rdfs:comment
| - File sharing peer to peer (P2P) systems like Gnutella, KaZaA, and eDonkey/eMule, took the Internet by a storm in recent years, with estimated user population of millions. Measurements show that about 50% of the file exchanges are illegal copies of multimedia files like AVI, MP3 etc. An academic research pointed on some weaknesses of two popular P2P networks in protecting user's privacy. The research analyzed Gnutella and eMule protocols and found weaknesses in the protocol; many of the issues found in these networks are fundamental and probably common on other P2P networks. Users of file sharing networks like eMule and Gnutella do not enjoy privacy but are subject to possible surveillance. Users may be tracked by IP address, DNS name, software version they use, files they share, queries th
|
abstract
| - File sharing peer to peer (P2P) systems like Gnutella, KaZaA, and eDonkey/eMule, took the Internet by a storm in recent years, with estimated user population of millions. Measurements show that about 50% of the file exchanges are illegal copies of multimedia files like AVI, MP3 etc. An academic research pointed on some weaknesses of two popular P2P networks in protecting user's privacy. The research analyzed Gnutella and eMule protocols and found weaknesses in the protocol; many of the issues found in these networks are fundamental and probably common on other P2P networks. Users of file sharing networks like eMule and Gnutella do not enjoy privacy but are subject to possible surveillance. Users may be tracked by IP address, DNS name, software version they use, files they share, queries they initiate, and queries they answer to. Much is known about the network structure, routing schemes, performance load and fault tolerance of P2P systems in general and Gnutella in particular. This document concentrates on the user privacy that reveals by the Gnutella and eMule networks. It might be surprising, but the eMule protocol does not provide much privacy to the users, although it is a P2P protocol which is supposed to be decentralized.
|