::
1545::
1539:6
1506:.
1491:.
1376::
162:(
151:A
144:.
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
50:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.