Fact-checked by Grok 2 weeks ago

WASTE

WASTE is a (P2P) and protocol and software application for secure , group chat, and over decentralized networks. Developed by at , it was released on May 28, 2003, but removed from public access shortly thereafter by Nullsoft's parent company due to concerns over its potential for unauthorized . The software enables users to create private, encrypted "nullnets" using a shared for , facilitating and data exchange among small groups without central servers. Key features include with 1,536-bit keys, cross-platform support (primarily Windows, with server capabilities), and tools for file transfers and IRC-style channels. Open-sourced after its initial withdrawal, WASTE influenced later privacy-focused P2P technologies despite its short commercial lifespan.

History and Development

Origins and Creation

WASTE was developed in 2003 by Justin Frankel, the principal developer at Nullsoft, the company he co-founded in 1997 as a 19-year-old programmer in Sedona, Arizona. Frankel had previously gained prominence for creating Winamp, a groundbreaking free MP3 player released in 1997 that revolutionized digital music playback and attracted millions of users. His experience at Nullsoft, which was acquired by AOL in 1999 for around $100 million, included another unauthorized project: the 2000 release of Gnutella, an open-source peer-to-peer file-sharing protocol that similarly bypassed corporate oversight and sparked legal controversies. Motivated by a desire to innovate in decentralized networking beyond large-scale public systems like Gnutella, Frankel pursued friend-to-friend (F2F) architectures to enable secure communication among small, trusted groups. The project began as an unauthorized side endeavor at , reflecting Frankel's rebellious streak and interest in privacy-focused technologies. He quietly developed and posted the initial version of WASTE on Nullsoft's website on May 28, 2003, without formal approval from , intending it initially for internal use such as secure between AOL's offices in and . This stealthy launch underscored Frankel's pattern of and open-source advocacy, honed through his earlier successes at . The name WASTE draws inspiration from Thomas Pynchon's 1966 novel , where it serves as an for "We Await Silent Trystero's Empire," symbolizing a , communication that operates parallel to official systems. This literary reference aligned with Frankel's vision of building covert, resilient channels for amid growing concerns over and centralized control in the early 2000s . Frankel's initial design goals centered on establishing a fully decentralized system tailored for trusted users, eschewing central authorities to prioritize and . The aimed to facilitate encrypted , private messaging, and group chats within small networks—typically limited to dozens of participants—using a where connections form only between authenticated peers, creating a overlay on the . This F2F approach was intended to mitigate risks associated with open networks, allowing users to build private "wastes" based on personal relationships rather than anonymous participation.

Release and Initial Controversy

WASTE was released on May 28, 2003, by Nullsoft's principal developer, Justin Frankel, who uploaded the software to the company's website without authorization from its parent company, America Online (AOL). The application was distributed under the GNU General Public License (GPL), enabling open-source modification and redistribution, and was initially intended for secure, encrypted communication among small groups, such as internal file sharing between AOL's offices. Within 24 hours of its availability, AOL removed WASTE from the Nullsoft site, citing the lack of internal approval and potential legal risks associated with distributing software, echoing concerns from Nullsoft's earlier unauthorized release in 2000. AOL replaced the download page with a notice revoking all rights to the software and demanding that users cease distribution, arguing that the release violated company policy and could expose the firm to liabilities in an era of heightened scrutiny over file-sharing technologies. The swift takedown sparked immediate community backlash, with the software garnering widespread attention on tech forums like , where it received thousands of downloads before removal. In response, developers and enthusiasts quickly mirrored the GPL-licensed code on , where the project was registered on May 30, 2003, ensuring its continued availability and preservation as despite AOL's efforts to suppress it. Amid the controversy, Frankel threatened to resign from on June 2, 2003, though he ultimately departed in January 2004. Early media coverage in outlets such as , , and BetaNews highlighted WASTE's potential for private, encrypted networking, framing it within broader discussions on implications during the era of expanding and enforcement. These reports emphasized how the software could enable "darknets" for secure group communication, raising questions about corporate control over innovative tools amid growing public concerns over and government monitoring.

