Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website;s source code and multimedia content with new visitors. As a result, a Maelstrom hosted website cannot be taken offline by law enforcement or any other parties. Due to this open distribution model, a number of interesting censorship, security and privacy considerations are raised. This paper explores the application, its protocol, sharing Maelstrom content and its new visitor powered ``web-hosting'' paradigm.
References
Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp Weinmann. Trawling for tor hidden services: Detection, measurement, deanonymization. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, pages 80–94, 2013.
BitTorrent Inc. Torrent Web Tools. https://github.com/bittorrent/torrent-web-tools, May 2015.
David Y Choi and Arturo Perez. Online piracy, innovation, and legitimate business models. Technovation, 27(4):168–178, 2007.
Eric Klinker. Project Maelstrom: The Internet We Build Next. http://blog.bittorrent.com/2014/12/10/project-maelstrom-the-internet-we-build-next/, December 2014.
Eric Klinker. Project Maelstrom Enters Beta. http://blog.bittorrent.com/2015/04/10/project-maelstrom-enters-beta/, April 2015. Andrew Loewenstern and Arvid Norberg. DHT Protocol.
http://www.bittorrent.org/beps/bep_0005.html, 2008. [Online; accessed July 2015].
Stefanie Roos, Benjamin Schiller, Stefan Hacker, and Thorsten Strufe. Measuring freenet in the wild: Censorship-resilience under observation. In Privacy Enhancing Technologies, pages 263–282. Springer, 2014.
Mark Scanlon, Jason Farina, Nhien-An Le Khac, and M-Tahar Kechadi. Leveraging Decentralisation to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent Sync. Journal of Digital Forensics, Security and Law, pages 85–99, 2014.
Mark Scanlon, Jason Farina, and M-Tahar Kechadi. Network Investigation Methodology for BitTorrent Sync: A Peer-to-Peer Based File Synchronisation Service. Computers & Security, 2015. http://dx.doi.org/10.1016/j.cose.2015.05.003.
Paul A. Watters, Robert Layton, and Richard Dazeley. How much material on BitTorrent is infringing content? A case study. Information Security Technical Report, 16(2):79 – 87, 2011.
Bassam Zantout and Ramzi Haraty. I2p data communication system. In ICN 2011, The Tenth International Conference on Networks, pages 401–409, 2011.
ZeroNet. https://github.com/HelloZeroNet/ZeroNet, May 2015.
Recommended Citation
Farina, Jason; Kechadi, M-Tahar; and Scanlon, Mark
(2015)
"Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser,"
Journal of Digital Forensics, Security and Law: Vol. 10
, Article 10.
DOI: https://doi.org/10.15394/jdfsl.2015.1216
Available at:
https://commons.erau.edu/jdfsl/vol10/iss4/10
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons