<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: I Was a Member of Centropy, The World&#8217;s Leading Movie Piracy Group</title>
	<atom:link href="http://torrentfreak.com/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 15:45:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: Liquidlicker</title>
		<link>/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/#comment-943366</link>
		<dc:creator><![CDATA[Liquidlicker]]></dc:creator>
		<pubDate>Tue, 03 Jul 2012 13:29:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=51632#comment-943366</guid>
		<description><![CDATA[ Was a member of DoD, too. Though back in the days there was little to worry about. I still remember the race with rzr. Now i&#039;m a useless accountant in some useless firm. Good old teen days back then.]]></description>
		<content:encoded><![CDATA[<p> Was a member of DoD, too. Though back in the days there was little to worry about. I still remember the race with rzr. Now i&#8217;m a useless accountant in some useless firm. Good old teen days back then.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: I Was a Member of Centropy, The World’s Leading Movie Piracy Group &#124; The Illuminati</title>
		<link>/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/#comment-936649</link>
		<dc:creator><![CDATA[I Was a Member of Centropy, The World’s Leading Movie Piracy Group &#124; The Illuminati]]></dc:creator>
		<pubDate>Fri, 15 Jun 2012 05:16:06 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=51632#comment-936649</guid>
		<description><![CDATA[[...] Source: I Was a Member of Centropy, The World&#8217;s Leading Movie Piracy Group [...]]]></description>
		<content:encoded><![CDATA[<p>[...] Source: I Was a Member of Centropy, The World&#8217;s Leading Movie Piracy Group [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: SpamBlog - I Was a Member of Centropy, The World’s Leading Movie Piracy Group</title>
		<link>/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/#comment-936591</link>
		<dc:creator><![CDATA[SpamBlog - I Was a Member of Centropy, The World’s Leading Movie Piracy Group]]></dc:creator>
		<pubDate>Thu, 14 Jun 2012 23:36:34 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=51632#comment-936591</guid>
		<description><![CDATA[[...] Source: I Was a Member of Centropy, The World&#8217;s Leading Movie Piracy Group [...]]]></description>
		<content:encoded><![CDATA[<p>[...] Source: I Was a Member of Centropy, The World&#8217;s Leading Movie Piracy Group [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: TehPARADOX</title>
		<link>/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/#comment-934664</link>
		<dc:creator><![CDATA[TehPARADOX]]></dc:creator>
		<pubDate>Sun, 10 Jun 2012 06:12:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=51632#comment-934664</guid>
		<description><![CDATA[TehPARADOX.c

hella big site]]></description>
		<content:encoded><![CDATA[<p>TehPARADOX.c</p>
<p>hella big site</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: 2600 Article 1990</title>
		<link>/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/#comment-934662</link>
		<dc:creator><![CDATA[2600 Article 1990]]></dc:creator>
		<pubDate>Sun, 10 Jun 2012 06:04:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=51632#comment-934662</guid>
		<description><![CDATA[true history/stats/dates was lost b4 .nfo&#039;s.

