Professional Documents
Culture Documents
by
Shruthi B Krishnan
Agenda
Introduction What is darknet? Features of darknet Evolution of darknet Introducing content into darknet Methods of policing Conclusions
Introduction
Copying or distributing content in digital format is easier Legal vs. illegal distribution of content Terms used
Objects Users Hosts
What is darknet?
Darknet is a collection of networks and technologies used to share digital content Assumptions
Any widely distributed object is available to some users in a form that permits copying Users copy available and interesting objects Users have high-bandwidth channels
Infrastructure requirements
Input facilities Transmission facilities Output facilities Search mechanisms/ database Caching mechanism
Evolution of darknet
Early Small-World networks
Internet displaced sneaker net reduced latency and powerful search mechanisms Centralized storage and search Efficient for legal online commerce Poor support for illegal object distribution
Distributed storage of objects injection, storage, distribution & consumption of objects done by users Centralized database for searching became the legal target
Distributed object storage and distributed database To reach any host on Gnutella darknet, a peer needs one or few participating peer-IP addresses Open protocol
Downloading objects without sharing them Some users sacrifice their resources, free-riders dont
Lack of anonymity
Server end-points can be determined
Subscribers are given access to objects based on a service contract Customers have no access to channels they are not entitled to Can freely use channels subscribed for
Client obtains
Encrypted content License specifying how to use
Policing hosts
Watermarking
Embeds an indelible, invisible mark on content Concerns about the robustness of the embedding layer Key management Watermark detectors in software or hardware
Supplier marks the object with an individualized mark identifying the purchaser If shared on darknet, purchaser is identified No key-distribution needed Expensive Collusion attacks
Conclusion
Technological implications
Even strong DRM systems can fail Watermark detectors have not made an impact
Questions.