Still working to recover. Please don't edit quite yet.

encrypting file sharing

From Anarchopedia
Jump to: navigation, search

See also: Security | Cryptography | File sharing | HOWTOs | Encrypting Your ...

Software or methods for more-secure/anonymous file sharing. If exchanging files with known parties over an ordinary file sharing network, see Encrypting Your Files.

Note: No action other than abstaining from any sort of file sharing is a true defence. Programs that promote anonymity may not be 100% effective and programs with encryption are often not carefully audited and may be insecure. In avoiding audits by the RIAA, anonymity is more important than encryption.

P2P-enabled Software[edit]

  • ENTROPY - Similar in design to Freenet (at least from the user's perspective), but written in C instead of Java.
  • Filetopia - a fairly large user base with strong traffic encryption. Semi-centralized.
  • FolderShare - commercial Windows client allowing secure file-access with provided client or a Web browser. Also locally-based (only individuals who you add). Communicates with centralized server for file listing.
  • Freenet - a popular anonymous and secure information sharing P2P network using Java. Can be opened with a prefered browser, among other clients.
  • GNUnet - reputation-based network. GPL, part of GNU project.
  • MUTE - for Windows, OS X, and Linux, easy search-and-download that seeks to protect the privacy of its users. Developed from Konspire's code. GPL
  • PRIVARIA - for Windows - more locally-based file sharing and Groupware tools
  • Tesla - A freeware, decentralized, file sharing program with IRC-style chat features and multi-source downloading.
  • WASTE - a focus on small groups of file sharing members, similar to Instant Messaging. Groupware meets social networking meets IM. No centralized server, although users can create supernodes.

Similar but not quite:

  • Konspire - development was moved from an anonymity/security-aim towards a subject-based download system

Adding encryption layers to P2P[edit]

  • Encrypting Your Files - exchange encrypted files. This can be useless if your recipient doesn't know the password or cannot determine it.
  • Encrypting Your Network Links - exchange files over an encrypted network. This may not work for hive-type downloads, since it is unlikely all clients would use the same type of network-layer encryption.

Related[edit]

This article is based on a public domain infoAnarchy article: Encrypting_Your_File_Sharing iA