everyone had a different view of the scene: Like the Chaos Club, the Cyberpunks are less hung up on getting hold of the latest technology and more interested in educating the public and spreading information. Invited to participate in the Santarcangelo Arts Festival, held in Rimini last Summer, they organised lectures on virtual reality and multi- media, flying in speakers from Germany and Britain and running an &#039;information wall&#039;. This comprised of a wall of old TVs playing feeds whichwere processed by an Amiga video editing system and mixed raw footage of thefestival events, computer graphics and the Cyberpunks&#039; own videos. Therewere also plans to set up a pirate TV station and broadcast in a narrow 2kmband towards Rimini. Unfortunately, after technical problems and concernvoiced by members of the Mutoid Waste Company (also present at the festival)that the material transmitted might be X rated, this had to be called off.Whilst groups in Europe seem to be gradually evolving into artful campaignersand consciousness-raising pranksters, the majority of US hackers haveremained simple tech freaks. However, things may be changing. US hackerculture has been going through a crisis in the last two years. In a full-blown moral panic, they have been systematically hunted down by the SecretService and have become the focus for hysteria reminiscent of the red scaresof the &#039;50s. (A time magazine cover from 1988 talked about &quot;The Invasion OfThe Data Snatchers&quot;.) Things began to happen, Shit hit teh fan shall we say... in January 1990 as the Secret Service began to arrest members of The Legion Of Doom and other knowledgeable hackers. LOD, MOD, Napalm, Excess, G0Dz, Chaos+, Acid, Telco1 were some of the most celebrated US hacker groups,on suspicion of having entered the computer systems of the Bell Southcompany. Although in many cases no charges were filed, electronic equipmentand discs were confiscated. things came to a head with &quot;Operation Sun Devil&quot;in May 1990, which involved 28 raids in 14 days; 42 computers and 23,000discs were confiscated, many of which have never been returned. Governmentagents carried out dawn raids on teenage bedrooms across the US, confiscatingcalculators and answerphones. All quite comical. Except things began to getmore serious. Raids became like precision strikes on terrorists and teenagersfound themselves threatened with jail sentences for accessing computersystems with no password, copying files or just being vaguelymischievous. Their offence might have been no more than the electronicequivalent of walking on the grass or breaking and entering, but thepunishment they faced was ten times more severe. FBR Wardialer In addition, the authorities began to target and close down electronicbulletin boards. In the States, there are now boards for every obsessiongoing, every hobby, belief, vice or fagc. So many that regulation of the kindof information being circulated is increasingly difficult. For that reason,it has been argued that the powers that be don&#039;t like the idea of boardsper se. Although a lot of the information that is circulated on some of themore underground boards (how to build bombs, or mix kitchen sink soap for example) is available elsewhere, they feel spooked by the thougth that it can be accessed by anyone with a computer. -They feel particularly spooked by the idea of hacker bulletin boards, and have begun to charge people merely for allowing &#039;dangerous information&#039; to pass through their systems. Hacked Voice-Mail &amp; listed codez. Posted on the Hack boards wHo had special access acker reaction to all this has been varied. After receiving prison sentences for their activities, the majority of the Legion Of Doom have decided to golegit and have set up as Comsec Data Security Corporation, a computerprotection consultancy. Others have taken a campaigning stance reminiscentof the Europeans. The East Coast hacker quarterly 2600, Phrack, Opeum, Sgt News, Black Files, Commodore SEQ Files. 2600 which publishedhardcore hacking info on phreaking and accessing computer networks, has triedto highlight the hypocrisy of the hacker busts. &quot;An individual cannot takea big credit checking corporation like TRW to court because they collectpersonal data on them without his or her permission,&quot; 2600 editor EmmanuelGoldstein comments. &quot;But TRW could claim its privacy was violated if a hackerfigures out how to access their system.