<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; Search Results  &#187;  DIGITAL CONTROL</title>
	<atom:link href="http://torrentfreak.com/search/DIGITAL+CONTROL/feed/rss2/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 09:27:11 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Kim Dotcom Breaks Post Election Media Silence</title>
		<link>http://torrentfreak.com/kim-dotcom-breaks-post-election-media-silence-141004/</link>
		<comments>http://torrentfreak.com/kim-dotcom-breaks-post-election-media-silence-141004/#comments</comments>
		<pubDate>Sat, 04 Oct 2014 15:17:01 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[kim dotcom]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94815</guid>
		<description><![CDATA[Since his hectic election campaign came to a close last month, Kim Dotcom hasn't given a single interview. On TorrentFreak today he breaks his silence, opening up on his fight with two governments, his departure from Baboom, and what he views as almost "religious extremism" employed by the labels and Hollywood to destroy him.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/dotcom-laptop.jpg"><img src="http://torrentfreak.com/images/dotcom-laptop.jpg" alt="dotcom-laptop" width="233" height="170" class="alignright size-full wp-image-76556"></a>When it comes to the online space, Kim Dotcom is undoubtedly one of the most polarizing personalities around. From Megaupload to Mega to his fledgling music service Baboom, everything touched by the man has been bathed in publicity and heated opinion.</p>
<p>It is this ability to attract attention that undoubtedly played a key role in his creation of the Internet Party, a political movement with a stated aim to shake up New Zealand politics and put Dotcom-affiliated politicians in Parliament.</p>
<p>Last month, however, the elections failed to go as planned. The Internet Party <a href="http://torrentfreak.com/dotcoms-internet-party-fails-to-enter-new-zealand-parliament-140920/">conceded defeat</a> without winning a single seat, with its founder honoring tradition by politely congratulating Prime Minister and arch-rival John Key on his success.</p>
<p>After endless appearances and endless daily tweets, Dotcom essentially disappeared from public life, only breaking his silence to comment on the video game Destiny and his <a href="http://torrentfreak.com/kim-dotcom-baboom-sever-all-ties-141002/">exit from Baboom</a>. Today we catch up with the controversial entrepreneur to find out what happened.</p>
<p>&#8220;Baboom is this great idea of unchaining the artists from major record labels, allowing them to deal directly with their fanbase and using groundbreaking new ways of monetization that pay artists even when fans access content for free,&#8221; Dotcom told TF.</p>
<p>&#8220;But Baboom is facing tough opposition from the labels. Baboom has had to deal with unfair and deliberate efforts to make us fail. I won&#8217;t go into details.&#8221;</p>
<p>Dotcom says that for the sake of the artists he wants Baboom to succeed. But, in order for that to happen, a sacrifice needed to be made.</p>
<p>&#8220;The best way to achieve that success was to take me out of Baboom completely. We have a great management team and some brave investors in place. The brand &#8216;Kim Dotcom&#8217; is toxic and a major distractor to what Baboom is trying to achieve,&#8221; he concedes.</p>
<p>While sometimes problematic, Dotcom&#8217;s branding is clearly a double-edged sword, one only needs to look at the 2012 launch of Mega.co.nz to see that. On the tiniest of budgets, Dotcom managed to rally the world&#8217;s press to witness the launch of his new cloud-storage site. And without him it&#8217;s doubtful that Baboom would&#8217;ve achieved the profile it has today.</p>
<p>But while those same strengths allowed the Internet Party to became a news event every day leading up to the election, Dotcom&#8217;s profile and history &#8211; by his own admission &#8211; became a millstone around the party&#8217;s neck. Every aspect of his private life became a point of leverage for his political opposition.</p>
<p>&#8220;The Internet Party failed to deliver meaningful change in New Zealand at the last election because of the media spin by our opponents,&#8221; Dotcom says.</p>
<p>&#8220;They have successfully turned me into a villain, a German Nazi, a horrible employer, a political hacker, a practitioner of prohibited digital voodoo magic and nothing short of a monster. I would hate that guy too if I didn&#8217;t know that it wasn&#8217;t true.&#8221;</p>
<p>Dotcom says that part of the problem is that he has powerful enemies who in turn have friends in positions of influence, including in the press.</p>
<p>&#8220;When you have the US Government, the NZ Government, all Hollywood studios and all major record labels fighting against you, you don&#8217;t have a lot of friends, especially in the media,&#8221; Dotcom says.</p>
<p>&#8220;They either own the media (like in the US) or control the media with their significant advertising spending. Their passion to destroy me and everything I do, because of a copyright disagreement, is almost as fanatical as some of the religious extremism I see on TV.&#8221;</p>
<p>So with the election over, and maybe even Dotcom&#8217;s entire political career with it, the entrepreneur still has huge adversity to overcome. As he cuts Baboom free and wishes the company every success, Dotcom thoughts and energies turn to his pending extradition case. He knows it&#8217;s not going to be easy, especially given the mauling he received at the hands of New Zealand&#8217;s political heavyweights in the run up to the election.</p>
<p>&#8220;If I was a judge in New Zealand I wouldn&#8217;t think too highly of &#8216;Kim Dotcom&#8217; after months of prime time media bashing by the Prime Minister personally and his media helpers,&#8221; Dotcom says.</p>
<p>&#8220;John Key constantly made the Internet Party and its goals for Internet Freedom about my extradition case and he accused me of attempting to subvert the New Zealand judiciary. He basically told the judiciary every day that I&#8217;m a selfish, criminal man who &#8216;has to go away&#8217;.&#8221;</p>
<p>While Dotcom insists his motives were altruistic, there can be little doubt that if the election had gone his way the words of John Key and friends might have meant just that little bit less. As it stands, things went pretty badly.</p>
<p>The details of that <a href="http://torrentfreak.com/kim-dotcom-extradition-hearing-delayed-until-2015-140707/">extradition fight</a> will become clear during the months to come, but in closing Dotcom shared with us an interesting development.</p>
