SlideShare a Scribd company logo
Protecting Free Expression Online with Freenet I. Clarke, S. G. Miller, T. W. Hong, O. Sandberg, and B. Wiley Presented by Sivadon Chaisiri Related paper:  Freenet: A Distributed Anonymous Information Storage and Retrieval System
O utline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
O verview of  F reenet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
F reenet  A rchitecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
G UID  K eys  1/4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ex. Data Store Ex. Routing Table F001 A50031 F004 F003 F002 FILE E9005C 872350 A5D033 KEY 152.195.200.102 101.72.100.214 64.75.32.88 158.108.216.7 IP ADDR 6D8FB7 329004 A5D030 A50001 KEY
G UID  K eys  2/4 ,[object Object],[object Object],[object Object],[object Object],File SHA CHK
G UID  K eys  3/4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Public key SSK Private key Description SHA SHA concat SHA File Signing Signature
R outing  1/3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
R outing  2/3 ,[object Object],Requestor Holder ,[object Object],A B C F E D 1 2 3 4 11 10 9 5 8 6 7 12 Data request Data reply Request fail
I nserting  F ile s  1/2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
I nserting  F ile s  2/2 ,[object Object],Publisher TTL=3 TTL=2 TTL=1 TTL=0 ,[object Object],insert all clear copy A B C D
A dding  N odes  1/2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
H a  = SHA(R a ) R a  = rnd() R b  = rnd() H b  = SHA(H a  + R b ) R c  = rnd() H c  = SHA(H b  + R c ) C b  = SHA(H b ) C c  = SHA(H c ) H a H b TTL=3 TTL=2 TTL=1 TTL=0 GUID( A ) = SHA(R a  + R b  + R c  + R d ) A dding  N odes  2/2 R d  = rnd() H c H c  , R d H b  , R c  , R d H a , R b , R c  , R d C a  = SHA(H a ) A B C D
M anaging  D ata  S tores ,[object Object],[object Object],[object Object],[object Object],[object Object]
P erformance  A nalysis  1/4 ,[object Object],[object Object],[object Object],[object Object],[object Object]
P erformance  A nalysis   2/4
P erformance  A nalysis  3/4
P erformance  A nalysis   4/4
P erformance  A nalysis
S ummary ,[object Object],[object Object],[object Object]
R eview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
R eference ,[object Object],[object Object],[object Object],[object Object]
Q  &  A

More Related Content

What's hot

Indexing, searching, and aggregation with redi search and .net
Indexing, searching, and aggregation with redi search and .netIndexing, searching, and aggregation with redi search and .net
Indexing, searching, and aggregation with redi search and .net
Stephen Lorello
 
Handling computer files
Handling computer filesHandling computer files
Handling computer files
Samuel Igbanogu
 
Data structure Unit-I Part A
Data structure Unit-I Part AData structure Unit-I Part A
Data structure Unit-I Part A
SSN College of Engineering, Kalavakkam
 
File organization in database
File organization in databaseFile organization in database
File organization in database
Afrasiyab Haider
 
Fundamental File Processing Operations
Fundamental File Processing OperationsFundamental File Processing Operations
Fundamental File Processing OperationsRico
 
Files c3
Files c3Files c3
Files c3
Omar Al-Sabek
 
File organisation
File organisationFile organisation
File organisation
Samuel Igbanogu
 
SD & D Sequential Files
SD & D Sequential FilesSD & D Sequential Files
SD & D Sequential Files
Forrester High School
 
Indexing structure for files
Indexing structure for filesIndexing structure for files
Indexing structure for files
Zainab Almugbel
 
Fundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsFundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of records
Devyani Vaidya
 
File structures
File structuresFile structures
File structures
Shyam Kumar
 
Dynamic multi level indexing Using B-Trees And B+ Trees
Dynamic multi level indexing Using B-Trees And B+ TreesDynamic multi level indexing Using B-Trees And B+ Trees
Dynamic multi level indexing Using B-Trees And B+ Trees
Pooja Dixit
 
Inverted index
Inverted indexInverted index
Inverted index
Krishna Gehlot
 
Files
FilesFiles
Mesics lecture files in 'c'
Mesics lecture   files in 'c'Mesics lecture   files in 'c'
Mesics lecture files in 'c'
eShikshak
 
File organization 1
File organization 1File organization 1
File organization 1
Rupali Rana
 
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...AIMS_Archives
 
File organization
File organizationFile organization
File organization
Gokul017
 

What's hot (20)

