June 15, 2013

How To Transfer Your Contacts from iPhone to Android



How to Transfer Your Contacts from iPhone to Android
When you change your handset, one of the most annoying tasks is to transfer contacts from your old phone to the new one. One way to transfer your contacts from iPhone to any other device would be to connect it to your computer, sync the contacts using iTunes and pray that the new device can sync with iTunes as well. Here are a few ways you can easily transfer contacts from iPhone to Android.

Backup Up iPhone contacts

Method 1: backup contacts to a vcf file

There is a very handy iOS application known as My Contacts Backup that allows users to backup their contacts in VCF or CSV format and save them online.
Once installed, run the application and it will show you the total number of contacts you have on your iPhone.
transfer-contacts-iphone-app
Before you start the backup, first tap the small wheel cog icon at the bottom right and change the export type to “vCards”.
transfer-contacts-iphone-settings
Next, go back to the main screen and tap the “Backup” button. This will backup all your contacts in the vCards format. After creating the backup, email the file (to your Gmail address) from within the app to yourself.
transfer-contacts-iphone-email

Method 2

If you don’t like installing third party applications, you can configure your iPhone to backup your contacts to Google. All you have to do is to setup a CardDAV account using your Gmail address. To do so, go to “Settings -> Mail, Contacts, Calendars and tap on Add account”. From there, tap on “Other” and select “Add CardDAV” account under Contacts heading.
transfer-contacts-iphone-google
Just enter the details including your login credentials and server. Make sure you write your complete email address in the username field and use google.com as the server. Tap Next and you are done. After setting it up, open your contacts application and it will automatically sync your contacts with your Google account.

Restoring Contacts on Android

If you are using Method 1 to create a backup of your contacts, open the Gmail app that comes with the phone and open the vcard file that you sent to yourself earlier. It will ask you which application you want to use to open the file. Select “Phone” and it will restore all the contacts to your device.
transfer-contacts-iphone-open
If you are using Method 2, you just have to make sure that your phone is connected to your Google account. Go to “Settings -> Accounts & Sync” and tap on your Google account.
transfer-contacts-iphone-accounts
Now, tap on “Sync Contacts” and it will restore all your contacts.
transfer-contacts-iphone-sync

In the End

Personally, I used the first method to transfer the contacts as it’s less time consuming and can get things done in five minutes or so. Which method do you use to transfer your contacts from your iPhone to any other device? We’d love to hear about it in the comments below.

Source: http://www.maketecheasier.com/transfer-contacts-from-iphone-to-android/2013/06/13