<p>&#8220;After 1000 days of waiting we finally got access to our own data (copies of our personal computers / hard drives). Remember, the Government made us wait this long for a single reason only: They demanded access to our <a href="http://torrentfreak.com/dotcom-encryption-keys-cant-be-given-to-fbi-court-rules-140702/">encryption codes</a>,&#8221; he says.</p>
<p>&#8220;But here&#8217;s the twist: It turns out that the Government had access to the encryption codes all along. Who would have thought that they didn&#8217;t install a trojan on my computer while they had the GCSB / NSA spying on me.&#8221;</p>
<p>Kim Dotcom&#8217;s extradition hearing is currently scheduled to take place in February 2015. Expect the media circus to get going again soon.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/kim-dotcom-breaks-post-election-media-silence-141004/feed/</wfw:commentRss>
		<slash:comments>45</slash:comments>
		</item>
		<item>
		<title>BitTorrent Wants to Become RIAA Certified Music Service</title>
		<link>http://torrentfreak.com/bittorrent-eyes-riaa-certification-music-sales-140930/</link>
		<comments>http://torrentfreak.com/bittorrent-eyes-riaa-certification-music-sales-140930/#comments</comments>
		<pubDate>Tue, 30 Sep 2014 16:18:57 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94582</guid>
		<description><![CDATA[With the exclusive release of Thom Yorke's latest album BitTorrent developed itself into a paid music service. With over half a million downloads thus far the "experiment" has become a great success, and if it's up to BitTorrent the company will become an RIAA-certified music service in the near future.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/bittorrent-logo.png"><img src="http://torrentfreak.com/images/bittorrent-logo.png" alt="bittorrent-logo" width="266" height="99" class="alignright size-full wp-image-88887"></a>Last Friday Radiohead frontman Thom Yorke <a href="http://torrentfreak.com/thom-yorke-releases-album-via-bittorrent-140926/">released</a> his new solo album via BitTorrent. A few tracks were made available for free, but those who want the full album are <a href="https://bundles.bittorrent.com/bundles/tomorrowsmodernboxes">charged $6</a>. </p>
<p>The new experiment is part of BitTorrent Inc&#8217;s <a href="https://bundles.bittorrent.com/">bundles project</a>, which allows artists to easily share their work with fans. While many artists tested the waters before Yorke, he is the first to ask for money directly from consumers.</p>
<p>“If it works well it could be an effective way of handing some control of Internet commerce back to people who are creating the work. Enabling those people who make either music, video or any other kind of digital content to sell it themselves. Bypassing the self elected gate-keepers,” commented Thom Yorke on his decision to join.</p>
<p>Fast forward a few days and the album release has turned out to be a great success. At the time of writing the number of downloads surpassed 500,000, and at the current rate this will have doubled before the end of the week. </p>
<p>These numbers are for both the free sample and the full album, which are both being counted by BitTorrent. Thom Yorke doesn&#8217;t want the sales figures to become public but judging from the number of people sharing the torrent this lies well above one hundred thousand.</p>
<p>&#8220;When the Bundle is downloaded using one of our clients, it pings back with a torrent added event which is how these are being counted. Thom Yorke has asked that sales figures remain undisclosed, which is his discretion,&#8221; BitTorrent spokesman Christian Averill told TorrentFreak. </p>
<p><center><a href="http://torrentfreak.com/images/yorke500k.jpg"><img src="http://torrentfreak.com/images/yorke500k.jpg" alt="yorke500k" width="618" height="335" class="alignnone size-full wp-image-94589"></a></center></p>
<p>Now that BitTorrent Inc. has become a paid music service, a whole new world opens up. Will there soon be a BitTorrent release at the top of the charts for example? We asked BitTorrent whether they are considering becoming an <a href="http://en.wikipedia.org/wiki/RIAA_certification">RIAA-certified</a> seller, and the company&#8217;s answer was an unequivocal yes.</p>
<p>&#8220;Our vision is absolutely that Bundles will count toward all the usual industry accolades and charts. Again, it will be up to the publisher of the specific Bundle. But the numbers certainly merit the recognition,&#8221; Averill says.</p>
<p>If that happens, BitTorrent sales will be eligible for RIAA&#8217;s gold and platinum awards as well as other charts.</p>
<p>While some music industry insiders may need some time to adjust to the idea of BitTorrent (Inc) as an authorized music service, the RIAA itself doesn&#8217;t see any reason why the company can&#8217;t apply. </p>
<p>&#8220;Music sales &#8230; on digital music services that are authorized by and reported to the record labels, whether paid for by the consumer through a subscription or free to the consumer through ad-supported services, are accepted for RIAA certifications,&#8221; RIAA&#8217;s Liz Kennedy tells TorrentFreak. </p>
<p>Becoming RIAA-certified doesn&#8217;t happen overnight though. BitTorrent would first have to request the certification and a full audit is then required to receive an Authorized service stamp and a possible listing on <a href="http://whymusicmatters.com">whymusicmatters.com</a>.</p>
<p>&#8220;Whymusicmatters.com, a joint initiative of the RIAA and Music Biz, lists the leading authorized music services in the United States,&#8221; Kennedy explains.</p>
<p>For BitTorrent this would be a great achievement. The company has had to withstand a fair amount of criticism from copyright holders in recent years, and recognition as an authorized music service will surely silence some of it.   </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/bittorrent-eyes-riaa-certification-music-sales-140930/feed/</wfw:commentRss>
		<slash:comments>96</slash:comments>
		</item>
		<item>
		<title>Thom Yorke Sells New Album via Paywall Protected Torrent</title>
		<link>http://torrentfreak.com/thom-yorke-releases-album-via-bittorrent-140926/</link>
		<comments>http://torrentfreak.com/thom-yorke-releases-album-via-bittorrent-140926/#comments</comments>
		<pubDate>Fri, 26 Sep 2014 18:44:56 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94488</guid>