Indexing, searching, and aggregation with redi search and .net
Indexing, searching, and aggregation with redi search and .netIndexing, searching, and aggregation with redi search and .net
Indexing, searching, and aggregation with redi search and .net
 
Handling computer files
Handling computer filesHandling computer files
Handling computer files
 
File organization
File organizationFile organization
File organization
 
Data structure Unit-I Part A
Data structure Unit-I Part AData structure Unit-I Part A
Data structure Unit-I Part A
 
Lucece Indexing
Lucece IndexingLucece Indexing
Lucece Indexing
 
File organization in database
File organization in databaseFile organization in database
File organization in database
 
Fundamental File Processing Operations
Fundamental File Processing OperationsFundamental File Processing Operations
Fundamental File Processing Operations
 
Files c3
Files c3Files c3
Files c3
 
File organisation
File organisationFile organisation
File organisation
 
SD & D Sequential Files
SD & D Sequential FilesSD & D Sequential Files
SD & D Sequential Files
 
Indexing structure for files
Indexing structure for filesIndexing structure for files
Indexing structure for files
 
Fundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsFundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of records
 
File structures
File structuresFile structures
File structures
 
Dynamic multi level indexing Using B-Trees And B+ Trees
Dynamic multi level indexing Using B-Trees And B+ TreesDynamic multi level indexing Using B-Trees And B+ Trees
Dynamic multi level indexing Using B-Trees And B+ Trees
 
Inverted index
Inverted indexInverted index
Inverted index
 
Files
FilesFiles
Files
 
Mesics lecture files in 'c'
Mesics lecture   files in 'c'Mesics lecture   files in 'c'
Mesics lecture files in 'c'
 
File organization 1
File organization 1File organization 1
File organization 1
 
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
 
File organization
File organizationFile organization
File organization
 

Viewers also liked

02 Ms Online Identity Session 1
02 Ms Online Identity   Session 102 Ms Online Identity   Session 1
02 Ms Online Identity Session 1
Sivadon Chaisiri
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
Sivadon Chaisiri
 
Intelbloggerday08
Intelbloggerday08Intelbloggerday08
Intelbloggerday08
Sivadon Chaisiri
 
Cost Minimization for Provisioning Virtual Servers in Amazon EC2
Cost Minimization for Provisioning Virtual Servers in Amazon EC2Cost Minimization for Provisioning Virtual Servers in Amazon EC2
Cost Minimization for Provisioning Virtual Servers in Amazon EC2
Sivadon Chaisiri
 
Presentation: Optimal Power Management for Server Farm to Support Green Compu...
Presentation: Optimal Power Management for Server Farm to Support Green Compu...Presentation: Optimal Power Management for Server Farm to Support Green Compu...
Presentation: Optimal Power Management for Server Farm to Support Green Compu...
Sivadon Chaisiri
 
UX勉強会(第十章)
UX勉強会(第十章)UX勉強会(第十章)
UX勉強会(第十章)
Takumi KASHIMA
 
Robust Cloud Resource Provisioning for Cloud Computing Environments
Robust Cloud Resource Provisioning for Cloud Computing EnvironmentsRobust Cloud Resource Provisioning for Cloud Computing Environments
Robust Cloud Resource Provisioning for Cloud Computing EnvironmentsSivadon Chaisiri
 
Research Issues on Resource Discovery & Matching Making
Research Issues on Resource Discovery & Matching MakingResearch Issues on Resource Discovery & Matching Making
Research Issues on Resource Discovery & Matching Making
Sivadon Chaisiri
 
Remote Call
Remote CallRemote Call
Remote Call
Sivadon Chaisiri
 
Optimal Virtual Machine Placement across Multiple Cloud Providers
Optimal Virtual Machine Placement across Multiple Cloud ProvidersOptimal Virtual Machine Placement across Multiple Cloud Providers
Optimal Virtual Machine Placement across Multiple Cloud ProvidersSivadon Chaisiri
 
01 All Up Technical Overview
01 All Up Technical Overview01 All Up Technical Overview
01 All Up Technical Overview
Sivadon Chaisiri
 
Research Issues on Grid Resource Brokers
Research Issues on Grid Resource BrokersResearch Issues on Grid Resource Brokers
Research Issues on Grid Resource Brokers
Sivadon Chaisiri
 
Optimization of Resource Provisioning Cost in Cloud Computing
Optimization of Resource Provisioning Cost in Cloud Computing Optimization of Resource Provisioning Cost in Cloud Computing
Optimization of Resource Provisioning Cost in Cloud Computing
Sivadon Chaisiri
 
