Morethought

Members
  • Posts

    36
  • Joined

  • Last visited

Everything posted by Morethought

  1. Right, and how would you recommend making BTSync to go through Tor? Plus BTSync is in alpha stage, subject to major development hence the growing "Wishlist" thread.
  2. That is very true The only thing on my mind was the useful and "cool" factor of the idea that Tor technology with this tool would provide not only security over the transaction but also your location so that other people you have helping you keep backups of files won't have your real location info from a real IP. Of course then there are the people who jump on to the first negative use of a technology. Since people here are worried about anonymity being added because of pedo's I could chime in at this point and say about how it currently is right now: "We should stop BTSync right now!, because it won't be long before someone frames someone by adding illegal pornography to someone's folder they are synced with (offering some of their space for free or money to help someone keep a synced backup externally to them) and now everyone who is synced in to that folder has illegal porn on their system which can be traced back even after deletion! While in the meantime the guy who perpetrated the act unshares their copy of the folder, securely wipes the offending files from their system using special tools, thus erasing all trace. OMG!" The point is, anything is possible and if we stop developing things based on what a few people "can" do with a technology then everything will be impossible because we would never do or invent anything whatsoever. Anything can be blown up to the extreme. BTSync is no different. Unfortunately many people do blow things up and try and get things banned or stopped. Someone goes into a school and kills a bunch of teachers and commits suicide.. Then they want to try and ban guns, when really criminals get illegal weapons any way because?... they are criminals. SO effectively banning/stopping things only serves to restrict what law abiding people are able to do and restricting the ability to protect and defend themselves. They already banned hand guns here in the UK and low and behold gangs in London and elsewhere have guns! What a bang up job..
  3. I have a secure VPN server set up that gives me secure access to my server's internal services, so I configured it to let my whole internet go through there just because I have unlimited bandwidth and it adds a measure of security. The problem is yesterday when I was setting this BTSync all up, it was not working. Nothing I did seemed to sync anything until I disconnected from the VPN and then magically everything started syncing. This really should be looked at. The technology I am using is OpenVPN
  4. That is kind of what I am saying. Technology is not bad or good, people's specific use of it can be good or bad. Some people get drunk and start fights at football matches but we don't ban football or beer. We would never invent anything if we were always worrying about what people will do with it. That would become a vicious spiral of nothingness.
  5. Ah I didn't think about it from that aspect. Well the only thing that comes to my mind is that a tool is a tool. Paedophiles and other criminals will use all the same security things that the rest of the planet uses. I am reminded of Steve Gibson talking about encryption software and how important it is to people's privacy to use it, but at the same time realising that criminals and pedo's will also be able to use it. We cannot not make tools just because of the possibilities of how some people may use them. There are people right now using Tor for god knows what. I have read that there are assassins on there contracting themselves out for bitcoins and then there's the famous silk road that everyone has heard of. Tor doesn't shut down because of a few guys doing bad things with it, nor did they specifically make Tor to help those people. Tor is very beneficial to people all over the world. It is unfortunate... but everything is subject to abuse. I just figured that since security is key feature with this software and given the current cool technology in Tor right now, that incorporating some of Tor's anonymity would be a really nice feature to add. One day you may want to add some content to your shared backup but not let those participant "friends" know exactly when there's nobody home because out of the clear blue sky your IP has changed to spain one day. If people are concerned with such things and always use that anonymous option it would protect them from people gathering any info about them while they are disseminating their backups to their little sync group from any location.
  6. I would love the ability to be able to selectively choose which files I would like to obtain at a new device/location rather than have to get a complete mirror. Similarly to how with downloading a torrent file you can opt to not download certain files and only download the things you need.
  7. Would it be possible to enhance this program with the ability to, almost Tor-like, pass packets around willing peers so that if a person wishes to be anonymous they can participate sending and receiving files without worry about other participants spying on their identity?
  8. I would like to be able to have read/write access to a folder and still be able to delete files when I don't want them taking up my space but yet NOT remove them from everyone else just because I don't want my space taken up with something in particular. I can swap my secret to the readonly one and that would likely work but then I cannot simply edit it and put the full code back in because it won't let me edit it once its readonly.. So then I have to totally remove it, then go readding it again using the full read/write code. Do you know what I mean?
  9. If you type in a code to get access to a folder, won't the network of peers/seeds/tracker have access to the code so that anyone up the chain of your discovery would be able to access the code? Or are you hashing the code some way so that the codes themselves are not known? I am interested what keeps your data "secret" with a peer to peer network where everyone is connected too and all you need is a code to gain access. What keeps other people from sniffing/obtaining access by listening to the network of people connected and their attempts to get initiated with some folder somewhere?
  10. I am interested in adding trackers to aid the discovery process but I don't know how I specifically add trackers.
  11. I would like to be able to share files in folders that exist as symbolic links on linux. Else I have to go making copies of all the data, wasting disk space, just to have the files in the new central "sharing" location.