		<description><![CDATA[In a surprise move Radiohead frontman Thom Yorke has released a new album, not through the regular channels, but via BitTorrent. Yorke is not sharing his work for free though, instead he's selling the album via a new paywalled torrent format which can't be shared with non-paying fans. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Radiohead’s Tom Yorke has been very critical of new music services such as Spotify. Last year he pulled his music from the popular streaming service claiming that “new artists get paid fuck all.”</p>
<p>Yorke would like to see more money flowing to the artists and in an effort to accomplish this goal he has teamed up with BitTorrent Inc. </p>
<p>The San-Francisco company has experimented with artist bundles for a while and together with Yorke they have now launched their first paywalled torrent. After paying $6, fans can download Yorke&#8217;s &#8220;Tomorrow&#8217;s Modern Boxes&#8221; album via a protected torrent file.</p>
<p>&#8220;It&#8217;s an experiment to see if the mechanics of the system are something that the general public can get its head around,&#8221; Thom Yorke and Nigel Godrich <a href="http://www.radiohead.com/deadairspace/tomorrows-modern-boxes">write</a> in a joint statement.</p>
<p>&#8220;If it works well it could be an effective way of handing some control of internet commerce back to people who are creating the work. Enabling those people who make either music, video or any other kind of digital content to sell it themselves. Bypassing the self elected gate-keepers,&#8221; they add. </p>
<p>In recent years BitTorrent Inc. has been working very hard to show that its technology can be used for more than &#8220;piracy&#8221; and today&#8217;s bundle is a prime example. After releasing various free samples from other artists, Yorke&#8217;s full album is definitely a breakthrough.</p>
<p><center><iframe width="640" height="420" src="https://bundles.bittorrent.com/embed/bundles/d0b4beba8efc4b46f6dba119b511a5b2d5cabc96168c0dc097ee9d514059ab63" frameborder="0" allowfullscreen id="bundle"></iframe></center></p>
<p>The paywall and other restrictions are not something traditional BitTorrent users are used to, but it&#8217;s a necessary &#8220;evil&#8221; to draw mainstream artists to the model. </p>
<p>BitTorrent Inc. emphasizes that the album itself is DRM-free but that the torrents do have copy protection. This means that people can&#8217;t easily share them with others who haven&#8217;t paid.</p>
<p>&#8220;BitTorrent Bundles features protected torrents, limiting the number of times a torrent can be downloaded. While Bundle content is DRM-free, torrents are protected with this new way of managing how often a Bundle is downloaded,&#8221; <a href="http://bundle-help.bittorrent.com/customer/portal/articles/1697610-what-is-a-protected-torrent-?b_id=3886">BitTorrent Inc. notes</a>.</p>
<p>This works very much like private trackers, where only members can share files with each other. With the &#8220;Tomorrow&#8217;s Modern Boxes&#8221; torrent those who pay are a &#8220;member&#8221; and only they can share the file. </p>
<p>It will be interesting to see if other artists are also willing to join the experiment. A full album for $6 definitely sounds like a fair price and the artists get to keep most of the cash. BitTorrent Inc. says it currently gets 10% of the revenue for enabling the distribution.</p>
<p>Perhaps unsurprisingly, several unauthorized torrents without a paywall are also doing the rounds on various torrent sites. The good news is, however, that the paywalled version currently has more people sharing than the pirated one. </p>
<p>Those interested in Thom Yorke&#8217;s &#8220;Tomorrow&#8217;s Modern Boxes&#8221; can <a href="https://bundles.bittorrent.com/bundles/tomorrowsmodernboxes">grab a copy here</a>.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/thom-yorke-releases-album-via-bittorrent-140926/feed/</wfw:commentRss>
		<slash:comments>103</slash:comments>
		</item>
		<item>
		<title>Google to News Corp: Nobody Fights Piracy Like Us</title>
		<link>http://torrentfreak.com/google-to-news-corp-nobody-fights-piracy-like-us-140925/</link>
		<comments>http://torrentfreak.com/google-to-news-corp-nobody-fights-piracy-like-us-140925/#comments</comments>
		<pubDate>Thu, 25 Sep 2014 15:33:58 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[google]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94423</guid>
		<description><![CDATA[After Rupert Murdoch's News Corp branded Google a "platform for piracy" last week, Google has today returned fire. The search giant says that after removing 222 million pages from search results and investing tens of millions in technology, almost no other company has done more to tackle online piracy. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/google-water.png"><img src="http://torrentfreak.com/images/google-water-150x150.png" alt="google-water" width="150" height="150" class="alignright size-thumbnail wp-image-89037"></a>In an <a href="http://newscorp.com/2014/09/17/news-corp-opposed-googles-european-commission-settlement-offer-welcomed-competition-commission-reconsideration/">open letter</a> to the European competition commissioner earlier this month, News Corp CEO Robert Thomson was highly critical of Google.</p>
<p>Thompson began by speaking warmly of Google&#8217;s roots as a &#8220;wonderfully feisty&#8221; Silicon Valley startup, but that developed into warnings over its immense power today as an &#8220;often unaccountable bureaucracy&#8221;. And, as is so often the case with Google&#8217;s rivals, matters soon turned to Google&#8217;s attitudes towards online piracy.</p>
<p>&#8220;The shining vision of Google’s founders has been replaced by a cynical management, which offers advertisers impressively precise data about users and content usage, but has been a platform for piracy and the spread of malicious networks, all while driving more traffic and online advertising dollars to Google,&#8221; Thompson said. </p>
<p>The News Corp statement was never likely to go unanswered and today Google officially returned fire.</p>
<p>&#8220;Google has done more than almost any other company to help tackle online piracy,&#8221; <a href="http://googlepolicyeurope.blogspot.co.uk/2014/09/dear-rupert_25.html?m=1">said</a> Rachel Whetstone, Google’s senior vice president of global communications.</p>
<p>&#8220;In 2013 we removed 222 million web pages from Google Search due to copyright infringement. The average take-down time is now just six hours,&#8221; she added.</p>
