![Page 1: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/1.jpg)
6° of Darkness
or
Using Webs of Trust to
Solve
the Problem of Global
Indexes
![Page 2: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/2.jpg)
The problem
● Most P2P networks are insecure● Thus they are susceptible to lawsuits
![Page 3: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/3.jpg)
![Page 4: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/4.jpg)
Napster
● Centralized servers● Easily taken down
![Page 5: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/5.jpg)
![Page 6: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/6.jpg)
Gnutella
● Decentralized● Still possible to glean IP addresses of the
individual nodes
![Page 7: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/7.jpg)
![Page 8: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/8.jpg)
KaZaA
● Much more efficient● Uses supernodes to route traffic● Hundred of users have been sued
![Page 9: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/9.jpg)
![Page 10: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/10.jpg)
Direct Connect
● Uses hubs and has large minimum share sizes
![Page 11: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/11.jpg)
![Page 12: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/12.jpg)
Bittorrent
● Each file must be hosted by a tracker and then is forwarded though a chain of downloaders/uploaders
![Page 13: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/13.jpg)
Bittorrent
● If the tracker goes down, the other nodes have no way of finding each other
● The IP address of the tracker is easily traced
![Page 14: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/14.jpg)
![Page 15: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/15.jpg)
WASTE
● A truly secure network with rings of encryption
![Page 16: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/16.jpg)
WASTE
● The problem is that these two networks cannot communicate with each other
![Page 17: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/17.jpg)
WASTE
● The reason why other P2P networks are so popular is because you can share files with people you don't personally know
![Page 18: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/18.jpg)
A New Network
● What is needed is a network that will allow you to share files with people you don't know, without revealing your identity to them.
![Page 19: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/19.jpg)
A little history
● In 1967 Stanly Milgrim published an article entitled “The Small World Phenomenon” in Psychology Today
![Page 20: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/20.jpg)
A little history
● In 1967 Stanly Milgrim published an article entitled “The Small World Phenomenon” in Psychology Today
● He concluded that most people in the world were connected to each other by a chain of six friends
![Page 21: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/21.jpg)
A little history
● In 1967 Stanly Milgrim published an article entitled “The Small World Phenomenon” in Psychology Today
● He concluded that most people in the world were connected to each other by a chain of six friends
● It was from this and later studies that the popular idea of Six Degrees of separation came from
![Page 22: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/22.jpg)
A little history
● There has been some debate about whether the average of six connections between any two people holds true throughout the world, but physiologists agree that are a lot of subnetworks with people being connected by an average of six or even fewer friends
![Page 23: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/23.jpg)
Six Degrees
● It may be possible to create a secure anonymous network on this principle
![Page 24: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/24.jpg)
Six Degrees
● Instead of sharing files with anyone who asks for them you will only reveal what files you are sharing to your trusted friends
![Page 25: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/25.jpg)
Six Degrees
● In turn they will let others know about these files, but not reveal your IP address
![Page 26: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/26.jpg)
So How does this Work?
● The base of the network is similar to WASTE, and the entire protocol depends on Public Key Cryptography
![Page 27: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/27.jpg)
Public Key Cryptography
● Each connection in this darknet represents an exchange of public keys
BA
Here is my public Key
![Page 28: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/28.jpg)
Public Key Cryptography
● If Bob put Alice's public key in his list of trusted users (Bob has decided to trust Alice), Alice will be able to download files from Bob
BA
Bob: I'll trust this key
![Page 29: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/29.jpg)
Public Key Cryptography
● All the files Bob send to Alice will be encrypted with Alice's public key, and no one will be able to read them but Alice.
BA
I can't read this!
E
![Page 30: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/30.jpg)
Public Key Cryptography
● Assuming that Alice is kind enough to return the favor and trust Bob, they will both be able to access each other's files, and Eve will not be able to eavesdrop at all.
BA
I still can't read this!
E
![Page 31: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/31.jpg)
Public Key Cryptography
● Supposing that Carol has a file that Alice wants.
BA
E
C
![Page 32: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/32.jpg)
Public Key Cryptography
● Alice does not trust Carol, more importantly Carol does not trust Alice, so there is no way for Alice to know that Carol has the file
BA
E
C
![Page 33: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/33.jpg)
Public Key Cryptography
● If Carol trusts Bob, she will tell him what files she has, and in turn, Bob can tell Alice
BA
E
C
![Page 34: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/34.jpg)
Public Key Cryptography
● Alice will then request the file from Bob, and Bob will request the file from Carol
BA
E
C
![Page 35: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/35.jpg)
Public Key Cryptography
● Bob will act as proxy between Carol and Alice, so that Carol does not have to reveal her IP address to Alice
BA
E
C
![Page 36: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/36.jpg)
Public Key Cryptography
● All the while, Eve who had been trying to eavesdrop on this transfer, can read none of the file.
BA
E
C
![Page 37: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/37.jpg)
Six Degrees
● This method can scale to many users each who only trust a few people, yet can access the entire network
G
B
E
F
H
A
I
C D
![Page 38: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/38.jpg)
Six Degrees
● Of course the more people you trust (more correctly the more people you can convince to trust you) the faster your downloads will be.
G
B
E
F
H
A
I
C D
![Page 39: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/39.jpg)
G
B
E
F
H
A
I
C D
![Page 40: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/40.jpg)
Problems
● If Bob is the only link between a lot of people, file transfers between them will be very slow
G
B
E
F
H
A
I
C D
![Page 41: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/41.jpg)
Problems
● Bob can help solve this problem by convincing more of his friends to trust each other
G
B
E
F
H
A
I
C D
![Page 42: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/42.jpg)
![Page 43: 6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfc81a28abf838ca8939/html5/thumbnails/43.jpg)
G
B
E
F
H
A
I
C D