Technical Overview

Protocol Fundamentals

WASTE is a (F2F) designed to function as a (VPN) over the , facilitating and data exchange among a closed group of users without exposing participants to the broader network. It operates by creating encrypted tunnels between trusted peers, enabling features such as and in a manner that mimics a while leveraging (P2P) connections. This architecture emphasizes and by limiting connectivity to pre-approved contacts, distinguishing it from open P2P systems that allow connections from unknown parties. The protocol employs a fully decentralized structure, eschewing central servers in favor of direct interactions among users who mutually trust one another. Connections are established exclusively between known individuals, forming a resilient where each can route traffic through intermediaries if direct paths are unavailable. This reliance on trusted peer connections ensures that the network remains insular and resistant to external interference or , as no or authority controls access or data flow. Communication in WASTE utilizes TCP port 1337 by default, allowing peers to initiate and maintain connections over standard infrastructure. The protocol is optimized for small-scale deployments, with recommendations for networks comprising 10 to 50 nodes to maintain performance and manageability. In basic operation, users exchange public keys with selected contacts to authenticate and establish secure links; once connected, these peers form a dynamic that routes messages and files through the network, ensuring end-to-end delivery within the trusted group. Encryption underpins all transmissions to protect content integrity and , though specific mechanisms are abstracted at this foundational level.

Encryption and Authentication

WASTE utilizes to authenticate peers and enable secure exchange of symmetric session keys, ensuring that only verified trusted parties can establish within the network. keys are generated with sizes of 1024 bits or larger, defaulting to 1536 bits, providing robust asymmetric security for the initial process. Public-private key pairs in WASTE are derived from a user-supplied , which seeds a cryptographically secure generator based on reference implementations, incorporating hashing and gathered from user input such as mouse movements during setup. This passphrase-based derivation ties the identity of each peer to a unique key pair, with the private key protected by the passphrase to prevent unauthorized use. The resulting keys support both peer via public key hashes and the of session keys during establishment. Data protection in WASTE relies on the symmetric operating in Propagating Block Chaining (PCBC) mode, a variant of that incorporates to enhance and . Session keys consist of 64-byte random values generated for each , exchanged securely via . The first 56 bytes are XORed to derive the Blowfish key (448 bits maximum strength), while the last 8 bytes serve as initialization vectors specific to each connection direction, preventing replay attacks and ensuring unique encryption streams. These keys provide confidentiality for all transmitted data. All traffic in , including messages and file transfers, undergoes , meaning content remains protected from intermediaries and can only be decrypted by the intended recipient peers using the shared s. The process begins with out-of-band sharing of public keys or their SHA-1 hashes, often manually verified through channels to bootstrap . Upon connection attempt, peers perform a challenge-response : one peer sends random bytes and an encrypted hash of its public key, the responder verifies and reciprocates, followed by RSA-encrypted exchange of s and vectors, confirmed via the random challenges to prevent man-in-the-middle attacks. This ensures that only authenticated peers derive the final XOR-combined needed for decryption.

Network Architecture

Core Network Mechanics

WASTE employs a topology, forming a distributed where connect in a partial mesh configuration to enable direct and indirect communication without relying on centralized . Each functions both as a client and a , provided it is not blocked by a on the default (typically ), allowing the network to scale with additional participants who accept incoming connections. This setup ensures that traffic is routed through multiple , with each participant relaying data for others to obfuscate the origins of communications and enhance overall within the closed group. Connection establishment begins with users manually adding trusted peers by providing their IP addresses or DNS names alongside public keys, which are used for authentication via RSA cryptography to verify identities and exchange session keys. This process creates a closed limited to explicitly authorized participants, often identified by a shared network name or ID, restricting access to small, trusted groups of 10-50 nodes to maintain security and manageability. Once connected, nodes dynamically form links based on availability, prioritizing paths of lowest latency to distribute traffic efficiently across the mesh. Traffic handling incorporates load balancing by routing data via the lowest-latency paths available, which helps prevent bottlenecks and improves network resilience against failures or disconnections. As more s join and accept connections, the strengthens, reducing the load on individual links and enabling redundant pathways for reliable transmission. This mechanism, while not perfectly optimized, effectively balances the network's operational demands in a decentralized environment. Search functionality operates through decentralized indexing, where queries are broadcast across the connected nodes to locate files or users without a central directory. Users can initiate searches directly, with results drawn from the shared resources of currently online participants, supporting virtual directory browsing to identify available content within the network. This approach maintains the distributed nature of the system, ensuring no single point of failure in discovery processes.