<p>The SVP also underlined Google&#8217;s earlier assertions that sites found to repeatedly violate copyright get downgraded in search rankings. It&#8217;s something the movie studios and record labels have being demanding for some time but although Google insists it delivers, few content creators appear pleased with the results.</p>
<p>On YouTube, however, things play out somewhat differently. Whetstone reminded News Corp that Google has spent tens of millions of dollars developing technology such as its ContentID, a system that not only combats piracy but enables creators to monetize their content.</p>
<p>And hitting back at the accusation that Google has been a platform for the spread of malicious networks, Whetstone said the company is committed to protecting its users’ security.</p>
<p>&#8220;It’s why we remove malware from our search results and other products, and protect more than 1 billion users every day from phishing and malware with our Safe Browsing warnings,&#8221; she said.</p>
<p>In response to News Corp accusations that Google undermines the business models of high quality content creators with &#8220;egregious aggregation”, Whetstone said that the days of news being controlled by a small number of media organizations were over.</p>
<p>&#8220;Today, people have far greater choice. That has had a profound impact on newspapers, who face much stiffer competition for people’s attention and for advertising Euros,&#8221; the SVP said.</p>
<p>&#8220;Google has worked hard to help publishers succeed online &#8212; both in terms of generating new audiences and also increasing their digital revenues. Our search products drive over 10 billion clicks a month to 60,000 publishers’ websites, and we share billions of dollars annually with advertising publishing partners.&#8221;</p>
<p>Finally, in a moment of comedy but with a serious point, Whetston held up a mirror to News Corp in response to its argument that Google&#8217;s actions could lead to &#8220;a less informed, more vexatious level of dialogue in our society&#8221; and only add to &#8220;the intemperate trends we are already seeing in much of Europe.&#8221;</p>
<p>By linking to an <a href="http://news.bbc.co.uk/nol/shared/spl/hi/pop_ups/06/programmes_enl_1146754853/img/1.jpg">image of a front page</a> published by Murdoch&#8217;s &#8216;The Sun&#8217; tabloid, Google makes clear that if you&#8217;re going to criticize others, getting your own house in order should always come first.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/google-to-news-corp-nobody-fights-piracy-like-us-140925/feed/</wfw:commentRss>
		<slash:comments>40</slash:comments>
		</item>
		<item>
		<title>Mega Goes Legal, Issues Ultimatum Over Cyberlocker Report</title>
		<link>http://torrentfreak.com/mega-goes-legal-issues-ultimatum-over-cyberlocker-report-140925/</link>
		<comments>http://torrentfreak.com/mega-goes-legal-issues-ultimatum-over-cyberlocker-report-140925/#comments</comments>
		<pubDate>Thu, 25 Sep 2014 09:55:18 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Mega.co.nz]]></category>
		<category><![CDATA[NetNames]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94386</guid>
		<description><![CDATA[Last week NetNames produced a report on "shadowy" file-hosting sites which surprisingly included Mega.co.nz. The file-hosting company responded by threatening "further action" unless it was removed from the "defamatory" report. Now, as promised, the New Zealand-based company is taking things to the next level. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/profit.png" width="222" height="175" class="alignright">Last week the Digital Citizens Alliance and NetNames released a new report with the aim of shining light on the business models of “shadowy” file-storage sites.</p>
<p>While listing some domains that may well live up to that less-than-flattering billing, the authors of <em>Behind The Cyberlocker Door: A Report How Shadowy Cyberlockers Use Credit Card Companies to Make Millions</em>, also decided to include New Zealand-based Mega.</p>
<p>Mega was founded by Kim Dotcom but the site bears little resemblance to his now defunct Megaupload. Perhaps most importantly, Mega was the most-scrutinized file-hosting startup ever, so every single detail simply had to be squeaky clean. As a result the site took extensive legal advice to ensure that it complies with every single facet of the law.</p>
<p>Nevertheless, NetNames took the decision to put Mega in its report anyway, bundling the site in with what are described as some of the market&#8217;s most dubious players. This was not received well by Mega CEO Graham Gaylard. In a <a href="http://torrentfreak.com/mega-demands-apology-over-defamatory-cyberlocker-report-140919/">TorrentFreak article</a> he demanded a full apology from NetNames and Digital Citizens Alliance and for his company to be withdrawn from the report. Failure to do so would result in &#8220;further action&#8221;, he said.</p>
<p>TF asked NetNames&#8217; David Price whether his company stood by its allegations. The response suggested that it did and no apology was forthcoming. It&#8217;s been a week since that ultimatum and as promised Mega is now making good on its threats.</p>
<p>&#8220;Mega&#8217;s legal counsel has written to NetNames, Digital Citizens Alliance and The Internet Technology &#038; Innovation Foundation (ITIF) stating that the report is clearly defamatory,&#8221; Mega CEO Graham Gaylard told TorrentFreak this morning.</p>
<p>Given NetNames&#8217; and Digital Citizens Alliance failure to respond, it comes as little surprise that Mega&#8217;s formalized demands now go beyond an apology and retraction. </p>
<p>Firstly, Mega&#8217;s legal team are now demanding the removal of the report, and all references to it, from all channels under the respondents&#8217; control. They also demand that further circulation of the report must be discontinued and no additional references to it should be made in public.</p>
<p>That&#8217;s a tough one. NetNames&#8217; effort is currently the most-circulated report in the &#8216;piracy&#8217; space and TorrentFreak is also informed that the paper is set to become the supporting documentation to Hollywood and the labels&#8217; follow-the-money anti-piracy drive.</p>
<p>Mega are also demanding a list of everyone who has had a copy of the report made available to them along with details of all locations where the report has been published. Again, that will be an interesting one to see Mega&#8217;s targets fulfill.</p>
