no way to be anonymous on internet? (p2p)

draggoon01

Senior member
May 9, 2001
858
0
0
what with riaa threads and all, is there no way to share files anonymously? i understand you need an ip to connect in first place, but isn't there someway to hide or trick the info?

can't p2p encrypt the ip connection info from user?

or can't p2p ping pong the info, so that if you try to grab an ip, you get the ip of dozens of people and can't tell who's ip?

something like what this site does to hide your info
www.anonymizer.com

or if all else fails, try to find an open wireless connection. college campus or neighbor or what not :)
 

BCYL

Diamond Member
Jun 7, 2000
7,803
0
71
You HAVE to have a stable IP at some point, or else how can information (packets) come back to you?

This is how the RIAA is checking... they get the destination IP of the packets, which is assigned to an ISP... then they get the specific name/user from the ISP's database...
 

draggoon01

Senior member
May 9, 2001
858
0
0
yeah, but isn't there a way to trick the person looking for ip?

how does that website i linked work?

can't you make it seem like 5 ip's are sending to you at one time so you can't distinguish?

can't you encrypt info?

can't you scramble the ip to form some derivative, use those derivatives to connect clients, and only some off shore server holds the decryption between ip and derivative-ip?

there's got to be some clever method i think...
 

Snapster

Diamond Member
Oct 14, 2001
3,916
0
0
Best way would be to scramble the data itself with encryption. Can they touch you for transferring data which they have no idea of what it is.
 

IcemanJer

Diamond Member
Mar 9, 2001
4,307
0
0
IP spec is defined way down in the network layer. What you're asking to do would require a redesign of the IP spec.
 

IcemanJer

Diamond Member
Mar 9, 2001
4,307
0
0
Originally posted by: Snapster
Best way would be to scramble the data itself with encryption. Can they touch you for transferring data which they have no idea of what it is.
what sort of encryption will you have to use? assuming you need some sort of key-exchange handshake using Public Key Infrastructure, how are you going to set up the infrastructure for all p2p users? how will you determine the session key when there are multiple parties trasferring data simultaneously with you? How is your CPU going to handle all the enc/dec processing?

My guess is that doing the actual encryption/decryption of data at the time of transfer would be the simple procedure. Setting the infrastructure such that each P2P user can securely exchange session keys with each other is going to be the crux.
 

Gunbuster

Diamond Member
Oct 9, 1999
6,852
23
81
You could route all the trafic through a proxy that is set not to keep any logs, but it would need to be on a monster connection