&quot; Whats wrong with this picture...Other organisations have been set up to raise concern about civil liberties and freedom of speech, the most high profile being the Blue Boxing, Electronic Frontier Foundation, which was set up by Mitch Kapor, a millionaire software pioneer, along with other big cheeses from the computer industry (including Steve Wozniak of Apple, an ex-phone phreaker), as a direct response to anti-hacking hysteria. A self-confessed hacker/software pirate in the &#039;70s, Kapor is worried that the current panic may lead to the formation of restrictive regulations which may hamper the development of cyberspace in thefuture. However he isn&#039;t in favour of legalising hacking. He thinks hackersshould still be punished. Although the EFF has had some success in its moves to end Secret Serviceexcesses, not all hackers are happy with the way it draws a line between theold &#039;60s hackers and modern computer intruders. &quot;There are a lot ofsimilarities between these 15-year-olds who are playing around in corporatecomputers and the 40-year-olds who played around with phones and are nowwriting software somewhere,&quot; comments Emmanuel Goldstein. &quot;They may be legit now, but they weren&#039;t always legitimate&quot;. Goldstein is also sceptical of the &#039;cyberpunk&#039; tag which hackers appropriated from the fiction of William Gibson and Bruce Stierling, dismissing it as a fashion thing. Whilst it may have helped to give hackers a sense of identity, the image of leather-cladanti-social rebels backfired when the authorities started to take itseriosly. Something which places original cyberpunk writers like Bruce Sterling in a tricky position. &quot;I&#039;ve had law enforcement people tell me that if they see acopy of (William Gibson&#039;s) Neuromancer in a kid&#039;s bedroom when they&#039;re doinga raid, they know he&#039;s bad, he&#039;s gone,&quot; he observes. &quot;There are people whouse the word &#039;cyberpunk&#039; as a synonym for computer criminal now. There&#039;slittle that we can do about it really.&quot; Except write a book, somethingSterling decided to do when anti-hacker hysteria reached his home town ofAustin, Texas. The Chicago Computer Fraud and Abuse Task Force seizedhardware and software from a texas SF publisher and made statements to thelocal press that cyberpunks were dangerous. &quot;Being quite well-known as acyberpunk myself, I thought I&#039;d better find out what was going on&quot;. Theresults of his investigations will be published as  The Hacker Crackdown inOctober in the US. As an outsider, Sterling offers a refreshingly sceptical perspective on the scene. Of the  5,000 or so hackers currently practicing in the States, he says the majority are just mischievous teens, electronic joyriders who are more curious than malicious. Most of them don&#039;t hack beyond the age of 22. They get bored and get a life outside of cyberspace. He laughs off the idea thathackers might be seen as radicals. &quot;The idea that these are like fresh-facedidealistic genius kids who are linked arm-in-arm to deal a telling blow tothe establishment is just bullshit. They all hate each other&#039;s guts. Theyturn each other in at the drop of a hat.&quot; Far from being proto-political rebels, he argues that young US hackers are actually political footballs, part of a larger game which is about the future and management of cyberspace. Thats why the rich software entrepreneurs of the Electronic Frontier Foundation have become involved. &quot;The EFF and their civil liberties fellow travellers are an interest group like any other. They shouldn&#039;t be shrouded in this air of &#039;Oh they&#039;re old &#039;60s people, look how idealistic and non-materialistic they are. These guys are pretty sharp operators who&#039;ve made a lot of money in the computer industry, and would now like to get their mouse gripping mitts on some lever of political power thatis consonant with the amount of money they have and the influence they wieldin the business world&quot;. A cynic might argue that the EFF aren&#039;t just concerned with the  freedom of speech. They really want to make sure that in the heat of hacker hysteria, a set of excessive laws don&#039;t get passed which might restrict their business operations in the future. This kind of thing is only to be expected, since as Sterling says, the electronic community is expanding daily. In the rush to go digital, hackers may even find themselves sidelined. &quot;Every aspect ofsociety is moving into electronic networking and that includes hippies,criminals, lawyers, politicians, bikers, knitting societies, even cops. Copshave their own bulletin boards now. There are hacker cops(bad). All thesesubcultures and sub-groups are moving in, and in a while what was once calledhacker culture may get swamped by other kinds of electronic bohemia.&quot; US hackers may have acted as the pioneers of the new electroniclandscape. But like the real pioneers who first explored the American West,they may find it difficult to find a foothold in the new communities theyhelped to create. The simple thing is to go in to business for the peoplethey formerly thought of as the enemy. Alternatively they could band togetherin informal vaguely politicised pressure groups like the Europeans. But theyneed to update their act. Otherwise they could even wind up a dyingbreed. &quot;In the end the thing about American hackers that&#039;ll kill them off isthat they&#039;re  dilettantes,&quot; Sterling concludes. 