<p>Finally, Mega is demanding a full public apology &#8220;to its satisfaction&#8221; to be published on the homepages of the respondents&#8217; websites. What form that could take without discrediting the rest of the report is probably up for negotiation, but having Mega in there at all was bound to be a controversial and potentially damaging move.</p>
<p>Mega has given the companies seven days to comply with the above requests. No official line has been provided as to what will happen if Mega is met with a refusal, but it seems that the company is serious about protecting its reputation and will do whatever it takes to do that.</p>
<p>It&#8217;s perhaps of note that to our knowledge none of the other sites listed in the report have come out publicly to protest their inclusion in it. That&#8217;s not to say that some weren&#8217;t wrongfully included of course, but when a company like Mega stands up in order to protect its brand that should set off alarm bells.</p>
<p>Do &#8216;pirate&#8217; sites with &#8220;shadowy&#8221; business models ever bother to publicly defend their reputations unless they&#8217;re the ones being hauled into court? </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/mega-goes-legal-issues-ultimatum-over-cyberlocker-report-140925/feed/</wfw:commentRss>
		<slash:comments>38</slash:comments>
		</item>
		<item>
		<title>Anti-Piracy Police Begin Targeting eBook Pirates</title>
		<link>http://torrentfreak.com/anti-piracy-police-begin-targeting-ebook-pirates-140921/</link>
		<comments>http://torrentfreak.com/anti-piracy-police-begin-targeting-ebook-pirates-140921/#comments</comments>
		<pubDate>Sun, 21 Sep 2014 05:02:45 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94127</guid>
		<description><![CDATA[After very publicly taking down a number of sites offering music, movies and TV shows without permission, City of London Police appear to have taken down their first ebook-related domain. OnRead is now under police investigation but according to its operators the site operated legally. That seems unlikely, however.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/cityoflondonpolice.jpg"><img src="http://torrentfreak.com/images/cityoflondonpolice.jpg" alt="cityoflondonpolice" width="200" height="82" class="alignright size-full wp-image-71397"></a>This year the City of London Police Intellectual Property Crime Unit has built a reputation for being one of the most prolific and aggressive anti-piracy groups operating today.</p>
<p>PIPCU, as its more commonly known, has been involved in the closure of dozens of domains, the closure of several sites, and the arrests of individuals up and down the country.</p>
<p>Until now PIPCU&#8217;s most visible partners, at least in terms of enforcement in the Internet space, have been the Federation Against Copyright Theft (movies and TV) and the BPI (music). However, there are now signs that sites offering pirated ebooks are part of PIPCU&#8217;s strategy.</p>
<p>Like many movie, music, <a href="http://torrentfreak.com/uk-police-make-third-pirate-streaming-arrest-140902/">sports</a> and <a href="http://torrentfreak.com/police-arrest-operator-torrent-site-proxies-140806/">proxy</a> fans have in recent months, this week visitors to the ebook site OnRead.com were confronted with the ominous PIPCU &#8220;seized&#8221; notice.</p>
<p>&#8220;You have tried to access a website that is under criminal investigation by the UK Police Intellectual Property Crime Unit (PIPCU). This site is being investigated for online copyright infringement,&#8221; the page reads.</p>
<p>The signs suggest that OnRead knew something was coming. After regular and often daily tweets of new literature appearing on the site, on September 2 the account <a href="https://twitter.com/OnRead/status/506833941580742656">fell silent</a>.</p>
<p>TorrentFreak asked City of London Police for specifics on the site&#8217;s closure, including whether the domain seizure and shutdown had been carried out together with The Publishers Association, a known PIPCU partner.</p>
<p>&#8220;As part of Operation Creative PIPCU is working closely with the Publishers Association, as well as FACT, IFPI and BPI to disrupt copyright infringing websites. Since the launch of the operation several illegal film, music and publishing sites have been suspended,&#8221; a PIPCU spokesperson said.</p>
<p><a href="/images/e-books.jpg"><img src="http://torrentfreak.com/images/e-books.jpg" alt="e-books" width="220" height="150" class="alignright size-full wp-image-26365"></a>While it seems more than likely that OnRead was operating without licenses recognized by UK publishers, an archive of the domain reveals that the site&#8217;s operators tried to claim that in at least one jurisdiction the site had operated legally.</p>
<p>&#8220;All materials presented on this site are available for the distribution over the Internet in accordance with the license of the Russian Organization for multimedia and Digital Systems (ROMS) and intended for personal use only. Further distribution, resale or broadcasting is strictly prohibited,&#8221; the recent archive reads.</p>
<p>ROMS was a Russian collective rights management organization that attracted public attention in 2006 when notorious music download site, AllofMP3, insisted it operated legally under ROMS&#8217; remit to collect and distribute statutory royalty payments as allowed under Russian law. In 2007, AllofMP3 closed down for good.</p>
<p>While the legal claims made by OnRead are fuzzy and by now years out of date, additional notes do warn users that they have &#8220;no right to download any files from the site if this violates the law of his country.&#8221;</p>
<p>It&#8217;s clear that PIPCU and quite probably The Publishers Association felt that OnRead was not in compliance with UK law. As a result the site&#8217;s domain, registered with InternetBS, is now in police hands.</p>
<p>In 2007, ZML.com, a site that offered movies to US customers, also tried to <a href="http://arstechnica.com/uncategorized/2007/11/its-like-allofmp3-for-movies-hands-on-with-zmls-drm-free-flicks/">claim ROMS protection</a>. That domain is now under the control of ICE and Homeland Security after being seized in the very first wave of <a href="https://torrentfreak.com/?s=%22operation+in+our+sites%22">Operation in Our Sites</a>.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/anti-piracy-police-begin-targeting-ebook-pirates-140921/feed/</wfw:commentRss>
		<slash:comments>349</slash:comments>
		</item>
		<item>
		<title>Mega Demands Apology Over &#8220;Defamatory&#8221; Cyberlocker Report</title>
		<link>http://torrentfreak.com/mega-demands-apology-over-defamatory-cyberlocker-report-140919/</link>
		<comments>http://torrentfreak.com/mega-demands-apology-over-defamatory-cyberlocker-report-140919/#comments</comments>
		<pubDate>Fri, 19 Sep 2014 16:24:42 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Digital Citizens Alliance]]></category>
		<category><![CDATA[Mega.co.nz]]></category>
		<category><![CDATA[NetNames]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94176</guid>
		<description><![CDATA[A new report which brands Mega.co.nz a "shadowy cyberlocker" has drawn a fierce response from the cloud storage site. CEO Graham Gaylard informs TorrentFreak that should the Digital Citizens Alliance refuse to remove Mega from its entire report and issue a public apology, further action will be taken.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/profit.png" width="222" height="175" class="alignright">Yesterday the Digital Citizens Alliance released a new report that looks into the business models of &#8220;shadowy&#8221; file-storage sites.</p>
<p>Titled “Behind The Cyberlocker Door: A Report How Shadowy Cyberlockers Use Credit Card Companies to Make Millions,” the report attempts to detail the activities of some of the world&#8217;s most-visited hosting sites.</p>
<p>While it&#8217;s certainly an <a href="http://torrentfreak.com/report-brands-dotcoms-mega-a-piracy-haven-140918/">interesting read</a>, the NetNames study provides a few surprises, not least the decision to include New Zealand-based cloud storage site Mega.co.nz. There can be no doubt that there are domains of dubious standing detailed in the report, but the inclusion of Mega stands out as especially odd.</p>
<p>Mega was without doubt the most-scrutinized file-hosting startup in history and as a result has had to comply fully with every detail of the law. And, unlike some of the other sites listed in the report, Mega isn&#8217;t hiding away behind shell companies and other obfuscation methods. It also complies fully with all takedown requests, to the point that it even <a href="http://torrentfreak.com/record-labels-take-down-kim-dotcoms-official-album-from-mega-140903/">took down its founder&#8217;s music</a>, albeit following an erroneous request.</p>
<p>With these thoughts in mind, TorrentFreak alerted Mega to the report and asked how its inclusion amid the terminology used has been received at the company.</p>
<p><strong>Grossly untrue and highly defamatory</strong></p>
<p><a href="/images/mega4.png"><img src="http://torrentfreak.com/images/mega4.png" alt="mega" width="240" height="85" class="alignright size-full wp-image-87644"></a>&#8220;We consider the report grossly untrue and highly defamatory of Mega,&#8221; says Mega CEO Graham Gaylard.</p>
<p>&#8220;Mega is a privacy company that provides end-to-end encrypted cloud storage controlled by the customer. Mega totally refutes that it is a cyberlocker business as that term is defined and discussed in the report prepared by NetNames for the Digital Citizens Alliance.&#8221;</p>
<p>Gaylard also strongly refutes the implication in the report that as a &#8220;cyberlocker&#8221;, Mega is engaged in activities often associated with such sites.</p>
<p>&#8220;Mega is not a haven for piracy, does not distribute malware, and definitely does not engage in illegal activities,&#8221; Gaylard says. &#8220;Mega is running a legitimate business alongside other cloud storage providers in a highly competitive market.&#8221;</p>
<p>The Mega CEO told us that one of the perplexing things about the report is that none of the criteria set out by the report for &#8220;shadowy&#8221; sites is satisfied by Mega, yet the decision was still taken to include it.</p>
<p><strong>Infringing content and best practices</strong></p>
<p>One of the key issues is, of course, the existence of infringing content. All user-uploaded sites suffer from that problem, from YouTube to Facebook to Mega and thousands of sites in between. But, as Gaylard points out, it&#8217;s the way those sites handle the issue that counts.</p>
<p>&#8220;We are vigorous in complying with best practice legal take-down policies and do so very quickly. The reality though is that we receive a very low number of take-down requests because our aim is to have people use our services for privacy and security, not for sharing infringing content,&#8221; he explains.</p>
<p>&#8220;Mega acts very quickly to process any take-down requests in accordance with its Terms of Service and consistent with the requirements of the USA Digital Millennium Copyright Act (DMCA) process, the European Union Directive 2000/31/EC and New Zealand’s Copyright Act process. Mega operates with a very low rate of take-down requests; less than 0.1% of all files Mega stores.&#8221;</p>
<p><strong>Affiliate schemes that encourage piracy</strong></p>
<p>One of the other &#8220;rogue site&#8221; characteristics as outlined in the report is the existence of affiliate schemes designed to incentivize the uploading and sharing of infringing content. In respect of Mega, Gaylard rejects that assertion entirely.</p>
<p>&#8220;Mega&#8217;s <a href="https://mega.co.nz/#affiliates">affiliate program</a> does not reward uploaders. There is no revenue sharing or credit for downloads or Pro purchases made by downloaders. The affiliate code cannot be embedded in a download link. It is designed to reward genuine referrers and the developers of apps who make our cloud storage platform more attractive,&#8221; he notes.</p>
<p><strong>The PayPal factor</strong></p>
<p><img src="http://torrentfreak.com/images/paypal.png" width="200" height="118" class="alignright">As detailed in many earlier reports (<a href="https://torrentfreak.com/paypal-bans-major-file-hosting-services-over-piracy-concerns-120710/">1</a>,<a href="https://torrentfreak.com/paypal-bans-usenet-providers-over-piracy-concerns-121121/">2</a>,<a href="https://torrentfreak.com/paypal-demands-invites-to-private-bittorrent-trackers-130108/">3</a>), over the past few years PayPal has worked hard to seriously cut down on the business it conducts with companies in the file-sharing space.</p>
<p>Companies, Mega included, now have to obtain pre-approval from the payment processor in order to use its services. The suggestion in the report is that large &#8220;shadowy&#8221; sites aren&#8217;t able to use PayPal due to its strict acceptance criteria. Mega, however, has a good relationship with PayPal.</p>
<p>&#8220;Mega has been accepted by PayPal because we were able to show that we are a legitimate cloud storage site. Mega has a productive and respected relationship with PayPal, demonstrating the validity of Mega’s business,&#8221; Gaylard says.</p>
