File Sharing Networks: A Comprehensive Guide - MakeUseOf

Exploring Major File Sharing Networks
Many individuals are curious about the most prominent file sharing networks currently in use. Understanding the distinctions between systems like BitTorrent, Gnutella, eDonkey, and Usenet is a common inquiry.
A frequent question revolves around identifying which network delivers optimal download speed or provides the strongest safeguards for user privacy.
A Comparative Overview
This guide provides a detailed examination of the advantages and disadvantages associated with each network. We will delve into the specific strengths and weaknesses of each platform.
Furthermore, we will address critical privacy issues inherent in file sharing. Protecting your digital footprint is paramount when engaging in these activities.
Privacy and Security Tools
The discussion extends to a review of exceptional tools designed to enhance your privacy. These resources can be invaluable when downloading files across these various networks.
These tools offer methods to safeguard your identity and activity while utilizing peer-to-peer and other file sharing technologies.
Understanding the Networks
BitTorrent
BitTorrent operates on a peer-to-peer (P2P) basis, distributing files in small pieces. This decentralized approach can lead to faster downloads.
Its popularity stems from its efficiency and wide availability of content, but it also carries inherent privacy risks.
Gnutella
Gnutella is another P2P network, known for its decentralized nature and resistance to censorship. It allows users to directly connect with each other.
However, Gnutella's open structure can make it more vulnerable to monitoring and legal scrutiny.
eDonkey
The eDonkey network, while less prevalent today, historically provided a platform for sharing a wide range of files. It utilized a centralized server for indexing.
Its centralized aspect made it easier to shut down, and it faced significant legal challenges.
Usenet
Usenet is a distributed discussion system, often used for file sharing through binary groups. It predates many modern P2P networks.
Usenet offers a degree of anonymity, but requires specific software and understanding of its unique structure.
Protecting Your Privacy
- VPNs (Virtual Private Networks): Encrypt your internet connection, masking your IP address.
- Encryption Software: Protects the files you download and share.
- Anonymous Browsers: Minimize tracking and enhance privacy.
Employing these tools is crucial for mitigating the risks associated with file sharing and maintaining your online privacy.
Table of Contents
This document provides an overview of various file sharing methods and their associated considerations.
§1–Introduction
The exchange of digital files has become a ubiquitous aspect of modern technology. Understanding the different methods employed for this exchange, along with the legal and privacy implications, is crucial.
§2–File Sharing and Copyright
Sharing files, particularly those protected by copyright, raises significant legal concerns. Unauthorized distribution of copyrighted material can result in substantial penalties.
It's important to be aware of copyright laws and respect the rights of content creators.
§3–What's P2P
P2P, or peer-to-peer, file sharing represents a decentralized approach to data exchange. Instead of relying on a central server, users directly share files with each other.
This method distributes the bandwidth load and can facilitate faster download speeds.
§4–Bit Torrent
BitTorrent is a widely used P2P protocol for distributing large files. It operates by breaking down a file into smaller pieces.
Users download these pieces from multiple sources simultaneously, increasing efficiency.
§5–Torrent Trackers
Torrent trackers are servers that help users locate peers who are sharing specific files. They do not host the files themselves.
Trackers maintain a list of peers and facilitate the connection process.
§6–eDonkey
eDonkey was a popular P2P network known for its extensive file index. It utilized a centralized server to manage file metadata.
While once prominent, its usage has significantly declined over time.
§7–Gnutella
Gnutella is another P2P file-sharing protocol that operates in a decentralized manner. It allows users to search for and download files directly from other users' computers.
Gnutella's architecture emphasizes resilience and adaptability.
§8–Usenet
Usenet is a distributed discussion system that can also be used for file sharing. Files are posted to newsgroups and can be downloaded by other users.
Usenet has a long history and continues to be used by some for specific purposes.
§9–Other File Sharing Networks
Numerous other file-sharing networks have emerged over the years, each with its own characteristics and user base.
These include networks focused on specific types of content or employing unique technologies.
