recentpopularlog in

kkennedy : p2p   31

Darknets and the future of P2P investigators - Ars Technica
FTA: 'LimeWire's new software illustrates a growing trend: "darknets" are becoming simple to setup and use. As millions of people now find that they can easily create their own private share networks, what's in store for content industry investigators who rely on public P2P networks to find suspected file-sharers?'
p2p  privacy  copyright  software  internet 
march 2009 by kkennedy
Tor VM - Tor in a virtual machine.
Tor VM is a small virtual machine that acts as a router and redirects your TCP traffic and DNS request through Tor while filtering out protocols that could jeopardize your anonymity. Tor VM is built using all open source software and is free.

There are many advantages to running Tor in a virtual machine. Any application on any operating system that uses TCP for communication is routed over Tor. By using a small virtual machine that acts as a router, protocols such as UDP and ICMP are filtered, preventing a compromise of your anonymity. Placing Tor in a virtual machine separates Tor from potentially insecure applications that could compromises Tor's integrity and your security.
security  privacy  tool  p2p 
november 2008 by kkennedy
Steal This Footage
The base footage from which Steal This Film II' was made, available under CC licenses (mostly BY-SA, with at least one BY-NC-ND exception). Amazing stuff, and great background for further documentaries, since all of it wasn't used in the film.
video  p2p  copyright  intellectualproperty  media  creativecommons 
august 2008 by kkennedy
-- TOTALLY cool. This is like unto GoogleFS. perl-based. woot.
backup  database  geek  p2p 
june 2007 by kkennedy

Copy this bookmark:

to read