The Uncertain Future of BitTorrent 340
javipas writes "The people behind the popular BitTorrent tracker are working on a new version of the BitTorrent protocol that could become the successor to the current one, maintained by BitTorrent Inc. The company founded by Bram Cohen — original author of this protocol — now has decided to close the source for several new features in the BitTorrent protocol, and this "gives them too much power and influence". The new file format would be called .p2p, and would maintain backwards compatibility with current .torrent files."
Oh well, (Score:4, Funny)
Re:Oh well, (Score:5, Insightful)
I think we should be happy that somebody's thinking about something new instead just relaying on something that's good but not optimal. Especially now with current climate of litigations and general problems (traffic shaping, etc) with BitTorrent it's time for something more resilient and anonymous.
Just my 2p.
Re: (Score:2, Interesting)
Re:Oh well, (Score:5, Informative)
Re:Oh well, (Score:5, Insightful)
Re:Oh well, (Score:4, Insightful)
And well before warez, there was pirate radio. (Score:4, Informative)
Re: (Score:3, Informative)
The earliest pirate radio station [wikipedia.org] in the UK was actually by the Daily Mail:
Ceto - The Ceto was a steam yacht reportedly renamed "Broadcasting Yacht" and fitted out for radio broadcasting purposes in 1928. Starting from off the coast of Dundee, Scotland, 'Daily Mail Radio/Radio Daily Mail' (Reports vary) broadcast easy listening music to various points around the British coast as it cruised around the nation's coastline. The sole sponsors of this
Wong+time != right; (Score:5, Funny)
Re: (Score:3, Funny)
Re:Oh well, (Score:5, Funny)
Re:Oh well, (Score:5, Funny)
Re:Oh well, (Score:5, Interesting)
I vote that we write one of our own. I've written a BitTorrent client before, and have written a protocol extension [sourceforge.net]. I'm just beginning to ponder a completely new protocol [sourceforge.net]. Any interest?
Re:Oh well, (Score:5, Interesting)
Re: (Score:3, Interesting)
On the other hand, defeating censorship is a goal I'm 100% behind.
Re: (Score:3, Funny)
Re: (Score:3, Insightful)
In that case, just call it the FSM.
And instead of .torrent, files will have an .appendage extension.
Arrrr!
Re: (Score:3, Funny)
Re:Oh well, (Score:5, Interesting)
Good luck close-sourcing Python code, anyway... reverse-engineering .pyc is beyond trivial. If there's anything really useful in there, it will be reverse-engineered and mysteriously make its way back into the BitTorrent OSS fork, anyway.
Re:Oh well, (Score:4, Informative)
Will they EVER learn? (Score:5, Insightful)
Perhaps that's one of the biggest reasons people should think long and hard about attempting leverage open source to gain popularity and a user base. There's that possibility of the user base forking your work and taking it over if they don't like the direction you're going... and that's exactly what I predict will happen with BitTorrent. And while they're at it, they'll probably go ahead and build into it some anonymity protection.
Re:Will they EVER learn? (Score:5, Insightful)
Au contraire (Score:5, Insightful)
Au contraire contraire (Score:5, Insightful)
Manufacturers do not assume liability if their product is used to perform illegal activities. How long would Heckler and Koch, Gerber, and Ronson remain in business if they were held liable for every knife fight, gun duel, and arson?
Re:Au contraire contraire (Score:4, Informative)
That has never stopped the media companies from going after software that enables copyright infringement.
Re:Au contraire contraire (Score:5, Insightful)
Manufacturers do not assume liability if their product is used to perform illegal activities.
I don't even have to point at an analogy, just at parallels - Napster. Kazaa. Both were very successfully litigated against for complicity in copyright infringement, no?
Re: (Score:3, Insightful)
Re:Au contraire (Score:4, Funny)
Re: (Score:2)
Re:Au contraire (Score:4, Funny)
Re:Will they EVER learn? (Score:4, Insightful)
Hmm. If he believes it's a good thing, and I'd rather see him stand by that belief. If he intended it to be a piracy tool because he believes in piracy, then he should stand by that, instead.
Either way, Bram doesn't seem to realise that he doesn't matter any more. The technology is out there, and neither he nor anyone else can take it back. He's unlikely to release anything more important for the rest of his life, and he may as well just accept whatever small (and it was small) contribution that he made. I say small, because however good BT is, it's only a little better than the P2P systems before. Just another piece of the slow, step-by-step, but fairly obvious puzzle we all glorify as computer science.
