{"id":26,"date":"2008-07-12T10:27:14","date_gmt":"2008-07-12T08:27:14","guid":{"rendered":"http:\/\/www.psyched.be\/wordpress\/?p=26"},"modified":"2013-12-15T00:24:25","modified_gmt":"2013-12-14T22:24:25","slug":"the-pirate-bay-wants-to-encrypt-the-entire-internet","status":"publish","type":"post","link":"http:\/\/www.psyched.be\/wordpress\/journalism\/the-pirate-bay-wants-to-encrypt-the-entire-internet\/","title":{"rendered":"The Pirate Bay Wants to Encrypt the Entire Internet"},"content":{"rendered":"<p>The team behind the popular torrent site The Pirate Bay has started to work on a new encryption technology that could potentially protect all Internet traffic from prying eyes. The project, which is still in its initial stages, goes by the name \u201cTransparent end-to-end encryption for the Internets,\u201d or IPETEE for short. It tackles encryption not on the application level, but on the network level, the aim being that all data exchanged on your PC would be encrypted, regardless of its nature \u2014 be it a web browser streaming video files or an instant messaging client. As Pirate Bay co-founder Fredrik Neij (a.k.a. Tiamo) told me, \u201cEven applications that don\u2019t supporting encryption will be encrypted where possible.\u201d<\/p>\n<p>Neij came up with the idea for IPETEE back when European politicians were starting to debate a Europe-wide move to DMCA-like copyright enforcement efforts, which were eventually authorized in the form of the <a href=\"http:\/\/www.theregister.co.uk\/2007\/04\/26\/ipred2_passed\/\" target=\"_blank\">Intellectual Property Rights Enforcement Directive<\/a> in the spring of 2007. \u201cI wanted to come up with something to make it harder for data retention,\u201d said Neij. But he didn\u2019t publish the initial draft proposal until early this month, when the discussion about privacy and surveillance online suddenly became urgent again. The Swedish parliament passed a new law in June that allows a local government agency to snoop on \u201cthe telephony, emails, and web traffic of millions of innocent individuals,\u201d as the <a href=\"http:\/\/www.eff.org\/deeplinks\/2008\/06\/sweden-and-borders-surveillance-state\" target=\"_blank\">EFF\u2019s Danny O\u2019Brien<\/a> put it. Neij promises that his new encryption scheme will be ready before the law takes effect next January.<br \/>\n<!--more--><br \/>\nIPETEE will likely be implemented as an add-on to operating systems like Windows and OS X. It will essentially do its work in the background, handling all incoming and outgoing IP traffic without any further interference from the user.<\/p>\n<p>Let\u2019s say you want to open a video download from a remote machine. IPETEE would first test whether the remote machine is supporting the crypto technology; once that\u2019s confirmed it would then exchange encryption keys with the machine before transmitting your actual request and sending the video file your way. All data would automatically be unscrambled once it reaches your machine, so there would be no need for your media player or download manager to support any new encryption technologies. And if the remote machine didn\u2019t know how to handle encryption, the whole transfer would fall back to an unencrypted connection.<\/p>\n<p>Neij told me that IPETEE could be easily implemented for data transfers between end users, such as files shared through P2P. \u201cThe proof-of-concept code will be available both on Windows and Linux,\u201d he explained, but the next step would be to make it scalable and available for operations in a server-based environment so that administrators could use IPETEE to protect their users\u2019 web or email transmissions.<\/p>\n<p>IPETEE could be a big step towards standardizing the encryption of web, email and even VoIP traffic, but it wouldn\u2019t protect against all types of interference. Your ISP could still kill your video downloads via BitTorrent, because newer traffic management solutions can identify P2P transfers by simply looking at the patterns of your uploads and downloads and not at the individual data packets. It could also potentially slow down certain transfers, because it takes time to establish encrypted connections. There might be other flaws in the architecture of the IPETEE system as well, which is why Neij\u2019s team is currently talking to crypto and network experts. But he seemed optimistic that he would have at least a proof of concept implementation ready by the end of the year.<\/p>\n<p>Of course, the Pirate Bay folks don\u2019t exactly have a good track record when it comes to following through with their plans. NewTeeVee alumn Jackson West pointed out back in March that long-planned projects like The Video Bay, the music site PlayBle and a new and secure P2P protocol have yet to be launched, and that\u2019s still true today. Adding an ambitious project like IPETEE to the list doesn\u2019t seem likely to solve that problem, but maybe this time Neij and his crew will overcome their ADD.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The team behind the popular torrent site The Pirate Bay has started to work on a new encryption technology that could potentially protect all Internet traffic from prying eyes. The project, which is still in its initial stages, goes by the name \u201cTransparent end-to-end encryption for the Internets,\u201d or IPETEE for short. It tackles encryption not on the application level, but on the network level, the aim being that all data exchanged on your PC would be encrypted, regardless of its nature \u2014 be it<strong>&#8230;<\/strong><\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[19,15],"tags":[],"class_list":["post-26","post","type-post","status-publish","format-standard","hentry","category-it","category-journalism"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/ph7OQR-q","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/www.psyched.be\/wordpress\/wp-json\/wp\/v2\/posts\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.psyched.be\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.psyched.be\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.psyched.be\/wordpress\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"http:\/\/www.psyched.be\/wordpress\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":0,"href":"http:\/\/www.psyched.be\/wordpress\/wp-json\/wp\/v2\/posts\/26\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.psyched.be\/wordpress\/wp-json\/wp\/v2\/media?parent=26"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.psyched.be\/wordpress\/wp-json\/wp\/v2\/categories?post=26"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.psyched.be\/wordpress\/wp-json\/wp\/v2\/tags?post=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}