§10–Privacy
Engaging in P2P file sharing can pose privacy risks. Your IP address is often visible to other users on the network.
Using a VPN or other privacy-enhancing tools can help mitigate these risks.
It is essential to understand the potential exposure of your online activity.
§11–Conclusion
File sharing technologies offer convenient ways to exchange digital content. However, it is vital to be mindful of copyright laws and privacy concerns.
Responsible usage and awareness of the associated risks are paramount.
1. Introduction
This eBook marks the beginning of another exploration, and it is my hope that you find it both informative and enjoyable. Our focus will be on file sharing, encompassing the various software solutions, protocols, challenges, and related aspects. The rationale behind creating a guide dedicated to file sharing stems from the fact that, despite advancements since the eras of Napster and physical media transfer, obstacles remain, particularly for individuals without extensive technical expertise.
Throughout this eBook, we will examine the prominent file sharing technologies currently available, evaluating their respective strengths and limitations. We will also discuss optimal strategies for utilizing these tools effectively. However, before delving into the intricacies of the subject, it’s crucial to address a significant consideration that naturally arises given the nature of this discussion.
2. File Sharing and Copyright
Copyright, particularly intellectual copyright encompassing text, images, videos, software, and artistic creations, deserves careful consideration. Despite the stance of some entities, such as the well-known torrent site ‘The Pirate Bay’, which advocate disregarding copyright laws, doing so is both unlawful and ethically questionable.
Certain campaigns have attempted to legitimize unauthorized downloading of copyrighted material, arguing it differs from traditional theft due to the nature of digital storage. This argument gained some traction due to its simplicity. The reasoning suggests that downloading music or books doesn’t incur printing, manufacturing, transportation, or sales personnel costs for the publisher; only the user’s electricity and internet expenses are involved. Consequently, the question arises: why should content be paid for?

Creative Commons Attribution. Photo by Daveybot via Flickr. Purchased music arranged in an album art wall.
However, this line of reasoning is fundamentally flawed. It overlooks the significant time and effort invested by musicians, writers, and programmers in creating the original work. This is a critical oversight. Consider the creator’s perspective – wouldn’t they expect to be compensated for their labor and be able to sustain themselves?
While I cannot endorse the methods of organizations like the RIAA and IFPI, which often appear overly simplistic in their anti-piracy efforts, I firmly oppose the theft of intellectual property. As Uncle Ben wisely stated to Peter Parker in Spider-Man: “With great power comes great responsibility.”

Creative Commons Attribution by everyskyline via Flickr.
It’s important to note that file sharing isn’t inherently illegal. Numerous legitimate applications exist, including the distribution of open source software, public domain content, creative commons licensed works, and copyleft materials. The underlying technology powering many P2P applications and services is not inherently negative. Bit Torrent, for example, has the potential to accelerate legitimate downloads, even those from platforms like iTunes and Amazon, if Content Delivery Networks (CDNs) were to adopt it.
Disclaimer
MakeUseOf and its contributors assume no liability for any actions taken based on the information provided herein. Copyright infringement is a serious offense, classified as a felony in the United States and many other jurisdictions. It is crucial to familiarize yourself with your local copyright laws before engaging in any of the activities discussed in this eBook. The information presented is strictly for educational purposes.
Understanding P2P Technology
P2P, which stands for Peer-to-Peer, represents a collection of technologies operating on a shared foundational principle. Unlike traditional client-server systems where a central server delivers data, P2P networks function with each computer acting as both a client and a server simultaneously.
Each participating computer attempts to download required files from other computers within the network that possess them. Conversely, it also shares its own data with other computers, forming what is known as a ‘swarm’.
The Concept of a Swarm
A 'swarm' is defined as the complete set of computers actively engaged in either downloading or uploading the same specific content. This distributed nature is central to P2P functionality.
This method of content distribution proves highly effective for delivering substantial amounts of data to numerous computers concurrently. Increasing the user base connected to a centralized server inevitably diminishes overall speed and can lead to system failure.
