<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: AFACT v iiNet: Day 7 &#8211; Investigators Condoned Infringement?</title>
	<atom:link href="http://torrentfreak.com/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 12:39:28 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: Borderliner</title>
		<link>/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/#comment-607933</link>
		<dc:creator><![CDATA[Borderliner]]></dc:creator>
		<pubDate>Fri, 16 Oct 2009 22:17:22 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=17939#comment-607933</guid>
		<description><![CDATA[The problem, I think, boils down to  one simple thing: AFACT ain´t saying how and what is exactly gathered. Unless they provide information confirming that the &quot;offenders&quot; were uploading (and not only uploading, but uploading correct data) then they can´t claim any non-authorized distribution was taking place. After all, just because a BT client announces that it has a certain hash doesn´t mean that it really does have the data that the hash is generated from.]]></description>
		<content:encoded><![CDATA[<p>The problem, I think, boils down to  one simple thing: AFACT ain´t saying how and what is exactly gathered. Unless they provide information confirming that the &#8220;offenders&#8221; were uploading (and not only uploading, but uploading correct data) then they can´t claim any non-authorized distribution was taking place. After all, just because a BT client announces that it has a certain hash doesn´t mean that it really does have the data that the hash is generated from.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: AFACT v iiNet: Day 8 – Anti-Piracy Evidence Lacking &#124; InstantIdiocy</title>
		<link>/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/#comment-607635</link>
		<dc:creator><![CDATA[AFACT v iiNet: Day 8 – Anti-Piracy Evidence Lacking &#124; InstantIdiocy]]></dc:creator>
		<pubDate>Thu, 15 Oct 2009 17:48:25 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=17939#comment-607635</guid>
		<description><![CDATA[[...] AFACT v iiNet: Day 8 – Anti-Piracy Evidence Lacking       Easy AdSense by Unreal    It’s day eight in the copyright infringement case of AFACT – representing several Hollywood studios – and Aussie ISP iiNet (earlier coverage of day one, day two, day three, day four , day five, day six and day seven). [...]]]></description>
		<content:encoded><![CDATA[<p>[...] AFACT v iiNet: Day 8 – Anti-Piracy Evidence Lacking       Easy AdSense by Unreal    It’s day eight in the copyright infringement case of AFACT – representing several Hollywood studios – and Aussie ISP iiNet (earlier coverage of day one, day two, day three, day four , day five, day six and day seven). [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: 5318008</title>
		<link>/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/#comment-607585</link>
		<dc:creator><![CDATA[5318008]]></dc:creator>
		<pubDate>Thu, 15 Oct 2009 13:48:27 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=17939#comment-607585</guid>
		<description><![CDATA[Powned]]></description>
		<content:encoded><![CDATA[<p>Powned</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Reasoned Mind</title>
		<link>/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/#comment-607584</link>
		<dc:creator><![CDATA[Reasoned Mind]]></dc:creator>
		<pubDate>Thu, 15 Oct 2009 13:47:51 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=17939#comment-607584</guid>
		<description><![CDATA[Hi, I&#039;m Reasoned Mind and I sniff butts.]]></description>
		<content:encoded><![CDATA[<p>Hi, I&#8217;m Reasoned Mind and I sniff butts.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: AFACT v iiNet: Day 8 – Anti-Piracy Evidence Lacking &#124; We R Pirates</title>
		<link>/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/#comment-607553</link>
		<dc:creator><![CDATA[AFACT v iiNet: Day 8 – Anti-Piracy Evidence Lacking &#124; We R Pirates]]></dc:creator>
		<pubDate>Thu, 15 Oct 2009 11:39:22 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=17939#comment-607553</guid>
		<description><![CDATA[[...] It’s day eight in the copyright infringement case of AFACT – representing several Hollywood studios – and Aussie ISP iiNet (earlier coverage of day one, day two, day three, day four , day five, day six and day seven). [...]]]></description>
		<content:encoded><![CDATA[<p>[...] It’s day eight in the copyright infringement case of AFACT – representing several Hollywood studios – and Aussie ISP iiNet (earlier coverage of day one, day two, day three, day four , day five, day six and day seven). [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: AFACT v iiNet: Day 8 – Anti-Piracy Evidence Lacking - P2P Talk?</title>
		<link>/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/#comment-607538</link>
		<dc:creator><![CDATA[AFACT v iiNet: Day 8 – Anti-Piracy Evidence Lacking - P2P Talk?]]></dc:creator>
		<pubDate>Thu, 15 Oct 2009 10:46:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=17939#comment-607538</guid>
		<description><![CDATA[[...] by Reese on Oct.15, 2009, under P2P News (No Ratings Yet) &#160;Loading ...  It’s day eight in the copyright infringement case of AFACT – representing several Hollywood studios – and Aussie ISP iiNet (earlier coverage of day one, day two, day three, day four , day five, day six and day seven). [...]]]></description>
		<content:encoded><![CDATA[<p>[...] by Reese on Oct.15, 2009, under P2P News (No Ratings Yet) &nbsp;Loading &#8230;  It’s day eight in the copyright infringement case of AFACT – representing several Hollywood studios – and Aussie ISP iiNet (earlier coverage of day one, day two, day three, day four , day five, day six and day seven). [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Rekrul</title>
		<link>/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/#comment-607493</link>
		<dc:creator><![CDATA[Rekrul]]></dc:creator>
		<pubDate>Thu, 15 Oct 2009 02:59:10 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=17939#comment-607493</guid>
		<description><![CDATA[What I want to know is; Are these anti-piracy agencies bonded/registered/whatever as qualified evidence gathering and handling organizations?

