Frage zu Artikel "Legitimate Applications of Peer-to-Peer Networks"