However, in a P2P architecture, the collective speed improves as more users finish downloading and begin sharing, exponentially increasing the number of available data sources.
P2P's Impact on Internet Traffic
Bit Torrent, a prominent P2P protocol, is estimated to account for a significant portion of global internet traffic, ranging from 27% to 55% depending on geographical location.
Legal Challenges and P2P
Throughout the years, organizations representing the music and film industries, such as the RIAA and MPAA, have successfully shut down numerous P2P services.
Furthermore, they have pursued legal action against individuals involved in P2P file sharing activities.
4. Bit Torrent
Developed by Bram Cohen in 2001, Bit Torrent stands as the most prevalent P2P (peer-to-peer) technology currently in use. Its advantages are numerous, offering a largely decentralized system, built-in redundancy, and notably improved download speeds when contrasted with conventional methods.
4.1 How Does It Function?
Utilizing the Bit Torrent protocol for both downloading and uploading necessitates the installation of a compatible application on a user’s system. A wide array of options exists, and we will address the optimal choice for each operating system shortly. Let's first examine the underlying mechanics of the protocol.
To facilitate file sharing among peers, a Bit Torrent application initially collects data regarding the files and stores it within a specific file. This file, commonly known as a ‘.torrent’ file, contains crucial information such as file size, name, and type. The size of this metadata file typically ranges from 1KB to 200KB, depending on the number of files included, even for containers measured in gigabytes.
The download process begins by obtaining a torrent file from a website that aggregates these metadata files, examples being The Pirate Bay or ISOHunt. These sites function as search engines, allowing users to locate desired downloads and acquire the corresponding torrent file. This file is then opened within the torrent client to initiate the download.
Initially, a peer designated as the ‘uploader’ submits the metadata file to a torrent tracker and awaits connections from other peers who wish to download the file.
Upon completion of the transfer, your status transitions from ‘leecher’ (downloader) to ‘seeder’ (uploader). The ‘ratio’ represents the balance between downloaded and uploaded data, calculated by dividing total downloaded size by total uploaded size. Maintaining a ratio above 0.7 is considered good etiquette within the Bit Torrent community. Peers with lower ratios are often labeled as ‘leechers’ and may face restrictions on private torrent trackers.
4.2 Technical Aspects
Bit Torrent downloads operate differently than traditional ftp or http requests. Downloads are not necessarily sequential; the client typically prioritizes downloading the rarest file segments first to ensure availability, or downloads randomly based on peer speed and availability.
Modern Bit Torrent clients often incorporate features that lessen dependence on a central tracker. While numerous, largely redundant trackers are available, and simultaneous failure is unlikely, PEX (Peer Exchange) and DHT (Distributed Hash Tables) provide a backup solution if a tracker is slow or unavailable. A tracker-less environment can perform well, or even faster, within a small group or local network, but global reliance on PEX can experience slower propagation rates.
4.3 Torrent Client Applications
These applications are responsible for reading the metadata and initiating the download of the requested files.
Selecting the best Bit Torrent application from the many available can be challenging, even for technically proficient users. Applications are evaluated based on factors like size, features, speed, reliability, security, and user interface.
Windows users frequently choose uTorrent, a freeware, closed-source client developed by Bit Torrent, Inc. It is recognized for its extensive feature set, intuitive user interface, stability, and minimal resource usage (less than 300KB executable). It remains the most popular Bit Torrent client and consistently receives positive reviews from technology publications.
Linux and Mac users often prefer Transmission, an open-source client lauded for its usability and small resource footprint.
5. Torrent Trackers
Utilizing reputable and widely-used torrent trackers is highly beneficial. A large user base actively downloading and uploading files fosters a robust swarm, resulting in faster download speeds and a greater selection of available content.
A typical response, reminiscent of ‘The Pirate Bay’, to legal challenges from copyright enforcement. Copyleft principles apply.
