Another P2P threat?

Discussion in 'privacy general' started by Pieter_Arntz, Jun 7, 2003.

Thread Status:
Not open for further replies.
  1. Pieter_Arntz

    Pieter_Arntz Spyware Veteran

    Joined:
    Apr 27, 2002
    Posts:
    13,491
    Location:
    Netherlands
    http://www.theregister.co.uk/content/6/31080.html

    PeerEnabler essentially uses peer-to-peer software to get content even closer to the edge of the network that content distribution services like Akamai.

    But where Akamai mirrors content to servers around the globe and connects users' requests for content to their nearest servers, to improve users' access and download experience, PeerEnabler turns users' own machines into the equivalent of those local servers.
     
  2. meneer

    meneer Registered Member

    Joined:
    Nov 27, 2002
    Posts:
    1,132
    Location:
    The Netherlands
    Leaving aside the small print in the EULA, the concept seems brilliant :cool: , just like Back Orifice is a great remote control tool (conceptually too of course :p ). It might be an enormous time and effort saver in companies to manage the information sharing, no more need for the big content servers.

    Leave aside the great concept, we must fear uncontrolled information flows over the internet. Signing the content is a plus, but what's next?
     
  3. Mr.Blaze

    Mr.Blaze The Newbie Welcome Wagon

    Joined:
    Feb 3, 2003
    Posts:
    2,842
    Location:
    on the sofa
    :cool:so is this good or bad or can easly become a new exploit
     
  4. Dan Perez

    Dan Perez Retired Moderator

    Joined:
    May 18, 2003
    Posts:
    1,495
    Location:
    Sunny San Diego
    Not necessarily an exploit (but, of course, depending on its implementation it may take on that characteristic :) ) but, IMHO, it seems to me it is just distributing insecurity with the content. People would go to a (presumeably) legitimate site and download legitimate (for the sake of argument) software without knowing it is received via a trojan or virus infest hard drive.

    This might also open up the possibility for disgruntled customers to intentionally feed trojaned/virii ridden software to further discredit the company.
     
  5. Mr.Blaze

    Mr.Blaze The Newbie Welcome Wagon

    Joined:
    Feb 3, 2003
    Posts:
    2,842
    Location:
    on the sofa
    :Doh like the thing i saw the other day omn winmx

    some guy had in his share folder all kinds of stuff with legitement names

    but when you looked at the file size of lets say 30 items or more they al read the same file size

    turns out it was all sub 7

    but with this new thing it bypass security protocol or something im not totaly up to speed

    hmmmmmmmm either way makes for some intresting reading indeed
     
  6. Dan Perez

    Dan Perez Retired Moderator

    Joined:
    May 18, 2003
    Posts:
    1,495
    Location:
    Sunny San Diego
    Hi Blaze,

    I am not familiar with WINMX but, yes, your exactly right. The problem here is that the original links appear just like any other link so the (supposedly) innocent downloader has no idea that his download is coming from the HD of a 486SX instead of a clustered collocated server behind firewalls, AV, etc

    Regards,

    Dan
     
  7. Mr.Blaze

    Mr.Blaze The Newbie Welcome Wagon

    Joined:
    Feb 3, 2003
    Posts:
    2,842
    Location:
    on the sofa
    :eek:oh wow ouch i understood that man that sux

    dont these bad guys have something better to do

    i mean i seen some intresting stuf they do

    why dont they just built a new os with all that time on there hands

    that way we all can stop relying onn microsoft os

    it really sadens me that programers that do bad things like that dont do something more benifit to the public they got skill why not use it for the greater good

    will thers always a bad apple in every group
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.