Monday, February 05, 2007

Is Bittorrent being over-used ?

Several weeks ago, in a P2P mailing-list, one proposed an improved version of HTTP protocol, with Bittorrent built in. Some others, however, argued that Bittorrent should not be used everywhere, and apparantly people should stop thinking of integrating Bittorrent to every protocol that they thought of. HTTP is light weight enough for Web/data transferring.

Bittorrent was an excellent and extremely useful tool for content distribution. True !. Another great thing about it is the open source nature, and incoporation of sharing incentives, as discussed in "Incentives build Bittorrent robustness" paper by its creator Bram Cohen. Nevertheless, it consumes an enormous amount of bandwidth and would only be efficient if many people decided to be seeds, in other words, free-riding/incooperatives still exists.

Bittorrent's success on file sharing and large-content distribution (software, linux-release...) seems to push all developers to integrate Bittorrent features to their products. Several months ago, some routers with Bittorrent built in were released. It was believed to keep participating in Bittorrent network even when users' computer was off. I don't know if it has ever taken off (yet), but just found out today that a company is about to launch a TV boxet with Bittorren built in !!! This box-set is supposed to join Bittorrent network and download movies/trailers and show it on your TV. (Long sigh ....)

I just personally find that it's going too fast (far ?).

Lesson from Kazaa/Skype/Joost

Sipping through a cup of hot coffee (with much more sugar than neccessary) and reading through this article was a wonderful treat to start a week. It discussed how Skype-like phenonmenon has had a significant impacts on the global business model.

Niklas Zennstrom and Janus Friis are the ones behind all these. Firstly, they wrote Kazaa, then sold them for big money, just to go and develop Skype for more money. And now Joost (originally known as The Venice Project) looks like the right one to put your money on. These guys have looked at the industries and seen big monsters sitting in the middle, monopolizing the market. And they tackled them head-on. Kazaa countered the music/recording industry, Skype dealt with the telecom operators, and Joost is believed to do the same to the TV/entertainment industry.

In all cases, Niklas and Janus solution was to not to rely on these providers, and harness the resources from individuals. And as it said, "the results was explosive". Kazaa, for instance, was the place where users can freely trade musics and records (at least until it was attacked). Skype has gradually bypassed the well-establish telecommunications operators, and become an incredible tool for real-time voice communication. Though Joost is still on its beta testing, it has already presented great threats to the current TV entertainment industry.

After all, the lesson here is that not only does techonology improve the current economics (efficiency, productivity), but it could also totally change/revolutionize the entire model. Music, TV, telecom has already been tackled ? What's left ? or what's next ?

Saturday, February 03, 2007

Fedora core 6 review

Having a new laptop (even not the cool one) just feels so good. As always, i decided to install Fedora Core. To be trendy, i went for Fedora core 6 ("partly" because the Core 5 disks were no where to be found). I remember using Core 4 just less than one year ago, and that was great experience already, until people in Oxford showed me even greater version (Core 5, with TPM support) last summer, and Core 6 caught the headlines just 2-3 months ago. Do they really need to be that fast ? Anyhow, Fedora Core 6 does impress me in some ways.

1. XEN kernel built-in. Basically, XEN is an open source, enterprise-level virtualization platform. Besides being open source and freely available, XEN differs to VMWare in that (1) it is still work in progress, (2) it would require virtualization hardware support (CPU with PAE support, which mostly unvailable on Intel, Centrino and older).
Sad new is, my cool new laptop does not have that neccessary stuff to run XEN, and threw a big "Kernel-panic" error at boot time.

2. Graphical user interface. It was different everytime. But with this version, there is a thing called "Desktop effect", that virtualizes all the virtual desktops as a cube, and users can see the cube spining and switching as they are switching among them. This picture illutrates that effect:
More screenshots can be found at http://lunapark6.com/?p=2454.

And this guy surely had the virtualization working:

3-++. There certainly are other cool features, as i use it more and more.

How far anonymity can be abused ?

Well, as far as P2P file sharing is concern, anonymity is probably the most desirable feature. With all the current news headlines of individual sharers getting busted, more users become aware of this anonymity thing.

While providing anonymity for P2P is still an active research field, several infrastructures that offer users' anonymity already existed. TOR is perhaps the most well-known system. It was designed as a low-latency anonymous communication channel. In other words, ones can use TOR to gain pretty strong anonymity while doing interactive communications such as Web browsing, chat, online game, etc.. (which require low-latency/fast communication).

One side-effect of TOR, as well as many other anonymous system, is the so-called reply-block. Long story short, it allows service providers (Web, streaming..) to offer their services anonymously. You may ask how it could be possible, because all the online services that have been used today was identified by an IP address (for message routing). This concept stemed from David Chumn's design back in the 80s, where a reply-block was acting like an anonymous email address, and that identity of the owner was extremely difficult to reveal. In context of TOR, a service can be identified by its reply-block, and TOR infrastructure will be routing any message destined to this address correctly. You can imagine that TOR infrasturcture is something similar to the current Internet infrastructure, but hosts are not labelled by a IP address, and identity of the address can not be revealed (in constrast, one can take a subpoena to an ISP and demands account information of the owner).

The good thing about TOR is that it is open source and freely available for Linux community (it may have a Windows version as well). I was quite intrigued to give it a try and to my suprise:
1. It seems to works correctly. Even though i did not look at it at the deepest level of communication, i can check that my IP address that was seen by some online services (that i was connecting to) was different from my real one. For example, typing google.com would send me to the google.de site, which meant that the last point of my anonymous tunnel was located in Germany.

2. Slow. It took about 7 seconds more in average to connects to wikipedia. That is not low-latency to me. However, with everything going on uder the surface, especially with public key encryption/decryption being very costly, it was good already.

3. I found out a whold new world, the hidden world that have been existing for a while on the Internet. They are named hidden services. By using reply-block mechanism, many people can publish their stuff on the Internet anonymously. I was excited to explore how people would use such censorship-resistant, anonymous communication for. Censoring documents involves preventing them from being published. For example, Chinese goverment was believed to have forced Google to censor some pictures/documents. However, this thing is far from international, you stop people publishing in one place, they can hire a server at a different country and make it public. Different jurisdication in different countries prevent censorship from being effective.
Anonymity, however is at a different level (much higher). Some stuff on the Internet should be internationally considered as illegal, such as drugs, weapons, child pornography ... With strong anonymity, these thing can happen.

Because those hidden services require proper configuration to access, i will shows some screenshot here, just for you to get some idea (to see them more clearly, you would have to click to the pictures):

This one is somebody's expression on the abuse of languages, services on hidden Websites, forums and other services.

Main entry to the hidden world is this one:

and finally, here is the list of hidden services that can be seen: drugs, pornography and many government-sensitive documents:

I'm so sure that this will be feeding more fuel to the current battle between technology and ethnicity regarding to anonymity.