Peer-to-Peer Technology to Trump Traditional Cloud Storage

On a lovely Thursday afternoon in June, I sat down with Sarah Koo, a data scientist with BitTorrent. I grew up in a time and place where Peer-to-Peer (P2P) transfer was almost commonplace, and I was fortunate enough to have the opportunity to learn more about this unique technology.


When Peer-to-Peer transfer is mentioned, the subject of copyright protection is the first thing to come to mind. Though P2P transfer is used, at times, to download Game of Thrones, the technology itself is an innovative protocol designed to efficiently transfer large files. I want to make an explicit statement that neither I, Sarah, nor BitTorrent, condones any forms of illegal file transfers. I am advocating the technology itself, which is commonly used in both academia and business. 


Bram Cohen created the Peer-to-Peer transfer protocol about a decade ago. This genius literally coded the program by himself in his bedroom, like many of our city’s tech entrepreneurs. Traditional file transfer protocols connected downloaders to a single server for direct file transfers. If there were 100 users downloading the same file, all these users would connect to the same server. Such traditional methods resulted in significant speed reductions and heavy server strain as demand for the file increased. Cohen's application created a distinct virtual network per file that allowed any invited users to help with distribution.

a protocol that created a virtual network based on the file itself, thus anyone within the network can help distribute the file

Lets say UC Berkeley is working on a massive database, and it needs to distribute it to 10,000 researchers across the country. If each of these 10,000 researchers downloads the file directly from the Cal server, the strain on the single server is intense and extremely inefficient. P2P transfer creates a network that links all invited researchers together, and once any researcher finishes downloading the database, he can act as a file distributor for other researchers within the network. Thus, the strain of distributing the database is crowd sourced to all its participants. 

BitTorrent, the most popular P2P transfer application, breaks down large files into small segments for even more efficient distribution. If the database described above is 20-gigabytes; BitTorrent could break down the file into 20 equal sized 1-gigabyte files. “If I request the file from peers, I can be getting it from 20 different people at the same time.” Thus, each peer only needs to distribute 1/20th of the overall load.

breaks down large files into small segments for more efficient distribution

Because BitTorrent breaks down files into many individual segments, peers can act as distributors the moment they finish downloading any piece of the overall file. Once all the segments are downloaded, BitTorrent reassembles the original file as whole. The ability to deconstruct files and then reassemble the segments after the transfer protocol is complete is groundbreaking, especially in the field of cloud storage.

BitTorrent has utilized this technology to build sync applications that are commonly used in industries such as video editing. In Hollywood, uncut video files run in the hundreds of gigabytes. If multiple video editors are working on the same film, it’s inefficient to retransfer the whole video anytime a minute change is made. Many editors utilize this segmentation technology to transfer and sync only the portions that were altered. Instead of retransferring the whole 100gb video, Hollywood only transfers the 1gb scene that was actually edited. Now that’s efficiency.


In our current age of NSA surveillance and CISPA interrogation, privacy and security has become a major concern. BitTorrent is unique among cloud storage applications, because it’s only a protocol, and not a storage system. “There’s no copy of (your files) on our cloud.” “If the government would be to subpoena our records, we wouldn’t have anything to turn over.”

“If the government would be to subpoena our records, we wouldn’t have anything to turn over.”

The lack of centralized storage acts as both a blessing and a curse. On one hand, your files never leave your possession; on the other hand, there’s no backup other than your own. Obviously, there are ways to alleviate this issue, but it’s something to keep in mind. I want to emphasis again that BitTorrent is only a protocol, not a storage service. 

Finally, I want to mention another firm that utilizes a similar technology, or at least one that I found to be of some interest. Bitcasa acts as a traditional cloud storage service, but it’s developing a technology called Infinite Drive: When a duplicate file is uploaded, the protocol searches its database for preexisting files, and earmarks the original without uploading the duplicate. 

If two teenage girls upload the same Justin Bieber album, only one copy is actually stored on Bitcasa's servers. When the album is downloaded, both users access the same file. The technology is interesting, but there are significant areas of concern. If one user alters the album, how would it affect related users who share the same download address. I don’t think this technology is ready for widespread use, but it’s something to look out for in the future.

the word “traditional” to describe cloud storage

It’s funny; it seems like it was only yesterday that Dropbox launched, but this Generation Y technology has already become old news. Earlier in this article, I, inadvertently, used the word “traditional” to describe cloud storage; might as well get out the cane and monocle while at it. The future of file storage will take advantage of Peer-to-Peer transfer protocol. It’s an ingenious method that enables crowd sourcing to distribute large files, and it's capabilities are greatly magnified by BitTorrent’s segmentation technology.

Peer-to-Peer file transfer is secure; but more importantly, it’s efficient.

  • Apple Watch game lets you save ‘The Martian’ from your wrist

    Oct 4, 2015 | 03:13 am

    Apple Watch game lets you save ‘The Martian’ from your wrist This season's sci-fi movie hit centered around saving the life of a scientist stranded on Mars now has an accompanying Apple Watch game The Martian: Bring Him Home puts you in the role of a NASA worker who has the only contact with stranded astronaut Mark Watney (Matt Damon). See also: The science of 'The Martian': What checks out (and what doesn't) Like the book and the movie, the game, developed by Los Angeles-based Little Labs, is less based on action and more focused on the thrill of conquering challenges through deft use of science Image: little labs Although you don't get to play the most interesting role of the stranded astronaut solving scientific puzzles, the game does offer an interesting (albeit incredibly simplified) take on the less glamorous role of a NASA team member Read more...More about Games, Gaming, Android, Film, and Ios

  • Veep friend finder app races to 5,000 users in one week, dev says

    Oct 4, 2015 | 02:00 am

    The new meetup/hookup app Veep has raced to 5,000 users after launching a week ago in the App Store, says the app’s developer. Veep, which is free, combines interest-based dating/hookup/friending functions with secure messaging to create a very straight forward way to meet people. “Before I made Veep I noticed how nearly all of the other popular […]

  • How to (sort of) fly the Air Hogs Star Wars R/C X-Wing Starfighter

    Oct 4, 2015 | 01:00 am

    How to (sort of) fly the Air Hogs Star Wars R/C X-Wing Starfighter Our Product Analyst and resident X-Wing Starfighter Pilot, Raymond Wong, recently traveled to Central Park to test out the new Air Hogs R/C X-Wing Starfighter. Read more...More about Star Wars, Tech, Gadgets, X Wing, and Air Hogs

  • Tor browser co-creator: Experian breach shows encryption may not be security panacea

    Oct 4, 2015 | 00:30 am

    The Experian/T-Mobile hack may be more worrisome than Experian’s carefully worded description of it suggests, some security experts said Friday. One of them is the co-creator of the Tor secure browser David Goldschlag (now SVP of strategy at Pulse Secure). Goldschlag previously was head of mobile at McAfee, and also once worked at the NSA. I […]

  • Jet could win the online retail game with old-school ads

    Oct 3, 2015 | 23:00 pm

    GUEST: Jet is a newcomer in online retail, and it’s gotten some pretty impressive funding ($225 million to be exact) that it’s blowing through with a massive old school advertising campaign. If you live in a major city, you may have seen Jet’s ads on buses and taxis, in addition to the TV and digital ads […]

  • Data likely stolen from Experian/T-Mobile spotted for sale on dark web, says Trustev

    Oct 3, 2015 | 22:41 pm

    T-Mobile data stolen from the servers of credit bureau Experian is already showing up for sale on the dark web, says one security firm. The Irish fraud prevention startup Trustev, which monitors such data sales listings, sent VentureBeat screen shots of listings of data it believes originated from the Experian theft, which was reported Thursday. Experian failed to protect […]