Nullnets and Passphrase Usage

In , nullnets represent open, public configurations of the that operate without a required or network identifier, enabling broader accessibility through the exchange of public keys. Users join these networks by posting their credentials—typically consisting of a username, public key, and connection details—to the WASTE Key Exchange, a community-maintained resource for coordinating participation. This setup allows for decentralized connections among potentially untrusted parties, with one prominent nullnet historically supporting 20 to 30 active users as of the late . The , interchangeably referred to as the name or , serves as a that derives a unique network identifier, ensuring between distinct groups and preventing accidental mergers or overlaps. Integrated into the protocol's cryptographic processes, such as the RSA-based using hashing, the is case-sensitive and must match exactly for peers to authenticate and route within the same logical . Without it, as in nullnets, networks can seamlessly merge, facilitating public discourse but increasing exposure risks. For private networks, best practices emphasize selecting long, random passphrases composed of mixed characters to generate robust identifiers and minimize collision probabilities, where unrelated networks with identical passphrases could inadvertently interconnect via mesh routing paths. The password—distinct but complementary—should also employ strong, unique compositions (e.g., incorporating uppercase, lowercase, numbers, and symbols) to secure keys, avoiding reuse across installations or storage on shared systems. A representative example contrasts the primary nullnet, used for exploratory or community-wide interactions with lower trust assumptions, against passphrase-secured setups for intimate friend groups, where the identifier enforces strict boundaries and enhances through controlled .

Features and Capabilities

Messaging and Chat Functions

WASTE's functionality enables direct text exchange between connected users, providing a for private conversations within the network. To initiate a , users right-click on a peer's name in the main interface and select the chat option, mimicking the operation of conventional applications like or . Presence indicators appear alongside connected users in the main window, displaying their online status to facilitate real-time communication. Group chats in are facilitated through dynamic, IRC-style chat rooms designed for multi-user discussions, routed across the peer-to-peer mesh for participants within the same . Visible public channels, such as #wanparty, are listed at the bottom of the main window and can be joined by double-clicking, while private or hidden rooms require manual commands like /join &hidden entered via the chat interface. These rooms operate exclusively among users sharing the network passphrase, effectively limiting access to invited participants through the closed-group structure. The original software's centers on a integrated into the main , which enumerates all connected peers along with their status, addresses, and trust ratings for quick access to functions. Pseudonymous nicknames are assigned during initial setup and serve as identifiers in all messaging interactions, allowing users to maintain without revealing real identities. While the does not support dedicated offline queuing, direct messages require active peer connections, with any pending communication deferred until reconnection through the . Integration with the network ensures that all instant messages and exchanges follow encrypted paths across the decentralized topology, leveraging for secure routing among trusted nodes. Setup for messaging begins with key pair generation in the application, followed by manual exchange of public keys with contacts via methods, and connection using their or DNS addresses; the is configured in the setup to personalize interactions from the outset. Usage involves monitoring the buddy list for availability and initiating chats either privately or in rooms, with all text transmissions broadcast or routed solely within the passphrase-defined group to preserve the closed ecosystem.

