A closer look at their claims reveals it is nothing more than a standard IP trace and obfuscation technique. Their first step is to log the IP’s of those sharing it, reporting this to both the ISP of the users, and the service producers. The second, to attempt to flood the system with fake versions of those files.
How the thinking behind this goes to protect any rights before it’s been released onto the internet is unknown. Pretty much the only way to do this is to have a watchdog in the agency’s employ overseeing every single screening of those films , it’s well known that the vast majority of “film piracy” is committed by so-called industry insiders, and those are also the people entrusted to keep the copies secure, as well as being in the best position to make high quality copies of them.
The second phase of the Bytes Corrupted plan is a method that’s been around for more than 10 years, and is suggested by the plans name. In essence, it is the same plan that the RIAA tried years ago with Napster, in that they attempt to flood the networks with fake/corrupt versions of the file, hiding the real ones. The only problem is that this isn’t 1997 any more, and sites like Mininova have user accounts, where uploaders can attach a user name to the upload, giving a sort of ‘badge of quality’ to the torrent, that copycat fake uploaders can’t match. It already helps on Mininova to identify fake aXXo film, as well as EZTV & VTV TV-torrent uploads.
Ultimately, its another 3rd rate anti-p2p effort undertaken by someone with no head for the fluid and dynamic world of file sharing, and probably more business acumen than techknowlege, and is doomed to be as impotent as most of these other techniques and services offered by a plethora of other anti-p2p companies.