From greg at electricrain.com Mon Feb 4 09:54:01 2002 From: greg at electricrain.com (Gregory P. Smith) Date: Sat Dec 9 22:11:44 2006 Subject: [p2p-hackers] Fwd: Stanford Networking Seminar, Thu 2/7, Mema Roussopoulos Message-ID: <20020204095353.B21169@zot.electricrain.com> ----- Forwarded message from Emre Kiciman ----- Stanford Networking Seminar When: 12:45PM, Thursday, February 7th, 2002 Where: Room 104, Gates Computer Science Building URL: http://netseminar.stanford.edu/sessions/2002-02-07.html ----------------------------------------------------------------- Title: CUP: Controlled Update Propagation in Peer-to-Peer Networks Abstract: Recently the problem of indexing and locating content in peer-to-peer networks has received much attention. Previous work suggests caching index entries at intermediate nodes that lie on the paths taken by search queries, but until now there has been little focus on how to maintain these intermediate caches. In this talk I propose CUP, a new comprehensive architecture for Controlled Update Propagation in peer-to-peer networks. CUP asynchronously builds caches of index entries while answering search queries. It then propagates updates of index entries to maintain these caches. Under unfavorable conditions, when compared with standard caching based on expiration times, CUP reduces the average miss latency by as much as a factor of three. Under favorable conditions, CUP can reduce the average miss latency by more than a factor of ten. CUP refreshes intermediate caches, reduces query latency, and reduces network load by coalescing bursts of queries for the same item. CUP controls and confines propagation to updates whose cost is likely to be recovered by subsequent queries. CUP gives peer-to-peer nodes the flexibility to use their own incentive-based policies to determine when to receive and when to propagate updates. Finally, the small propagation overhead incurred by CUP is more than compensated for by its savings in cache misses. Bio: Mema Roussopoulos is a PhD student working with Mary Baker at Stanford University. Her interests are in the areas of distributed systems, networking, and mobile computing. Before attending Stanford, she was at the University of Maryland, College Park, where she received a Bachelor's in Computer Science. Notes: Lunch will be available at 12:15. A vegetarian selection will be available. No drinks will be provided. The talk itself will begin at 12:45 +----------------------------------------------------------------------------+ | This message was sent via the Stanford Computer Science Department | | colloquium mailing list. To be added to this list send an arbitrary | | message to colloq-subscribe@cs.stanford.edu. To be removed from this list,| | send a message to colloq-unsubscribe@cs.stanford.edu. For more information,| | send an arbitrary message to colloq-request@cs.stanford.edu. For directions| | to Stanford, check out http://www-forum.stanford.edu | +-------------------------------------------------------------------------xcl+ ----- End forwarded message ----- -- Gregory P. Smith From bram at gawth.com Tue Feb 5 20:35:01 2002 From: bram at gawth.com (Bram Cohen) Date: Sat Dec 9 22:11:44 2006 Subject: [p2p-hackers] CodeCon schedule announced, deadline for preregistration approaching Message-ID: CodeCon's schedule has now been announced, see http://codecon.org/schedule.html Registration is $50 online before Feb. 7th. A $15 late fee will be charged at the door. CodeCon will be held Feb 15-17, Noon-5pm at DNA Lounge in San Francisco. There will be a PGP key signing which requires some advance preparation for participation, see http://codecon.org/program.html#keys Presentations will include - * Peek-A-Booty - a distributed anti-censorship application * Invisible IRC Project - secure, anonymous client/server networks * Idel - lightweight mobile code for p2p cpu sharing * Reptile - a distributed but uniform content exchange mechanism * MNet - a universal shared filestore * Alpine - a social discovery mechanism which can handle high churn rates, malicious peers, and limited bandwidth * Eikon - an image search engine * CryptoMail - encrypted email for all * libfreenet - a case study in horrors incomprehensible to the mind of man, and other secure protocol design mistakes * BitTorrent - hosting large, popular files cheaply -Bram Cohen "Markets can remain irrational longer than you can remain solvent" -- John Maynard Keynes From greg at electricrain.com Sat Feb 16 09:15:01 2002 From: greg at electricrain.com (Gregory P. Smith) Date: Sat Dec 9 22:11:44 2006 Subject: [p2p-hackers] Fwd: Stanford Networking Seminar, Thu 2/21, Petros Maniatis Message-ID: <20020216171413.GC14876@zot.electricrain.com> ----- Forwarded message from Emre Kiciman ----- Date: Fri, 15 Feb 2002 23:49:58 -0800 (PST) From: Emre Kiciman Reply-To: Emre Kiciman To: netseminar@lists.Stanford.EDU, colloq@CS.Stanford.EDU Subject: Stanford Networking Seminar, Thu 2/21, Petros Maniatis Stanford Networking Seminar When: 12:45PM, Thursday, February 21, 2002 Where: Room 104, Gates Computer Science Building URL: http://netseminar.stanford.edu/sessions/2002-02-21.html --------------------------------------------------------------------- Title : Historic Integrity in Peer-to-peer Systems Speaker : Petros Maniatis Stanford University Abstract: Time and history are important concepts within the lifetime of a distributed system. Both have been previously discussed within settings that span only a single administrative domain: machines owned by the same organization, delegates of the same authority, etc. In this talk we address history and time in a more "troubled" setting, such as a peer-to-peer system of mutually distrustful, and occasionally naughty, entities. We describe the concept of timeline entanglement, a technique for building secure histories comprising events in distinct administrative domains. Timeline entanglement can be used to secure peer-to-peer systems against "historic revisionism", an important attack against accountable services. We then present Timeweave, an efficient prototype framework for maintaining historic integrity in a peer-to-peer system. Timeweave has applications ranging from the maintenance of structured overlay networks against malicious tampering to the long-term archival storage of digitally signed documents. Bio: Petros Maniatis is a PhD student in the Computer Science Department at Stanford University, working with Mary Baker. He received Bachelors and Masters degrees in Computer Science from the Department of Informatics in the University of Athens, Greece, and Stanford, respectively. His interests include distributed algorithms, fault tolerance, and security in peer-to-peer systems. Notes: Lunch will be available at 12:15. A vegetarian selection will be available. No drinks will be provided. The talk itself will begin at 12:45 +----------------------------------------------------------------------------+ | This message was sent via the Stanford Computer Science Department | | colloquium mailing list. To be added to this list send an arbitrary | | message to colloq-subscribe@cs.stanford.edu. To be removed from this list,| | send a message to colloq-unsubscribe@cs.stanford.edu. For more information,| | send an arbitrary message to colloq-request@cs.stanford.edu. For directions| | to Stanford, check out http://www-forum.stanford.edu | +-------------------------------------------------------------------------xcl+ ----- End forwarded message ----- -- Gregory P. Smith From gojomo at bitzi.com Mon Feb 18 21:44:01 2002 From: gojomo at bitzi.com (Gordon Mohr) Date: Sat Dec 9 22:11:44 2006 Subject: [p2p-hackers] CodeCon Thanks! References: Message-ID: <007701c1b851$a987de00$1fc77940@golden> Thanks to Bram, and all the volunteers and presenters, for a very good conference! CodeCon fills an important niche, and I'm looking forward to future editions. - Gojomo ____________________ Gordon Mohr, gojomo@ bitzi.com, Bitzi CTO _ http://bitzi.com _ From gwachob at wachob.com Mon Feb 25 09:17:01 2002 From: gwachob at wachob.com (Gabe Wachob) Date: Sat Dec 9 22:11:44 2006 Subject: [p2p-hackers] Chilling Effects Clearinghouse launches (fwd) Message-ID: FYI! -- Gabe Wachob gwachob@wachob.com Personal http://www.wachob.com CTO, WiredObjects http://www.wiredobjects.com ---------- Forwarded message ---------- Date: Mon, 25 Feb 2002 09:25:03 -0500 From: Wendy Seltzer To: fsl-discuss@alt.org Subject: [fsl-discuss] Chilling Effects Clearinghouse launches EFF, Harvard's Berkman Center for Internet & Society, and law school clinics at Stanford, Berkeley, and USF today announced the launch of the Chilling Effects clearinghouse: Chilling Effects will be a collection point for cease and desist notices concerning online activity -- we invite visitors to enter C&Ds they have received or sent. The website will collect the C&Ds in a searchable database and hyperlink them to explanations of the legal issues. As it gathers data, we'll begin to analyze trends in the use and abuse of legal threats. I hope you'll browse the site and add any notices you've received. We cover topics that should be of interest to this list, including copyright and the DMCA, trademark, anonymity, and defamation. EFF press release below. --Wendy Electronic Frontier Foundation Media Release For Immediate Release: Monday, February 25, 2002 EFF and Law School Clinics Launch ChillingEffects.org Project Aims to Educate Internet Users About Online Rights San Francisco - The Electronic Frontier Foundation (EFF) and four major law school legal clinics announced the launch today of a project and website