June 14, 2013

Find your own private Internet with Freenet-PCWorld



Anonymous peer-to-peer communication on the Internet isn’t just a handy tool for privacy enthusiasts; it’s critical for preserving free speech in the digital world. Anonymous file-sharing services like BitTorrent are legion, but their utility is limited—you can share only files—and their reputations are unfairly tarnished by people who use them to share media illegally. If you’re looking for a highly anonymous peer-to-peer network with websites, forums, and more, look no farther than the Free Network, one of the best-kept secrets in anonymous communication.
Here’s how it works: Freenet is an anonymous peer-to-peer data-sharing network similar to BitTorrent, but with one key difference: All uploaded data is assigned a unique key, sliced up into small, encrypted chunks and scattered across different computers on the network. That form of data storage means that—unlike with BitTorrent—you don’t have to keep your Freenet client running to seed files you want to share on the network.
Instead, when someone wants to access a piece of data—a document or photograph, for example—they “fetch” it from the network using the unique key assigned to that piece of data. Freenet routes fetch requests through intermediary computers on the network that don’t store records of the request, ensuring that no single computer on the network knows the contents of any one file.
An example of a Freenet website, or freesite.
If that sounds familiar, it’s because this fetching system works very similarly to the way your Web browser does when it fetches websites from the Internet. In fact, once you have the Freenet client running on your PC, you can use most Web browsers to browse files and websites stored on the Freenet. For optimal security, download the most recent version of a browser you don’t normally use—say, Firefox or Chrome—and use it exclusively to browse Freenet, with private browsing enabled.
Next, head over to the Freenet Project website, and download the Freenet client for your operating system. The Freenet installer will walk you through the setup procedure and provide excellent explanations of the different levels of security you can choose from at each step of the process: who to connect to, how much of your hard drive and bandwidth to permit the Freenet client to use while it’s running, and so on.
Accessing Freenet is a fairly spartan experience; this is about as exciting as it gets in terms of fancy visuals.
The biggest choice you have to make is whether to use Freenet in friends-only mode—also known as darknet mode—for maximum privacy. In darknet mode, you can connect to Freenet only through trusted friends with whom you exchange encryption keys, which makes it very difficult for anyone to track what you’re doing on Freenet or even to determine that you’re accessing Freenet in the first place. Of course, funneling your Freenet access through a handful of trusted friends will create a traffic bottleneck that throttles your download speeds—so if you go this route, try to convince at least five or ten friends to join up with you so you can fetch Freenet websites (or “freesites,” as they’re called) and files from Freenet at a semi-decent speed.
Once the Freenet client is up and running, right-click the client icon in your Windows taskbar and select Open Freenet to access the Freenet welcome page in your browser of choice. From here, you can browse Freenet, chat on Freenet forums, and connect with other Freenet users.
Freenet is a complex and powerful tool for privacy enthusiasts, capable of scaling to meet your privacy needs. If you want to build a private web of communication linking a few trusted friends, Freenet can help you do that. If you just want a way to share and consume content anonymously, Freenet can help you do that too.



The Web Hidden On The Web – FreeNet

freenet projectThis week it was officially announced that the United States National Security Agency (NSA) has been mining data from cellular service provider, Verizon. People were, and are, freaking out! How could the government do such a thing? What kind of totalitarian state are we really in?
Folks, there are those of us who have been trying to tell you this for years. Not just tin-hatters, but people who were a part of doing it, people who have had it happen to them, and people who had voted for, or against, the legislation to do these things. But our heads keep going back into the sand.
I’ll never understand how someone can deny that the government, any government, might be listening to everything we say and do, when there was a cover story article about it in Wired magazine, back in March 2012. Go read the article, The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say), then come back and find out what you can do to opt-out of Big Brother on the Internet.

FreeNet – The Other World Wide Web

freenet projectIn the not so distant past, a few people understood that the Web was going to become the largest communications tool ever imagined. The sheer volume of information that is generated and placed on the web everyday, is greater than all the information that existed in written form prior to 1800. Over 5,000 years of the written word could not equal what we publish in a day.
A great deal of that information is personal, and to a government that wishes to control its people, this is the greatest gift we could give them. Ian Clarke understood this and strove to create a tool that would have the functionality of the web, but with as much anonymity as possible. Thus was born FreeNet in the year 2000.
Historically, the FreeNet project has been known to those in the general public who even know about it, as a file sharing service. Kind of like Napster back then, or BitTorrent today. As a file sharing format it didn’t work very well. That is, it worked more slowly than the Napsters of yesterday or the BitTorrents of today. Those that saw it as simply a file sharing tool, left FreeNet, leaving behind not many people who saw it for what it truly is – liberated information.