File Sharing Mechanisms

WASTE employs a decentralized system designed for secure distribution among trusted peers, emphasizing through limited rather than open indexing. Users can share files by designating specific directories, which are automatically indexed for within the network. This approach allows for direct transfers without relying on centralized servers, aligning with the protocol's focus on small, closed groups. File discovery occurs via keyword-based searches that propagate through the connected network. Peers initiate queries using simple text strings, such as entering search terms in the interface or via commands like "/search filename.ext," which broadcast the request to all accessible nodes. Matching files from shared directories on other peers are returned as results, enabling users to browse and select items for download without a global directory. This propagation is confined to the trust network, ensuring searches do not extend beyond authorized connections. Once located, files are transferred using a direct peer-to-peer protocol and bandwidth throttling to manage network resources. Users can configure upload and download limits, for example, setting incoming transfers to 60-70 KB/s on a 768k DSL connection, to prevent overload. The transfers window monitors progress, allowing manual control over active sessions. Additionally, chat integration permits sharing file links directly in conversations for seamless access. Shared folders form the core of the system, where users select directories to expose to the network. Enabling the "Index files, allow searching and browsing" option automatically catalogs contents for trusted peers holding the appropriate public keys, facilitating access without manual uploads. This setup promotes efficient among small groups, such as friends or collaborators, by keeping files locally hosted and queryable only within the passphrase-protected nullnet. The mechanisms are optimized for small-scale networks, typically limited to around 50 users, to preserve privacy and performance. Without global indexing, avoids the vulnerabilities of large systems, focusing instead on trusted, connections that prevent widespread exposure. This design choice prioritizes for intimate networks over for mass distribution.

Security Analysis

Strengths in and

WASTE's design emphasizes robust anonymity by operating as a friend-to-friend (F2F) protocol, restricting connections exclusively to pre-approved trusted peers through manual public key exchanges, thereby preventing exposure to external observers or unverified users. This F2F model ensures that network participation is limited to a closed group, reducing the risk of infiltration and enhancing overall privacy within the trusted circle. A key strength in anonymity stems from comprehensive traffic obfuscation, where all communications are transmitted as uniform encrypted streams, making it difficult for adversaries to perform traffic analysis and distinguish between message types, file transfers, or idle connections. The protocol employs RSA for secure session key exchange and authentication, paired with Blowfish encryption in PCBC mode for link protection, which further conceals data patterns and origins across the network. The fully decentralized architecture eliminates single points of failure, as the partial mesh topology allows messages to traverse multiple redundant paths among nodes, enabling the network to remain operational even if individual nodes go offline or experience outages. This resilience is inherent to the structure, where each participant can act as both client and router without relying on central servers. Strong is enforced via the F2F paradigm, confining interactions to explicitly authorized peers and preventing unauthorized access or by outsiders, which bolsters security in sensitive communications. In small groups of 10 to 50 nodes, achieves high efficiency with low , as searches and transfers occur rapidly within the limited scope, avoiding the overhead of large-scale mechanisms.

Identified Vulnerabilities and Flaws

The WASTE protocol employs Blowfish in Propagating Cipher Block Chaining (PCBC) mode for link-level encryption, a non-standard mode that introduces significant cryptographic weaknesses. PCBC is malleable, allowing an attacker with access to ciphertexts to modify them in ways that produce predictable changes in the decrypted plaintext without knowledge of the key. This vulnerability enables chosen-ciphertext attacks, where an adversary can forge valid messages or existential forgeries by exploiting the mode's structure, particularly when combined with known plaintext blocks. For instance, interchanging adjacent ciphertext blocks can alter the message integrity without immediate detection, as the mode propagates errors but does not inherently provide authentication beyond basic checks. These flaws were analyzed in detail, demonstrating that PCBC variants like PCBC+ permit forgery attacks with complexity as low as O(2^{n/2}) operations using the birthday paradox for malleability exploitation. A core operational flaw in stems from its reliance on unverified nicknames for user identification within the network. While authenticates peer connections, nicknames are assigned arbitrarily and not bound to keys or certificates, permitting any participant to impersonate another by adopting the same nickname. This enables spoofing attacks, where a malicious peer can masquerade as a trusted contact to disseminate false information, inject malicious files, or disrupt functions without detection by other users. The protocol's design assumes trust among peers but lacks mechanisms to verify or challenge nickname uniqueness, exacerbating risks in larger networks. This issue was partially mitigated in version 1.6 by displaying public key hashes alongside nicknames. WASTE lacks a built-in protocol-level for dynamic expulsion or of misbehaving peers. Once added via public , peers can be manually removed by individual users deleting the corresponding key files, but full exclusion requires coordinated action by all participants. This manual process can lead to fragmented if not all peers synchronize removals, resulting in persistent exposure to compromised or adversarial nodes until resolved offline. Reconnection issues further compromise operational reliability in WASTE, particularly with dynamic IP addresses common in residential . The protocol does not automatically handle IP changes or beyond initial setup, necessitating manual intervention—such as updating host lists or using static DNS entries—to reestablish links. This leads to frequent downtime, as peers behind changing IPs become unreachable until manually re-added, disrupting and continuity. Without built-in or heartbeat mechanisms for IP updates, experience intermittent , especially in mobile or unstable environments.

