Phex

Last updated
Phex
Developer(s) Phex Development Team
Initial releaseApril, 2001
Stable release 3.4.2.116 (February 1, 2009;15 years ago (2009-02-01)) [±]
Repository
Written in Java
Platform Java SE
Available inEnglish, Dutch, German, French, Turkish, Spanish and Portuguese. [1]
Type Peer-to-peer file sharing
License GNU General Public License
Website phex.org

Phex is a peer-to-peer file sharing client for the gnutella network, released under the terms of the GNU General Public License, so Phex is free software. Phex is based on Java SE 5.0 or later.

Contents

Features

Phex supports most of the recent features of the gnutella network. [2] [3] Additionally it enables the creation of private networks over the internet, [4] has a powerful search result filter, [5] shows client country flags, and can export the list of shared files into multiple formats, some of which can also be read out and downloaded directly by another Phex.

Version 3.2.0.102 also supports Tiger Tree hashes for uploads and downloads, providing full protection against poisoned downloads. Together with Swarming, segmented file transfer, [6] and the Download Mesh [7] this makes downloads as efficient and safe as BitTorrent downloads, yet completely decentralized by design.

History

FURI was an early gnutella client written by William W. Wong and released under the GNU General Public License. The software was notable at the time of its release for being written entirely in Java. The software was capable of running on Java 1.1 as long as the user downloaded external Swing libraries. If these libraries were unavailable, Java 1.2 was required.

Officially, the program never left Beta status. The author eventually stopped maintaining the software, resulting in users migrating to other clients like LimeWire. The last update to the software was on May 1, 2000. [8]

In April 2001 Konrad Haenel forked the rarely updated gnutella client FURI to form Phex. While he participated in the Phex project initially, he left in late 2001. The project member Gregor K. continued to develop Phex and is the lead developer today.

Early versions of Phex were released simply as a java jar file, limiting their ease of use on some platforms such as the Mac OS. MacPhex was an alternative version made available on the Phex website and supported by macXster. It wrapped Phex in a double click-able application and occasionally added small additional features unique to the Mac OS.

Anonymous Phex

Since 2006, an anonymous version of Phex has been available: I2Phex, which uses the I2p network to hide the IP address of the users of this gnutella client. The future roadmap is to integrate the I2Phex code into one of the next Phex versions. [9]

Rather than use the public IP network, I2Phex uses encrypted tunnels through the I2p privacy/encryption network.

Traffic is mixed with other network traffic (see mix network) through a garlic routing system, making it difficult for outside observers to identify originators or the recipients of a file through traffic analysis.

Anonymous networks have been remiss to host file sharing protocols due to bandwidth considerations. Often only searching (or tracking for BitTorrent) are supported. [10] Nodes within the garlic routing system could refuse to route file sharing traffic. This makes inbound and outbound connections easier to locate. Outbound traffic is unencrypted so associating it with the inbound node will break the anonymity.

LimeWire, FrostWire, gtk-gnutella, and Phex all support the use of TLS to encrypt traffic between nodes. TLS is not anonymous like I2P, however, it does prevent ISPs from filtering gnutella content and makes it more difficult to trace traffic.

Phex with Tor

It is possible to use Phex with SOCKS5 proxy. Using that feature it is possible to route gnutella traffic via Tor and then to Phex. This is possible by using SOCKS5 cascading proxy to Tor client.

Academic studies

Various academic studies are based on Phex:

See also

Related Research Articles

<span class="mw-page-title-main">Hyphanet</span> Peer-to-peer Internet platform for censorship-resistant communication

Hyphanet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools were originally designed by Ian Clarke, who defined Freenet's goal as providing freedom of speech on the Internet with strong anonymity protection.

Gnutella is a peer-to-peer network protocol. Founded in 2000, it was the first decentralized peer-to-peer network of its kind, leading to other, later networks adopting the model.

<span class="mw-page-title-main">LimeWire</span> Peer-to-peer file sharing application

LimeWire was a free peer-to-peer file sharing client for Windows, macOS, Linux and Solaris. Created by Mark Gorton in 2000, it was most prominently a tool used for the download and distribution of pirated materials, particularly pirated music. In 2007, LimeWire was estimated to be installed on over one-third of all computers globally.

<span class="mw-page-title-main">Peer-to-peer</span> Type of decentralized and distributed network architecture

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network, forming a peer-to-peer network of nodes.

<span class="mw-page-title-main">Shareaza</span> Peer-to-peer file sharing application

Shareaza is a peer-to-peer file sharing client running under Microsoft Windows which supports the Gnutella, Gnutella2 (G2), eDonkey, BitTorrent, FTP, HTTP and HTTPS network protocols and handles magnet links, ed2k links, and the now deprecated gnutella and Piolet links. It is available in 30 languages.

<span class="mw-page-title-main">Proxy server</span> Computer server that makes and receives requests on behalf of a user

In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. It improves privacy, security, and performance in the process.

BitTorrent, also referred to as simply torrent, is a communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a decentralized manner. The protocol is developed and maintained by Rainberry, Inc., and was first released in 2001.

