Gnutella Forums  

Go Back   Gnutella Forums > Gnutella News and Gnutelliums Forums > General Gnutella Development Discussion
Register FAQ The Twelve Commandments Members List Calendar Arcade Find the Best VPN Today's Posts

General Gnutella Development Discussion For general discussion about Gnutella development.


Welcome To Gnutella Forums

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content, fun aspects such as the image caption contest and play in the arcade, and access many other special features after your registration and email confirmation. Registration is fast, simple and absolutely free so please, join our community today! (click here) (Note: we use Yandex mail server so make sure yandex is not on your email filter or blocklist.)

If you have any problems with the Gnutella Forum registration process or your Gnutella Forum account login, please contact us (this is not for program use questions.) Your email address must be legitimate and verified before becoming a full member of the forums. Please be sure to disable any spam filters you may have for our website, so that email messages can reach you.
Note: Any other issue with registration, etc., send a Personal Message (PM) to one of the active Administrators: Lord of the Rings or Birdy.

Once registered but before posting, members MUST READ the FORUM RULES (click here) and members should include System details - help us to help you (click on blue link) in their posts if their problem relates to using the program. Whilst forum helpers are happy to help where they can, without these system details your post might be ignored. And wise to read How to create a New Thread

Thank you

If you are a Spammer click here.
This is not a business advertising forum, all member profiles with business advertising will be banned, all their posts removed. Spamming is illegal in many countries of the world. Guests and search engines cannot view member profiles.



           Deutsch?              Español?                  Français?                   Nederlands?
   Hilfe in Deutsch,   Ayuda en español,   Aide en français et LimeWire en françaisHulp in het Nederlands

Forum Rules

Support Forums

Before you post to one of the specific Client Help and Support Conferences in Gnutella Client Forums please look through other threads and Stickies that may answer your questions. Most problems are not new. The Search function is most useful. Also the red Stickies have answers to the most commonly asked questions. (over 90 percent).
If your problem is not resolved by a search of the forums, please take the next step and post in the appropriate forum. There are many members who will be glad to help.
If you are new to the world of file sharing please do not be shy! Everyone was ‘new’ when they first started.

When posting, please include details for:
Your Operating System ....... Your version of your Gnutella Client (* this is important for helping solve problems) ....... Your Internet connection (56K, Cable, DSL) ....... The exact error message, if one pops up
Any other relevant information that you think may help ....... Try to make your post descriptive, specific, and clear so members can quickly and efficiently help you. To aid helpers in solving download/upload problems, LimeWire and Frostwire users must specify whether they are downloading a torrent file or a file from the Gnutella network.
Members need to supply these details >>> System details - help us to help you (click on blue link)


Moderators

There are senior members on the forums who serve as Moderators. These volunteers keep the board organized and moving.
Moderators are authorized to: (in order of increasing severity)
Move posts to the correct forums. Many times, members post in the wrong forum. These off-topic posts may impede the normal operation of the forum.
Edit posts. Moderators will edit posts that are offensive or break any of the House Rules.
Delete posts. Posts that cannot be edited to comply with the House Rules will be deleted.
Restrict members. This is one of the last punishments before a member is banned. Restrictions may include placing all new posts in a moderation queue or temporarily banning the offender.
Ban members. The most severe punishment. Three or more moderators or administrators must agree to the ban for this action to occur. Banning is reserved for very severe offenses and members who, after many warnings, fail to comply with the House Rules. Banning is permanent. Bans cannot be removed by the moderators and probably won't be removed by the administration.


The Rules

1. Warez, copyright violation, or any other illegal activity may NOT be linked or expressed in any form. Topics discussing techniques for violating these laws and messages containing locations of web sites or other servers hosting illegal content will be silently removed. Multiple offenses will result in consequences. File names are not required to discuss your issues. If filenames are copyright then do not belong on these forums & will be edited out or post removed. Picture sample attachments in posts must not include copyright infringement.

2. Spamming and excessive advertising will not be tolerated. Commercial advertising is not allowed in any form, including using in signatures.

3. There will be no excessive use of profanity in any forum.

4. There will be no racial, ethnic, or gender based insults, or any other personal attacks.

5. Pictures may be attached to posts and signatures if they are not sexually explicit or offensive. Picture sample attachments in posts must not include copyright infringement.