<p><strong>Public apology and retraction &#8211; or else</strong></p>
<p>Gaylard says that these are just some of the points that Mega finds unacceptable in the report. The CEO adds that at no point was the company contacted by NetNames or Digital Citizens Alliance for its input.</p>
<p>&#8220;It is unacceptable and disappointing that supposedly reputable organizations such as Digital Citizens and NetNames should see fit to attack Mega when it provides the user end to end encryption, security and privacy. They should be promoting efforts to make the Internet a safer and more trusted place. Protecting people&#8217;s privacy. That is Mega’s mission,&#8221; Gaylard says.</p>
<p>&#8220;We are requesting that Digital Citizens Alliance withdraw Mega from that report entirely and issue a public apology.  If they do not then we will take further action,” he concludes.</p>
<p>TorrentFreak asked NetNames to comment on Mega&#8217;s displeasure and asked the company if it stands by its assertion that Mega is a &#8220;shadowy&#8221; cyberlocker. We received a response (although not directly to our questions) from David Price, NetNames&#8217; head of piracy analysis.</p>
<p>&#8220;The NetNames report into cyberlocker operation is based on information taken from the websites of the thirty cyberlockers used for the research and our own investigation of this area, based on more than a decade of experience producing respected analysis exploring digital piracy and online distribution,&#8221; Price said.</p>
<p>That doesn&#8217;t sound like a retraction or an apology, so this developing dispute may have a way to go. </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/mega-demands-apology-over-defamatory-cyberlocker-report-140919/feed/</wfw:commentRss>
		<slash:comments>40</slash:comments>
		</item>
		<item>
		<title>Censorship Is Not The Answer to Online Piracy</title>
		<link>http://torrentfreak.com/censorship-answer-online-piracy-140914/</link>
		<comments>http://torrentfreak.com/censorship-answer-online-piracy-140914/#comments</comments>
		<pubDate>Sun, 14 Sep 2014 21:59:25 +0000</pubDate>
		<dc:creator><![CDATA[Simon Frew]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[pirate party australia]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93934</guid>
		<description><![CDATA[The Australian Government has proposed a wide variety of measures to deal with online piracy, including website blocking.  The local Pirate Party believes that censorship is not the answer, however, and signals a range of problems with the Government's plans. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><em>This is a guest post written by Simon Frew, Deputy President of <a href="http://pirateparty.org.au/">Pirate Party Australia</a>.</em></p>
<p>&#8212;</p>
<p>The Australian Government recently called for <a href="http://www.ag.gov.au/consultations/pages/onlinecopyrightinfringementpublicconsultation.aspx">submissions </a><a href="http://www.ag.gov.au/consultations/pages/onlinecopyrightinfringementpublicconsultation.aspx">into its plans</a> to introduce a range of measures that are the long-standing dreams of the copyright lobby: ISP liability, website blocking for alleged pirate sites and graduated response.</p>
<p>The Government&#8217;s discussion paper specifically asked respondents to ignore other Government inquiries into copyright. This meant ignoring an inquiry by the Australian Law Reform Commission (ALRC) into <a href="http://www.alrc.gov.au/inquiries/copyright-and-digital-economy">copyright in the digital economy</a> and an <a href="http://www.aph.gov.au/parliamentary_business/committees/house_of_representatives_committees?url=ic/itpricing/report.htm">IT pricing inquiry</a>. These reviews both covered important aspects of sharing culture in the 21<sup>st</sup> century, yet they were completely ignored by the Government&#8217;s paper and respondents were instructed to ignore issues covered in them.</p>
<p>The ALRC review examined issues around the emerging remix culture, the ways the Australian copyright regime limits options for companies to take advantage of the digital environment and issues around fair dealing and fair use. It recommended a raft of changes to update Australian copyright law to modernize it for the digital age. Whilst the recommendations were modest, they were a step in the right direction, but this step has been ignored by the Australian Parliament.</p>
<p>The IT pricing inquiry held last year, looked into why Australians pay exorbitant prices for digital content, a practice that has been dubbed the Australia Tax. Entertainment and Tech companies were dragged in front of the inquiry to explain why Australians pay much more for products than residents of other countries. The <a href="http://www.cnet.com/au/news/it-pricing-inquiry-verdict-australia-is-consistently-ripped-off/">review found</a> that, compared to other countries, Australians pay up to 84% more for games, 52% more for music and 50% more for professional software than comparable countries. The result of this review was to look at ways to end geographic segmentation and to continue to turn a blind eye to people using Virtual Private Networks (VPNs) to circumvent the higher prices in Australia.</p>
<p><a href="http://mashable.com/2014/09/09/copyright-laws-australian-forum/">Between the Australia Tax</a> and the substantially delayed release dates for TV shows and movies, Australians don&#8217;t feel too bad about <a href="http://torrentfreak.com/game-of-thrones-premiere-triggers-piracy-craze-140407/">accessing content</a> by other means. According to some estimates, over 200,000 people have <a href="http://qz.com/262992/netflix-is-scaring-the-living-daylights-out-of-australias-media-industry/">Netflix</a> accounts by accessing the service through VPNs.</p>
<p>Pirate Party Australia (PPAU) responded to the latest review with a <a href="http://pirateparty.org.au/media/submissions/PPAU_2014_AGD_Online_Copyright_Infringement_DP.pdf">comprehensive paper,</a> outlining the need to consider all of the evidence and what that evidence says about file-sharing.</p>
<p>To say the Government&#8217;s discussion paper was biased understates the single-mindedness of the approach being taken by the Government. A co-author of the Pirate Party submission, Mozart Olbrycht-Palmer summed it up:</p>
