There's nothing simple about supposing the impossible. You'd basically have to re-write how the universe works.
it's not, I'm not changing how the universe works :roll: my example was very possible, just unlikely, however we already have examples of unlikely happenings in computers & technology but whatever ...
Haven't we established that they are taking measures so drastic that pirates will be forced to turn to proxies?
not really... nothing is established yet, there's still judicial & technical challenges around the corner ...
I know there are legit uses for privacy. That doesn't mean TOR nodes can't be seized if illegal stuff is traced back to them.
sure, however unless the TOR node owner is actually using his computer for illegal stuff, they would find nothing on it to be used to back up their accusations...
Because they relay actually illegal data (as in illegal data has been positively traced to them) and the operators have made no effort whatsoever to discourage this use.
haha ! but two things : 1)you suppose they would make no effort whatsoever to discourage its use...
2)then every and each internet relay is guilty of those charges (relaying illegal data) so this would challenge the whole principle of how internet works by making relays responsible of what data pass through their computers ...
And this individual's piracy habits are dependent on his peers - peers who do not have the luxury of protecting their identities while stealing. Ultimately this individual won't have any peers to pirate things from.
you don't need a lot of individuals to make an effective P2P network ... (Direct Connect)
This example *isn't* a single computer acting as a router. There are five computers in this example, and the picture makes it clear none of them act as a central server. If you added a sixth computer acting as a router, you wouldn't be looking at the original diagram any more.
a computer router or a hardware router doesn't make any difference, it's still a link ...
but fine since you will obviously not agree on this let's forget about this one and instead see this :
http://www.ibm.com/developerworks/java/library/j-jxta2/side-jxta2.html
How does a P2P network "work," and how is it different from the conventional client/server or multitiered networks we're so used to [...] In a P2P network, everything you'd want to access (called resources) are owned and managed by peers
http://freepctech.com/pc/002/networks007.shtml
http://en.wikipedia.org/wiki/Client-server
In peer-to-peer architectures, each host or instance of the program can simultaneously act as both a client and a server, and each has equivalent responsibilities and status.
ftp://ftp.tik.ee.ethz.ch/pub/students/2002-2003-Wi/SA-2003-16.pdf
http://technet.microsoft.com/en-us/library/cc751396.aspx
In the client-server scheme, a central server handles all security and file transactions; in peer-to-peer networks, each machine shares its own resources and handles its own security
http://www.enterprise-technology.net/network2.htm
In a client-server network architecture, however, certain computers are designated for full-time server duty, while others (such as user workstations) are full-time clients
http://www.ehow.com/about_5380893_peertopeer-vs-clientserver-networks.html
A client-server network involves multiple clients connecting to a single, central server. Public data and applications are only installed on the server
http://wiki.answers.com/Q/Differences_between_peer_to_peer_network_and_client_server_network
http://www.computer.org/portal/web/csdl/doi/10.1109/P2P.2001.990434