&quot;They&#039;re not getting any money for this. They&#039;re doing it for free, because it&#039;s like a cool subculture do.  They&#039;re doing it for power and knowledge. But anything these jerk-offs can do for power and knowledge, a real operator can do for a lotof money.&quot; -MORE&gt;&gt; Mad Hatter and The Inter Circle. Wired Article. 
Newsgroups, NewsBIN, EFNet, Hacking AOLl, Underworld Story Released &gt;&gt;MORE ]]></description>
		<content:encoded><![CDATA[<p>true history/stats/dates was lost b4 .nfo&#8217;s.</p>
<p>everyone had a different view of the scene: Like the Chaos Club, the Cyberpunks are less hung up on getting hold of the latest technology and more interested in educating the public and spreading information. Invited to participate in the Santarcangelo Arts Festival, held in Rimini last Summer, they organised lectures on virtual reality and multi- media, flying in speakers from Germany and Britain and running an &#8216;information wall&#8217;. This comprised of a wall of old TVs playing feeds whichwere processed by an Amiga video editing system and mixed raw footage of thefestival events, computer graphics and the Cyberpunks&#8217; own videos. Therewere also plans to set up a pirate TV station and broadcast in a narrow 2kmband towards Rimini. Unfortunately, after technical problems and concernvoiced by members of the Mutoid Waste Company (also present at the festival)that the material transmitted might be X rated, this had to be called off.Whilst groups in Europe seem to be gradually evolving into artful campaignersand consciousness-raising pranksters, the majority of US hackers haveremained simple tech freaks. However, things may be changing. US hackerculture has been going through a crisis in the last two years. In a full-blown moral panic, they have been systematically hunted down by the SecretService and have become the focus for hysteria reminiscent of the red scaresof the &#8217;50s. (A time magazine cover from 1988 talked about &#8220;The Invasion OfThe Data Snatchers&#8221;.) Things began to happen, Shit hit teh fan shall we say&#8230; in January 1990 as the Secret Service began to arrest members of The Legion Of Doom and other knowledgeable hackers. LOD, MOD, Napalm, Excess, G0Dz, Chaos+, Acid, Telco1 were some of the most celebrated US hacker groups,on suspicion of having entered the computer systems of the Bell Southcompany. Although in many cases no charges were filed, electronic equipmentand discs were confiscated. things came to a head with &#8220;Operation Sun Devil&#8221;in May 1990, which involved 28 raids in 14 days; 42 computers and 23,000discs were confiscated, many of which have never been returned. Governmentagents carried out dawn raids on teenage bedrooms across the US, confiscatingcalculators and answerphones. All quite comical. Except things began to getmore serious. Raids became like precision strikes on terrorists and teenagersfound themselves threatened with jail sentences for accessing computersystems with no password, copying files or just being vaguelymischievous. Their offence might have been no more than the electronicequivalent of walking on the grass or breaking and entering, but thepunishment they faced was ten times more severe. FBR Wardialer In addition, the authorities began to target and close down electronicbulletin boards. In the States, there are now boards for every obsessiongoing, every hobby, belief, vice or fagc. So many that regulation of the kindof information being circulated is increasingly difficult. For that reason,it has been argued that the powers that be don&#8217;t like the idea of boardsper se. Although a lot of the information that is circulated on some of themore underground boards (how to build bombs, or mix kitchen sink soap for example) is available elsewhere, they feel spooked by the thougth that it can be accessed by anyone with a computer. -They feel particularly spooked by the idea of hacker bulletin boards, and have begun to charge people merely for allowing &#8216;dangerous information&#8217; to pass through their systems. Hacked Voice-Mail &amp; listed codez. Posted on the Hack boards wHo had special access acker reaction to all this has been varied. After receiving prison sentences for their activities, the majority of the Legion Of Doom have decided to golegit and have set up as Comsec Data Security Corporation, a computerprotection consultancy. Others have taken a campaigning stance reminiscentof the Europeans. The East Coast hacker quarterly 2600, Phrack, Opeum, Sgt News, Black Files, Commodore SEQ Files. 2600 which publishedhardcore hacking info on phreaking and accessing computer networks, has triedto highlight the hypocrisy of the hacker busts. &#8220;An individual cannot takea big credit checking corporation like TRW to court because they collectpersonal data on them without his or her permission,&#8221; 2600 editor EmmanuelGoldstein comments. &#8220;But TRW could claim its privacy was violated if a hackerfigures out how to access their system.&#8221; Whats wrong with this picture&#8230;Other organisations have been set up to raise concern about civil liberties and freedom of speech, the most high profile being the Blue Boxing, Electronic Frontier Foundation, which was set up by Mitch Kapor, a millionaire software pioneer, along with other big cheeses from the computer industry (including Steve Wozniak of Apple, an ex-phone phreaker), as a direct response to anti-hacking hysteria. A self-confessed hacker/software pirate in the &#8217;70s, Kapor is worried that the current panic may lead to the formation of restrictive regulations which may hamper the development of cyberspace in thefuture. However he isn&#8217;t in favour of legalising hacking. He thinks hackersshould still be punished. Although the EFF has had some success in its moves to end Secret Serviceexcesses, not all hackers are happy with the way it draws a line between theold &#8217;60s hackers and modern computer intruders. &#8220;There are a lot ofsimilarities between these 15-year-olds who are playing around in corporatecomputers and the 40-year-olds who played around with phones