WASTE is a peer-to-peer and friend-to-friend protocol and software application developed by Justin Frankel at Nullsoft in 2003 that features instant messaging, chat rooms, and file browsing/sharing capabilities. The name WASTE is a reference to Thomas Pynchon's novel The Crying of Lot 49. In the novel, W.A.S.T.E. is an underground postal service.

gtk-gnutella

gtk-gnutella is a peer-to-peer file sharing application which runs on the gnutella network. gtk-gnutella uses the GTK+ toolkit for its graphical user interface. Released under the GNU General Public License, gtk-gnutella is free software.

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

Kademlia is a distributed hash table for decentralized peer-to-peer computer networks designed by Petar Maymounkov and David Mazières in 2002. It specifies the structure of the network and the exchange of information through node lookups. Kademlia nodes communicate among themselves using UDP. A virtual or overlay network is formed by the participant nodes. Each node is identified by a number or node ID. The node ID serves not only as identification, but the Kademlia algorithm uses the node ID to locate values.

The Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic, and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world. Given the high number of possible paths the traffic can transit, a third party watching a full connection is unlikely. The software that implements this layer is called an "I2P router", and a computer running I2P is called an "I2P node". I2P is free and open sourced, and is published under multiple licenses.

The eDonkey Network is a decentralized, mostly server-based, peer-to-peer file sharing network created in 2000 by US developers Jed McCaleb and Sam Yagan that is best suited to share big files among users, and to provide long term availability of files. Like most sharing networks, it is decentralized, as there is no central hub for the network; also, files are not stored on a central server but are exchanged directly between users based on the peer-to-peer principle.

<span class="mw-page-title-main">FrostWire</span> Free and open-source BitTorrent client

FrostWire is a free and open-source BitTorrent client first released in September 2004, as a fork of LimeWire. It was initially very similar to LimeWire in appearance and functionality, but over time developers added more features, including support for the BitTorrent protocol. In version 5, support for the Gnutella network was dropped entirely, and FrostWire became a BitTorrent-only client.

<span class="mw-page-title-main">Tribler</span> Peer-to-peer filesharing software and protocol

Tribler is an open source decentralized BitTorrent client which allows anonymous peer-to-peer by default. Tribler is based on the BitTorrent protocol and uses an overlay network for content searching. Due to this overlay network, Tribler does not require an external website or indexing service to discover content. The user interface of Tribler is very basic and focused on ease of use instead of diversity of features. Tribler is available for Linux, Windows, and OS X.

<span class="mw-page-title-main">Vuze</span> BitTorrent client

Vuze is a BitTorrent client used to transfer files via the BitTorrent protocol. Vuze is written in Java, and uses the Azureus Engine. In addition to downloading data linked to .torrent files, Azureus allows users to view, publish and share original DVD and HD quality video content. Content is presented through channels and categories containing TV shows, music videos, movies, video games, series and others.

Peer-to-peer file sharing (P2P) systems like Gnutella, KaZaA, and eDonkey/eMule, have become extremely popular in recent years, with the estimated user population in the millions. An academic research paper analyzed Gnutella and eMule protocols and found weaknesses in the protocol; many of the issues found in these networks are fundamental and probably common on other P2P networks. Users of file sharing networks, such as eMule and Gnutella, are subject to monitoring of their activity. Clients may be tracked by IP address, DNS name, software version they use, files they share, queries they initiate, and queries they answer to. Clients may also share their private files to the network without notice due to inappropriate settings.

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information such as IP addresses. Anonymous proxy is the opposite of transparent proxy, which sends user information in the connection request header. Commercial anonymous proxies are usually sold as VPN services.

Bitblinder was an open source software program that allows users to share bandwidth and IP addresses in order to anonymously download torrents and browse the internet. It was first released in June 2009, under an MIT open-source license. It was developed by Josh Albrecht and Matthew Kaniaris of Innominet. The software is based on the principles that Tor uses to create anonymity but was designed to be faster and encourage file sharing in addition to anonymous browsing. It currently comes bundled with an anonymous browser based on Mozilla Firefox and an anonymous BitTorrent client based on BitTornado. The software was planned to provide anonymity for instant messaging and Internet Relay Chat.

<span class="mw-page-title-main">StealthNet</span> Anonymous darknet file sharing software

StealthNet is an anonymous P2P file sharing software based on the original RShare client, and has been enhanced. It was first named 'RShare CE'. It use the same network and protocols as RShare.

References

  1. "Translate and Localize Phex".
  2. "Phex Feature comparison".
  3. "The Gnutella network explained".
  4. "Private Networks with Phex".
  5. "Search Result Filter System".
  6. "Swarming and Partial File Sharing explained".
  7. "The Download Mesh explained".
  8. "GnutellaDev: Source: Furi". Archived from the original on 2007-10-07. Retrieved 2007-08-31.
  9. I2Phex Roadmap
  10. "Tor and BitTorrent". Archived from the original on 2007-09-28. Retrieved 2007-08-31.