Re: (Score:2)
You can use HTTP, FTP, cell-phones and other communication mediums -wether protocol based or not- to perform illegal activities. I guess given the current legal system Bram has no choice. But if the reason is to protect his company assets, maybe we ought to shut down the entire Internet in order to fully prevent illegal activity. Or not. I think given the system
Re:Will they EVER learn? (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2)
Shooting themself in the foot (Score:4, Insightful)
Re: (Score:2)
If you haven't heard, Bit Torrent now owns uTorrent.
Re: (Score:3, Interesting)
Re:Shooting themself in the foot (Score:5, Informative)
so? (Score:2, Informative)
Re: (Score:2, Insightful)
Tin-foil hat... (Score:5, Interesting)
What the Story Submission Should Have Said (Score:5, Informative)
Letter to Pirate Bay re: new torrent protocol (Score:5, Interesting)
ONION ROUTING:
1) Implement Onion routing (aka: Tor / anonymize the sources) as a built in feature.
2) Onion Routing should, where possible, try to use exit points and middle points that have roughly the same amount of bandwidth as you, otherwise torrenting will not become a reality through Onion Routing. So some kind of peer bandwidth algorythm needs to be incorporated.
3) Onion routing should be on by default, and each user should also become an exit point and donate 30% of their bandwidth to this. This will greatly increase the number of exit routers & provide this as a defacto alternative, as opposed to just some obscure security feature for the 31337 (hackers & government homeland types).
4) Individual site upload ratios, should take into consideration that fact that you are an exit point and some portion of that 30% should be counted toward your uploaded bytes ratio (even if traffic is going to other sites)... in other words, help promote torrent security = get bonus points from private trackers.
SIMPLIFY ISP SHAPING BYPASS
Background: Forcing protocol encryption isn't enough these days; some ISPs are shaping or even blocking torrent traffic by methods such as sending TCP RST packets to close a session, or their infrastructure auto-analyzes your encrypted traffic patters and if they are high bandwidth, very encrypted and on for long amounts of time to the same destination you get flagged & shapped (regardless of the fact that you could indeed be doing something legal)
1) There's a page on Wikipedia that lists all the "BAD ISPs" (http://www.azureuswiki.com/index.php/Bad_ISPs). This is a list of ISPs internationally that in one way or another shape your bitorrent traffic (Comcast anyone?). We need to be one step ahead of these ISPs and render their multi-million dollars worth of shaping infrastructure useless - sooner rather than later - sooner so that they can't make up for the ROI on all that gear they purchased. If the ROI fails, the next time engineering dept approach CEO for X dozens of millions more, they will get declined and we (torrent community) will win.
2) This site breaks down "throttling" into 5 different categories or ways in which the ISP can throttle you... each listing the bypass method.
http://www.azureuswiki.com/index.php/Avoid_traffic_shaping#Escalation_of_the_crypto_settings [azureuswiki.com]
Note that level 5 (the most aggressive shaping method known so far) is only bypassable by a single client today (Azeurus), utorrent to my understanding can not bypass this.
Anyway my point with these above 2 items is that these facts need to be considered:
1. The number of ISPs throttling internationally is already large and growing larger
2. Your new torrent client needs to simplify bypassing these various levels of encryption so that it can be adopted by the masses. If it is not adopted by the masses (rendering ISP throttling useless), the ISPs will have won.
I don't have time to type more, so please research what other clients out there (beyond just torrent) are doing and borrow ideas from them.
Here's a brief list of intelligent encryption/anonymous software out there to investigate:
RODI: http://slashdot.org/article.pl?sid=05/06/01/1252232 [slashdot.org]
MUTE: http://mute-net.sourceforge.net/ [sourceforge.net]
ANTS: http://antsp2p.sourceforge.net/ [sourceforge.net]
GNUnet: http://gnunet.org/ [gnunet.org]
I2P: http://www.i2p.net/ [i2p.net]
FreeNet: http://freenetproject.org/ [freenetproject.org]
TOR: http://tor.eff.org/ [eff.org]
THanks and good luck!
Freenet (Score:3)
If your experience is different, please take a moment to elaborate.
If *anyone* has any current, positive experience with Freenet, please jump in. I figure *somebody* is probably still u
Freenet is NOT what you're looking for... (Score:3, Informative)
Aw, poor Alice! She's so clueless and disappointed because she hasn't found Wonderland... yet
Yes, Alice, I do know something you don't. Freenet is for posting stuff, but there are OTHER similar (anonymous) networks around... some haven't made it to the public, and some are still in beta (but already working imho). They implement onion routing, and are very secure. Some are used for file transfer, others for general purpose (to host websites, forums, etc). Yes, they work.