to empower Internet users with detailed information about their legal rights in response to cease-and-desist letters designed to restrict their online activities. The project brings the EFF together with Internet law clinics at Harvard, Stanford, the University of California at Berkeley, and the University of San Francisco, and is expected to grow to include additional law schools. Called Chilling Effects in reference to the way legal threats can freeze out free expression, the project invites Internet users to add their cease-and-desist letters to an online clearinghouse at ChillingEffects.org. Students at the participating law school clinics will review the letters and annotate them with links to explain applicable legal rules. "The Internet makes it easier for individuals to speak to a wide audience, but it also makes it easier for other people and corporations to silence that speech," said Berkman Center Fellow Wendy Seltzer, who conceived the project and programmed the website. "Chilling Effects aims to level the field by helping online speakers to understand their rights in the face of legal threats." The Chilling Effects project works by publishing cease-and-desist letters received by Internet users and providing detailed information about the relevant law. For example, if an Internet user receives a letter demanding that she remove a synopsis of a "Star Trek" episode from her website, members of the Chilling Effects team would post the letter online, embedding it with links to information about basic copyright protections, the rules governing synopses, and the fair use doctrine. "EFF receives hundreds of requests for help and information from recipients of cease-and-desist letters," said EFF Legal Director Cindy Cohn. "This project should help individuals gain access to greatly needed information as well as allow us to track who is sending these letters and research larger trends." The project currently provides basic legal information on issues like fan fiction, copyright and the Digital Millennium Copyright Act, trademark and domain names, anonymous speech, and defamation. New topics will be added as new issues arise. In addition to publishing cease-and-desist letters, the Chilling Effects team will offer periodic "weather reports" assessing the legal climate for Internet activity. The reports will seek to answer such questions as what types of Internet activity are most vulnerable to the chilling effects of legal threats. The Chilling Effects project website: About EFF: The Electronic Frontier Foundation is the leading civil liberties organization working to protect rights in the digital world. Founded in 1990, EFF actively encourages and challenges industry and government to support free expression, privacy, and openness in the information society. EFF is a member-supported organization and maintains one of the most-linked-to websites in the world at http://www.eff.org/ About Berkman Center for Internet & Society: The Berkman Center for Internet & Society is a research program founded to explore cyberspace, share in its study, and help pioneer its development: http://cyber.law.harvard.edu/ About Samuelson Law, Technology and Public Policy Clinic: The Samuelson Law, Technology and Public Policy Clinic at Boalt Hall was the first clinic in the country to provide law students with the opportunity to represent the public interest in cases and matters on the cutting-edge of high technology law. Since January 2001, students participating in the Clinic have worked with leading lawyers in nonprofit organizations, government, private practice, and academia to represent clients on a broad range of legal matters including Internet free speech and online and wireless privacy. http://www.law.berkeley.edu/news/releases/20000424Samuelson.shtml About Stanford Law School's Center for Internet and Society: The Center for Internet and Society (CIS) is a public interest technology law and policy program at Stanford Law School. The CIS brings together scholars, academics, legislators, students, hackers, and scientists to study the interaction of new technologies and the law and to examine how the synergy between the two can either promote or harm public goods like free speech, privacy, public commons, diversity, and scientific inquiry. The CIS strives as well to improve both technology and law, encouraging decision makers to design both as a means to further democratic values. http://cyberlaw.stanford.edu/ About University of San Francisco Internet and Intellectual Property Justice Project: This University of San Francisco School of Law program provides legal services to parties who require help with intellectual property matters. The project is currently available to help parties in domain name disputes under ICANN online dispute resolution