Ants P2P anonymous

vbimport

#1

Ants p2p network has grown in the last months, give it a try…

Key features:

  • Open Source Java implementation (GNU-GPL license)
  • Point to point encryption (AES 128 - 512).
  • End to end encryption (AES 128 - 512).
  • Communications through any kind of HTTP Proxy, NAT or traffic filtering system
  • Serverless

Guide: http://antsp2p.altervista.org

include a step by step installation tutorial (also for linux) and an advanced faq


#2

Again I warn people there is NO such thing as anonymity on-line.


#3

Very True Very True !!!


#4

The problem with all “anonymous P2P” systems, is that the multihop meandering wastes a lot of capacity. The idea is that no node should know for certain, exactly what traffic is for who, as each packet may be terminating at the next node, or forwarded further.

There are theoretical attacks possible, eg. Man in the Middle or “Man either side”, but plausible deniability should still be maintained unless completely surrounded.


#5

That’s all good, but won’t such a method greatly impact efficiency?
I know I tried freenet some time ago, which works in a similar way (nobody really knows where the data is and who’s downloading it), but I was very disappointed at its performance.


#6

of course anonymous p2p will hardly be as fast as actual p2p.
That’s the price to pay…


#7

Yeah but is there really a p2p program that is really 100% anonymous?


#8

coaxley you have already been told in the thread you started the answer is [B]NO[/B]. Anonymity does not exist online. If you are that scared just don’t do it.


#9

There’s already anonymous p2ps in Japan, it’s called WinNY and SHARE, someone just need to translate them and start promoting them to English speaking users.


#10

Sorry awdrifter, but didn’t users of WinNy get busted last year by the Japanese police??? :confused:


#11

The only real way to be anonymous on the internet is to use a computer that doesnt belong to you, like a library computer or something… unless you log onto your own system… or the library take your details before you log on… or there are security cameras where you are when you log on.


#12

Yep…that’s about right. I have heard of people breaking into other people’s homes specifically to use their broad-band connections for illicit purposes…now that’s taking paranoia to the limit!


#13

Now there’s an idea, if I ever end up back on dialup! :bigsmile:

Just kidding :wink:


#14

haha that sounds like a bad excuse a husband would use when his wife found porn on his computer :bigsmile:


#15

LOL :bigsmile:


#16

Ha! I did hear from a police friend of mine that not so long ago his colleagues prosecuted a fellow for regularly boosting the locks on a Council building that was not fitted with alarms and using one of the computers therein to download kiddie porn. He was caught because a passerby saw the light from his laptop screen and rang the police. This police mate of mine is fond of stretching the truth from time-to-time so I don’t know if he was pulling my leg. If it is true the the sick bastard deserved what he got! :a


#17

Jeez…what a prize pillock.


#18

Would have to be if he broke into a council building then downloaded it on the bottom floor by the pathment… with clear glass


#19

Even then p-2-p on a library or public access PC, wouldn’t work all either take details, require proof of id, or stop people from installing their own software effectively blocking it.


#20

has anyone tried TOR

http://tor.eff.org/

bassically your traffic is routed though 3 nodes after each node the source is scrubbed and no logs are kept and its encrypted until it reaches the exit point.

you see not even the exit point will know who sent the data originally just which node sent it the data.

the client randomy chooses a pathway and to be identified for certain traffic all 3 of the nodes you use need to be nobbled.

it works the same way as some remailers which bassically you send a message it scrubs the source details and forwads it on to the next mail server it can do this multiple times which means its incredblly difficult to trace an email and would only be possible if all the email servers were under the investigators controll which is quite difficult when a random list is selected from hundreds of remailers.