Hiding Data Sources in P2P Networks Marek Klonowski, Miroslaw Kutylowski, Bartlomiej Rozanski We propose a peer-to-peer (P2P) architecture where the identity of nodes holding data remains hidden, but the information itself can be efficiently fetched. This architecture can be used to protect P2P networks against malicious attacks towards nodes holding important data. In particular, our protocol can be used for maintaining access to revocation lists, blacklists and similar data, which is of growing importance for modern P2P protocols.