How FreeNet Works – The Nutshell Version

FreeNet runs something like a cross between BitTorrent and a web server. It’s like BitTorrent in that little bits of the information are stored across the network of computers using FreeNet. If you’d like to know more about how BitTorrent works, we have an article on that. No single computer should have the complete file, all of the time. This makes it hard to shut someone down for serving up information, because they don’t even know what information they have!
I could have 8 bits from a movie on my computer, but how could anyone know what movie? The 8 bits in itself is not useful information. However, when it is combined with the thousands of other little bits of information, it can become a useful file. Perhaps a recipe for cookies, or a song, or even communications between political dissidents. Even then, what information is on your hard drive should be encrypted. FreeNet recommends using TrueCrypt, however FreeNet also has the ability to encrypt the files it uses.
what is freenet
Where it’s like a web server is that it allows you to utilize the web to share information with others. For more on how a web server works, we also have an article on that. It does this using encrypted connections (nodes) that connect to other nodes on the FreeNet. This makes the usage of FreeNet hard to detect. It appears almost like normal web communications. You can make your server public, which is the least secure method, or you can make it private so that only people you want to access your files can even see that you exist. This is, of course, the most secure method.
what is freenet
If you’re new to FreeNet, you’ll probably use the Low Security setting of FreeNet. Then, once you find friends of a feather, you may start to migrate more and more toward the Dark FreeNet. Dark, meaning not highly visible. You and your friends can now openly discuss politics, religion, ecology, inventions, whatever! You can do so with a degree of certainty that no one really knows who you are.
In fact, this has made FreeNet the most popular web privacy tool in China, and several other countries with oppressive regimes. That is not to say that the encryption and methodology will provide perfect security. I simply don’t believe that exists. Where a person is smart enough to create good security, someone else who is smarter will come along and foil that security. Such is life.
One downside to FreeNet is that because of the security measures, it is inherently slower than your normal web browsing. Just remember that all those nodes that have the information you want have to be connected to, and all the information has to be downloaded and decrypted on your computer for you to make sense of it. Inconvenience is the price we pay for security. However, FreeNet provides you with information about how many nodes are connected and what your security level is, so you know what kind of speeds to expect.
what is freenet
FreeNet also estimates the download time and progress for each page you access.
freenet hidden websites
You can also chose to download the file in the background, and save it to a specific directory for later viewing. Or you can fetch the file, however it will only be accessible through FreeNet’s download page.
freenet hidden websites

 A Warning About Using FreeNet

Imagine a market scene like you might have seen in an Indiana Jones movie. People scurrying about, most of them just trying to make a living selling rugs or spices, but under the cover of the activity there are always those that are selling drugs or guns, or running gambling rings. There is a dark underbelly to the beast.
There is definitely this kind of illegal, and immoral, activity happening on FreeNet. Just don’t take part in it. Just like this kind of activity happens on the regular web that you use everyday, you just don’t take part in it and life is good.
freenet project
I believe that the more positive use of FreeNet there is, the less of the immoral activity there will be. The immoral don’t like being seen at all, and will scatter like cockroaches in the light, if more moralistic people are around them.

The Take Away

The regular web is a wonderful thing and useful beyond what we can even comprehend today. It is still in it’s infancy as a technology. Today, it is akin to the phone’s partyline, where anybody could pick up a phone and hear what’s happening to your great aunt Martha. Freenet is a step toward the privacy of having your own private phone line. The more people that use these private lines,  the more that the system will move to this privacy model. So use your party line if what you are talking about is of no significance, but pick up the FreeNet private line when you need to discuss things that really matter.
Have you used the FreeNet project before? Would you use it? Do you think it’s a waste of time for average folks? What other secure methods are there for communicating on the Internet? Let us know your thoughts and experiences in our comments section below. Just so you know, it is public.

Source: http://www.makeuseof.com/tag/freenet-the-private-internet/

June 12, 2013

How Does a Bittorrent Client Initially Discover Its Peers?

When your torrent client joins the swarm to share and gather file pieces, how exactly does it know where all its peers are? Read on as we poke around inside the mechanisms that undergird the BitTorrent protocol.
Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites.

The Question

SuperUser reader Steve V. had a very specific question about the Distributed Hash Table (DHT) system within the BitTorrent protocol:
I’ve already read this SuperUser answer and this Wikipedia article but both are too technical for me to really wrap my head around.
I understand the idea of a tracker: clients connect to a central server which maintains a list of peers in a swarm.
I also understand the idea of peer exchange: clients already in a swarm send the complete list of their peers to each other. If new peers are discovered, they are added to the list.
My question is, how does DHT work? That is, how can a new client join a swarm without either a tracker or the knowledge of at least one member of the swarm to exchange peers with?
(Note: simple explanations are best.)
His question in turn prompted a really detailed reply about the different functions of the BitTorrent system; let’s take a look at it now.

