LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

22
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09

Transcript of LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

Page 1: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

LIS508 almost last lecture: Privacy and Ethics

Thomas Krichel

2003-12-09

Page 2: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

The unethical network

• There are a lot of ethical issues arising in computer networks!

• Here we list a few.

Page 3: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

Offensive Speech

• WWW and other network installations are full of speech that offends some– views on religion and politics– sexually explicit material– spam

• Are Internet Service Providers (ISPs) reliable for contents?

• Are they allowed to restrict contents?

Page 4: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

Government snooping

• FBI has installed a system at many ISPs to snoop email for any interesting contents.

• Originally called carnivore, now DCS1000.• But fourth amendment prohibit searches without

a search warrant.

• At the world summit for the information society, developing countries have pushed for UN control of the Internet.

Page 5: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

Private snooping

• Web providers have cookies installed to recognize users of the some machine.

• If this is a home machine, behavior of a user may be quite traceable.

• But, of course, it can be used to provide convenient features that overcome the stateless nature of http.

Page 6: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

Illegal copying

• Some copyright holders view the Internet as a giant copying machine.

• They may be right when it comes to file sharing.

• File sharing operates on peer-to-peer networks exchanging information.

Page 7: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

Peer-to-Peer (P2P)

• Most Internet services are based on a client/server architecture.

• In a P2P architecture, users run clients that also run as servers, called "servents".

• But we can stick to client/server way of terminology– You act as a client when I want something– You act as a server when you give something

Page 8: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

Napster

• Napster is sometimes referred to as a p2p network. This is not quite true.

• Napster ran a central server. You connected to that server and announced what files you had to share.

• Every search was conducted on the dataset assembled at the central server.

• Connections to download files where done between peer machines only!

Page 9: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

end of Napster

• Napster argued since it was only involved in collecting the information about files available, it was legal.

• Napster never shared any illegal file.• The courts thought otherwise. • It was shut down. • Napster network died without a central machine.• To enable true piracy, we need a truly distributed

system.

Page 10: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

gnutella protocol

• This protocol underlies much of the current file-sharing activity on the Internet.

• It is based on TCP/IP and http!• A file sharing network (fsn) is a bunch of

machines that exchange files using gnutella.

• To connect to a gnutella network, you need the IP address of one single machine that is already part of the network.

Page 11: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

connection to a fns

• Once you establish connection to the first servent, you announce your presence.

• The first servent will pass on that message to all the servents that it is connected to, and so on.

• These servents all reply with data about themselves– how many files it is sharing– how many kilo bytes the files take up

• This already adds up to a lot of traffic!

Page 12: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

time to live• Every gnutella message has a time to live

(ttl). It is decremented every time it passes at a servent.

• The TTL is usually quite small. It can be arbitrarily reduced by servents.

• The number of servents that the packet has already been rooted to is also noted.

Page 13: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

detail on the message

• MessageID 16 bytes ID • FunctionID 1 byte function of packet

– search– connection announcement (initialization), etc.

• RemainingTTL 1 byte TTL left to this packet• HopsTaken 1 byte number of servents this

packet has already been routed through• DataLength 4 bytes size of the remaining

data in the packet

• (no need to remember for quiz)

Page 14: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

example scenario

• Alice starts a servent. Knows Charlie's IP and send him an init packet.

• Charlie gets it and routes it to Bob and Eve. They pass it on further and so on, until TTL is reached.

• Charlie sends his file data to Alice.• Charlie gets responses from Bob and Eve,

sends it to Alice…• Everyone only knows about the servents that

they are connected to.

Page 15: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

searches• When you do a search, it is passed on

from servent to servent through the fsn.• Servents have their own rule how to

repond to queries. – If you search for '.mp3'

• a servent may only look for a file '.mp3'• a servent may look for all files ending with .mp3

– Servents may respond with a truncated results set.

• Searches are public, most fsn software has a search monitor.

Page 16: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

downloading

• to establish downloads the servents use http.

• this is a well-established protocol with a good code base.

• Thus everyone who is connected to a file sharing network run a web server!

Page 17: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

ease to infringe

• Clearly all the traffic on a fsn, with current technology, can be observed.

• But the infringement is so massive that it appears difficult to clamp down on.

• The easy to infringe is technological.

• RIAA have sued. They reach the tippy top of the iceberg, with the hope to dissuade.

Page 18: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

copyright holders are scared

• ISPs can keep track who has what IP at a given moment.

• Some block the ports that are used for file sharing.

• Copyright holders have demanded these lists.

• This is a violation of customer privacy.

Page 19: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

Freenet

• This is as different file sharing system that is still under development. It aims:– To allow people to distribute material

anonymously.– To allow people to retrieve material

anonymously.– To make the removal of material almost

insuperably difficult.– To operate without central control.

• Ethics are more political.

Page 20: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

operation of freenet• Searches are only passed to one other

servent, which pass it on. After no positive response from that chain, another servent is tried.

• But the entire document sought is passed along, unless it is too large

• Servents keep caches of popular documents until no one asks for it for a long time.

• popular documents frequent and close to users.

Page 21: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

searching on freenet

• You basically can not search on freenet.

• Each document has an identifier. The identifier and the document can not be changed.

• This will make it difficult to use it on its own as a device for people to exchange copyrighted material.

Page 22: LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

http://openlib.org/home/krichel

Thank you for your attention!