ANts P2P - Security

Security

The data transfers run over indirect connections: Senders and receivers of a file do not hold a direct connection with each other, but the connection cascades over several nodes, so that neither party can trivially determine the other's identity.

The traffic between nodes is encrypted with AES, which prevents sniffing both from outsiders and from transit nodes. The encryption key exchange uses Diffie-Hellman algorithm.

ANts P2P also allows users to offer web servers anonymously; these servers are only reachable from within the ANts P2P network. ANts P2P is however not an outproxy network which lets users reach services on the conventional internet; for this, an outproxy service such as Tor can be used separately.

Read more about this topic:  ANts P2P

Famous quotes containing the word security:

    Our security depends on the Allied Powers winning against aggressors. The Axis Powers intend to destroy democracy, it is anathema to them. We cannot provide that aid if the public are against it; therefore, it is our responsibility to persuade the public that aid to the victims of aggression is aid to American security. I expect the members of my administration to take every opportunity to speak to this issue wherever they are invited to address public forums in the weeks ahead.
    Franklin D. Roosevelt (1882–1945)

    A well-regulated militia being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.
    Second Amendment, U.S. Constitution (1791)

    The three great ends which a statesman ought to propose to himself in the government of a nation, are,—1. Security to possessors; 2. Facility to acquirers; and, 3. Hope to all.
    Samuel Taylor Coleridge (1772–1834)