Implementations and Evolution

Original Software Versions

The original WASTE software, developed by , debuted in May 2003, establishing basic (F2F) connectivity for secure, encrypted communication among small trusted groups. This initial release focused on core mechanics like key exchange and Blowfish encryption to enable , group chat, and without central servers, prioritizing and . Development progressed through several iterations, culminating in stable releases up to version 1.7 in 2008 and the final official update, 1.7.4, on December 24, 2008. These later versions introduced enhancements, such as improved buddy lists and network status displays, alongside bug fixes to enhance reliability and usability, while maintaining with earlier builds for established networks. Experimental branches emerged to optimize performance, notably variants employing a 16k packet size that reduced overhead and boosted transfer speeds compared to the standard packet limit. However, these modifications rendered them incompatible with conventional networks, limiting their adoption to specialized testing environments. The core protocol demonstrated stability across versions, supporting consistent mesh topologies without major disruptions. WASTE was primarily designed for Windows platforms, offering a full (GUI) client and server for Win98 and later systems, with no official cross-platform ports during Nullsoft's stewardship. This Windows-centric approach aligned with Nullsoft's expertise in the ecosystem but restricted broader accessibility until community efforts later expanded support.

Forks and Modern Derivatives

Following the discontinuation of official development by in 2008, community efforts led to several forks and derivatives of , primarily hosted on , aimed at enhancing compatibility, security, and functionality for modern use cases. The primary continuation, the project, maintains the core protocol while extending support to multiple platforms including limited native implementations for BSD, , , and full support for Windows, with a cross-platform beta (wxWaste) using . This adaptation addresses the original Windows-only limitation, allowing broader accessibility for encrypted collaboration in small groups. One notable early fork is WASTE Again, initiated from WASTE version 1.5.0.408 beta 3, which introduces universal plug-and-play (uPnP) for simplified network configuration without manual router adjustments, SOCKS4a proxy awareness, and full compatibility with Tor for anonymous routing. This derivative, licensed under GPLv2, evolved into version 1.8 and serves as a foundation for further enhancements, focusing on ease of setup and integration with privacy tools. BlackBelt WASTE represents an ongoing modern derivative, building on these efforts to create AI-enhanced private networks with support for IPv4, (v2/v3 onion addressing), and (via proxy) to bolster anonymity in mixed environments. Released under GPLv3, version 1.8 (latest build as of October 2025) includes voice-over-IP (VoIP) capabilities for secure conferencing, distributed AI-driven performance tuning, recurrent neural networks for in audio, and for handling over 1,000,000 queued files up to 4TB each, achieving transfer rates exceeding 80 MB/s per connection in IPv4 mode. These additions emphasize high-impact and improvements for contemporary applications. Other minor forks, such as Swarm Darknet, extend WASTE's framework with similar integrations and large-scale file queuing, while community discussions highlight efforts to mitigate known vulnerabilities in the original PCBC encryption mode, which is susceptible to attacks like adjacent block swapping that compromise confidentiality. These derivatives prioritize seminal enhancements, such as stronger and anti-spoofing measures using 3072-bit public-key infrastructure, to improve overall protocol resilience without altering the decentralized mesh topology.

