38 research outputs found

    Paradoxes of Property: Piracy and Sharing in Information Capitalism

    Full text link
    All societies both suffer and benefit from levels of what is perceived as disorder, and the guiding principles of the society may be contradictory, or paradoxical, in that their ordering systems create disorder. Our aim in this text is explore the disorders and vagaries of property that seem essential to its continuance, construction and destruction, and then demonstrate how these paradoxes play out in the information economy in particular within the domain of peer-to-peer (P2P) file-sharing. We do not wish to reduce these paradoxes and contradictions to a temporary error or to a future ordered synthesis, but to take them as they are in all their splintered fury. Much contemporary social action stems from these incoherencies, and the disputes, displays of power, and innovations which circle around them. In the P2P field the disorder generated by the order of property provides opportunities for new productive and adaptive social and technical forms of life to emerge. By contrasting order and disorder we are not implying the necessary existence of a binary distinction between the two, or that those definitions of order and disorder will not change depending on the social position of the definers. Disorder is not always and everywhere the same. It resists definition, which adds to its effect

    Covert Channel in the BitTorrent Tracker Protocol

    Get PDF
    Covert channels have the unique quality of masking evidence that a communication has ever occurred between two parties. For spies and terrorist cells, this quality can be the difference between life and death. However, even the detection of communications in a botnet could be troublesome for its creators. To evade detection and prevent insights into the size and members of a botnet, covert channels can be used. A botnet should rely on covert channels built on ubiquitous protocols to blend in with legitimate traffic. In this paper, we propose a covert channel built on the BitTorrent peer-to-peer protocol. In a simple application, this covert channel can be used to discretely and covertly send messages between two parties. However, this covert channel can also be used to stealthily distribute commands or the location of a command and control server for use in a botnet

    PariTorrent: seeding strategies

    Get PDF
    Uno dei protocolli peer-to-peer più diffusi ai nostri giorni è BitTorrent, di cui esistono numerose implementazioni. Il plugin Torrent sviluppato all'interno del progetto PariPari è un client BitTorrent scritto in Java che supporta molte delle funzionalità fornite dai client più comuni disponibili gratuitamente su Internet. In questa tesi discuteremo principalmente alcuni metodi che mirino ad ottimizzare l'efficienza dell'upload dei pezzi che compongono un .torrent, al fine di massimizzare l'utilizzo del canale di upload, riducendo così i tempi di download per i peer che stanno condividendo lo stesso file .torrent, penalizzando al contempo i peer malevoli (noti anche come free-rider) che non effettuano upload nella ret

    Typhoid Mario: Video Game Piracy as Viral Vector and National Security Threat

    Get PDF
    Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal delivery device for malware, as users routinely launch unverified programs and forego virus detection. The illicit nature of the transaction forces users to rely almost entirely on the reputation of websites, uploaders, and other users to determine if a file is safe to download. In spite of this, stakeholders continue to push for ineffectual anti-infringement actions that destroy this reputational infrastructure. Scholars and policymakers have not made a case for utility by considering only first-stage economic incentives to create content. In addition to the economic consequences, malware must be taken seriously as a threat to infrastructure and national security, especially in light of Russia’s efforts to infect machines to influence and delegitimize elections. Accordingly, this Article proposes that we adopt a harm reduction philosophy that both dissuades piracy and decreases the malware risk attendant to ongoing piracy

    On the sustainability of credit-based P2P communities

    Full text link

    Incentive-driven QoS in peer-to-peer overlays

    Get PDF
    A well known problem in peer-to-peer overlays is that no single entity has control over the software, hardware and configuration of peers. Thus, each peer can selfishly adapt its behaviour to maximise its benefit from the overlay. This thesis is concerned with the modelling and design of incentive mechanisms for QoS-overlays: resource allocation protocols that provide strategic peers with participation incentives, while at the same time optimising the performance of the peer-to-peer distribution overlay. The contributions of this thesis are as follows. First, we present PledgeRoute, a novel contribution accounting system that can be used, along with a set of reciprocity policies, as an incentive mechanism to encourage peers to contribute resources even when users are not actively consuming overlay services. This mechanism uses a decentralised credit network, is resilient to sybil attacks, and allows peers to achieve time and space deferred contribution reciprocity. Then, we present a novel, QoS-aware resource allocation model based on Vickrey auctions that uses PledgeRoute as a substrate. It acts as an incentive mechanism by providing efficient overlay construction, while at the same time allocating increasing service quality to those peers that contribute more to the network. The model is then applied to lagsensitive chunk swarming, and some of its properties are explored for different peer delay distributions. When considering QoS overlays deployed over the best-effort Internet, the quality received by a client cannot be adjudicated completely to either its serving peer or the intervening network between them. By drawing parallels between this situation and well-known hidden action situations in microeconomics, we propose a novel scheme to ensure adherence to advertised QoS levels. We then apply it to delay-sensitive chunk distribution overlays and present the optimal contract payments required, along with a method for QoS contract enforcement through reciprocative strategies. We also present a probabilistic model for application-layer delay as a function of the prevailing network conditions. Finally, we address the incentives of managed overlays, and the prediction of their behaviour. We propose two novel models of multihoming managed overlay incentives in which overlays can freely allocate their traffic flows between different ISPs. One is obtained by optimising an overlay utility function with desired properties, while the other is designed for data-driven least-squares fitting of the cross elasticity of demand. This last model is then used to solve for ISP profit maximisation

    A DISPERSÃO DE DADOS COMO CRITÉRIO PARA A POLÍTICA DE SELEÇÃO DE PEERS EM UMA REDE BITTORRENT PARA STREAMING SOB DEMANDA INTERATIVO

    Get PDF
    Este artigo analisa o impacto da dispersão de dados na política de seleção de peers de uma rede BitTorrent utilizada para o serviço de streaming sob demanda interativo. Para tanto, a política original de seleção de peers do protocolo BitTorrent é modificada com o intuito de priorizar aqueles peers que menos introduzem dispersão. Em seguida, através de simulações em cenários reais de distribuição de conteúdo multimídia, a qualidade de serviço do sistema é avaliada usando diferentes métricas de desempenho. Comparado ao sistema tradicional, os resultados finais permitem conjecturar que a dispersão de dados é um importante critério a ser considerado para a seleção de peers em virtude da otimização de serviço que foi possível observar. Por exemplo, houve registro de reduções de até 34% com relação ao número de pedaços perdidos pelos clientes durante sessões de transferências de dados multimídia. Ante o exposto, a principal contribuição deste artigo é a possibilidade de implementação de protocolos de streaming sob demanda mais eficientes usando o critério da dispersão de dados
    corecore