Skip Nav | Home | Mobile | Editorial Guidelines | Mission Statement | About Us | Contact | Help | Security | Support Us

World

From Palestine, the Next Revolution in File Sharing

Ras Kabir | 18.09.2003 18:51 | Social Struggles | Technology | World

From the legacy of Napster comes ES5 - the product of an international team dedicated to the success of Peer-to-Peer file sharing. Built with a high attention to privacy and stealth, the group cleverly positioned themselves in a place of few intellectual property laws - Palestine.




"Most proponents view Intellectual Property (IP) as a matter of utility. Without such laws, the argument goes, we would be deprived of clever inventions and beautiful works of art ... we say that if you purchase the book or buy the CD, you are its rightful sole owner. Proponents of IP, however, say that some distant author or musician may partially colonize your book and CD and tell you how to use them [ex. prevent you from reselling their creations].
-- Ilana Mercer and N. Stephan Kinsella

EARTH STATION FIVE
Our group is made up of many people, Jordanians, Palestinians, Indians, Americans, Russians and Israelis. Some of us are Jewish, some Christians, some Hindus and other of us are Muslim.

Believe it or not, we all love and respect each other.

We all work and play together. Our families on many occasions eat at the same dinner table. We trust each other and are very close friends with each other. As a group, the most important thing in our life is our children, our families and love ones and of course our friends.

P2P FILE SHARING
Our #1 goal is to protect its users from intrusions to their privacy by providing encrypted traffic, random ports and IP anonymity:

One Click Proxy Server: Users can send connection requests through intermediary proxy servers located throughout the world so that the download destination of a file cannot be traced by any entity whatsoever. There is nothing for the user to set-up, just right click to enable the proxy server.

SSL-Secure Sockets: Prevents monitoring of a user’s uploading or downloading activity. Users can automatically deploy SSL by right clicking.

UDP-User Datagram Protocol: Using UDP makes it impossible to reliably scan a userâs computer to determine if ES5 is running. Also, unlike TCP connections, UDP traffic can not be easily blocked by ISPs.

ES5 Security Key: ES5 utilizes a standard HTTP server to transmit files, but deploys a special "security key" so than only ES5 users can access your shared files.

IP Addresses: ES5 does not display user IP Address information.

Dynamic Ports: Each ES5 node uses a randomly chosen port (unless the user chooses a specific port themselves). Therefore, ISPs will be unable to identify file-sharing traffic based upon port numbers and unable to throttle back the users bandwidth.

User Defined Port Settings: ES5 provides users with “one-click” port setting options for ES5 to use port 53 (the port used by DNS) or port 37 (the port used by time service) therefore rendering all blocking attempts hopeless.

Multiple Points of Entry: ES5 uses multiple methods for connecting to the ES5 network including IP Multicast, Usenet Articles, Web Sites, Node List Files and a several other undisclosed methods.

Penetrating Firewalls: UDP allows seamless penetration of firewalls without inconvenient setting of firewall parameters. For users behind firewalls, ES5 uses UDP to request a PUSH, where the behind-the-firewall computer initiates the connection back to the requested user’s computer.

PGPDisk: As an additional security feature, to all P2P programs, is that ES5 integrates seamlessly with PGPDisk (which is a free program and will be provided by ES5 to its users) that lets you encrypt your disk drives to store your P2P content. No one except you will ever be able to see your files, not your kids, your spouse, your mother, your boss, the FBI, the KGB or anyone else!

Ras Kabir
- e-mail: ras@earthstationv.com
- Homepage: http://www.earthstation5.com/

Comments

Display the following 2 comments

  1. Yes! — kram
  2. Where is the source code? — Chris

Publish

Publish your news

Do you need help with publishing?

/regional publish include --> /regional search include -->

World Topics

Afghanistan
Analysis
Animal Liberation
Anti-Nuclear
Anti-militarism
Anti-racism
Bio-technology
Climate Chaos
Culture
Ecology
Education
Energy Crisis
Fracking
Free Spaces
Gender
Globalisation
Health
History
Indymedia
Iraq
Migration
Ocean Defence
Other Press
Palestine
Policing
Public sector cuts
Repression
Social Struggles
Technology
Terror War
Workers' Movements
Zapatista

Kollektives

Birmingham
Cambridge
Liverpool
London
Oxford
Sheffield
South Coast
Wales
World

Other UK IMCs
Bristol/South West
London
Northern Indymedia
Scotland

Server Appeal Radio Page Video Page Indymedia Cinema Offline Newsheet

secure Encrypted Page

You are viewing this page using an encrypted connection. If you bookmark this page or send its address in an email you might want to use the un-encrypted address of this page.

If you recieved a warning about an untrusted root certificate please install the CAcert root certificate, for more information see the security page.

IMCs


www.indymedia.org

Projects
print
radio
satellite tv
video

Africa

Europe
antwerpen
armenia
athens
austria
barcelona
belarus
belgium
belgrade
brussels
bulgaria
calabria
croatia
cyprus
emilia-romagna
estrecho / madiaq
galiza
germany
grenoble
hungary
ireland
istanbul
italy
la plana
liege
liguria
lille
linksunten
lombardia
madrid
malta
marseille
nantes
napoli
netherlands
northern england
nottingham imc
paris/île-de-france
patras
piemonte
poland
portugal
roma
romania
russia
sardegna
scotland
sverige
switzerland
torun
toscana
ukraine
united kingdom
valencia

Latin America
argentina
bolivia
chiapas
chile
chile sur
cmi brasil
cmi sucre
colombia
ecuador
mexico
peru
puerto rico
qollasuyu
rosario
santiago
tijuana
uruguay
valparaiso
venezuela

Oceania
aotearoa
brisbane
burma
darwin
jakarta
manila
melbourne
perth
qc
sydney

South Asia
india


United States
arizona
arkansas
asheville
atlanta
Austin
binghamton
boston
buffalo
chicago
cleveland
colorado
columbus
dc
hawaii
houston
hudson mohawk
kansas city
la
madison
maine
miami
michigan
milwaukee
minneapolis/st. paul
new hampshire
new jersey
new mexico
new orleans
north carolina
north texas
nyc
oklahoma
philadelphia
pittsburgh
portland
richmond
rochester
rogue valley
saint louis
san diego
san francisco
san francisco bay area
santa barbara
santa cruz, ca
sarasota
seattle
tampa bay
united states
urbana-champaign
vermont
western mass
worcester

West Asia
Armenia
Beirut
Israel
Palestine

Topics
biotech

Process
fbi/legal updates
mailing lists
process & imc docs
tech