P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 29-06-02, 08:05 PM   #1
theknife
my name is Ranking Fullstop
 
theknife's Avatar
 
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
Default What Will They Think of Next?

Meanwhile, over at the RIAA, the boys down in the anti-piracy lab are hard at work
theknife is offline   Reply With Quote
Old 29-06-02, 08:22 PM   #2
theknife
my name is Ranking Fullstop
 
theknife's Avatar
 
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
Default

This strategy is doomed from the start...if you did happen to d/l a spoof, you'd delete it - end of story.

Last edited by theknife : 29-06-02 at 08:36 PM.
theknife is offline   Reply With Quote
Old 29-06-02, 08:25 PM   #3
goldie
yea, it's me.
 
goldie's Avatar
 
Join Date: Jan 2002
Location: usa
Posts: 2,093
Default Hmmmm

Spoofing........sorta has a ring of familiarity to it, doesn't it?

you Hillary & Co.
goldie is offline   Reply With Quote
Old 30-06-02, 04:10 AM   #4
twinspan
- a rascal -
 
twinspan's Avatar
 
Join Date: Mar 2002
Location: for security reasons, never the same as the President's
Posts: 759
Default

as usual, they're fixated on suppressing the symptoms (people downloading free music off the Net) rather than the disease (record companies overcharging, and overcharging for an outdated delivery system at that).
__________________
Your prompt response is requested.

Respectfully,

Mark Weaver,
Director of Enforcement
MediaForce, Inc.
(212) 925-9997
twinspan is offline   Reply With Quote
Old 30-06-02, 08:30 AM   #5
nanook
just one of the gang...
 
nanook's Avatar
 
Join Date: May 2001
Posts: 1,777
Default

Quote:
Originally posted by theknife
This strategy is doomed from the start...if you did happen to d/l a spoof, you'd delete it - end of story.

from article
Quote:
"By making stealing more of a hassle, they hope to persuade more people to shell out for a CD at the local record store".
u r right knife. and we always get our songs. the hassle of downloading is part of the pleasure of seeing if u can get a good quality, whole song.
the hunt is on!!!

to them

to u, knife
__________________
"rock on, all"

nanook is offline   Reply With Quote
Old 30-06-02, 09:05 AM   #6
theknife
my name is Ranking Fullstop
 
theknife's Avatar
 
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
Default

in the article, they used Sheryl Crow's Soak Up The Sun as an example - so I figured I'd download it just to see how hard it was....

...and I got 5 good copies in about 5 minutes.

But it's interesting how they would have to execute this strategy...set up multiple user accounts on the P2P networks, with multiple libraries, with hard drives full of spoofs. The article reads like this stuff gets into the P2P networks and runs wild, but I don't see it happening like that. I would think, in most cases, the spoof would get no further than the first time it is d/l'd by any given user.


I think I'll join you in that beer, Nanook
theknife is offline   Reply With Quote
Old 30-06-02, 11:57 PM   #7
BuzzB2K
Just another cat on the FastTrack...
 
BuzzB2K's Avatar
 
Join Date: Jan 2002
Location: Hamilton
Posts: 727
Default

Quote:
Originally posted by theknife
in the article, they used Sheryl Crow's Soak Up The Sun as an example - so I figured I'd download it just to see how hard it was....

...and I got 5 good copies in about 5 minutes.

I think I'll join you in that beer, Nanook
When did they start the spoofing? I've had the Album (C'mon C'mon) since early April...
BuzzB2K is offline   Reply With Quote
Old 01-07-02, 12:10 AM   #8
fblaguy
Senior Napsterite
 
fblaguy's Avatar
 
Join Date: Jun 2000
Posts: 1,691
Default

I already ended up with a spoofed file. Right before audioglaxy stopped sharing I wasn trying to get No Doubt's Hella Good, well the first one I got was a 4 minute long continuous loop of the chorus. I found the real song when my searching came up with "real version - No Doubt - Hella Good"

It still is dumb to try and spoof the song though.
fblaguy is offline   Reply With Quote
Old 01-07-02, 12:18 AM   #9
Scyth
Registered User
 
Scyth's Avatar
 
Join Date: Apr 2001
Location: Vancouver, Canada
Posts: 454
Default

This is bad news for the more open networks as it suggests the labels will also employ other more effective technological measures to deter pirates.

One things I've being worried about for a few months now is the potential for injecting garbage data into a multi-source download. Someone, either a concern rightsholder or a malicious user, could make a client that claims to be a source for a file, then sends out random data. The result would be an mp3 with noise and seek errors. I haven't been able to think of a good way to protect against this.
Scyth is offline   Reply With Quote
Old 01-07-02, 03:07 AM   #10
TankGirl
Madame Comrade
 
TankGirl's Avatar
 
Join Date: May 2000
Location: Area 25
Posts: 5,587
Wink

Quote:
Originally posted by Scyth
One things I've being worried about for a few months now is the potential for injecting garbage data into a multi-source download. Someone, either a concern rightsholder or a malicious user, could make a client that claims to be a source for a file, then sends out random data. The result would be an mp3 with noise and seek errors. I haven't been able to think of a good way to protect against this.
The receiving client would automatically detect such a spoof when calculating hash number for the received file and comparing it to the one being requested. If hashing is applied to partial chunks as well (which is needed anyway if incomplete files are utilized as sources for multisourced downloads), the integrity of the data can be safeguarded at a lower level.

The above measures still leave the problem of 'original fakes' - deceptively named junk files fed into the network. Open networks without verifiable peer identities and trust relationships will remain vulnerable to bad original data even if the problem can be partially adressed by publishing hash numbers for good rips.