Jus [slashdot.org]
Re: (Score:3, Insightful)
Assuming the pirated song is in a public torrent, MediaSentry can and join the swarm and start requesting chunks of data. If their client can connect to my client and download chunks of whatever file they're "protecting" today, I'm equally hosed whether those chunks are coming from a file stored on my hard drive or forwarded from someone five layers
Re: (Score:3, Interesting)
Well, yes. ISP's pulling that level of filtering are, as you imply, doing so where choices for cheap and freely usable bandwidth are limited. This can be because of the expense of bandwidth or a desire for casual monitoring (such as a campus network, where the student with the 3 Terabytes of MP3's and DVD's sharing them to the world is both a bandwidth and a legal problem). I
Re: (Score:3, Interesting)
Huh. That runs counter to my entire body of experience. Most dealers are selling just enough so that they can smoke for free and possibly make a little extra money on the side. Large scale distributors (the ones who sell by the pound or more) on the other hand probably care more about the money. It's more pure business at that level.
And yes, I do greatly respect dealers for "sticking it t
Comment removed (Score:4, Interesting)
Backward compatable (Score:2)
Re: (Score:2)
There are some very interesting technologies... (Score:5, Insightful)
And honestly, if Bittorrent closes some of the protocol, the features either going to be ignored or reverse engineered. In which case there's already 2 different
What the the closed source features? (Score:5, Insightful)
Predictable (Score:5, Insightful)
But there is nothing there people should be afraid., as everybody knows, real innovation on the P2P scene occurs when the interested parts (the filesharers, not necessarily illegal ones) are the real force behind the development, as PEX (protocol encryption) came to prove, now that the cat is out of the sack, there is not a lot of things that Mr. Cohen can do.
Re:Predictable (Score:4, Interesting)
Re:Predictable (Score:5, Insightful)
Re: (Score:2, Insightful)
Re: (Score:2, Interesting)
Because if I am going to pay a content provider for a download, I want the transaction to be as follows:
1) I pay $$$
2) Provider sends me file, using their upstream bandwidth and my downstream.
As opposed to:
1) I pay provider.
2) Provider tells me where the files, or pieces thereof, are.
3) I use my downstream AND upstream bandwidth, and my file storage, and my processor cycles, to distribute the file for the person I just paid.
I know some game companies do this to distrib
Re: (Score:2)
This would save the distributer money, because they could credit you less for your bandwidth than they would have to pay for the extra serv
Re: (Score:2)
Re: (Score:2)
Closed encrypted source... (Score:2)
USB 2.0 is better than Bit Torrents. (Score:4, Interesting)
1. quickly net them more music than they can listen to in an entire lifetime.
2. make sure they have off-site backup of their music in case their house is burned down by RIAA goons.
And, if you don't put it on-line, none of it is traceable by RIAA. And Comcast can't stop it.
Re:USB 2.0 is better than Bit Torrents. (Score:5, Interesting)
Re: (Score:2)
Re:USB 2.0 is better than Bit Torrents. (Score:5, Insightful)
Imagine the day when you could carry the Library of Congress (which probably will be copyrighted as a work itself) around in your pocket.
Also imagine two more things, sadly. "IP" corporations will make the manufacturers of such superstorage encrypt their devices and register the keys with the corporations/government, and no doubt will make the devices snitch you out by making them periodically check in with a registrar with a list of naughty things you may have; and possession of such devices, most certainly possession of unregistered/unlicensed content will bear the penalty of years in prison, or even the death penalty. George Hearst's men shot his miners who pocketed gold nuggets during the first Guilded Age. We are entering another. This time the evil men can track our movements and actions minutely. This age will be a police state beyond even my sad imagination. Actually it will be a death sentence to resist the new lords of IP: if you resist arrest, they will stun you, possibly killing you. If you try to flee the country, they may shoot you dead. If you are imprisoned and try to escape, they will shoot you and kill you. Death is the penalty for ultimately refusing to bend the knee and take it in the ass. And your friends will sadly shake their heads at your obdurate refusal to accede to the law, and Youtubers will guffaw as the taser darts stop your heart, cheering on the thugs who are shutting your fool mouth up.
Here's a little line for all of you. When people ask you why you should care if the guvmint/Comcast/shadow creatures of the corporate world/ monitors your location, communications, downloads, reading material, mail, and traveling accessories if you've done nothing wrong, ask them the simple question:
Why do you have shades on your windows if you've nothing to hide?
If the protection of our precious kids/selves/intellectual property is more important than the right to not be monitored, then build all houses out of glass and let everyone see what we do. It's the same damned thing. If you've nothing to hide, put cameras in every corner of your house and let the government record.
