Find a Question:
Anonymous torrent client Tribler get end-to-end encryption
Researchers at TU Delft have end-to-end encryption to the new version of the torrent client Tribler added. The torrent traffic that goes through Tribler is therefore, according to the developers completely anonymous and do not block.
Tribler has its own TOR-like technology to allow anonymous use. This involves P2P technology that does not use servers need to be made and the TOR network is therefore not taxed. “We have three full-time cryptography experts to work to make this possible.” Dr. Johan Pouwelse allows TU Delft to Tweakers know.
The team builds on the anonymizing layer that has been added in version 6.3, but version 6.4 also provides end-to-end encryption so that seeders in the swarm can not be traced. Currently the program is still used by a relatively small crowd group. Slightly more than 8500 users have tested the client in the past week. In the last month that more than 20,000, as can be read on the statistics page of the torrent client. According Pouwelse there was after the raid on the Pirate Bay to see a spike in the use of Tribler and increases the interest.
In addition to the scientific objective, the client also has a social function, claims Pouwelse. According to him, there is a feeling that privacy is an illusion, and there is need to permit anonymous exchanges of information. There would, however, worldwide, few parties that the complex knowledge needed to allow privacy in concrete services can convert. “In addition, we as scientists come from our ivory tower,” he jokes.
His team is also working on another project to allow mobile data sharing without internet connection. With this experimental service, users must apps to each other’s phones can transfer via bluetooth or NFC. The self compiling app would thereby present themselves as regular app icon innocent.
This also Droid Stealth -dienst should be anonymous and shatter example at demonstrations can be used in countries with regimes that block Internet or strongly monitors. This method of viral apps and content sharing has to be combined with the anonymous Tribler network in the future at times when users have access to the internet.Viewing:-308
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!