Understanding P2P Networks, Software Licensing, and Data Privacy
P2P (Peer-to-Peer) Networks
A P2P network is a peer computer network where all participants behave as both clients and servers. The main idea is that all users share resources. The more a user shares, the more privileges they have, and the faster their access will be. To download a file, it is broken into small pieces. These parts are then requested and downloaded. You also become a server for the parts you are downloading. This allows the same file to be downloaded from many places at once, so the download speed increases as the number of clients sharing the file increases.
Limitations
- Connections are asymmetric (ADSL), meaning the upload speed is lower than the download speed.
- It’s normal for downloads to be interrupted if the original source is not connected.
- You may not know exactly what you are downloading.
- Most of the time, files are downloaded without the authors’ permission.
When Downloads Can Be Penalized
- When there is a profit motive (to make money).
- When there is harm to others (the crime is committed by both the provider and the receiver).
According to the Ministry of Culture, downloading music without the artist’s permission is a crime.
Software Ownership and Distribution
Software is considered “free” when it has these characteristics:
- Users should have the right to use the program wherever, whenever, and however they want.
- Users should have the right to study how the program works and, if they have the knowledge, adapt it to their needs. This requires access to the source code (how the program is made).
- Users should have the right to distribute copies of the program.
- Users should have the right to improve the program and release their improvements.
Richard Stallman
Seeing that most software was proprietary, Richard Stallman established the GNU project, which aims to create a free operating system to solve this problem. It was initially called GNU/Linux, after Linus Torvalds.
Licenses
A license is an authorization from the program’s creator that indicates the conditions for using the program (found on the label). Types of licenses include:
- Proprietary: Commercial software that you must pay for (e.g., Microsoft products).
- Semi-free: You cannot profit from or sell it.
- Free:
- Permissive: 100% free.
- Copyleft: You cannot change the distribution terms.
Examples:
- Operating Systems: Linux (Free), Windows (Proprietary)
- Browsers: Mozilla Firefox (Free), Internet Explorer (Proprietary)
- Graphic Editors: GIMP (Free), Photoshop (Proprietary)
- Freeware: Free software (e.g., Frostwire).
- Shareware: A limited number of copies are available (e.g., Nero).
- Adware: Free to use, but you must view advertisements within the program (e.g., Messenger).
Data Privacy Protection
In the information society we live in, personal data is increasingly revealed through the network. Consequently, more and more companies have access to this data, including information about our tastes and hobbies. This information can be sold illegally to third parties. Sometimes, there are legal loopholes.
Crimes Against Privacy
- Logging into another person’s computer without permission.
- Unauthorized data transfer.
- Intercepting email addresses.
- Electronic harassment.
European Legislation
- Data should be clear and legitimate and should never be excessive in relation to the purposes for which it is used.
- Data must be accurate and up-to-date.
- Those responsible for the data should allow users to correct or remove their data.
- Identification data should not be maintained for a longer period than necessary.
- All EU member states must designate a central authority to monitor the implementation of these measures.
Social Engineering and Security
Social engineering is the use of actions to obtain confidential information from other people without them realizing it.
Attacks
- Calling data centers posing as a customer who has lost their password.
- Creating websites that ask for user passwords for competitions, etc.
- Searching through papers and around the workplace for data.
- Impersonating an employee of the company.
Prevention Strategies
- Verify the authenticity of people seeking information.
- Never open emails from unknown sources.
- Analyze emails with an antivirus program.
- Never respond to requests for personal information.
- Never throw away important documents without shredding them.
Phishing
Phishing involves imitating a company’s image with the intention of fraudulently obtaining a user’s data.
Data Encryption
Encryption is used to prevent unauthorized individuals from viewing information. How does it protect information? It uses encryption methods where both the sender and receiver are aware of a key. This key allows them to encrypt the message before sending it and decrypt it upon receipt.
Problem
A third party could potentially obtain the key. Sometimes, the receiver is unknown. It cannot be used between companies or individuals who have not had a prior relationship.
Solution
To solve this problem, a method based on two keys is used: one public and one private.