Difference between revisions of "P2p"

From Wikispooks
Jump to navigation Jump to search
(Created page with "{{concept |wikipedia= |constitutes= |interests= |description= }} In a '''p2p network''' every participant is simultaneously server and client. This requires that participants...")
 
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{concept
 
{{concept
|wikipedia=
+
|wikipedia=https://en.wikipedia.org/wiki/Peer-to-peer
|constitutes=
+
|constitutes=distributed network, file sharing, technology
 
|interests=
 
|interests=
|description=
+
|description=In a '''p2p network''' every participant is simultaneously server and client
 
}}
 
}}
  
Line 15: Line 15:
 
      
 
      
 
==Media deceptions==
 
==Media deceptions==
The {{ccm}} habitually deceives the general public about the possibility to take matters into one's own hands; focussing on how people may ''get banned'' on exchanges; accusations of [[money laundering]], a problem every monetary system faces, including the dollar and reporting effords of de-anonymization. (Attacks on encrypted networks a possible, but on a statistical basis - the user still has [[plausible deniability]]).  
+
The {{ccm}} habitually deceives the general public about the possibility to take matters into one's own hands; focussing on how people may ''get banned'' on exchanges; accusations of [[money laundering]], a problem every [[monetary system]] faces, including the dollar and reporting effords of de-anonymization. (Attacks on encrypted networks are possible, but on a statistical basis - the user still has [[plausible deniability]]).
 +
 
 +
The {{ccm}} habitually associates use of censorship resistant p2p networks with [[criminality]].
 +
 
 +
<hr/>
 +
 
 +
Examples include [[i2p]], [[Retroshare]], [[freenet]], [[Monero]] and all other [[Cryptocurrencies]] .
  
 
{{SMWDocs}}
 
{{SMWDocs}}
 +
 
==References==
 
==References==
 
{{reflist}}
 
{{reflist}}

Latest revision as of 06:50, 12 February 2022

Concept.png P2p 
(distributed network,  file sharing,  technology)Rdf-entity.pngRdf-icon.png
In a p2p network every participant is simultaneously server and client

In a p2p network every participant is simultaneously server and client. This requires that participants ("nodes") donate disc space, bandwidth and sharing of risk with the network. It is implemented by distributed hash tables and consensus algorithms. Anonymity may be low (i.e. Bitcoin) or high (i.e. i2p, Monero) depending on the amount of encryption in use. Strong encryption generally slows down network speed.

Censorship resistance, criminality and voting

P2p networks can and do solve the problem of censorship of information in a democracy. This however requires a change of mindset in the participant, who must be willing to take the risk of hosting illegal content. It is true that any censorship resistant network may be used for criminal purposes. The decision wether we want to live in a free society and accept a certain amount of criminality or to live in a totally controlled society where crooks are running the system is apparently hard to make when security is an important value. The implementation of personal voting in consensus algorithms may be a way to prevent criminal activity without the need for a central authority.

Use

Most likely because users don't understand the inner workings and for "ease of use" p2p networks may be accessed by super nodes, i.e. exchanges or other centralised servers running a node for the end user. It is important to know the difference: it is, for example, not necessary to use an exchange to transfer Bitcoins and it is impossible to get banned; however the user must be willing to download <300GB and run the Bitcoin client by himself.

Media deceptions

The commercially-controlled media habitually deceives the general public about the possibility to take matters into one's own hands; focussing on how people may get banned on exchanges; accusations of money laundering, a problem every monetary system faces, including the dollar and reporting effords of de-anonymization. (Attacks on encrypted networks are possible, but on a statistical basis - the user still has plausible deniability).

The commercially-controlled media habitually associates use of censorship resistant p2p networks with criminality.


Examples include i2p, Retroshare, freenet, Monero and all other Cryptocurrencies .


 

Examples

Page nameDescription
BitTorrent
BitcoinA cryptocurrency
CryptocurrencyDigital currencies with computer generated security protection.
OdyseeOdysee is an alt-tech video hosting platform.

 

Related Documents

TitleTypePublication dateAuthor(s)Description
Declaration of Currency IndependencedeclarationMay 2021John McAfeeThe main author, John McAfee, died mysteriously in jail the next month.
Declaration of Monetary Independencedeclaration2021Mark Maraia
Mike Hobart
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.



References