View Single Post
Old 2003-12-03, 19:27   Link #43
zalas
tsubasa o sagashite
 
Join Date: Jul 2003
Send a message via ICQ to zalas
Quote:
Originally Posted by PocariSweat
Someone said in another thread it was based on freenet. Somehow I don't think that's the case because with freenet no one person really shares a file - instead it's encrypted and uploaded in random bits to the network as a whole. A given user may be sharing bits and peices of thousands of files, but even they can't tell or choose exactly what.
Winny does support the bits and pieces thing when possible. However, once you fully download a file, or if you share a directory, Winny will share the entire file until you delete it from the cache or unshare it. Hence, once you finish downloading a file, you'll continue sharing it. The cache IS encrypted, but if you have the right search keywords, you can unencrypt it. For example, suppose "Linux Appz.tgz" was one of the files you have cached. You may even know which file it is, but you'll be unable to open/decrypt/find the file unless you search through your cache using Winny and type in "Linux" or "Appz" or something like that. Furthermore, I'm not quite sure if Winny does en-route caching like Freenet. For example, if packets pass through you, I'm not sure if you retain those packets, but it's possible (at times I've had uploads of up to 5k/s when I hadn't downloaded anything).
To find an infringer, you would probably have to be directly connected to him/her instead of through a transport proxy node. However, if you infiltrate enough nodes in the network, you increase the chances of a direct connect. If you compromise a routing node, you can probably create a giant log to comb through of all the connections, and then find IPs of your colleagues who are putting in searches to find sharers. Lastly, you can also see what people are searching for in the nodes you're connected to directly in Winny, it's in the first panel.
zalas is offline   Reply With Quote