View Single Post
Old 2007-07-15, 08:00   Link #67
Slice of Life
eyewitness
 
 
Join Date: Jan 2007
OK, here is a bunch of hopefully not too naive questions from somebody who has never used Winny or its successors.

What exactly is the difference between them and the olde decentralized tools like overnet? What exactly is encrypted? The shared packages? Trying to log and analyze the transmitted raw data on the net is a pretty bad strategy. If you want the IPs of sharers simply take part in the sharing process. And this is something the copyright holder can do by himself, not just the government. I can't see how revealing the IP to the sharing partner can be prevented except if PD uses something like onion routing and even that wouldn't make sense if the network is exclusively created for PD. Furthermore, what does it mean, encryption has been hacked? Standard encryption algortihms cannot simply be "hacked". Finally, why is PD not open source? Security via obscurity?
__________________
- Any ideas how to fill this space?
Slice of Life is offline   Reply With Quote