and are nowwriting software somewhere,&#8221; comments Emmanuel Goldstein. &#8220;They may be legit now, but they weren&#8217;t always legitimate&#8221;. Goldstein is also sceptical of the &#8216;cyberpunk&#8217; tag which hackers appropriated from the fiction of William Gibson and Bruce Stierling, dismissing it as a fashion thing. Whilst it may have helped to give hackers a sense of identity, the image of leather-cladanti-social rebels backfired when the authorities started to take itseriosly. Something which places original cyberpunk writers like Bruce Sterling in a tricky position. &#8220;I&#8217;ve had law enforcement people tell me that if they see acopy of (William Gibson&#8217;s) Neuromancer in a kid&#8217;s bedroom when they&#8217;re doinga raid, they know he&#8217;s bad, he&#8217;s gone,&#8221; he observes. &#8220;There are people whouse the word &#8216;cyberpunk&#8217; as a synonym for computer criminal now. There&#8217;slittle that we can do about it really.&#8221; Except write a book, somethingSterling decided to do when anti-hacker hysteria reached his home town ofAustin, Texas. The Chicago Computer Fraud and Abuse Task Force seizedhardware and software from a texas SF publisher and made statements to thelocal press that cyberpunks were dangerous. &#8220;Being quite well-known as acyberpunk myself, I thought I&#8217;d better find out what was going on&#8221;. Theresults of his investigations will be published as  The Hacker Crackdown inOctober in the US. As an outsider, Sterling offers a refreshingly sceptical perspective on the scene. Of the  5,000 or so hackers currently practicing in the States, he says the majority are just mischievous teens, electronic joyriders who are more curious than malicious. Most of them don&#8217;t hack beyond the age of 22. They get bored and get a life outside of cyberspace. He laughs off the idea thathackers might be seen as radicals. &#8220;The idea that these are like fresh-facedidealistic genius kids who are linked arm-in-arm to deal a telling blow tothe establishment is just bullshit. They all hate each other&#8217;s guts. Theyturn each other in at the drop of a hat.&#8221; Far from being proto-political rebels, he argues that young US hackers are actually political footballs, part of a larger game which is about the future and management of cyberspace. Thats why the rich software entrepreneurs of the Electronic Frontier Foundation have become involved. &#8220;The EFF and their civil liberties fellow travellers are an interest group like any other. They shouldn&#8217;t be shrouded in this air of &#8216;Oh they&#8217;re old &#8217;60s people, look how idealistic and non-materialistic they are. These guys are pretty sharp operators who&#8217;ve made a lot of money in the computer industry, and would now like to get their mouse gripping mitts on some lever of political power thatis consonant with the amount of money they have and the influence they wieldin the business world&#8221;. A cynic might argue that the EFF aren&#8217;t just concerned with the  freedom of speech. They really want to make sure that in the heat of hacker hysteria, a set of excessive laws don&#8217;t get passed which might restrict their business operations in the future. This kind of thing is only to be expected, since as Sterling says, the electronic community is expanding daily. In the rush to go digital, hackers may even find themselves sidelined. &#8220;Every aspect ofsociety is moving into electronic networking and that includes hippies,criminals, lawyers, politicians, bikers, knitting societies, even cops. Copshave their own bulletin boards now. There are hacker cops(bad). All thesesubcultures and sub-groups are moving in, and in a while what was once calledhacker culture may get swamped by other kinds of electronic bohemia.&#8221; US hackers may have acted as the pioneers of the new electroniclandscape. But like the real pioneers who first explored the American West,they may find it difficult to find a foothold in the new communities theyhelped to create. The simple thing is to go in to business for the peoplethey formerly thought of as the enemy. Alternatively they could band togetherin informal vaguely politicised pressure groups like the Europeans. But theyneed to update their act. Otherwise they could even wind up a dyingbreed. &#8220;In the end the thing about American hackers that&#8217;ll kill them off isthat they&#8217;re  dilettantes,&#8221; Sterling concludes. </p>
<p>&#8220;They&#8217;re not getting any money for this. They&#8217;re doing it for free, because it&#8217;s like a cool subculture do.  They&#8217;re doing it for power and knowledge. But anything these jerk-offs can do for power and knowledge, a real operator can do for a lotof money.&#8221; -MORE&gt;&gt; Mad Hatter and The Inter Circle. Wired Article. <br />
Newsgroups, NewsBIN, EFNet, Hacking AOLl, Underworld Story Released &gt;&gt;MORE </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: -=-=-=-=</title>
		<link>/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/#comment-934565</link>
		<dc:creator><![CDATA[-=-=-=-=]]></dc:creator>
		<pubDate>Sat, 09 Jun 2012 18:54:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=51632#comment-934565</guid>
		<description><![CDATA[OMG i remember Buccaneer, Fastlink, and Site Down
I was caught up in site down june 2005 
i remember it like yesterday  Guns in my face when i opened the door
i remember GTD in previous  and JD333
 ]]></description>
		<content:encoded><![CDATA[<p>OMG i remember Buccaneer, Fastlink, and Site Down<br />
I was caught up in site down june 2005<br />
i remember it like yesterday  Guns in my face when i opened the door<br />
i remember GTD in previous  and JD333</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: -=-=-=-</title>
		<link>/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/#comment-934563</link>
		<dc:creator><![CDATA[-=-=-=-]]></dc:creator>
		<pubDate>Sat, 09 Jun 2012 18:49:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=51632#comment-934563</guid>
		<description><![CDATA[hello. Long time no see.. say hi to our buddy dact, have you seen nebs too?