The Answer

SuperUser contributor Allquixotic offers an in depth explanation:
How can a new client join a swarm without either a tracker or the knowledge of at least one member of the swarm to exchange peers with?
You can’t. It is impossible.*
* (Unless a node on your local area network happens to already be a node in the DHT. In this case, you could use a broadcasting mechanism, such as Avahi, to “discover” this peer, and bootstrap from them. But how did they bootstrap themselves? Eventually, you’ll hit a situation where you need to connect to the public Internet. And the public Internet is unicast-only, not multicast, so you’re stuck with using pre-determined lists of peers.)

References

Bittorrent DHT is implemented via a protocol known as Kademlia, which is a special case of theoretical concept of a Distributed hash table.

Exposition

With the Kademlia protocol, when you join the network, you go through a bootstrapping procedure, which absolutely requires that you know, in advance, the IP address and port of at least one node already participating in the DHT network. The tracker that you connect to, for instance, may be itself a DHT node. Once you are connected to one DHT node, you then proceed to download information from the DHT, which provides you connectivity information for more nodes, and you then navigate that “graph” structure to obtain connections to more and more nodes, who can provide both connectivity to other nodes, and payload data (chunks of the download).
 
I think your actual question in bold — that of how to join a Kademlia DHT network without knowing anyother members — is based on a false assumption.
The simple answer to your question in bold is, you don’t. If you do not know ANY information at all about even one host which might contain DHT metadata, you are stuck — you can’t even get started. I mean, sure, you could brute force attempt to discover an IP on the public internet with an open port that happens to broadcast DHT information. But more likely, your BT client is hard-coded to some specific static IP or DNS which resolves to a stable DHT node, which just provides the DHT metadata.
 
Basically, the DHT is only as decentralized as the joining mechanism, and because the joining mechanism is fairly brittle (there’s no way to “broadcast” over the entire Internet! so you have to unicastto an individual pre-assigned host to get the DHT data), Kademlia DHT isn’t really decentralized. Not in the strictest sense of the word.
 
Imagine this scenario: Someone who wants P2P to stop goes out and prepares an attack on all commonly used stable DHT nodes which are used for bootstrapping. Once they’ve staged their attack, they spring it on all nodes all at once. Wham; every single bootstrapping DHT node is down all in one fell swoop. Now what? You’re stuck with connecting to centralized trackers to download traditional lists of peers from those. Well, if they attack the trackers too, then you’re really, really up a creek. In other words, Kademlia and the entire BT network is constrained by the limitations of the Internet itself, in that, there is a finite (and relatively small) number of computers that you would have to successfully attack or take offline to prevent >90% of users from connecting to the network.

 Once the “pseudo-centralized” bootstrapping nodes are all gone, the interior nodes of the DHT, which are not bootstrapping because nobody on the outside of the DHT knows about the interior nodes, are useless; they can’t bring new nodes into the DHT. So, as each interior node disconnects from the DHT over time, either due to people shutting down their computers, rebooting for updates, etc., the network would collapse.


Of course, to get around this, someone could deploy a patched BitTorrent client with a new list of pre-determined stable DHT nodes or DNS addresses, and loudly advertise to the P2P community to use this new list instead. But this would become a “whack-a-mole” situation where the aggressor (the node-eater) would progressively download these lists themselves, and target the brave new bootstrapping nodes, then take them offline, too.
Not only did we learn the answer to the original question but we also learned quite a bit about the nature of the BitTorrent system and its vulnerabilities.

Source: http://www.howtogeek.com/163751/how-does-a-bittorrent-client-initially-discover-its-peers/?utm_source=newsletter&utm_medium=email&utm_campaign=120613

For further reading, see MakeUseOf's Bittorrent guide here:

http://www.makeuseof.com/pages/free-torrent-guide