使用者:Yya45/匿名P2P
匿名P2P溝通系統是一種匿名點對點技術,通過參與者構建節點來運作。此類匿名技術特點是其構造了一個隱藏在表層網絡下的匿名網絡。
因為許多原因,使用匿名P2P技術構建的網絡使用者數量在近幾年飛速增長:1.有部分人想通過此類網絡傳播一些在所在地違法的文件,但不願承擔訴訟或不願暴露身份。[1]2.對政府的不信任, 例如大規模的網絡流量監視,網絡數據的的保留,以及一些與言論有關的訴訟.[2]
匿名的動機
以下是使用匿名P2P技術的幾個原因:
匿名P2P技術的使用者一般不希望自己的真實身份為人所知. 通常的原因包括:
- 來自國家,公司,本地ISP的審查
- 為了保護包括瀏覽記錄在內的個人隱私數據
- 分發在所在地可能被視作非法的文件
- 一些合法但在風俗習慣上無法接受的行為
- 害怕被報復
匿名P2P技術的爭議
雖然匿名P2P技術支持並保護了一些非主流的言論意見, 其同時也庇護了一些違法行為, 例如舞弊,誹謗 ,一些違法的色情物品的交易, 一些非授權作品的傳播以及犯罪活動的規劃。一些匿名P2P技術的評論家認為這些缺點顯然超過了這類系統提供的優點。而且一些其他的渠道已經足夠用於傳播這些非主流的言論意見了。
匿名P2P技術的支持者相信所有免費的言論發表平台都同時提供一種威權利益. 其他人[誰?]反駁說信息本身就是倫理中立的, 且信息的好與壞是由人本身來評判的。信息的好壞本就是可變的;例如:假如匿名點對點服務出現於20世紀50至60年代,這項技術也許會因為協助傳播民權思想與無政府主義而被針對。
匿名P2P技術一般都被政府視為加密技術的民主化並給予了普通民眾一種方式訪問加密的信息的渠道。這種觀點的支持者,如菲爾·齊默爾曼說這種防監控技術均衡了政府與它的人民才是政府要禁止此類技術的真正原因。[3] 約翰·皮爾格補充說對民眾的監督有助於遏制對「既定權威的共識」的威脅或對權力結構與特權的連續性的威脅"[4]
言論自由
除非人民可以在匿名的狀態下表達出來,否則一些對真正的言論自由的要求,尤其是在一些有爭議的方面是非常困難甚至不可能的。如果匿名不存在, 那任何一個人都會因為發表一些非主流觀點而被針對。這就是為什麼在許多民主形式中都要實施匿名表決的原因。但一些政黨希望隱藏的爭議信息,例如一些腐敗問題的細節同樣會以匿名的形式被披露出來。
匿名博客
匿名博客是匿名網絡最廣泛的應用之一. 在某種程度上,當匿名博客有可能在非匿名的網際網路上應用時,託管博客的提供商可能會被迫提供博客的IP位址(就像谷歌披露其匿名博客創建者的身份一樣)[5] 匿名網絡為提高匿名的程度提供了一個更為高效的方案。例如Syndie,I2P就是匿名博客技術應用的一個例子。
關於使用匿名博客的一個理由是暴露身份的影響。有時一個以創建者姓名命名的博客會遇到一種情況,即要麼保持沉默,要麼影響到創建者自身與他工作單位。[6]
另一個爭議是匿名博客的訴訟風險。一些非匿名的博客已經面臨高達百萬美元的訴訟[7] (儘管這個博客已經被關閉[8]); 匿名博客則提供了一種對訴訟風險的保護。
通過網際網路域名進行的審查
在非匿名的網際網路中,一個類似「example.com"的域名是查詢此網站信息的媒介。維基解密的調查顯示域名對於審查來說是十分脆弱的。即便沒有法院的命令,一些域名的供應商也關停了他們用戶的域名。[9]
對於這一部分受影響的用戶,域名封鎖是一個比域名提供商拒絕服務還要嚴重的問題。通常,域名提供商對其所有的域名有完整的控制權。在歐洲旅行社的事件中,多於80個.com域名在沒有任何理由的情況下被域名提供商關停。受影響的旅行社不得不在.net的頂級域名下重建網站。[10]
另一方面,匿名網絡並不依賴於某個特定的頂級域名提供商。 例如Freenet,I2P,Tor基於公匙密碼學標準隱藏了它們的域名以抵制域名審查:只有一個擁有正確私匙的人才能更新或關閉一個網站。
控制在線追蹤
匿名P2P在日常交流中同樣有利用價值。當交流匿名化,揭示通信雙方的決定僅由雙方承擔,不對第三方開放。作為一個個人自由的問題,許多人不希望默認提供太多不必要的數據。因為在某些場合,一些數據可以被編譯成用戶的訪問記錄。
例如,一些電信服務系統會默認會默認向提供商發送主叫方的通話信息。(雖然可以對單個或全部通話關閉此功能)如果一個用戶打電話查詢一個產品或一場電影的開場時間,服務商會記錄下呼叫用戶的號碼,亦也有可能會以此獲取用戶的個人資料。
一些合法網絡活動的監視
在線監視,例如獲取並保留訪問網站和電子郵件流量的詳細信息可能會對合法的網絡活動產生影響[11] 。人們可能會對訪問或討論一些法律信息望而卻步,因為他們明白監控的可能性並相信此類信息可能會被視作可疑信息。法學教授丹尼爾·索羅維說:「此類現象對社會是有害的,因為它限制了觀點的表達範圍和參與政治活動的自由度。」( such effects harm society because, among other things, they reduce the range of viewpoints being expressed and the degree of freedom with which to engage in political activity.")[12]
保密資料的獲取
大部分國家會限制或審查部分種類的出版物及影像資料與某些類型的內容。除此之外的其他材料可以合法持有但並不能合法分發。例如,版權與軟體的專利法案可能禁止了其的傳播。但這些法律在匿名P2P網絡中的執行十分困難。
匿名網上交易
基於匿名加密貨幣,匿名的買賣成為了可能。匿名加密貨幣可以被用於逃稅。但買賣雙方任何實物商品的轉讓都有可能會損害匿名交易的匿名性。[13]
有人認為傳統的金錢交易提供了一種類似的匿名形式。但現有法律足以被用於打擊因匿名交易引起的犯罪行為,無論是線上還是線下,例如逃稅。
匿名P2P的功能
