We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

The Return of "The Return of Peer to Peer Computing".

00:00

Formal Metadata

Title
The Return of "The Return of Peer to Peer Computing".
Title of Series
Part Number
96
Number of Parts
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language
Production PlaceBerlin

Content Metadata

Subject Area
Genre
Abstract
Nicholas Tollervey/Holger Krekel - The Return of "The Return of Peer to Peer Computing". At last year's Europython Holger Krekel gave a keynote called "The Return of Peer to Peer Computing". He described how developers, in light of the Snowden surveillance revelations, ought to learn about and build decentralized peer-to-peer systems with strong cryptography. This talk introduces, describes and demonstrates ideas, concepts and code that a group of Pythonistas have been working on since Holger's keynote. We asked ourselves two questions: what are the fundamental elements / abstractions of a peer-to-peer application and, given a reasonable answer to the first question, what can we build? We will present work done so far, discuss the sorts of application that might be written and explore how peer-to-peer technology could be both attractive and viable from an economic point of view. ----- This talk introduces, describes and demonstrates concepts and code created during sprints and via online collaboration by a distributed group of Pythonistas under the working title p4p2p. We asked ourselves, as frameworks such as Zope/Plone, Django, Pyramid or Flask are to web development what would the equivalent sort of framework look like for peer-to-peer application development? We've tackled several different technical issues: remote execution of code among peers, distributed hash tables as a mechanism for peer discovery and data storage, various cryptographic requirements and the nuts and bolts of punching holes in firewalls. Work is ongoing (we have another sprint at the end of March) and the final content of the talk will depend on progress made. However, we expect to touch upon the following (subject to the caveat above): * What is the problem we're trying to solve? * Why P2P? * The story of how we ended up asking the questions outlined in the abstract. * What we've done to address these questions. * An exploration of the sorts of application that could be built using P2P. * A call for helpers and collaboration.
Keywords
Peer-to-peerClassical physicsPeer-to-peerComputer animationLecture/Conference
Context awarenessPeer-to-peerLevel (video gaming)Peer-to-peerContext awarenessPresentation of a groupMultiplication signQuicksortGroup actionSoftwareMereologyPosition operatorComputer animationLecture/Conference
Information privacySelf-organizationBitDistanceSoftware developerResultantMultiplication signMeeting/Interview
Domain nameInformation privacyFacebookOperator (mathematics)Dependent and independent variablesLine (geometry)Meeting/InterviewLecture/Conference
Information privacyInformation privacyQuicksortSoftware developerAsynchronous Transfer ModeExecution unitDependent and independent variablesState of matterVideo gameParameter (computer programming)Content (media)Type theorySystem callPlanningEquivalence relationDivergenceEvent horizonMeeting/Interview
BitDichotomyParameter (computer programming)QuicksortException handlingHacker (term)Classical physics1 (number)Lecture/Conference
DichotomyFlow separationParameter (computer programming)Computer animationLecture/Conference
FamilyCivil engineeringWebsiteRight angleMetropolitan area networkPhysical law5 (number)TelecommunicationEmailWave packetComputer animation
IRIS-TRule of inferenceMathematicsResultantTwitterTelecommunicationBitPhysical lawInformation securityRule of inferenceMathematicsQuicksortAreaComputer configurationState of matterRippingLecture/ConferenceComputer animation
Multiplication signTelecommunicationPhysical lawLocal ringComputer fileIncidence algebraElectronic mailing listCoefficient of determinationSelf-organizationMessage passingTrailLecture/Conference
Interior (topology)Physical lawInformation privacyFundamental theorem of algebraRight angleCorrespondence (mathematics)VotingDeclarative programmingQuicksortCASE <Informatik>Projective planeRight angleIndependence (probability theory)AuthorizationCausalityInformation privacyTelecommunicationPrisoner's dilemmaView (database)
Sound effectOpen setInformation privacyCausalitySound effectRight angleFunctional (mathematics)Lecture/ConferenceComputer animation
Service (economics)Computer programmingImage resolutionNP-hardMetropolitan area networkCodeServer (computing)Lecture/Conference
Computational physicsEnterprise architectureAuthorizationStandard deviationForm (programming)Data structureComputer programmingSphereRight angleAuthorizationWebsiteStandard deviationData structureComputer architectureProcess (computing)Computer programmingForm (programming)Electronic program guide1 (number)Different (Kate Ryan album)Dependent and independent variablesPhysical systemPower (physics)Test-driven developmentPhysical lawGame controllerSelf-organizationSign (mathematics)Software developerDatabaseSoftware testingServer (computing)Computer animation
Computer programmingPhysical lawMereologySoftwareQuicksortLine (geometry)Rule of inferenceSoftware developerLecture/Conference