Economic Analysis of Resource Market in Cloud Computing Environment
Economic Analysis of Resource Market in Cloud Computing EnvironmentEconomic Analysis of Resource Market in Cloud Computing Environment
Economic Analysis of Resource Market in Cloud Computing EnvironmentSivadon Chaisiri
 
Benson Pecha Kucha
Benson Pecha KuchaBenson Pecha Kucha
Benson Pecha Kucha
mbenson75
 
UX勉強会(第十五章)
UX勉強会(第十五章)UX勉強会(第十五章)
UX勉強会(第十五章)
Takumi KASHIMA
 
動画のあれこれ
動画のあれこれ動画のあれこれ
動画のあれこれ
Takumi KASHIMA
 
UX勉強会(第四章)
UX勉強会(第四章) UX勉強会(第四章)
UX勉強会(第四章)
Takumi KASHIMA
 
UX勉強会(第五章)
UX勉強会(第五章)UX勉強会(第五章)
UX勉強会(第五章)
Takumi KASHIMA
 

Viewers also liked (19)

02 Ms Online Identity Session 1
02 Ms Online Identity   Session 102 Ms Online Identity   Session 1
02 Ms Online Identity Session 1
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
 
Intelbloggerday08
Intelbloggerday08Intelbloggerday08
Intelbloggerday08
 
Cost Minimization for Provisioning Virtual Servers in Amazon EC2
Cost Minimization for Provisioning Virtual Servers in Amazon EC2Cost Minimization for Provisioning Virtual Servers in Amazon EC2
Cost Minimization for Provisioning Virtual Servers in Amazon EC2
 
Presentation: Optimal Power Management for Server Farm to Support Green Compu...
Presentation: Optimal Power Management for Server Farm to Support Green Compu...Presentation: Optimal Power Management for Server Farm to Support Green Compu...
Presentation: Optimal Power Management for Server Farm to Support Green Compu...
 
UX勉強会(第十章)
UX勉強会(第十章)UX勉強会(第十章)
UX勉強会(第十章)
 
Robust Cloud Resource Provisioning for Cloud Computing Environments
Robust Cloud Resource Provisioning for Cloud Computing EnvironmentsRobust Cloud Resource Provisioning for Cloud Computing Environments
Robust Cloud Resource Provisioning for Cloud Computing Environments
 
Research Issues on Resource Discovery & Matching Making
Research Issues on Resource Discovery & Matching MakingResearch Issues on Resource Discovery & Matching Making
Research Issues on Resource Discovery & Matching Making
 
Remote Call
Remote CallRemote Call
Remote Call
 
Optimal Virtual Machine Placement across Multiple Cloud Providers
Optimal Virtual Machine Placement across Multiple Cloud ProvidersOptimal Virtual Machine Placement across Multiple Cloud Providers
Optimal Virtual Machine Placement across Multiple Cloud Providers
 
01 All Up Technical Overview
01 All Up Technical Overview01 All Up Technical Overview
01 All Up Technical Overview
 
Research Issues on Grid Resource Brokers
Research Issues on Grid Resource BrokersResearch Issues on Grid Resource Brokers
Research Issues on Grid Resource Brokers
 
Optimization of Resource Provisioning Cost in Cloud Computing
Optimization of Resource Provisioning Cost in Cloud Computing Optimization of Resource Provisioning Cost in Cloud Computing
Optimization of Resource Provisioning Cost in Cloud Computing
 
Economic Analysis of Resource Market in Cloud Computing Environment
Economic Analysis of Resource Market in Cloud Computing EnvironmentEconomic Analysis of Resource Market in Cloud Computing Environment
Economic Analysis of Resource Market in Cloud Computing Environment
 
Benson Pecha Kucha
Benson Pecha KuchaBenson Pecha Kucha
Benson Pecha Kucha
 
UX勉強会(第十五章)
UX勉強会(第十五章)UX勉強会(第十五章)
UX勉強会(第十五章)
 
動画のあれこれ
動画のあれこれ動画のあれこれ
動画のあれこれ
 
UX勉強会(第四章)
UX勉強会(第四章) UX勉強会(第四章)
UX勉強会(第四章)
 
UX勉強会(第五章)
UX勉強会(第五章)UX勉強会(第五章)
UX勉強会(第五章)
 

Similar to Present Paper: Protecting Free Expression Online on Freenet

Ods chapter7
Ods chapter7Ods chapter7
Ods chapter7
JeroenDhondt
 
Introduction P2p
Introduction P2pIntroduction P2p
Introduction P2p
Davide Carboni
 
File System Interface
File System InterfaceFile System Interface
File System Interface
chandinisanz
 