Here are some of my preferred options:
• The Pirate Bay stands out due to its extensive peer network and file library, its distinctive and humorous responses to copyright concerns, and its user-friendly interface. Its continued availability, however, remains uncertain given the legal issues faced by its creators and the sale of its assets.
• ISOHunt has maintained a consistent level of service for a considerable period, consistently meeting the needs of its users. It rightfully earns a prominent position in my list of frequently visited sites.
• Coda.fm offers a superior user experience with its intuitive design and integrated review system, making it an excellent choice for sourcing music via torrents.
• For those seeking a lower-risk experience, LegalTorrents provides access to content that is not subject to copyright restrictions. Alternatives include LegitTorrents and Vuze.
• TorrentScan efficiently searches across multiple public trackers for desired content. If you don't have a specific tracker preference or don't mind an additional step to reach the source site, it’s a valuable resource. The sidebar provides further recommendations for public trackers.
Saikat Basu of MakeUseOf has authored a detailed Beginner’s guide to BitTorrent. I highly recommend reviewing this guide, particularly if you are new to this technology. It also includes valuable advice for experienced users.
We also maintain a regularly updated page dedicated to articles concerning torrents, offering tips, client reviews, and tracker information.
5.1 BitTorrent Scorecard:
- Speed: 5/5
- File Availability: Excellent
- Privacy: 1/5
- Malware Danger: Fair
- Ease of Use: 4/5
5.2 The Advantages of BitTorrent
Currently, BitTorrent is a primary method for many, including myself, to obtain content from the internet. I have tested various file-sharing services, but none have matched BitTorrent’s speed, the sheer volume of available files, or its overall reliability. I recall instances of downloading 700 MB disc images (.iso) only to discover they were password-protected, corrupted, or that peers disconnected during the final stages of the download.
Many of these issues were mitigated by the introduction of BitTorrent, and I have no intention of reverting to alternative services. However, BitTorrent is not without its limitations, and it’s worthwhile to explore other available protocols.
6. eDonkey
Despite its unassuming name, the eDonkey network once dominated the landscape of file sharing for a considerable period. Although functioning as a decentralized system, it still depends on servers to process search requests, which maintain indexes of files available for sharing.
The network’s original developer reached a settlement with the RIAA amounting to approximately $30 million. However, a dedicated community, numbering in the millions, continued to refine both the client and server software, ensuring the network’s continued operation.
Significant differences distinguish eDonkey from Bit Torrent. Notably, it operates without the need for tracker websites and employs a distinct protocol for locating and downloading files. This protocol is, in many instances, slower than that utilized by Bit Torrent.
For Windows users, Shareaza, an open-source client, stands out as the optimal choice. It effectively supports Gnutella, Gnutella2, eDonkey, BitTorrent, magnet, ed2k, and Piolet links.

The application boasts a well-organized interface, demonstrated stability during testing, and successfully facilitated file downloads across all supported protocols.
Mac and Linux operating system users will find aMule to be a robust client, designed for both eDonkey and Kad networks.

The eDonkey network’s substantial size ensures a critical mass of both files and users, potentially delivering rapid download speeds, particularly within metropolitan areas. However, it is susceptible to the presence of counterfeit files, malicious software, and tracking attempts.
Most download clients, such as Shareaza, feature a ‘Network’ or ‘Hub’ button. Utilizing this, users can refresh the list of accessible servers and select those offering optimal speed and file variety. Multiple connections can be active simultaneously, though exceeding five is not recommended due to potential search slowdowns.
File availability and download speed are influenced by factors like the time of day, geographical location, and network conditions. Generally, the eDonkey network exhibits slower speeds and a smaller file selection compared to Bit Torrent. Furthermore, the risk of encountering viruses is elevated due to the absence of a rating or commenting system.