匿名或使用虛假身份
因為部分標榜匿名P2P的網站確並未記錄用戶的任何標記符,這些網站可以被視作完全的不記名;但其他標榜匿名P2P的網站實際上通過加密後的密鑰來區分節點而不是通過IP位址來區分,因此剩下的這些網站僅能視作部分不記名。例如,每個在加密網絡上運行的節點都包含一個與公鑰相關聯的加密地址,在實際運行中,該地址充當公鑰進行使用,允許信息向其發送。在Freenet上,信息被拆分為若干部分,通過特定鍵值與索引值進行區分,節點本身為匿名。
進行DoS攻擊或發送垃圾郵件
匿名網絡在成立之初一般由一批規模較少,較為友善的開發者社區負責維護。隨著對匿名P2P有興趣的用戶群逐漸膨大,惡意用戶必然出現並開始在匿名網絡上嘗試不同種類的攻擊方式。這與網際網路是一致的,隨著網際網路的廣泛應用,隨之而來的是不斷的騷擾信息與廣泛傳播的DoS攻擊。對於這些攻擊,匿名網絡可能需要不同於主流的應對方式。例如,將攻擊者的地址列入黑名單�並不能完成,因為匿名網絡隱藏了這項信息。因此面對DoS攻擊,匿名網絡顯得更為脆弱,Tor已經清晰的展現了這種劣勢。
針對匿名網絡攻擊預謀通常被視作危害計算機信息系統犯罪,雖然網絡的性質使其難以在不損害數據匿名性的情況下被起訴。
開放式與類暗網式的匿名網絡類型
與傳統P2P模式類似,匿名P2P可以以開放式或類暗網的形式進行。兩種不同方式下,節點在網絡中尋找另一節點的過程表述如下:
- 在開放式網絡下,節點間不需要任何特殊配置即可直接配對,僅在多個不同節點中選擇其一的過程中需要少量的人工控制。
- 在類暗網式網絡下,用戶通常手動創建節點與另一已知節點的連接,因而所需時間更長。
一些網絡,例如Freenet,同時支持兩種不同模式(即部分節點由用戶手動配置,剩餘節點在開放式網絡中自行搜尋)。
在一個類暗網式網絡中,用戶僅與已知節點建立點對點連接。但許多類暗網式網絡In a friend-to-friend (or F2F) network, users only make direct connections with people they know. Many F2F networks support indirect anonymous or pseudonymous communication between users who do not know or trust one another. For example, a node in a friend-to-friend overlay can automatically forward a file (or a request for a file) anonymously between two "friends", without telling either of them the other's name or IP address. These "friends" can in turn forward the same file (or request) to their own "friends", and so on. Users in a friend-to-friend network cannot find out who else is participating beyond their own circle of friends, so F2F networks can grow in size without compromising their users' anonymity.
Some friend-to-friend networks allow the user to control what kind of files can be exchanged with "friends" within the node, in order to stop them from exchanging files that user disapproves of.
Advantages and disadvantages of opennet compared to darknet are disputed, see friend-to-friend article for summary.
匿名P2P應用程式的列表
非匿名P2P軟體
- Bitmessage - an anonymous decentralized messaging system serving as a secure replacement for email
- DigitalNote XDN - an open-source anonymous decentralized encrypted messaging system based on blockchain technology
- Freenet - a censorship-resistant distributed file system for anonymous publishing (open source, written in Java)
- GNUnet - a P2P framework, includes anonymous file sharing as its primary application (GNU Project, written in C, alpha status)
- NeoLoader - a filesharing software compatible with several networks. Anonymous when used with the "NeoShare" feature (that use the proprietary "NeoKad" network)[14]