proceedings as well as with other trademark and copyright work that the faculty supervisors feel is appropriate. Legal work is performed free of charge by students under the direction of faculty members. http://www.usfca.edu/law/html/iipjp.html Contact: Cindy Cohn Legal Director Electronic Frontier Foundation cindy@eff.org +1 415 436-9333 x108 (office), +1 415 823-2148 (cell) Wendy Seltzer Fellow Berkman Center for Internet & Society at Harvard Law School wendy@seltzer.com +1 212-715-7815 Jennifer Stisa Granick Clinical Director Stanford Law School Center for Internet and Society jennifer@granick.com +1 650 724-0014 Deirdre Mulligan Acting Clinical Professor and Director Samuelson Law, Technology and Public Policy Clinic, Boalt Hall School of Law, University of California at Berkeley dmulligan@law.berkeley.edu +1 510 642-0499 Diane Cabell Director Clinical Program in Cyberlaw Berkman Center for Internet & Society Harvard Law School +1 617 495-7547 dcabell@law.harvard.edu Professor Robert Talbot Professor of Law and Director of Internet and Intellectual Property Justice Project University of San Francisco School of Law +1 415 422-6218 (office), +1 415 717-2826 (cell) talbotr@usfca.edu - end - ============================================================ Wendy Seltzer -- wendy@seltzer.com w: (212) 715-7815 // f: (212) 715-8192 // m: (646) 228-4722 Associate, Kramer Levin Naftalis & Frankel LLP Adjunct Professor, St. John's University School of Law Fellow, Berkman Center for Internet & Society at Harvard Law School http://cyber.law.harvard.edu/seltzer.html _______________________________________________ fsl-discuss mailing list fsl-discuss@lists.alt.org http://lists.alt.org/mailman/listinfo/fsl-discuss From arma at mit.edu Mon Feb 25 15:06:01 2002 From: arma at mit.edu (Roger Dingledine) Date: Sat Dec 9 22:11:44 2006 Subject: [p2p-hackers] Privacy Enhancing Technologies 2002 Message-ID: <20020225180512.R10839@moria.seul.org> Privacy Enhancing Technologies 2002 April 14-15, 2002 San Francisco, CA Call for Participation Registration for Privacy Enhancing Technologies 2002 is now open. Details and online registration can be found at http://www.pet2002.org/ along with the program and hotel information. Privacy and anonymity are increasingly important in the online world. Corporations and governments are starting to realize their power to track users and their behavior, and restrict the ability to publish or retrieve documents. Approaches to protecting individuals, groups, and even companies and governments from such profiling and censorship have included decentralization, encryption, and distributed trust. Building on the success of the first anonymity and unobservability workshop (LNCS 2009, held in Berkeley in July 2000), PET2002 addresses the design and realization of such anonymity and anti-censorship services for the Internet and other communication networks. The program consists of peer reviewed papers, an invited talk, and a panel discussion on policy. The proceedings will be published in the Springer-Verlag Lecture Notes in Computer Science series. Preliminary PET2002 program: David Chaum: Invited Talk "Privacy-enhancing technologies for the Internet, II: Five years later" Ian Goldberg "Detecting Web Bugs With Bugnosis: Privacy Advocacy Through Education" Adil Alsaid, David Martin "Private authentication" Martin Abadi "Towards an Information Theoretic Metric for Anonymity" Andrei Serjantov, George Danezis "Towards Measuring Anonymity" Claudia Diaz, Stefaan Seys, Joris Claessens, Bart Preneel "The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data" G{\"u}nter Karjoth, Matthias Schunter, Michael Waidner "Privacy Enhancing Profile Disclosure" Peter Dornbach, Zoltan Nemeth "Privacy Enhancing Service Architectures" Tero Alamaki, Margareta Bjorksten, Peter Dornbach, Casper Gripenberg, Norbert Gyorbiro, Gabor Marton, Zoltan Nemeth, Timo Skytta, Mikko Tarkiainen Policy Panel, moderated by John Borking "Dummy Traffic Against Long Term Intersection Attacks" Oliver Berthold, Heinrich Langos "Protecting Privacy during On-line Trust Negotiation" Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis "Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer" Alex Iliev, Sean Smith "Preventing Interval-based Inference by Random Data Perturbation" Yingjiu Li, Lingyu Wang, and Sushil Jajodia "Fingerprinting Websites Using Traffic Analysis" Andrew Hintz "A Passive Attack on the Privacy of Web Users Using Standard Log Information" Thomas Demuth "Covert Messaging Through TCP Timestamps" John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts "Almost Optimal Private Information Retrieval" Dmitri Asonov, Johann-Christoph Freytag "Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?" Dogan Kesdogan, Mark Borning, Michael Schmeink (please distribute widely)