Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)


In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website;s source code and multimedia content with new visitors. As a result, a Maelstrom hosted website cannot be taken offline by law enforcement or any other parties. Due to this open distribution model, a number of interesting censorship, security and privacy considerations are raised. This paper explores the application, its protocol, sharing Maelstrom content and its new visitor powered ``web-hosting'' paradigm.


Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp Weinmann. Trawling for tor hidden services: Detection, measurement, deanonymization. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, pages 80–94, 2013.

BitTorrent Inc. Torrent Web Tools. https://github.com/bittorrent/torrent-web-tools, May 2015.

David Y Choi and Arturo Perez. Online piracy, innovation, and legitimate business models. Technovation, 27(4):168–178, 2007.

Eric Klinker. Project Maelstrom: The Internet We Build Next. http://blog.bittorrent.com/2014/12/10/project-maelstrom-the-internet-we-build-next/, December 2014.

Eric Klinker. Project Maelstrom Enters Beta. http://blog.bittorrent.com/2015/04/10/project-maelstrom-enters-beta/, April 2015. Andrew Loewenstern and Arvid Norberg. DHT Protocol.

http://www.bittorrent.org/beps/bep_0005.html, 2008. [Online; accessed July 2015].

Stefanie Roos, Benjamin Schiller, Stefan Hacker, and Thorsten Strufe. Measuring freenet in the wild: Censorship-resilience under observation. In Privacy Enhancing Technologies, pages 263–282. Springer, 2014.

Mark Scanlon, Jason Farina, Nhien-An Le Khac, and M-Tahar Kechadi. Leveraging Decentralisation to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent Sync. Journal of Digital Forensics, Security and Law, pages 85–99, 2014.

Mark Scanlon, Jason Farina, and M-Tahar Kechadi. Network Investigation Methodology for BitTorrent Sync: A Peer-to-Peer Based File Synchronisation Service. Computers & Security, 2015. http://dx.doi.org/10.1016/j.cose.2015.05.003.

Paul A. Watters, Robert Layton, and Richard Dazeley. How much material on BitTorrent is infringing content? A case study. Information Security Technical Report, 16(2):79 – 87, 2011.

Bassam Zantout and Ramzi Haraty. I2p data communication system. In ICN 2011, The Tenth International Conference on Networks, pages 401–409, 2011.

ZeroNet. https://github.com/HelloZeroNet/ZeroNet, May 2015.



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.