- Netsukuku - a peer-to-peer routing system aiming to build a free and independent Internet
- Osiris (Serverless Portal System) - an anonymous and distributed web portals creator.
- Perfect Dark - a P2P client which relies on a mixnet and distributed datastore to provide anonymity (freeware, written for Windows)
- Syndie - a content (mainly forums) syndication program that operates over numerous anonymous and non-anonymous networks (open source, written in Java)
- Tribler - an open source anonymous peer-to-peer decentralized BitTorrent client
- Umbra - an open source privacy platform built by the Shadow Project. Features an anonymous decentralized messaging system with private and group chat capabilities.
- ZeroNet - a decentralized Internet-like network of peer-to-peer users. Allows tunneling of HTTP-traffic through Tor.
- Classified-ads - a open source DHT-based decentralized messaging and voice app. Allows users to not expose any personal details but does not hide network addresses of nodes.
I2P系列
- I2P - a fully decentralized overlay network for strong anonymity and end-to-end encryption, with many applications (P2P, browsing, distributed anonymous e-mail, instant messaging, IRC, ...) running on top of it (free/open source, platform-independent)
- I2P-Bote an anonymous, secure (end-to-end encrypted), serverless mail application with remailer functionality for the I2P network
- I2P-Messenger an anonymous, secure (end-to-end encrypted), serverless instant messenger for the I2P network
- I2PSnark - an anonymous BitTorrent client for the I2P network
- I2Phex - a Gnutella client which communicates anonymously through I2P
- iMule - an aMule port running under I2P network
- Robert (P2P Software) - another anonymous BitTorrent client for the I2P network
- I2P-Tahoe-LAFS - a censorship-resistant distributed file system for anonymous publishing and file sharing (open source, written in Python, pre-alpha status)
- Vuze (formerly Azureus) - a BitTorrent client with the option of using I2P or Tor (open source, written in Java)
加密的P2P軟體
Private P2P networks are P2P networks that only allow some mutually trusted computers to share files. This can be achieved by using a central server or hub to authenticate clients, in which case the functionality is similar to a private FTP server, but with files transferred directly between the clients. Alternatively, users can exchange passwords or keys with their friends to form a decentralized network.
加密的F2F (friend-to-friend)軟體
Friend-to-friend networks are P2P networks that allows users only to make direct connections with people they know. Passwords or digital signatures can be used for authentication.
Examples include :
- Retroshare - filesharing, serverless email, instant messaging, VoIP, chatrooms, and decentralized forums.
- OneSwarm - a backwards compatible BitTorrent client with privacy-preserving sharing options, aims to create a large F2F network.
應用於內部子網的匿名P2P技術
It is possible to implement anonymous P2P on a wireless mesh network; unlike fixed Internet connections, users don't need to sign up with an ISP to participate in such a network, and are only identifiable through their hardware.
Protocols for wireless mesh networks are Optimized Link State Routing Protocol (OLSR) and the follow-up protocol B.A.T.M.A.N., which is designed for decentralized auto-IP assignment. See also Netsukuku.
Even if a government were to outlaw the use of wireless P2P software, it would be difficult to enforce such a ban without a considerable infringement of personal freedoms. Alternatively, the government could outlaw the purchase of the wireless hardware itself.[來源請求]
引用來源
- ^ Electronic Frontier Foundation (2005). RIAA v. The People: Five Years Later. Retrieved March 5, 2008.
- ^ Julien Pain, editor (2005). Reporters Without Borders handbook for bloggers and cyber-dissidents 網際網路檔案館的存檔,存檔日期2007-02-15.. Retrieved January 23, 2008.
- ^ Russell D. Hoffmann (1996). Interview with author of PGP (Pretty Good Privacy). Transcript of a radio interview, retrieved 2008-01-21.
- ^ John Pilger (2002). Impartiality of British Journalism[永久失效連結]. ZNet article, retrieved 2008-02-11.
- ^ Declan McCullagh (2007). Google: We had no choice in Israel ID request. CNET News.com article, retrieved 2008-02-11.
- ^ Bill Vallicella (2004). Reasons for 'Anonyblogging'. Maverick Philosopher blog, retrieved 2008-02-11.
- ^ Media Bloggers Association (2006). MBA Member Hit With Multi-Million Dollar Federal Lawsuit. Retrieved 2008-02-11.
- ^ Associated Press (2006). Ad agency drops lawsuit against Maine blogger. Retrieved 2008-02-11.
- ^ WIKILEAKS.INFO censored by eNom and Demand Media. Retrieved 2008-03-09.
- ^ Adam Liptak (2008). A Wave of the Watch List, and Speech Disappears. The New York Times, 2008-03-04. Retrieved 2008-03-09.
- ^ Dawinder S. Sidhu (2007). The chilling effect of government surveillance programs on the use of the internet by Muslim-Americans. University of Maryland Law Journal of Race, Religion, Gender and Class.
- ^ Daniel J. Solove (2006). "I've got nothing to hide" and other misunderstandings of privacy. San Diego Law Review, Vol. 44.
- ^ Rob Thomas, Jerry Martin (2006). The underground economy: priceless. Retrieved 2008-01-20.
- ^ http://neoloader.com/anonymity.html
外部連結
- Anomos - Anonymous BitTorrent
- Anonymous-p2p.org
- Planet Peer Board - discussion on anonymous P2P
- Planet Peer Wiki - a wiki about various anonymous P2P applications
- A Survey of Anonymous Peer-to-Peer File-Sharing (2005)
- Models for Anonymous-p2p Dr. Fabio Dianda - CNR - Italy[永久失效連結] (dead link on September 2013)
- Anonymous, Decentralized and Uncensored File-Sharing is Booming by TorrentFreak (2011)
- Classified-ads - Partially anonymous DHT-based messaging and voip application