Главная
Study mode:
on
1
Introduction
2
Motivations
3
Privacy
4
Eric Schmidt
5
William Hague
6
False dichotomy
7
American Muslims
8
Surveillance
9
RIPA
10
Rogues Gallery
11
Human Rights
12
The Fourth Amendment
13
Engineering
14
Political Philosophy
15
Programming is Politics
16
PeertoPeer
17
taxonomy diagrams
18
clientserver architecture
19
hierarchy
20
what can we do
21
what were our aims
22
two important questions
23
the point
24
outcomes
25
the test card
26
the problem
27
a distributed hash table
28
the universal tht
29
serendipity
30
the value of the web
31
cuneiform
32
Questions
Description:
Explore a conference talk that delves into the world of peer-to-peer computing and its potential impact on privacy and decentralization. Learn about the motivations behind developing peer-to-peer systems, including concerns about surveillance and the need for stronger cryptography. Discover the fundamental elements and abstractions of peer-to-peer applications, and examine the progress made by a group of Pythonistas in creating a framework for P2P development. Gain insights into remote code execution, distributed hash tables, cryptographic requirements, and firewall navigation techniques. Consider the types of applications that could be built using P2P technology and explore the economic viability of such systems. Engage with discussions on privacy, human rights, and the political implications of programming choices. Understand the challenges and opportunities presented by peer-to-peer architectures compared to traditional client-server models.

The Return of Peer to Peer Computing

EuroPython Conference
Add to list