6.1 Scorecard for eDonkey:
• Speed: 3/5
• File Availability: Fair
• Privacy: 2/5
• Malware Danger: Severe
• Ease of Use: 3/5
7. Gnutella
Despite originating in 2007, Gnutella remains an active file-sharing network. Following a significant increase in usage after 2001, largely triggered by Napster’s shutdown, both the protocol and its client software have undergone continuous improvements. It currently holds the position as the second most popular network, trailing behind BitTorrent.
Although initially conceived as a fully decentralized system, Gnutella, similar to eDonkey, relies on components like caches, ultra-peers, and ‘leaves’ to maintain operational stability.
LimeWire stands out as the most widely used download client for the Gnutella network. Developed in Java, it offers cross-platform compatibility. It is a recommended choice for both Windows and Linux operating systems.
Mac users should consider Acquisition, which is built using native code and adheres to the standard Mac application user interface.
Based on personal experience, Gnutella is preferable to eDonkey. The download clients generally exhibit a more refined user experience, and the network often feels more responsive. Furthermore, Gnutella eliminates the need for manual server selection, a requirement on eDonkey.
LimeWire’s search filtering is a significant benefit. Users can exclude specific file types, such as executables, documents, images, or content protected by copyright, tailoring their searches to their preferences.
The simplicity of LimeWire is remarkable; its operation is so intuitive that even a non-technical user could easily initiate downloads. Simply launch the application, input your desired search terms, and click the download button. A helpful wizard is available for first-time users.
7.1 Scorecard for Gnutella:
- Speed: 4/5
- File Availability: Good
- Privacy: 3/5
- Malware Danger: Severe
- Ease of Use: 5/5
The potential for encountering malware remains a serious concern when utilizing Gnutella. Users should exercise extreme caution.
Gnutella offers a user-friendly experience, but privacy considerations and the risk of malicious software necessitate careful usage.
8. Usenet
Originating from earlier bulletin board systems, USENET (user network) facilitates the sharing of articles, images, music, and binary files through a distributed network of servers. These communities, often referred to as newsgroups, function in a manner akin to email communication.
Upon connecting to a newsgroup – for instance, sci.math – within a newsreader application, users are able to both post new messages and respond to existing ones. Messages are organized into threaded conversations, mirroring the structure of email inboxes like Gmail.
A significant characteristic of many USENET servers is the lack of required personal information, registration processes, or logging of user activity.
The prominence of USENET as a platform for information exchange and discussion has diminished with the rise of forums and blogs. Despite a declining user base, certain newsgroups remain active for the distribution of applications, videos, music, and other binaries.
USENET inherently offers a degree of privacy that surpasses many other peer-to-peer (P2P) networks. The protocol, which shares similarities with SMTP (Simple Mail Transfer Protocol), establishes a chain of trust.
A sender’s identity can be effectively concealed through modifications to the message header. Typically, only the server possesses knowledge of the user’s address, and many newsgroups refrain from maintaining logs, or are unlikely to disclose any information if they do.
Furthermore, USENET servers often operate under the protection of the DMCA Safe Harbor regulations, classifying them as telecommunications providers. This means they are not legally liable if they promptly remove copyrighted material upon notification from rights holders.
However, the decentralized architecture of the network and the policies of numerous server administrators render complete content removal challenging. Information tends to propagate across multiple servers within the mesh, and cancel requests are frequently disregarded.

An illustration of a mesh network. Creative Commons by Marc_Smith via Flickr.
Certain limitations do exist. Free newsgroups often retain data for limited durations due to server storage constraints. Paid services typically offer longer retention periods, up to a maximum of one year.
Speed can also be a concern; newsgroups may experience slower performance than other P2P technologies during peak usage times (such as afternoons and evenings) due to their server-based infrastructure. The process of uploading and downloading can be more involved than with other technologies.
Files must be divided into smaller segments (under 50MB), compressed using formats like .RAR archives, and protected with .PAR recovery files. Additionally, file information in .NFO format is attached, and the data requires reconstruction after download.
Currently, there are no freely available USENET applications specifically designed for binary file sharing. Therefore, recommendations are limited to paid options. Unison is highly regarded for macOS, BinBot is a strong choice for Linux, and NewsLeecher is considered the best option for Windows.