  • LinkedIn pays big after class action lawsuit over user emails

    Oct 3, 2015 | 22:12 pm

    LinkedIn pays big after class action lawsuit over user emails The company known for using reminder emails to get you to use its professional networking service will now have to pay a hefty sum for taking the tactic a bit too far In an email sent by LinkedIn on Friday, users were notified that they were eligible for a class action settlement related to email marketing. The company has agreed to pay out $13 million to users who may have been impacted by its Add Connections service. The settlement stems from a 2013 class action lawsuit filed in California See also: Sony: Hack class-action lawsuit invalid because no one's ID has been stolen LinkedIn's Add Connections program allowed users to import their personal contacts into the company's system and then have invitations to connect on LinkedIn sent out on their behalf. However, if a recipient of the invitation email didn't accept the invitation within a certain amount of time, LinkedIn would then send two follow up emails repeating the invitation Read more...More about Email, Linkedin, Spam, Lawsuits, and Class Action Lawsuit

  • The Rise Of Entrepreneurial Communities

    Oct 3, 2015 | 22:00 pm

    The Rise Of Entrepreneurial Communities  This summer, as Chairman of the House Small Business Committee, I had the opportunity to honor an innovative business accelerator called First Batch. This isn’t your typical business accelerator. First Batch is a product accelerator in my hometown of Cincinnati, Ohio, that focuses on helping entrepreneurs and makers bring physical products to market. It’s a great resource… Read More

  • Meet the 27 all-star moderators for GamesBeat 2015

    Oct 3, 2015 | 21:00 pm

    I’m very proud to introduce a cast of characters that you won’t find together at any other event. Besides myself, the moderators of GamesBeat 2015 include the following people. As you can tell from the picture of the guy below, our moderators will show no mercy when necessary. But honestly, we’ve recruited them because they’re […]

  • The Force is not strong with Air Hogs' Star Wars R/C X-Wing Starfighter

    Oct 3, 2015 | 20:30 pm

    The Force is not strong with Air Hogs' Star Wars R/C X-Wing Starfighter Video: Mark Boyer, Noah Throop Ho ho ho, Merry Chri—Star Wars! Happy Hanuk—Star Wars! Happy Kwan-Star Wars! I can't help but have Star Wars on my mind 24/7. We're so close — mere months away — from the release of Star Wars Episode VII: The Force Awakens that I can feel the Force coursing through my very being. See also: Hasbro's remote-controlled BB-8 is bursting with charm, even when it fails The latest Star Wars tech toy to hit Mashable HQ is the Air Hogs Remote Control X-Wing Starfighter. If you’ve ever played with an Air Hog R/C toy, you already have an idea of what to expect. But if you’re like me and have never flown an Air Hog before, and have only seen them on TV commercials as a kid, you’re going to be disappointed. Read more...More about Rc, Toys, Remote Control, Star Wars, and Tech

  • Go 1,000 miles between fill-ups with Chevy's 2016 Volt

    Oct 3, 2015 | 20:15 pm

    Go 1,000 miles between fill-ups with Chevy's 2016 Volt "Range-extended EV" or "plug-in hybrid": Chevy doesn't care what you call the all-new 2016 Volt... so long as you buy one. If Chevy and its representatives had its druthers, however, you and I would refer to the Volt as a range-extended EV. That's because the compact five-seater can travel 53 miles in all-electric "EV" mode. And after the initial charge of the onboard lithium-ion batteries is depleted, the gasoline engine kicks on and can propel the Volt up to 420 miles on a single tank of gas. Thanks to the EV characteristics of the Volt, though, Chevrolet figures owners will be able to go 1,000 miles between trips to the gas station, as many of their trips will be all-electric and gas-free. Read more...More about Cars, Tech, Transportation, Chevrolet, and Volt

  • Pronoun, A Self-Publishing Platform For Authors, Is Ready To Serve Humanity

    Oct 3, 2015 | 19:59 pm

    Pronoun, A Self-Publishing Platform For Authors, Is Ready To Serve Humanity  Pronoun, a self-publishing system that aims to help authors get their books edited and printed, is beginning the long road to making it easier for self-published authors to get noticed. First stop? Getting authors onto the platform. The company, founded by Josh Brody and Ben Zhuk, raised $3.5 million in June to create books that people will read. The goal is noble: by bringing all of the… Read More