#Vuze dht backup only license#This behavior poses serious threats to privacy and data protection issues and there are virtually no specific legislation or explicit guarantees.Īnother problem is that many social networking systems have very demanding terms of service, essentially asking their users a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use content that they submit. While some social networking services have extremely differentiated business models (Hobart, 2011 McGrath, 2010), for most of them the primary source of income is advertisement and consequently they have a strong motive for: ( i) using user provided data to increase performance for that purpose and ( ii) even giving access to authorized commercial third parties to the data. However, the huge operative costs of supporting the infrastructure necessary to provide the service to millions of users can only be justified with robust business plans. Certainly, existing systems demonstrate that the problem can be solved providing enough resources. The centralized nature allows a simple browser-based user experience and, moreover, many algorithms, e.g., friend suggestion, are far easier and more efficient to implement in this setting.Ī drawback is that scaling centralized systems to tens or hundreds of million of users is not an easy task. Even if these social networking systems are greatly dissimilar in their user base and functionality, they are almost always centralized systems. The results are presented here, regarding (i) communication delays for some simulations of node churn, (ii) delays measured in test operations over PlanetLab, in direct communication, and (iii) through the I2P anonymizing network.Īfter the huge success of the early social networking systems, many other players came in the social networking market and nowadays hundreds of different social networking systems exist. The authors have implemented the system and conducted various experiments to study its behaviour. The system they propose, Blogracy, is a micro-blogging social networking system focused on: (i) anonymity and resilience to censorship (ii) authenticatable content (iii) semantic interoperability using activity streams. In particular, they introduce a key-based identity system and a model of social relations for distributing content efficiently among interested readers. In this paper the authors propose a novel P2P system that leverages existing, widespread and stable technologies such as DHTs and BitTorrent. However, such strategy has many drawbacks, e.g., lack of privacy, lack of anonymity, risks of censorship and operating costs. AbstractThe current approach to build social networking systems is to create huge centralized systems owned by a single company.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |