- Phex
Infobox Software
name = Phex
caption = Phex's search interface in Linux
developer = Phex Development Team
released = April, 2001
frequently_updated = yes
programming language = Java
operating system =Cross-platform
language = English
genre =Peer to peer
license =GNU General Public License
website = http://www.phex.org/Phex is a
peer-to-peer file sharing client for theGnutella network. Phex is based on Java technology and available for systems that offer aJ2SE 1.5 runtime environment.Released under the terms of the
GNU General Public License , Phex isfree software .Features
Phex supports most of the recent features of the Gnutella network [cite web|title=Phex Feature comparison|url=http://www.phex.org/wiki/index.php/Features] [cite web|title=The Gnutella network explained|url=http://en.gnufu.net] .
Additionally it enables the creation of private networks over the internet [cite web|title=Private Networks with Phex| url=http://www.phex.org/wiki/index.php/Creating_a_private_Network] , has a powerful search result filter [cite web |title=Search Result Filter System| url=http://www.phex.org/wiki/index.php/Filter_System] and can export the list of shared files into multiple formats, some of which can also be read out and downloaded directly by another Phex.
Version 3.2.0.102 also supports
Tiger Tree hashes for uploads and downloads, providing full protection against poisoned downloads. Together with Swarming, Partial File Sharing [cite web|title=Swarming and Partial File Sharing explained| url=http://rakjar.de/gnufu/index.php/GnuFU_en#Better_Downloading_Part1:_Swarming_and_Partial_File_Sharing] and the Download Mesh [cite web|title=The Download Mesh explained |url=http://rakjar.de/gnufu/index.php/GnuFU_en#Finding_sources_without_searching_aka_the_Download-Mesh] this makes downloads as efficient and safe as BitTorrent downloads, yet completely decentralized by design.History
FURI was an early
Gnutella client written by William W. Wong and released under theGNU Public License . The software was notable at the time of its release for being written entirely in Java. The software was capable of running on Java 1.1 as long as the user downloaded external Swing libraries. If these libraries were unavailable, Java 1.2 was required.Officially, the program never left Beta status. The author eventually stopped maintaining the software, resulting in users migrating to other clients like
Limewire . The [http://www.schnarff.com/gnutelladev/source/furi/ last update] to the software was on May 1st, 2000.In
April 2001 Konrad Haenel forked the rarely-updated Gnutella client FURI to form Phex. While he participated in the Phex project initially, he left in late 2001. The project member Gregor K. continued to develop Phex and is the lead developer today.Anonymous Phex
Since 2006, an anonymous version of Phex has been available: I2Phex, which uses the
I2p network to hide theIP address of the users of thisGnutella client.The future roadmap is to integrate the I2Phex code into one of the next Phex versions.Rather than use the public IP network, I2Phex uses encrypted tunnels through the
i2p privacy/encryption network.Traffic is mixed with other network traffic through a
garlic routing system, making it difficult for outside observers to identify originators or the recipients of a file through traffic analysis.Anonymous networks have been remiss to host file sharing protocols due to bandwidth considerations. Often only searching (or tracking for BitTorrent) are supported [cite web|title=Tor and BitTorrent |url=http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO/BitTorrent] . Nodes within the
garlic routing system could refuse to route file sharing traffic. This makes inbound and outbound connections easier to locate. Outbound traffic is unencrypted so associating it with the inbound node will break the anonymity.gtk-gnutella ,LimeWire , andPhex all support the use of TLS to encrypt traffic between nodes. TLS is not anonymous likeI2p , however, it does prevent ISPs from filteringGnutella content and makes it more difficult to trace traffic.Phex with TOR
It is possible to use Phex with
SOCKS5 proxy. Using that feature it is possible to route Gnutella traffic viaTOR and then to Phex. This is possible by usingSOCK5 cascadingproxy toTOR client.See also
*
Comparison of Gnutella software Various academic studies are based on Phex:
* cite web
url = http://www.di.unito.it/~schifane/papers/networking06.pdf
last = Ruffo
first = Giancarlo
title = A Decentralized Recommendation System Based on Self-organizing Partnerships
publisher = Università di Torino
year = 2006
* cite web
url = http://www.cs.ucl.ac.uk/staff/c.mascolo/www/dasson07.pdf
last = Kampffmeyer
first = Holger
title = EPITELLA: Improving the Gnutella Search Algorithm through Epidemic Spreading Models for Complex Networks
publisher = University College London
year = 2006
* cite web
url = http://www.scs.org/scsarchive/getDoc.cfm?id=1666
last = Makosiej
first = Przemyslaw
title = Measurement Study of Shared Content and User Request Structure in Peer-to-Peer Gnutella Network
publisher = University of Rostock
year = 2004
* cite web
url = http://www.cs.iastate.edu/~ndubrov/201.pdf
last = Natalia
first = Stakhanova
title = A reputation-based trust management in peer-to-peer network systems
publisher = Iowa State University
year = 2003References
External links
* [http://phex.org/ Official homepage]
* [http://wiki.phex.org Phex-Wiki]
* [http://www.gnutellaforums.com/forumdisplay.php?forumid=16 User forum]
* [http://sourceforge.net/projects/phex Project page] atSourceForge.net
* [http://www.ohloh.net/projects/556?p=Phex+-+P2P+Gnutella+filesharing+program Code quality and contributor statistics] at [http://www.ohloh.net/ Ohloh]
Wikimedia Foundation. 2010.