6. Remember to post in the correct forum. Take your time to look at other threads and see where your post will go. If your post is placed in the wrong forum it will be moved by a moderator. There are specific Gnutella Client sections for LimeWire, Phex, FrostWire, BearShare, Gnucleus, Morpheus, and many more. Please choose the correct section for your problem.

7. If you see a post in the wrong forum or in violation of the House Rules, please contact a moderator via Private Message or the "Report this post to a moderator" link at the bottom of every post. Please do not respond directly to the member - a moderator will do what is required.

8. Any impersonation of a forum member in any mode of communication is strictly prohibited and will result in banning.

9. Multiple copies of the same post will not be tolerated. Post your question, comment, or complaint only once. There is no need to express yourself more than once. Duplicate posts will be deleted with little or no warning. Keep in mind a forum censor may temporarily automatically hold up your post, if you do not see your post, do not post again, it will be dealt with by a moderator within a reasonable time. Authors of multiple copies of same post may be dealt with by moderators within their discrete judgment at the time which may result in warning or infraction points, depending on severity as adjudged by the moderators online.

10. Posts should have descriptive topics. Vague titles such as "Help!", "Why?", and the like may not get enough attention to the contents.

11. Do not divulge anyone's personal information in the forum, not even your own. This includes e-mail addresses, IP addresses, age, house address, and any other distinguishing information. Don´t use eMail addresses in your nick. Reiterating, do not post your email address in posts. This is for your own protection.

12. Signatures may be used as long as they are not offensive or sexually explicit or used for commercial advertising. Commercial weblinks cannot be used under any circumstances and will result in an immediate ban.

13. Dual accounts are not allowed. Cannot explain this more simply. Attempts to set up dual accounts will most likely result in a banning of all forum accounts.

14. Video links may only be posted after you have a tally of two forum posts. Video link posting with less than a 2 post tally are considered as spam. Video link posting with less than a 2 post tally are considered as spam.

15. Failure to show that you have read the forum rules may result in forum rules breach infraction points or warnings awarded against you which may later total up to an automatic temporary or permanent ban. Supplying system details is a prerequisite in most cases, particularly with connection or installation issues.

Violation of any of these rules will bring consequences, determined on a case-by-case basis.


Thank You! Thanks for taking the time to read these forum guidelines. We hope your visit is helpful and mutually beneficial to the entire community.


Reply
 
LinkBack Thread Tools Display Modes
  #11 (permalink)  
Old September 12th, 2001
dux dux is offline
Disciple
 
Join Date: April 13th, 2001
Location: new brunswick, nj, us
Posts: 11
dux is flying high
Default Re: Hmmmm

Quote:
Originally posted by lurker701



Interesting idea. It could very well work, but it could also crash and burn.

What troubles me is that you're asking these high-bandwidth machines to essentially act as shields for the rest of the gnutella network. The policing you're refering to doesn't even need to occur to bring the network down. Simply pay your employees a few bucks an hour to pull stuff down on gnutella through these proxies. Wham. You now have a situation where the proxy machines either have to ban every single person who's using their machine to share copyrighted data, or be disconnected by their isp through the typical complaint-and-ban process.
In my last post I was firstly trying to address the issue of whether good anonymity was possible over a P2P network, and in terms of strict possibility bandwidth isn't relevent. But, I'm glad to see you agree that it is at least possible. Even with the state of bandwidth as it is today, though, I still think it could be implemented. Just put a bandwidth cap on the proxy at say 20% of the machine's total bandwidth. The main incentive for doing this, in my mind, is not to allow illegal distributing of copyrighted materials (not that I favor copyright), but to allow people censored by their governments access to content they can't view directly. Simple web page downloading is not an enormous hit on most hosts, and if some people want to download or share music and video through proxies, they will have to trade bandwidth for anonymity (but the network in general shouldn't suffer). Also, the mere fact that the network allows proxies offers protection in itself since it would be difficult to prove that a particular person is sharing illicit material and not a person proxying through him/her, even though it may seem very obvious.