Legacy and Impact

Influence on P2P and Darknet Technologies

WASTE represented an early implementation of friend-to-friend (F2F) darknets, enabling small, trusted groups to form encrypted overlay networks for private communication and file sharing without relying on public infrastructure. Its architecture, which limited connections to pre-approved peers, shares similarities with trusted overlay networks in later privacy-oriented systems, including Freenet's Darknet mode and I2P's garlic routing for anonymity. The protocol demonstrated the feasibility of closed, resilient peer-to-peer (P2P) groups for private use. The protocol's integration of strong encryption for all links, combined with optional traffic padding to obscure patterns, underscored the importance of end-to-end security in environments. Post-2003 academic papers analyzed 's flooded query mechanism and for balancing privacy against vulnerabilities like in group settings. was noted as similar to other trusted connection networks like the Dark Freenet. Following its abrupt removal by in May 2003 amid internal controversy, 's GPL-licensed found refuge on , where community maintainers continued development and created derivatives like BlackBelt WASTE. This hosting enabled ongoing enhancements, such as cross-platform portability and integration with anonymizing tools, preserving the software's viability despite corporate intervention. The episode encapsulated a cultural pushback against corporate oversight in open-source P2P development, as creator Justin Frankel's unauthorized release challenged AOL's policies and galvanized support for autonomous, user-driven networks. WASTE thus became a symbol of defiance, encouraging the ethos of in communities and reinforcing the value of over proprietary control.

Comparisons to Contemporary Protocols

WASTE's (F2F) architecture confines connectivity to manually approved peers, fostering a straightforward model ideal for small, closed groups but inherently limiting and dynamic expansion compared to 's protocol. Tor enables anonymous traversal of the public internet via layered across a vast volunteer-operated relay network, supporting broader access without requiring personal introductions between users. Similarly, while shares darknet aspirations with by prioritizing secure, internal communications, accommodates larger, more fluid networks through garlic routing, which bundles messages for enhanced anonymity and resilience against . , by contrast, emphasizes static, invite-only topologies suited to intimate collaborations rather than 's scalable, peer-managed hidden services ecosystem. In comparison to modern VPN protocols like , WASTE's decentralized mesh topology offers greater distribution of control and resistance to single points of failure, but at the cost of complex initial peer bootstrapping and configuration. prioritizes high-speed, lightweight point-to-multipoint connections with minimal overhead and straightforward key-based setup, making it more accessible for everyday secure tunneling over the open . By 2025, forks such as BlackBelt have evolved WASTE by integrating and transports, as well as AI features and conferencing, enabling hybrid overlays that extend reach beyond pure F2F while preserving core , though these remain specialized tools overshadowed by the ubiquity of and commercial VPNs in mainstream adoption.