ill be in touch. were also working on a book/movie too.
let us know if you want to collaborate.

zzzz
-=-=-=-= ]]></description>
		<content:encoded><![CDATA[<p>hello. Long time no see.. say hi to our buddy dact, have you seen nebs too?</p>
<p>ill be in touch. were also working on a book/movie too.<br />
let us know if you want to collaborate.</p>
<p>zzzz<br />
-=-=-=-= </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: what is 1337</title>
		<link>/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/#comment-934084</link>
		<dc:creator><![CDATA[what is 1337]]></dc:creator>
		<pubDate>Fri, 08 Jun 2012 14:18:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=51632#comment-934084</guid>
		<description><![CDATA[Late 80&#039;s, Teh absolute best time 4 the scene... 

The HUMBLE Guys core members are from FBR, (c=64 Crack/Import)... Back in the BBS era when single line 1200/2400 baud modems &amp; $7.00 a minute LD charges effected release times, File size was a serious issue &amp; programmers wrote good code that was ultra-packed. Everything was original vs. today where the same game engine + different gfx = $new. Teh true &quot;Elite&quot; was 1,200 -1,500 talented users &amp; &quot;Optical Illusion&quot; thats listed above went live in 1989 by Optik Freeze &amp; was an official FBR site. Eric survived the whole &quot;Not So Humble Babe&quot; (Amy from 313 areacode, NOT the Amy from 615 areacode/Candyman&#039;s wife) credit card fraud problems. I did not know Eric was busted in 2004, We have not talked for over 20 years.