8.1 Scorecard for Usenet:
• Speed: 2/5
• File Availability: Variable
• Privacy: 4/5
• Malware Danger: Minimal
• Ease of Use: 1/5
Alternative File Sharing Platforms
Beyond the commonly known networks, numerous other services are exploited for the unauthorized distribution of copyrighted material. Rapidshare serves as a prime example of such a platform.
Instances of legal repercussions have been observed, with the service being shut down and users facing identification and tracking. For example, in April 2009, Rapidshare disclosed personal information regarding suspected copyright violations to prominent record companies.
It is strongly advised to avoid utilizing these types of services.
Downloading from Rapidshare doesn’t typically require a dedicated download manager. Instead, users need to obtain the direct file location to initiate the download process.
Several search engines are available to assist in locating files hosted on these networks.
Caution should be exercised regarding smaller, less established networks. These include offshoots of larger platforms and those promoted with exaggerated claims of speed on low-quality websites.
Engaging with these platforms often proves to be a detrimental decision.
10. Privacy Considerations
Your Internet Service Provider, the individuals you are downloading files from, the torrent tracker, and even someone nearby utilizing network monitoring tools can ascertain your online activities. It's crucial to understand that utilizing the P2P services discussed previously offers no inherent privacy.
The risk involved is a matter of probability: among the vast number of file-sharers, what are the chances of being among those targeted with legal action?
10.1 Methods for Enhancing Your Privacy
• ItsHidden Beta, a complimentary VPN service specifically designed for this purpose, assures users that no logs are retained, delivers acceptable speeds, and is currently available without charge.
• IPREDATOR, functioning similarly to ItsHidden, was initiated by the creators of The Pirate Bay. While the beta testing phase is presently closed, registration may still allow for potential invitation access.
• Alternative paid VPN services, such as Witopia.net, maintain limited logs primarily to deter misuse, including activities like hacking and spamming. Their Terms of Service, as vetted by legal counsel, explicitly prohibit copyright infringement.
• OneSwarm, while remaining compatible with the BitTorrent protocol, introduces the concepts of trusted contacts and obfuscation of peer addresses. A detailed review of its features is available.

• BitBlinder represents a highly promising solution for online privacy. Currently, access is restricted to a private beta program, but reviewing the technical specifications and subscribing to their blog is highly recommended.
• While private trackers often feature rigorously moderated content and typically experience fewer issues with leeching, they do not provide a reliable solution for privacy-focused individuals. If an invitation to such a service is obtained, it's reasonable to assume that the RIAA could also gain access.
• IP filtering software, including ProtoWall and the now-discontinued PeerGuardian, attempts to block connections originating from known IP addresses associated with organizations like Media Sentry and the MPAA. While not entirely foolproof, these tools can offer a degree of protection. Linux users may find MoBlock to be a suitable alternative.
Concluding Remarks
Throughout this discussion, we have examined several widely-used file sharing networks and the corresponding applications best suited for each. Determining the optimal choice for your needs presents a challenge. However, BitTorrent appears to offer the greatest adaptability overall.
For individuals seeking a convenient method to occasionally transmit files to friends and family, particularly those of substantial size, Tim Watson’s insights on four remarkably straightforward websites providing solutions are highly recommended. Alternatively, a more technically inclined approach involves establishing a personal encrypted VPN and leveraging the built-in tools of your operating system, as detailed in Dave Dragger’s guide on utilizing Hamachi.
As the Roman philosopher Seneca eloquently stated, “There is no delight in owning anything unshared.”
Additional Resources:
- Understanding the Mechanics of P2P (Peer-to-Peer) File Sharing
- Five Complimentary Browser-Based P2P File Sharing Platforms Without Size Restrictions
- Methods for Locating Files Online Without Employing P2P Software
- Five Essential Tips for Safeguarding Your Privacy During Torrent Downloads
Publication Date: May 2010