References

  1. [1]
    Criteria for the Definition of Solid Waste and Solid and Hazardous ...
    Sep 8, 2025 · "Solid waste" means any garbage or refuse, sludge from a wastewater treatment plant, water supply treatment plant, or air pollution control facility and other ...Missing: context | Show results with:context
  2. [2]
    Resource Conservation and Recovery Act (RCRA) Overview | US EPA
    Sep 5, 2025 · Solid waste includes solids, liquids and gases and must be discarded to be considered waste. Congress has amended RCRA several times, which ...Missing: context | Show results with:context
  3. [3]
    How the World Bank is tackling the growing global waste crisis
    May 16, 2025 · Every year, the world produces over two billion tonnes of municipal waste, a figure expected to rise by 73 percent to nearly four billion ...
  4. [4]
    Wastes | US EPA
    Jun 17, 2025 · Many different types of waste are generated, including municipal solid waste, hazardous waste, industrial non-hazardous waste, agricultural and animal waste, ...
  5. [5]
    Waste Pollution 101 - UNEP
    Waste pollution is a cross-cutting issue that disrupts ecosystems' integrity and services, threatens to undermine economic prosperity, and harms human health ...
  6. [6]
    Non-Hazardous Materials and Waste Management Hierarchy - EPA
    Aug 20, 2025 · Source reduction, also known as waste prevention, means reducing waste at the source, and is the most environmentally preferred strategy.
  7. [7]
    Solid waste management | UNEP - UN Environment Programme
    Nov 9, 2022 · Poor waste management - ranging from non-existing collection systems to ineffective disposal -causes air pollution, water and soil contamination ...
  8. [8]
    The Men Who Stole the World -TimeFrames- Printout - TIME
    Nov 24, 2010 · In 1997, Justin Frankel, an 18-year-old hacker in Sedona, Ariz ... With Nullsoft, Frankel's modus operandi had been to write the best ...Missing: WASTE origins
  9. [9]
    Justin Frankel Rocks On | WIRED
    Oct 2, 2006 · After selling his startup Nullsoft and the hit music application Winamp for $100 million to the world's then most powerful internet company, ...Missing: background F2F
  10. [10]
    Justin Frankel | MIT Technology Review
    By the time Frankel released Gnutella in 2000, he had sold Nullsoft, the company under which he developed Winamp and Gnutella, to America Online.AOL paid ...Missing: F2F | Show results with:F2F
  11. [11]
    WASTE Documentation Rev. 5 - SourceForge
    WASTE history: The quiet launch of WASTE was the work of Nullsoft's principal developer, Justin Frankel, a soft-spoken 20-something known for his tech savvy ...Missing: protocol origins
  12. [12]
    Controversial Winamp creator resigns from AOL - CNET
    Jan 26, 2004 · In May 2003, Frankel was forced to pull a software program called Waste, which let users set up private networks equipped with peer-to-peer ...Missing: protocol origins
  13. [13]
    The World's Most Dangerous Geek - by David Kushner - Disruptor
    Feb 11, 2022 · Taking the name from an underground postal system in the Thomas Pynchon novel The Crying of Lot 49, Frankel created Waste: a "private workspace, ...
  14. [14]
    [PDF] Copyright and Shared Networking Technologies - QMRO Home
    Aug 15, 2010 · 226 WASTE is an acronym for ‗We Await Silent Tristero's Empire', a reference to T. Pynchon's novel. The Crying of Lot 49. It was developed by ...
  15. [15]
    [PDF] Decentralized Online Social Networks - ResearchGate
    [Gol07], there is a motivation ... social networks to discover friends to build a Virtual Private Network (VPN) ... Justin Frankel. Waste P2P Darknet, 2003. http ...
  16. [16]
    Nullsoft's Waste: Encrypted, Distributed, Mesh Net - Slashdot
    May 29, 2003 · Then someone (Justin Frankel?) leaked the source and the rest is history. ... Copyright (C) 2003 Nullsoft, Inc. WASTE is free software; you ...
  17. [17]
    Nullsoft Encrypts Communication with WASTE - BetaNews
    May 28, 2003 · The brainchild of Winamp creator Justin Frankel, WASTE utilizes encryption and public keys to keep sensitive data hidden from prying eyes. WASTE ...Missing: protocol origins
  18. [18]
    AOL pulls Nullsoft file-sharing software - CNET
    May 30, 2003 · Waste had been used internally to share files between AOL's San Francisco office, where Nullsoft is based, and its Dulles, Va., headquarters, ...Missing: April controversy removal
  19. [19]
    AOL Execs Flush Nullsoft's WASTE - BetaNews
    May 30, 2003 · In a notice posted to the former WASTE Web site, AOL said the release was "unauthorized" and revoked all rights to the software, demanding ...Missing: April controversy
  20. [20]
    What a Waste -- AOL removes access to file-sharing software