Quote:

Certainly, it's quite easy to determine who your proxy is, even if it's not apparent in the gnutella interface itself. A simple netstat will be enough to determine that much. The encryption isn't an issue because the policing machines *are* the machines recieving the public key. And now you've made the network more centralized, with a handfull of high-bandwidth proxies to go after instead of thousands of users. Even if the proxy machines aren't sharing any files themselves, if they aid in the distribution of copyrighted material, they can be shut down if they persist in that behavior.
The assumption is that most people won't dump their TCP stream (either because they lack the sophistication or they just don't care). And encryption *is* still then an issue. You can't decrypt public-key encrpyted data without the *private* key. Even the person who does the encryption can't decrypt without the private key. The public key encrypts, the private key decrypts. The public key might be returned with the query so if the proxy computer is just for file transfers the proxy computer wouldn't see it. But, presumably, it could just ask for it. It still then has to crack the encryption to know the content. You could have system that disposes of each public/private key pair after each use, which might prevent the proxy from even getting a public key.

As for whether you could be shut down for proxying, the DMCA isn't quite clear and it might depend on the exact implementation. For it to be contributory infrigment there has to be financial benefit in letting the transfer procede (as there was with Napster). For it to be vicarious infrigement there has to be knowledge of the violation, and if the data is encrypted no one should be expected to decrypt it to find out. And there are substantial legitiment uses of the technology (such as giving censored peoples access to the free world, whistle blowing, etc.). Let me refer you to
http://www.eff.org/IP/P2P/Napster/20...ite_paper.html
and you can judge for yourself.

Quote:

So, yeah, I guess you can provide anonymity for a good number of users, but only by putting a smaller, and therefore more vulnerable, group of users at greater risk. Under those conditions, I wonder who would be willing to act as a proxy in the first place.
As I said, cap the proxy bandwidth at 20% and only let high bandwidth hosts proxy. Those who want anonymity will have to sacrifice bandwidth, but those who don't care shouldn't be affected.
Reply With Quote
  #12 (permalink)  
Old September 12th, 2001
Unregistered
Guest
 
Posts: n/a
Default About GQ Rating

The GQ rating could be made to work possibly by making it a more complicated formula based on connection speed, and number of files downloaded/shared. Modem users might get a class/rating of their own (say muGQ) and be exempt, while cable users or aothe broadband users could all be rated on the same level.

Also, it would be hacked and tinkered with within days of its release, and that could not be helped. Clients could be made wich would give out 100% GQ ratings all the time, as well as report being a different client (so you wouldn't know of these false ratings). So the GQ system is mostly plausible as a good faith / honor system / voluntary system. But, the only people who would cheat it are malicious broadband users, and why!?

Just my thoughts.
Reply With Quote
  #13 (permalink)  
Old September 13th, 2001
Apprentice
 
Join Date: September 6th, 2001
Posts: 9
lurker701 is flying high
Default Re: Re: Hmmmm

Quote:
Originally posted by dux


And encryption *is* still then an issue. You can't decrypt public-key encrpyted data without the *private* key. Even the person who does the encryption can't decrypt without the private key. The public key encrypts, the private key decrypts.

Thanks for straigtening that out ... let me restate what I *meant* to say, with this different (and less convoluted) understanding of which key goes where for what purpose. The policing computer sends the request for files, along with the newly generated public key that its client has generated, retaining the private key. The file gets sent, encrypted, by the direct infringer. The proxy passes it along. Policing computer gets the file, decrypts it, and discovers it is a file that its company owns the rights to.

See the problem? You can't create an open network that also excludes the record companies and software developers. If Joe Blow can get online and get a copy of Office XP, so can Microsoft. Step one of the sucussful action against the proxy is complete -- we've proven direct infringment.

Quote:
Originally posted by dux


As for whether you could be shut down for proxying, the DMCA isn't quite clear and it might depend on the exact implementation. For it to be contributory infrigment there has to be financial benefit in letting the transfer procede (as there was with Napster). For it to be vicarious infrigement there has to be knowledge of the violation, and if the data is encrypted no one should be expected to decrypt it to find out. And there are substantial legitiment uses of the technology (such as giving censored peoples access to the free world, whistle blowing, etc.). Let me refer you to
http://www.eff.org/IP/P2P/Napster/20...ite_paper.html
and you can judge for yourself.
No, for vicarious infringement, the person either has to know, or *should have known* the infringement was occurring. All you have to do is fire up a gnutella client to demonstrate that the person running the proxy *should have known* that it was being used to infringe on copyrights. The vast majority of the material is copyrighted. You know it, I know it, they know it. And if you don't know it, you should have known it.

