Presentation is loading. Please wait.

Presentation is loading. Please wait.

6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.

Similar presentations


Presentation on theme: "6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes."— Presentation transcript:

1 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes

2 The problem ● Most P2P networks are insecure ● Thus they are susceptible to lawsuits

3

4 Napster ● Centralized servers ● Easily taken down

5

6 Gnutella ● Decentralized ● Still possible to glean IP addresses of the individual nodes

7

8 KaZaA ● Much more efficient ● Uses supernodes to route traffic ● Hundred of users have been sued

9

10 Direct Connect ● Uses hubs and has large minimum share sizes

11

12 Bittorrent ● Each file must be hosted by a tracker and then is forwarded though a chain of downloaders/uploaders

13 Bittorrent ● If the tracker goes down, the other nodes have no way of finding each other ● The IP address of the tracker is easily traced

14

15 WASTE ● A truly secure network with rings of encryption

16 WASTE ● The problem is that these two networks cannot communicate with each other

17 WASTE ● The reason why other P2P networks are so popular is because you can share files with people you don't personally know

18 A New Network ● What is needed is a network that will allow you to share files with people you don't know, without revealing your identity to them.

19 A little history ● In 1967 Stanly Milgrim published an article entitled “The Small World Phenomenon” in Psychology Today

20 A little history ● In 1967 Stanly Milgrim published an article entitled “The Small World Phenomenon” in Psychology Today ● He concluded that most people in the world were connected to each other by a chain of six friends

21 A little history ● In 1967 Stanly Milgrim published an article entitled “The Small World Phenomenon” in Psychology Today ● He concluded that most people in the world were connected to each other by a chain of six friends ● It was from this and later studies that the popular idea of Six Degrees of separation came from

22 A little history ● There has been some debate about whether the average of six connections between any two people holds true throughout the world, but physiologists agree that are a lot of subnetworks with people being connected by an average of six or even fewer friends

23 Six Degrees ● It may be possible to create a secure anonymous network on this principle

24 Six Degrees ● Instead of sharing files with anyone who asks for them you will only reveal what files you are sharing to your trusted friends

25 Six Degrees ● In turn they will let others know about these files, but not reveal your IP address

26 So How does this Work? ● The base of the network is similar to WASTE, and the entire protocol depends on Public Key Cryptography

27 Public Key Cryptography ● Each connection in this darknet represents an exchange of public keys B A Here is my public Key

28 Public Key Cryptography ● If Bob put Alice's public key in his list of trusted users (Bob has decided to trust Alice), Alice will be able to download files from Bob B A Bob: I'll trust this key

29 Public Key Cryptography ● All the files Bob send to Alice will be encrypted with Alice's public key, and no one will be able to read them but Alice. B A I can't read this! E

30 Public Key Cryptography ● Assuming that Alice is kind enough to return the favor and trust Bob, they will both be able to access each other's files, and Eve will not be able to eavesdrop at all. B A I still can't read this! E

31 Public Key Cryptography ● Supposing that Carol has a file that Alice wants. B A E C

32 Public Key Cryptography ● Alice does not trust Carol, more importantly Carol does not trust Alice, so there is no way for Alice to know that Carol has the file B A E C

33 Public Key Cryptography ● If Carol trusts Bob, she will tell him what files she has, and in turn, Bob can tell Alice B A E C

34 Public Key Cryptography ● Alice will then request the file from Bob, and Bob will request the file from Carol B A E C

35 Public Key Cryptography ● Bob will act as proxy between Carol and Alice, so that Carol does not have to reveal her IP address to Alice B A E C

36 Public Key Cryptography ● All the while, Eve who had been trying to eavesdrop on this transfer, can read none of the file. B A E C

37 Six Degrees ● This method can scale to many users each who only trust a few people, yet can access the entire network G B E F H A I C D

38 Six Degrees ● Of course the more people you trust (more correctly the more people you can convince to trust you) the faster your downloads will be. G B E F H A I C D

39 G B E F H A I C D

40 Problems ● If Bob is the only link between a lot of people, file transfers between them will be very slow G B E F H A I C D

41 Problems ● Bob can help solve this problem by convincing more of his friends to trust each other G B E F H A I C D

42

43 G B E F H A I C D


Download ppt "6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes."

Similar presentations


Ads by Google