Hacker 10 – Security Hacker

Computer security
Menu
  • Anonymity
  • Encryption
  • Mobile Phone
  • Other
  • Security

Protect your privacy with a no logs VPN!

Join WindScribe
Home
Anonymity
Anomos, a pseudoanonymous P2P network
Anonymity

Anomos, a pseudoanonymous P2P network

John Durret 11 September, 2010

If you are afraid of a RIAA lawsuit against you for sharing a hard to find MP3 song or want to share something with privacy in the online World you must know that peer to peer software like Bittorrent and eMule are not safe, you can easily be traced back to your computer IP and home when you are downloading files through peer-to-peer software, the best proof of this are the dozens of arrests carried out every year against file sharers.

Pseudoanonymous and private P2P file sharing

Anomos will encrypt all of your file sharing transfers and hide your IP from your peers at the same time, you get privacy and pseudoanonymity. Notice the word is pseudoanonymity because the central tracker will still know your real IP.

Anomos is open source and has no ad aware included, its standalone client is easy to use by newbies and it works in Windows, Linux and MAC computers. This free pseudoanonymous file sharing software uses an onion routing anonymization layer with end-to-end encryption, no party outside of the trusted tracker will have any information about who people are and what they are downloading

Anomos file sharing P2P logo

Anomos file sharing P2P logo

Anomos file sharing strong points

Other programs like Gnunet aim at making your P2P transfers totally anonymous but they require a large number of peers for a smooth download and it is usually very slow to transfer anything because the files you want get routed through other peers before reaching you.

Anomos central tracker considerably speeds up the network as it gives out multiple direct points of connection for the file to be downloaded from.

Anomos file sharing weak points

Anomos relies on a centralized tracker server to initiate downloads, if this trusted tracker is ever compromised your anonymity will be over. Peers need to provide their actual IP addresses to the tracker so that neighbour connections can be made.

There is a way to set up Anomos with tor to avoid forwarding your real IP to the tracker but this is hard to put together, Anomos official blog has some information about how to do this.

Visit Anomos homepage

Reddit
Tweet
Email
Next Article

Related Articles

Services to send self-destructing email and notes
Sending a self-destructing note or email is a good way …

Services to send self-destructing email and notes

Man using HideMyAss to harass ex-girlfriend arrested
A judge from Galveston County named Chris Dupuy has been …

Man using HideMyAss to harass ex-girlfriend arrested

About The Author

John Durret

There are zero AI articles in this blog. I write about privacy and security online, I don“t earn a living with this blog so I write what I want, there is no leverage on me.

Leave a Reply Cancel Reply

Hacker 10 – Security Hacker

Computer security
Copyright © 2025 Hacker 10 - Security Hacker
Privacy by WindScribe VPN