You are here: FIDIS Interactive > FIDIS Database on IMS > 

FIDIS Interactive

More about this database.

Database on Identity Management Systems


“Entropy (Version: 0.9.1-439)”:

Manufacturer of the IMS

  • “Pullmoll”,
  • URL: (Visit Homepage)
  • Nature of provider / distributor: private
  • Nationality of the manufacturer: Germany

Type of the IMS / Class of the IMS

  • Type of the IMS: N/A
  • Class of the IMS: Class 1

Supported languages

  • England: English
  • Germany: German

References for the IMS

Is the IMS an open/closed IMS?

State of IMS deployment

Distribution of the IMS

Geographic scope

Is the IMS an open/closed IMS?: Open

State of IMS deployment: Prototype

Distribution of the IMS: Public Domain

Geographic scope: Global

Hard and software requirements of the IMS

*nix, Windows, Mac OS X, Darwin, or Yellow Dog Linux, internet connection, at least 500MB disk-space, a free TCP-port, web-browser

Installed base of the IMS (Userbase)


Interoperability and supported standards

TCP/IP, Freenet Client Protocol (FCP)

Server-side component(s)

n.a. (P2P-network)

Client-side component(s)


Description of functionality / features (client and server)

Data stored in the network is being encrypted and divided into chunks. Chunks then are distributed on several peers. Entropy uses the Freenet Client Protocol (FCP).  It distributes or downloads pieces of data (chunks) to/from computers taking part in the Entropy-Network. Data is encrypted and secured against data-loss. It cannot be traced nor censored. Entropy enables anonymous distribution and retreival of data.

Main functionality

Entropy enables anonymous distribution and retreival of data.

Purchase costs in EUR


Flow charts of the IMS

Screenshots of the IMS

Click to enlarge

Other file resources


Evaluator of the IMS

Christian Krause (ICPP)

General Comments (free text)

Entropy is designed to meet several goals at once:

  1. Distributes documents in the network in a wide-spread manner, so that it is not practically possible to locate it (i.e. make censorship impossible).
  2. Keeps documents retrievable even if some of the nodes keeping copies of them are offline
  3. Hides from users, admins or authorities, what node on the network actually keeps parts (fragments, bit-chunks) of what documents (key encryption).
  4. Optimizes data retrieval for the most common user base with ADSL, where the downstream bandwidth is several times the upstream bandwidth (e.g. 768kbit/s vs. 128kbit/s with many German ISPs).
  5. Hides from network operators, what kind of communication happens between nodes of the network (transport encryption).

Back (This Record was last updated on: 18-03-2008 13:09)