All of their evidence consists of screenshots and log printouts, both of which could be easily faked by anyone with half a brain. Give me a list of the IP addresses they use and I&#039;ll whip up a 100% accurate screenshot of them sharing the latest RIAA albums.

In the US, at least in criminal trials, all evidence has to be handled by qualified personel. They don&#039;t let just anyone handle or take posession of the evidence because then they can&#039;t know if it was tampered with or not.

This prrincipal seems to be ignored where these companies are concerned.

I&#039;d love to see a court case where they pull out their screenshots and the defense loads up a paint program, opens the screenshot and pastes different IP addresses over the ones for the defendant.]]></description>
		<content:encoded><![CDATA[<p>What I want to know is; Are these anti-piracy agencies bonded/registered/whatever as qualified evidence gathering and handling organizations?</p>
<p>All of their evidence consists of screenshots and log printouts, both of which could be easily faked by anyone with half a brain. Give me a list of the IP addresses they use and I&#8217;ll whip up a 100% accurate screenshot of them sharing the latest RIAA albums.</p>
<p>In the US, at least in criminal trials, all evidence has to be handled by qualified personel. They don&#8217;t let just anyone handle or take posession of the evidence because then they can&#8217;t know if it was tampered with or not.</p>
<p>This prrincipal seems to be ignored where these companies are concerned.</p>
<p>I&#8217;d love to see a court case where they pull out their screenshots and the defense loads up a paint program, opens the screenshot and pastes different IP addresses over the ones for the defendant.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ninja</title>
		<link>/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/#comment-607489</link>
		<dc:creator><![CDATA[Ninja]]></dc:creator>
		<pubDate>Thu, 15 Oct 2009 02:39:02 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=17939#comment-607489</guid>
		<description><![CDATA[iiNet prepares heavy artillery. AFACT is going down!

Way to go iiNet!]]></description>
		<content:encoded><![CDATA[<p>iiNet prepares heavy artillery. AFACT is going down!</p>
<p>Way to go iiNet!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sad Truth</title>
		<link>/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/#comment-607435</link>
		<dc:creator><![CDATA[Sad Truth]]></dc:creator>
		<pubDate>Wed, 14 Oct 2009 22:47:18 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=17939#comment-607435</guid>
		<description><![CDATA[The only solution is to kill everyone over thirty.]]></description>
		<content:encoded><![CDATA[<p>The only solution is to kill everyone over thirty.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anonymous</title>
		<link>/afact-v-iinet-day-7-did-investigators-condone-infringement-091014/#comment-607429</link>
		<dc:creator><![CDATA[Anonymous]]></dc:creator>
		<pubDate>Wed, 14 Oct 2009 22:01:55 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=17939#comment-607429</guid>
		<description><![CDATA[To fix 39&#039;s analogy.

Assume you have a drug dealing business. The source of these drugs is a bit dodgy, by being created by copying someone else&#039;s patented process.

You proceed to give these drugs out to all of your friends, using a clever system of notes.

The person who first created the drug gets in on the act, by approaching you one day, and asking for a sample. In order to make sure no one person carries too many drugs (assume they&#039;re heavy drugs), your careful system of notes sends out several notes to various different people, who then send notes back to the person who first created these drugs, sending a couple of grams along the way.

Unfortunately, the notes system, while technically ingenious, requires everyone to sign their name at the bottom of the note. Now, some people put down a pretend name, or use someone else&#039;s name, but the person who originally created the drug now has a list of names of people who have broken their patent.

Oh hey, they can sue those people.]]></description>
		<content:encoded><![CDATA[<p>To fix 39&#8242;s analogy.</p>
<p>Assume you have a drug dealing business. The source of these drugs is a bit dodgy, by being created by copying someone else&#8217;s patented process.</p>
<p>You proceed to give these drugs out to all of your friends, using a clever system of notes.</p>
<p>The person who first created the drug gets in on the act, by approaching you one day, and asking for a sample. In order to make sure no one person carries too many drugs (assume they&#8217;re heavy drugs), your careful system of notes sends out several notes to various different people, who then send notes back to the person who first created these drugs, sending a couple of grams along the way.</p>
<p>Unfortunately, the notes system, while technically ingenious, requires everyone to sign their name at the bottom of the note. Now, some people put down a pretend name, or use someone else&#8217;s name, but the person who originally created the drug now has a list of names of people who have broken their patent.</p>
<p>Oh hey, they can sue those people.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
