Join us on IRC: #infoanarchy on irc.oftc.net — channel blog

Bring back infoAnarchy, the first site to report on the coming age of abundance. Revive infoanarchy.org blog & wiki - donate BTC to 1J66guL99svkrDzEerVhammM938niMUC5G

Encrypting Your File Sharing

From iA wiki

See also: Security | Cryptography | File sharing | HOWTOs | Encrypting Your ...

Software or methods for more-secure/anonymous file sharing. If exchanging files with known parties over an ordinary file sharing network, see Encrypting Your Files.

Note: No action other than abstaining from any sort of file sharing is a true defence. Programs that promote anonymity may not be 100% effective and programs with encryption are often not carefully audited and may be insecure. In avoiding audits by the RIAA, anonymity is more important than encryption.

P2P-enabled software

Similar but not quite:

  • Konspire - development was moved from an anonymity/security-aim towards a subject-based download system

Adding encryption layers to P2P

  • Encrypting Your Files - exchange encrypted files. This can be useless if your recipient doesn't know the password or cannot determine it.
  • Encrypting Your Network Links - exchange files over an encrypted network. This may not work for hive-type downloads, since it is unlikely all clients would use the same type of network-layer encryption.

Related