You all won't do it, because you know damned well you all do something illegal somewhere. Corporations break the law every minute of their existence. A lot of you smoke leaves. A lot of you sleep with people you know you shouldn't. You read things that would affect people's opinion of you. You listen to music and watch video without license of the copyright holder.
Anyway, keep the bugs off your glasses and the smokies off your asses. I'd say "Peace", but we're not ever going to get that with greedy bastards convincing us to roll our pants down on command.
Re: (Score:2)
Why not use the internet? (Score:2)
Re: (Score:3, Funny)
Re: (Score:3, Interesting)
http://www.engadget.com/2007/09/22/hackers-project-sends-media-filled-hard-drives-to-troops/ [engadget.com]
So what? (Score:2, Insightful)
And they speak as if they were the only ones who could develop new features. Don't forget about the distributed network for BitTorrent and all the good things clients and servers have implemented to improve existing protocols, BitTorrent and others.
Ryan Fenton (Score:4, Funny)
hmm. (Score:5, Interesting)
I dont want to be paranoid, but...
RIAA/MPAA/**AA are trying to legislate against P2P
They have several key bitTorrent devs in their pockets
They are promoting a new *better* protocol
How long before this is a negotiating tools to the powers that that control the legislation - on the lines of "yes, P2P has legitimate uses, but the new protocol will safeguard those interests whilst protecting copyright" or something on those lines. In other words this could be an initial step towards the long term goal of a legal P2P system that is easy to police/control content. These people plan a long way ahead, I would not be surprised if something like this is brewing...
Mind you I like the concept of packet obfuscation to thwart ISP throttling mentioned in TFA.
Re: (Score:2)
More likely the MPAA want to gain the bandwidth benefits of P2P with a more controlled environment and shop front. That way they can market a legal service to Joe Sixpack and the sharers who fe
Bad name (Score:2)
On the subject of P2P (Score:4, Interesting)
Re: (Score:2)
Re:On the subject of P2P (Score:5, Funny)
. . .
. . . . . . i . .
nt . . . e .
. . r . . es . .
-
PARITY.. please.. add parity (Score:2)
So.. make 10% parity and then bitorrent can be even more resource intensive.. doesn't matter because we all have dual and quad cores now. So, just stick bitorrent on another core. Then, give bitorrent its own hard drive and you barely notice it running on your computer.
^^ That's my feature request.
Re: (Score:2)
Re: (Score:2, Insightful)
So, if there was 1% overhead that went into parity... those people would just leave 1% sooner (since they can regenerate the files they need anyway). So everybody would be stuck at 98% and still unable to use the parity. That won't be helpful.
Parity is useful in newsgroups because your servers won't randomly run away from
Better name for the file extension (Score:5, Funny)
Re: (Score:2, Funny)
Apparently Taco finds that basic grammar are too hard, too.
Re: (Score:2, Funny)
Re:the people is working (Score:4, Funny)
http://thepiratebay.org/search/oxford%20english%20dictionary/0/3/0 [thepiratebay.org]
Re: (Score:3, Insightful)
Re: (Score:3, Funny)
Re: (Score:2)
The geek is first against the wall when the Revolution becomes the Terror.
He is the ideologue whose agricultural reforms end in famine, the architect whose grandiose stage sets for the new regime threaten to bankrupt the state.
He is the damned nuisance who frays tempers as he insists on drawing the new Assembly into yet another interminable debate over calendar reform.
Re: (Score:2)
(besides, any geek will tell you that attempting to write a calendar program in assembly is just a bad idea, use something a little higher-level)
Re: (Score:2)
Firing squads, armed with flying chairs.
Re: (Score:2)
Re:Grammatical Errors. (Score:5, Funny)
Hmm. You must be new here...
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Meanwhile, .FLV yawns, streams another video (Score:4, Informative)
Re: (Score:2)
Most ISPs are starting to put monthly bandwidth limits on their users. You don't want to keep streaming the same thing over and over again every time you want to read/listen/view it.
You also can't access streaming content without internet access, such as on most portable devices (iPods, etc). Even if a few portable devices can access internet, it can still be trouble getting a connection (people are getting smarter and locking down their wi-
Re: (Score:2)
Also expect comcast to move to QOS technology as their existing hack gets killed.
Re: (Score:2)
I'm not sure what BT inc. is trying to do by closing the source, but I can tell you that whatever the changes, they'll be judged by the public on merit alone. If they are bad, they'll be ignored. If they're good they'll be reverse engineered and cloned. End of story.
To support this, look at other protocols out there that