    "A day after developers at America Online's Nullsoft unit quietly released file-sharing software, AOL pulled the link to the product from the subsidiary's Web ...Missing: removal | Show results with:removal
  21. [21]
    WASTE
    ### Summary of WASTE Project
  22. [22]
    waste - security model and implementation - Free
    WASTE builds a distributed network of hosts, and secures each link in the network. In securing each link, WASTE also authenticates each link using public keys.
  23. [23]
    [PDF] DEPARTMENT OF APPLIED PHYSICS AND ELECTRONICS UME ...
    • jWASTE - WASTE is a software protocol that enables secure distributed communication for small trusted groups of users. This project will extend the ...
  24. [24]
    WASTE Documentation Rev. 6
    Some history of WASTE. The quiet launch of WASTE was the work of Nullsoft's principal developer, Justin Frankel, a soft-spoken 20-something known for his ...Missing: origins | Show results with:origins
  25. [25]
    Active Nullnet - WASTE / Discussion / Networks - SourceForge
    Feb 20, 2008 · There is one public active nullnet i know of, it has about 20~30 active users. If you like to connect to this nullnet or connect your own ...
  26. [26]
    [PDF] Private Communication Through a Network of Trusted Connections
    In this type of network (sometimes called a Darknet, or a friend-to-friend network) every participant communicates directly only with his own trusted peers ...
  27. [27]
    waste :: home
    WASTE is RSA secured, and has been hearalded as the most secure P2P connection protocol currently in development. For technical information please see " ...
  28. [28]
    [PDF] Cryptanalysis of Two Variants of PCBC Mode when used for ...
    We first examine a variant, identified below as PCBC+, which was one of the first ever proposals for a block cipher mode of operation designed to provide both ...
  29. [29]
    WASTE again
    - **Project Description**: A fork of WASTE 1.5.0.408 beta 3, starting from version 1.5.1.412 beta 3.
  30. [30]
    BlackBelt WASTE - ipv4/Tor/i2p +AI+Voice download - SourceForge
    Rating 5.0 (1) · FreeOct 12, 2025 · A WASTE client. Download and create your own WASTE networks. Move 1000's of GB's at 100MB+ per sec. (800 Mbits per sec) FULL pause and resume capable.Missing: passphrase | Show results with:passphrase
  31. [31]
    BlackBelt WASTE - ipv4 / Tor / i2p + AI
    ### Summary of Swarmdarknet Project
  32. [32]
    [PDF] Defending Privacy: the Development and Deployment of a Darknet
    PCBC mode which WASTE Again uses and is known to have vulnerabilities [10] ... A range of tests were carried out from the domain of security, usability, ...<|separator|>
  33. [33]
    [PDF] The Darknet: A Digital Copyright Revolution
    [32] Users often refer to darknets for file sharing as friend-to-friend (F2F) ... like the aptly named WASTE, a parasitic darknet capable of secretly piggybacking ...
  34. [34]
    [PDF] THE EVOLUTION OF P2P NETWORKS FOR FILE EXCHANGE: THE ...
    Perhaps the most popular darknet to date is WASTE, an open source project created in. 2003 by the P2P hacker Justin Frankel, also creator of the original ...
  35. [35]
    [PDF] How to Disappear Completely: A Survey of Private Peer-to-Peer ...
    WASTE [32, 33] is a group-based network created by Justin Frankel, the author of. Gnutella. ... The impact of free-riding on peer-to-peer ... WASTE peer-to-peer ...Missing: influence | Show results with:influence
  36. [36]
    Private Communication Through a Network of Trusted Connections
    In this type of network (sometimes called a Darknet, or a friend-to-friend network) every participant communicates directly only with his own trusted peers ...<|control11|><|separator|>
  37. [37]
    Nullsoft founder fed up with AOL control - ZDNET
    Jun 4, 2003 · Frankel's comments come less than a week after AOL pulled a program he authored called Waste that enables small groups of people to create ...
  38. [38]
    Nullsoft founder tired of AOL's attitude [updated] - Ars Technica
    Jun 3, 2003 · Frankel sold Nullsoft to AOL almost four years ago, but he remained onboard and has been involved with the unit since that time. However, last ...<|control11|><|separator|>
  39. [39]
    [PDF] Comparison of Anonymous Communication Networks-Tor, I2P ...
    The group of connected routers form a circuit of encrypted connections through relays on the Tor network. No individual resource on this relay path knows the ...
  40. [40]
    BlackBelt Privacy Tor/i2p+WASTE+VidVoIP - SourceForge
    Rating 4.7 (10) · Free · WindowsWASTE - friendly support. Built-in NULLNET. WASTE networks IPv4 (ip), Tor (Onion), or i2P (eep); Share URL's or SIP addresses. WASTE will initiate a call ...