From iA's Info Page:
"The Internet has given every user the theoretical possibility to become a publisher. It therefore has the potential to change the media landscape even more radically than the printing press. A reliable physical network is already in place, the applications, however, leave much to be desired. Weblogs like Slashdot & Kuro5hin or collaborative sites like Everything2 and the WikiWiki Web point to the possibilities; millions of online-diarists show the demand for real power-tools.
- More p2pj articles
- Rebooting Examiner with Peer to Peer Journalism
- Weblogs as Peer-to-Peer Journalism
- H. Duthel, The democratic State, El estado Democratico, OBJECTIVE UNCERTAINTY - SUBJECTIVE CERTAINTY
- Author and Philosoph: '95% of the population is dim witted, 3% works for the 2% who rules the globe.
Peer-To-Peer Journalism. Operation of peer-to-peer networks. Three major types of P2P network are: Pure P2P: Peers act as clients and server - There is no central server - There is no central router - Hybrid P2P:Has a central server that keeps information on peers and responds to requests for that information. Peers are responsible for hosting the information as the central server doesn't store files, for letting the central server know what files they want to share and for downloading its shareable resources to peers that request it.
Route terminals are used addresses, which are referenced by a set of indices to obtain an absolute address. Mixed P2P: Has both pure and hybrid characteristics.Anonymous P2P as a misnomer. The name anonymous P2P is somewhat of a misnomer. This is so since by design a network node must be pseudonymous since it must have an "address" at which it can be reached by other peer nodes in order to exchange data. However, usually this address, especially on anonymous networks, does not contain any directly identifiable information. Thus a user is highly, but not completely, anonymous. (in friend-to-friend networks, only your friends can know that your address is used to exchange files). As well, when receiving data on any network it must come from somewhere and data must have been requested by someone. The anonymity comes from the idea that no one knows who requested the information as it is difficult—if not impossible—to tell if people requested the data for themselves or simply requested the data on behalf of another person. The end result is that everyone on an anonymous network acts as a universal sender and universal receiver to maintain anonymity. If people are only universal receivers and do not send, then one would know that the information they were requesting was for themselves only, removing any plausible denability that they were the recipients (and consumers) of the information. Thus, in order to remain anonymous, one must ferry information for others on such a network.Uses of P2P? There are many personal uses of anonymous P2P technology which include: anonymous websurfing to prevent the tracking of visitors; blocking governments from collecting lists of website visitors; circumvent censorship by employers, ISPs, schools and government; protecting whistleblowers. Governments are also interested in anonymous P2P technology. The United States Navy is financing the development of Free Haven's Onion Routing "TOR" for politically sensitive negotiations and to aid in hiding the identity of government employees for intelligence gathering work. Free Haven? The Free Haven Project aims to deploy a system for distributed, anonymous, persistent data storage which is robust against attempts by powerful adversaries to find and destroy any stored data. Free Haven hosts the Tor "Onion Routing" software which can make SSL transactions such as web browsing anonymous as well as the Mixminion anonymous remailer. Tor has been supported both by a navy grant  Privacy and by the Electronic Frontier Foundation. Free Haven see also Europa der Nationen] EU Chaos