Finally, the person running the proxy clearly contributed to the infringement by providing the proxy and thereby providing annonymity and connectivity to the other parties involved.

All it takes is one lawsuit. You don't have to sue everyone. Once you've succeeded against one poor schmuck, you could use the precident to get several proxies per day shut down.

Who would be stupid enough to run one of these proxies? Would you do it?

I'll say it again: The only thing that can save you from the big bad wolf is the law of large numbers. That means you need as many people actually sharing files as possible, and you need to do it in as decentralized a manner as possible. Proxies would centralize the network and give great big red targets for the record companies to shoot at.

The moral of the story is: SHARE YOUR FILES!

The other moral is : GIVE US A TOOL TO DETERMINE WHETHER OR NOT PEOPLE DOWNLOADING FROM US ARE SHARING THEIR FILES!

(y'all remember that this thread was originally about freeloaders, right?)

-Lurker
Reply With Quote
  #14 (permalink)  
Old September 13th, 2001
dux dux is offline
Disciple
 
Join Date: April 13th, 2001
Location: new brunswick, nj, us
Posts: 11
dux is flying high
Default Re: Re: Re: Hmmmm

Quote:
Originally posted by lurker701


Thanks for straigtening that out ... let me restate what I *meant* to say, with this different (and less convoluted) understanding of which key goes where for what purpose. The policing computer sends the request for files, along with the newly generated public key that its client has generated, retaining the private key. The file gets sent, encrypted, by the direct infringer. The proxy passes it along. Policing computer gets the file, decrypts it, and discovers it is a file that its company owns the rights to.

See the problem? You can't create an open network that also excludes the record companies and software developers. If Joe Blow can get online and get a copy of Office XP, so can Microsoft. Step one of the sucussful action against the proxy is complete -- we've proven direct infringment.
The method I was suggesting is a little different, but what you are describing should work as well. Queries on gnutella are already anonymous, it is only file transfers that are not (unless by random luck you get a hit after only one hop). So the proxy is only for file transfers and has nothing to with the passing of queries or public keys. My thought was to send a public key with the response rather than the query (a little easier on bandwidth it is ). But it doesn't matter who's public key it is so long as it can get encrypted on one end and decrypted on the other. So, the policing computer gets the file and finds that it's copyrighted. For all they know the proxy computer is serving the file. Suppose by dumb luck they own both the proxy and the requesting computers. They still have to prove that the computer seen by the proxy is the one serving the file and is not a proxy itself. For a large network like gnutella, owning two computers involved in an infringing transfer is going to be rare. Given the unlikelyhood that they could even prosecute in that case, I don't see the RIAA (or whoever) investing so much in computing power and bandwidth for such a futile cause. It's much more likely in my opinion that they would try to have passed new laws that would make the technology illegal.

Quote:

No, for vicarious infringement, the person either has to know, or *should have known* the infringement was occurring. All you have to do is fire up a gnutella client to demonstrate that the person running the proxy *should have known* that it was being used to infringe on copyrights. The vast majority of the material is copyrighted. You know it, I know it, they know it. And if you don't know it, you should have known it.

I don't follow you. How could a proxy be expected to know that there is an infringment if the stream is strongly encrypted? ISPs aren't held responsible for the data they forward and most of that data *isn't* encrypted. Just recently eBay won a case concerning culpabilty for copyright infringement over their system (first time the DMCA has been thwarted so far in court in its short history).


Quote:

Finally, the person running the proxy clearly contributed to the infringement by providing the proxy and thereby providing annonymity and connectivity to the other parties involved.

All it takes is one lawsuit. You don't have to sue everyone. Once you've succeeded against one poor schmuck, you could use the precident to get several proxies per day shut down.
He/she may be contributing, but contributing by itself isn't illegal. Under the DMCA a contributor can be found guilty of either contributory or vicarious infringement, as you're aware. But to be found guilty of either you have to violate *all*, not any, of the elements of either case. A requirement of contributory infringement is knowledge of a direct infringement (by no stretch can a user be expected to know this from an encrypted stream), and a requirement of vicarious infringement is financial benefit. I don't see at all how a proxy, using the network layed out above, could be found guilty of infringement under the DMCA. The law of course may change, but that isn't the issue. And, again, there are substantial non-infringing uses.