OSI.pptx
OSI.pptxOSI.pptx
OSI.pptx
Creative67
 
Task 803   - 1 page Instructions Distinguish between full con.docx
Task 803   - 1 page Instructions Distinguish between full con.docxTask 803   - 1 page Instructions Distinguish between full con.docx
Task 803   - 1 page Instructions Distinguish between full con.docx
rudybinks
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and Streaming
Dilum Bandara
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
 
Filehandlinging cp2
Filehandlinging cp2Filehandlinging cp2
Filehandlinging cp2
Tanmay Baranwal
 
Chapter8 27 nov_2010
Chapter8 27 nov_2010Chapter8 27 nov_2010
Chapter8 27 nov_2010Umang Gupta
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocol
INSIGHT FORENSIC
 
OSI (Open System Interconnection) Model
OSI (Open System Interconnection) Model OSI (Open System Interconnection) Model
OSI (Open System Interconnection) Model
rachanabuch
 
DCN-chapter1.pdf
DCN-chapter1.pdfDCN-chapter1.pdf
DCN-chapter1.pdf
MakuBandar
 
19 structured files
19 structured files19 structured files
19 structured files
ashish61_scs
 
Audio MD Metadata Scheme
Audio MD Metadata SchemeAudio MD Metadata Scheme
Audio MD Metadata Scheme
Ariel Hess
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
GTKlondike
 
Top schools in delhi ncr
Top schools in delhi ncrTop schools in delhi ncr
Top schools in delhi ncr
Edhole.com
 
Top schools in ghaziabad
Top schools in ghaziabadTop schools in ghaziabad
Top schools in ghaziabadEdhole.com
 

Similar to Present Paper: Protecting Free Expression Online on Freenet (20)

Ods chapter7
Ods chapter7Ods chapter7
Ods chapter7
 
Introduction P2p
Introduction P2pIntroduction P2p
Introduction P2p
 
File System Interface
File System InterfaceFile System Interface
File System Interface
 
OSI.pptx
OSI.pptxOSI.pptx
OSI.pptx
 
Task 803   - 1 page Instructions Distinguish between full con.docx
Task 803   - 1 page Instructions Distinguish between full con.docxTask 803   - 1 page Instructions Distinguish between full con.docx
Task 803   - 1 page Instructions Distinguish between full con.docx
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and Streaming
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Filehandlinging cp2
Filehandlinging cp2Filehandlinging cp2
Filehandlinging cp2
 
Hadoop
HadoopHadoop
Hadoop
 
Chapter8 27 nov_2010
Chapter8 27 nov_2010Chapter8 27 nov_2010
Chapter8 27 nov_2010
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocol
 
OSI (Open System Interconnection) Model
OSI (Open System Interconnection) Model OSI (Open System Interconnection) Model
OSI (Open System Interconnection) Model
 
DCN-chapter1.pdf
DCN-chapter1.pdfDCN-chapter1.pdf
DCN-chapter1.pdf
 
19 structured files
19 structured files19 structured files
19 structured files
 
ppt
pptppt
ppt
 
Audio MD Metadata Scheme
Audio MD Metadata SchemeAudio MD Metadata Scheme
Audio MD Metadata Scheme
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
Top schools in delhi ncr
Top schools in delhi ncrTop schools in delhi ncr
Top schools in delhi ncr
 
Top schools in ghaziabad
Top schools in ghaziabadTop schools in ghaziabad
Top schools in ghaziabad
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Present Paper: Protecting Free Expression Online on Freenet

  • 1. Protecting Free Expression Online with Freenet I. Clarke, S. G. Miller, T. W. Hong, O. Sandberg, and B. Wiley Presented by Sivadon Chaisiri Related paper: Freenet: A Distributed Anonymous Information Storage and Retrieval System
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. H a = SHA(R a ) R a = rnd() R b = rnd() H b = SHA(H a + R b ) R c = rnd() H c = SHA(H b + R c ) C b = SHA(H b ) C c = SHA(H c ) H a H b TTL=3 TTL=2 TTL=1 TTL=0 GUID( A ) = SHA(R a + R b + R c + R d ) A dding N odes 2/2 R d = rnd() H c H c , R d H b , R c , R d H a , R b , R c , R d C a = SHA(H a ) A B C D
  • 15.
  • 16.
  • 17. P erformance A nalysis 2/4
  • 18. P erformance A nalysis 3/4
  • 19. P erformance A nalysis 4/4
  • 20. P erformance A nalysis
  • 21.
  • 22.
  • 23.
  • 24. Q & A