P2p
P2p (distributed network, file sharing, technology) | |
---|---|
In a p2p network every participant is simultaneously server and client |
In a p2p network every participant is simultaneously server and client. This requires that participants ("nodes") donate disc space, bandwidth and sharing of risk with the network. It is implemented by distributed hash tables and consensus algorithms. Anonymity may be low (i.e. Bitcoin) or high (i.e. i2p, Monero) depending on the amount of encryption in use. Strong encryption generally slows down network speed.
Contents
Censorship resistance, criminality and voting
P2p networks can and do solve the problem of censorship of information in a democracy. This however requires a change of mindset in the participant, who must be willing to take the risk of hosting illegal content. It is true that any censorship resistant network may be used for criminal purposes. The decision wether we want to live in a free society and accept a certain amount of criminality or to live in a totally controlled society where crooks are running the system is apparently hard to make when security is an important value. The implementation of personal voting in consensus algorithms may be a way to prevent criminal activity without the need for a central authority.
Use
Most likely because users don't understand the inner workings and for "ease of use" p2p networks may be accessed by super nodes, i.e. exchanges or other centralised servers running a node for the end user. It is important to know the difference: it is, for example, not necessary to use an exchange to transfer Bitcoins and it is impossible to get banned; however the user must be willing to download <300GB and run the Bitcoin client by himself.
Media deceptions
The commercially-controlled media habitually deceives the general public about the possibility to take matters into one's own hands; focussing on how people may get banned on exchanges; accusations of money laundering, a problem every monetary system faces, including the dollar and reporting effords of de-anonymization. (Attacks on encrypted networks are possible, but on a statistical basis - the user still has plausible deniability).
The commercially-controlled media habitually associates use of censorship resistant p2p networks with criminality.
Examples include i2p, Retroshare, freenet, Monero and all other Cryptocurrencies .
Examples
Page name | Description |
---|---|
BitTorrent | |
Bitcoin | A cryptocurrency |
Cryptocurrency | Digital currencies with computer generated security protection. |
Odysee | Odysee is an alt-tech video hosting platform. |
Related Documents
Title | Type | Publication date | Author(s) | Description |
---|---|---|---|---|
Declaration of Currency Independence | declaration | May 2021 | John McAfee | The main author, John McAfee, died mysteriously in jail the next month. |
Declaration of Monetary Independence | declaration | 2021 | Mark Maraia Mike Hobart |