***Note 2 self: Do not place BBS #&#039;s on Intro/Crack screens...

If anyone wants more reading on this topic search &quot;Bruce Sterling&quot; it&#039;s a free book with an online audio version by &quot;Cory D&quot; in Google. I think Jason Scott has a copy on Textfiles.org.

Search: Roy/SAC, Radman/ACID.org, Defacto2.org,CMDB.org or C64.org and you will find everything related c64. ***Use VICE Emulator and see all cracktros/intros on your PC.

Wiki has a full page related to THG and our little creation called .NFO files.

Candyman (Dave Frances) FBR/THG passed away (Heart Attack).

Thank you:
  EFF.org - Multi Resource.
   ChillingEffects.com - Legal Resource.
    TorrentFreak.com - Information Resource.

We all spill milk, it&#039;s how you clean it up that counts. 
]]></description>
		<content:encoded><![CDATA[<p>Late 80&#8242;s, Teh absolute best time 4 the scene&#8230; </p>
<p>The HUMBLE Guys core members are from FBR, (c=64 Crack/Import)&#8230; Back in the BBS era when single line 1200/2400 baud modems &amp; $7.00 a minute LD charges effected release times, File size was a serious issue &amp; programmers wrote good code that was ultra-packed. Everything was original vs. today where the same game engine + different gfx = $new. Teh true &#8220;Elite&#8221; was 1,200 -1,500 talented users &amp; &#8220;Optical Illusion&#8221; thats listed above went live in 1989 by Optik Freeze &amp; was an official FBR site. Eric survived the whole &#8220;Not So Humble Babe&#8221; (Amy from 313 areacode, NOT the Amy from 615 areacode/Candyman&#8217;s wife) credit card fraud problems. I did not know Eric was busted in 2004, We have not talked for over 20 years.</p>
<p>***Note 2 self: Do not place BBS #&#8217;s on Intro/Crack screens&#8230;</p>
<p>If anyone wants more reading on this topic search &#8220;Bruce Sterling&#8221; it&#8217;s a free book with an online audio version by &#8220;Cory D&#8221; in Google. I think Jason Scott has a copy on Textfiles.org.</p>
<p>Search: Roy/SAC, Radman/ACID.org, Defacto2.org,CMDB.org or C64.org and you will find everything related c64. ***Use VICE Emulator and see all cracktros/intros on your PC.</p>
<p>Wiki has a full page related to THG and our little creation called .NFO files.</p>
<p>Candyman (Dave Frances) FBR/THG passed away (Heart Attack).</p>
<p>Thank you:<br />
  EFF.org &#8211; Multi Resource.<br />
   ChillingEffects.com &#8211; Legal Resource.<br />
    TorrentFreak.com &#8211; Information Resource.</p>
<p>We all spill milk, it&#8217;s how you clean it up that counts. </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Korax</title>
		<link>/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/#comment-933040</link>
		<dc:creator><![CDATA[Korax]]></dc:creator>
		<pubDate>Tue, 05 Jun 2012 23:22:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=51632#comment-933040</guid>
		<description><![CDATA[wicked1 long time no talk, this is korax.
 ]]></description>
		<content:encoded><![CDATA[<p>wicked1 long time no talk, this is korax.<br />
 </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Hush</title>
		<link>/i-was-a-member-of-centropy-the-worlds-leading-movie-piracy-group-120526/#comment-931979</link>
		<dc:creator><![CDATA[Hush]]></dc:creator>
		<pubDate>Sat, 02 Jun 2012 14:40:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=51632#comment-931979</guid>
		<description><![CDATA[I would like to read this. Although, the $10,000 goal to fund it is absolutely absurd. ]]></description>
		<content:encoded><![CDATA[<p>I would like to read this. Although, the $10,000 goal to fund it is absolutely absurd. </p>
]]></content:encoded>
	</item>
</channel>
</rss>