Digital signalCryptographyPower (physics)Control flowAddress spacePeer-to-peerHierarchySoftwareComputer networkEquals signClient (computing)Server (computing)Inheritance (object-oriented programming)Web 2.0Power (physics)SoftwarePeer-to-peerHierarchyGame controllerContext awarenessCryptographyDigitizingQuicksortDiagramArithmetic meanWechselseitige InformationEqualiser (mathematics)Point (geometry)Right angleMultiplication signMereologyNetwork topologyClient (computing)Server (computing)Computer animation
HierarchyComputing platformComputer architectureServer (computing)Client (computing)Web 2.0Multiplication signField (computer science)ResultantHierarchyFacebookContent (media)Power (physics)Point (geometry)SurgerySingle-precision floating-point formatPattern languageGroup actionExpert systemOperator (mathematics)Interface (computing)TwitterGame controllerGreen computingAuthenticationLecture/ConferenceComputer animation
RhombusIdeal (ethics)AuthorizationDependent and independent variablesGame controllerComputer architectureElectronic visual displayHierarchyPower (physics)Digital photographyConsistencyEndliche ModelltheorieWeb 2.0Lecture/Conference
Enterprise architectureCryptographyProcess (computing)Control flowDigital signalSystem programmingPoint (geometry)Group actionMereologyTelecommunicationInternetworkingElement (mathematics)Fundamental theorem of algebraPhysical systemHash functionTable (information)Matrix (mathematics)Web 2.0Game controllerServer (computing)FacebookClient (computing)Term (mathematics)Condition numberPhysical systemProcess (computing)IntegerPeer-to-peerEvent horizonSelf-organizationDigitizingAuthorizationVideo gameArithmetic meanSpring (hydrology)Moment <Mathematik>OvalPower (physics)Element (mathematics)Point (geometry)Normal (geometry)Form (programming)Projective planeAreaComputer architectureWordWeb pageSoftware developerTelecommunicationGroup actionMatrix (mathematics)MereologyMultiplication signSound effect1 (number)InternetworkingService (economics)AttractorInformation securityDigital photographyMessage passingCryptographyComputer programmingQuicksortInstance (computer science)Avatar (2009 film)Programmer (hardware)Lecture/ConferenceComputer animation
PrototypeComputing platformCryptographyPrototypeHacker (term)CodeVulnerability (computing)Point (geometry)Goodness of fitProjective planeView (database)Physical systemTable (information)Hash functionCryptographyMessage passingComputing platformLevel (video gaming)System callSoftware testingDrop (liquid)Universe (mathematics)Peer-to-peerLecture/ConferenceComputer animation
Peer-to-peerPhysical systemSoftware developerSuspension (chemistry)CryptographyFundamental theorem of algebraMessage passingRow (database)Group actionMoment (mathematics)Projective planeForcing (mathematics)FrequencyShared memoryInformation securityWeb browserLecture/Conference
Message passingCryptographyQuicksortPoint (geometry)Game controllerEmailCentralizer and normalizerSingle-precision floating-point formatMultiplication signLine (geometry)Message passingCuboidServer (computing)TelecommunicationPhysical systemTable (information)Key (cryptography)Projective planeHash functionComplete metric spaceReal numberComputer animationLecture/Conference
Electric currentProjective planeHash functionCartesian coordinate systemSoftwareMultiplication signSingle-precision floating-point formatSimilarity (geometry)Point (geometry)Element (mathematics)FluidTable (information)Computer programmingScaling (geometry)Ocean currentNumberUniverse (mathematics)AlgorithmGoodness of fitData storage deviceKey (cryptography)Game controllerWeightFreewareSoftware developerWave packetBit
QuicksortHash functionMereologyTable (information)Physical systemCartesian coordinate systemSoftware developerKey (cryptography)NamespaceComputing platformSoftwareLecture/Conference
Pattern languageBridging (networking)BuildingTheoryDifferent (Kate Ryan album)Food energyAuthorizationParameter (computer programming)Position operatorSoftware developerPhysical systemTable (information)TwitterSound effectGoodness of fitIntegrated development environmentMultiplication signWeb 2.0QuicksortAffine spaceTablet computerHypertextRepresentational state transferPerspective (visual)Computer architectureOnline helpBuildingTheoryBridging (networking)DigitizingGreatest elementExistenceSymbol tableBerners-Lee, TimMemory managementPhysical lawSystem administratorInformation privacySheaf (mathematics)WebsiteProcess (computing)CircleGodPeer-to-peerNeuroinformatikSlide ruleInternetworkingCountingHidden Markov modelGroup action
Multiplication signElectronic mailing listType theorySoftwareUniform resource locatorMetreSign (mathematics)Three-valued logicBlackboard systemFile archiverTable (information)Goodness of fitWebsitePower (physics)Lattice (order)Hash functionWordMoment (mathematics)MathematicsParallel portInstance (computer science)BitGreatest elementTouchscreenFreewareWeb pageOffice suiteStandard deviationDegree (graph theory)Spring (hydrology)MassGroup actionService (economics)Coma BerenicesProjective planeTwitterProfil (magazine)InformationContext awarenessPeer-to-peerShared memoryEmailPlanningForm (programming)Information securityAddress spaceMereologyQuicksortSpacetimeInternetworkingClique problemSphereKey (cryptography)Lecture/Conference
MereologyMultiplication signMusical ensembleRule of inferenceLecture/Conference
Transcript: Englisch(auto-generated)