- tg
TankGirl is offline   Reply With Quote
Old 01-07-02, 04:14 AM   #11
zombywoof
 
 
zombywoof's Avatar
 
Join Date: Mar 2000
Posts: 2,160
Default

Cuckoo Eggs
zombywoof is offline   Reply With Quote
Old 01-07-02, 04:26 AM   #12
twinspan
- a rascal -
 
twinspan's Avatar
 
Join Date: Mar 2002
Location: for security reasons, never the same as the President's
Posts: 759
Default

re hashing and avoiding duds/spoofs/garbage
is anyone here participating in Bitzi?

It seems to be a client/protocol-independent hashing system, with submissions of verified files by users. Not sure how it works really.
__________________
Your prompt response is requested.

Respectfully,

Mark Weaver,
Director of Enforcement
MediaForce, Inc.
(212) 925-9997
twinspan is offline   Reply With Quote
Old 01-07-02, 02:35 PM   #13
Scyth
Registered User
 
Scyth's Avatar
 
Join Date: Apr 2001
Location: Vancouver, Canada
Posts: 454
Default

Quote:
Originally posted by TankGirl
If hashing is applied to partial chunks as well (which is needed anyway if incomplete files are utilized as sources for multisourced downloads), the integrity of the data can be safeguarded at a lower level.
- tg
How low is this level going to be. If it's too high, then there's a good chance that the rogue source will have contributed to that chunk and the entire chunk will have to be thrown away. On the other hand, if the level is small, a large amount of hash data has to be sent.
Scyth is offline   Reply With Quote
Old 01-07-02, 02:52 PM   #14
Scyth
Registered User
 
Scyth's Avatar
 
Join Date: Apr 2001
Location: Vancouver, Canada
Posts: 454
Default

Never mind, I started doing the math and it's not as bad as I thought.

Say you have an X byte file. If you download in 10,000 byte (hundreth of a megabyte) chunks from each source, then there will be X/10,000 chunks to verify. Assuming a 32 bit = 4 byte hash for each chunk, that's X/100,000*4 bytes worth of hash information. So, hash information will make up only X/10,000*4/X=.04% of the total download, which is a trivial amount, even if it has to be retrieved for each source.
Scyth is offline   Reply With Quote
Old 01-07-02, 03:18 PM   #15
JohnDoe345
Who's really in control here? Help me...
 
JohnDoe345's Avatar
 
Join Date: Jan 2002
Posts: 222
Default

Creating fakes for music files is kind of a wasted effort in my opinion. For the most part mp3's download relatively fast. It can be a pain for 56k users, but they are still relatively fast compared to movies and software. Also since broadband users can download mp3's quickly, they can easily figure out which ones are real and which are fake, which in turn tells others which ones are fake and which ones are real by simply sharing it. The mp3 files that are shared by many users tend to be correct. If not with that many sources it takes me about a minute or less to download and see if it's real or not.
JohnDoe345 is offline   Reply With Quote
Old 01-07-02, 03:28 PM   #16
butterfly_kisses
Napsterite
 
butterfly_kisses's Avatar
 
Join Date: Apr 2002
Posts: 138
muhaaaa

Quote:
Originally posted by Scyth
Never mind, I started doing the math and it's not as bad as I thought.

Say you have an X byte file. If you download in 10,000 byte (hundreth of a megabyte) chunks from each source, then there will be X/10,000 chunks to verify. Assuming a 32 bit = 4 byte hash for each chunk, that's X/100,000*4 bytes worth of hash information. So, hash information will make up only X/10,000*4/X=.04% of the total download, which is a trivial amount, even if it has to be retrieved for each source.
glad u can do the math...i can't (i don't dispute your figures..i am just envious of them) my mind has a difficult time grasping such abstract concepts. <insert :envious: smiley here>
butterfly_kisses is offline   Reply With Quote
Old 01-07-02, 03:58 PM   #17
dead_frog
Oddball
 
Join Date: Feb 2002
Location: Pond
Posts: 140
Arrow

I don't see what the problem is.
The article mentions billboard pop, so they're trying to stop people getting the same stuff they're labelling as 'tasteful' while stuffing it down the average consumer's throat till it's coming out of his ears.

dead_frog is offline   Reply With Quote
Old 01-07-02, 05:10 PM   #18
TankGirl
Madame Comrade
 
TankGirl's Avatar
 
Join Date: May 2000
Location: Area 25
Posts: 5,587
Wink

Quote:
Originally posted by Scyth
Say you have an X byte file. If you download in 10,000 byte (hundreth of a megabyte) chunks from each source, then there will be X/10,000 chunks to verify. Assuming a 32 bit = 4 byte hash for each chunk, that's X/100,000*4 bytes worth of hash information. So, hash information will make up only X/10,000*4/X=.04% of the total download, which is a trivial amount, even if it has to be retrieved for each source.
Good maths, Scyth.

Your calculation demonstrates how just a small stream of extra hash information can give us safe multisourced downloads from partially completed files. That is just about as good as it can get at the file transfer level and makes possible fast cascade-like distribution of huge files.

It is enough that there is a single source with the complete original file to calculate the hash numbers for all data chunks included. With that information available the potential downloaders can start searching for the content itself and - as soon as some content becomes available - form a cascade of simultaneously downloading and uploading nodes.

In case of large files the hash numbers themselves could be packed into separate, sharable metaobjects verified by their own hash numbers. For example a 650 MB movie would produce 65.000 10 kB data chunks and with 4 byte hash size this would be approximately 65.000 x 4 = 260 kB of hash data - enough to justify a separate, multisourcable object.

eDonkey must use some sort of chunk hashing mechanism and I also remember reading recently about a Gnutella client experimenting with similar technology.

- tg
TankGirl is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump






All times are GMT -6. The time now is 05:17 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)