Quote:

Who would be stupid enough to run one of these proxies? Would you do it?


Who would be stupid enough to share copyrighted materials over Gnutella? Would you?
Personally, I think I'd have a much better legal case, if not a perfectly sound case, with the proxy.


And yes, on the original point, everthing possible should be done to see that users share more files
Reply With Quote
  #15 (permalink)  
Old September 18th, 2001
Artedium
Guest
 
Posts: n/a
Default A point about space and value

I'm new to these forums but I wanted to share some of my views on sharing files.

For me, I set my client to download many files at once, knowing full well that if I'm lucky, I might get one or two per day fully completed. I leave the service on almost all the time and have it set for 3-4 simultaneous uploads at 1 file each.

My problem is that I have one computer (notebook with 18Gb capacity) pretty much dedicated to this function while I'm away. When I'm home, it also serves as my main workstation. Most of the files I download are video-related, however I do have several games and utilities as well.

FILE SIZES & LIMITED STORAGE
With the size of files I'm working with, and the limited storage I have in relation to those file sizes, I can't keep increasing my shared collection size indefinitely without running out of space and crippling the performance of my computer. Eventually, some of those shared files will have to be relocated or deleted.

VALUE OF FILES IN A COLLECTION
Depending on the nature of a file's contents, it's value to me may differ greatly. Files which I wish to keep for a long time will stay in my collection, however again we come to the argument about limited storage space -- it can't go on forever without consequences. Usually these files may end up on CD-R. Files which I have a moderate interest in (say a song or a movie), depending on the subject may get one listen or viewing. If it's crap, I'll delete it (hence removing it from the shared collection) -- again, I can't afford to overload my storage. If it's something I might want to keep, perhaps CD-R. A consumers we need to realize that the value of any particular file is not static - it's fluid. It changes over time, and that value may directly impact how long it stays in a shared collection.

PARTICIPACTION
One thing I try to do is leave as many seeming popular files in the shared collection as long as possible. I even keep mental notes on which files get uploaded the most and try to give people as much opportunity to share what I have available, as long as it doesn't impact too much on my own utility of my computer. As the storage fills up, I have to make judgement calls on what to keep and what to turf from the collection to make room for new downloads. Sometimes that means removing a very popular file. There have even been the odd occasion where I've had to halt someone's upload midstream (and remove one or more shared files) because my new downloaded files were so numerous that I again was close to overloading my harddrive. Sure I felt bad about it, but what can I do (I use Gnotella)? I wouldn't like that if someone did it to me (and I'm sure they have on numerous occasions for whatever reasons).

DEFRAGMENTATION
Recently I discovered that my harddrive was severly fragmented and the notebook's overall performance was drastically getting worse. The harddrive was so full, there was not enough empty space to use as temporary working space -- hence the defragmentation process never completed. I had to relocate and remove massive amounts of files elsewhere temporarily just to get the defrag to complete. I also took that opportunity to cull several large files from my collection to make room for potential new downloads.

All I'm saying is that the issue of sharing files is not cut & dry. It goes beyond the issue of some people not wanting to share.

~Artedium
Reply With Quote
  #16 (permalink)  
Old November 21st, 2001
Morgwen's Avatar
lazy dragon - retired mod
 
Join Date: October 14th, 2001
Location: Germany
Posts: 2,927
Morgwen is flying high
Default

I don´t think all freeloader are bad!

This discussion between Moak and me shows a few ideas against freeloading, and why people "free" load:

http://www.gnutellaforums.com/showth...&threadid=4613

Morgwen
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Stop Freeloaders theviking Download/Upload Problems 2 February 6th, 2006 02:08 PM
Freeloaders Unregistered New Feature Requests 0 October 21st, 2002 06:34 PM
To stop freeloaders, define "Rarely" Niels Download/Upload Problems 3 May 8th, 2002 08:34 AM
Ability to identify and stop freeloaders Unregistered XoloX Feature Request 0 October 12th, 2001 09:28 AM
0% for freeloaders Unregistered New Feature Requests 0 October 6th, 2001 03:56 PM


All times are GMT -7. The time now is 07:13 AM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
SEO by vBSEO 3.6.0 ©2011, Crawlability, Inc.

Copyright © 2020 Gnutella Forums.
All Rights Reserved.