Tuesday, August 31, 2010

About p2p network

Share uses encryption to hide the identity of who is transferring or what they are transferring. It is non-centralized so it cannot be easily shut down and it supports multiple source "swarm" downloading. All files are transferred encrypted so they must be decrypted upon download completion. In the meantime they are stored in encrypted form in a "Cache" folder. This folder is also used to allow your recently downloaded files to be shared among the network based on priorities.When a new version of Share becomes available, users are given a notice in the Share statusbar. When this happens, users can search for the new version on the share network and download it from a reliable source based on Trip. This internal method of distribution makes it hard to find a copy of the software outside of the (presumed safely anonymous) Share network, since offering this software publicly could lead to unwanted attention from law enforcement agencies.

No comments:

Post a Comment