<p><i>The discussion paper stands out as the worst I have ever read. The Government has proposed both a graduated response scheme and website blockades without offering any evidence that either of these work. Unsurprisingly the only study the discussion paper references was commissioned by the copyright lobby and claims Australia has a high level of online copyright infringement. This calls into question the validity of the consultation process. The Government could not have arrived at these proposals if independent studies and reports had been consulted.</i></p>
<p>The entire review was aimed at protecting old media empires from the Internet. This is due in part, to the massive support given to the Liberal (Conservatives) and National Party coalition in the lead-up to the 2013 federal election which saw Murdoch owned News Ltd media, comprising most major print-news outlets in Australia, <a href="http://theconversation.com/election-2013-the-role-of-the-media-17543">actively campaign</a> for the in-coming Government. There is also a long history of media companies donating heavily to buy influence. Village Roadshow, one of Australia&#8217;s largest media conglomerates, has donated close to <a href="http://www.zdnet.com/au/lobby-pushing-for-australian-piracy-crackdown-donates-millions-7000026421/">four million dollars</a> to both major parties since 1998: in the lead up to the 2013 election alone, they donated over $300,000 to the LNP.</p>
<p>The sort of influence being wielded by the old media is a big part of what Pirate parties worldwide were formed to counter. The Internet gives everyone a platform that can reach millions, if the content is good enough. The money required to distribute culture is rapidly approaching zero and those who built media empires on mechanical distribution models (you know, physical copies of media, DVDs, cassettes etc) want to turn the clock back, because they are losing their power to influence society.</p>
<p>Much of the Pirate Party response centred on the need to allow non-commercial file-sharing and dealing with the wrong, bordering on fraudulent assumptions, the paper was based on. From the paper:</p>
<p><i>Digital communications provide challenges and opportunities. Normal interactions, such as sharing culture via the Internet, should not be threatened. Creators should seize the new opportunities provided and embrace new forms of exposure and distribution. The Pirate Party believes the law should account for the realities of this continually emerging paradigm by reducing copyright duration, promoting the remixing and reuse of existing content, and legalising all forms of non-commercial use and distribution of copyrighted materials.</i></p>
<p>The discussion paper asked, &#8216;What could constitute ‘reasonable steps’ for ISPs to prevent or avoid copyright infringement?&#8217; This was of particular concern because it is aimed at legally overturning the <a href="https://torrentfreak.com/iinet-isp-not-liable-for-bittorrent-piracy-high-court-rules-120420/">iiNet case</a>, which set a legal precedent that ISPs couldn&#8217;t be sued for the behavior of their users. This section was a not-so-subtle attempt to push for a graduated response (&#8216;three strikes&#8217;) system which has been <a href="http://www.lawandarts.org/wp-content/uploads/2014/01/JLA-37.2-Evaluating-Graduated-Response.pdf">heavily criticized</a> in a number of countries.</p>
<p>The agenda laid out in this discussion paper was very clear, as demonstrated by Question 6: &#8220;What matters should the Court consider when determining whether to grant an injunction to block access to a particular website?&#8221;</p>
<p>The Pirate Party obviously disagrees with the implication that website blocking was a foregone conclusion. Censorship is not the answer to file-sharing or any other perceived problem on the Internet. Government control of the flow of information is not consistent with an open democracy. The Pirate Party submission attacked website blocking on free speech grounds and explained how measures to block websites or implement a graduated response regime would be trivial to avoid through the use of VPNs.</p>
<p>On Tuesday September 9, a <a href="http://www.communications.gov.au/digital_economy/online_copyright_infringement_forum">public forum</a> was held into the proposed changes. The panel was stacked with industry lobbyists, <a href="http://olbrychtpalmer.net/2014/09/10/copyrightau-evidence-what-evidence/">no evidence</a> was presented while the same tired arguments were trotted out to try to convince attendees that there was need to crack down on file-sharing. It wasn&#8217;t all bad though, with the host of the meeting, Communications Minister Malcolm Turnbull, flagging a <a href="http://www.brisbanetimes.com.au/federal-politics/political-news/malcolm-turnbull-says-copyright-law-proposal-a-failure-and-government-needs-to-start-again-20140910-10ethp.html">Government re-think</a> on how to tackle piracy after the scathing responses to the review from the public.</p>
<p>Despite signalling a re-think, the Australian Government is still intent on implementing draconian copyright laws. Consumers may have won this round, but the fight will continue.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/censorship-answer-online-piracy-140914/feed/</wfw:commentRss>
		<slash:comments>24</slash:comments>
		</item>
		<item>
		<title>Which VPN Services Take Your Anonymity Seriously? 2014 Edition</title>
		<link>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/</link>
		<comments>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/#comments</comments>
		<pubDate>Tue, 09 Sep 2014 19:45:35 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Sidebar]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[vpn services]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=85262</guid>
		<description><![CDATA[Millions of people use a VPN service to protect their privacy, but not all VPNs are as anonymous as one might hope. In fact, some VPN services log users' IP-addresses for weeks. To find out how secure VPNs really are TorrentFreak asked the leading providers about their logging policies, and more.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/boxed.jpg"><img src="http://torrentfreak.com/images/boxed.jpg" alt="boxed" width="222" height="178" class="alignright size-full wp-image-36576"></a>By now most Internet users are well aware of the fact that pretty much every step they take on the Internet is logged or monitored. </p>
<p>To prevent their IP-addresses from being visible to the rest of the Internet, millions of people have signed up to a VPN service. Using a VPN allows users to use the Internet anonymously and prevent snooping.</p>
<p>Unfortunately, not all VPN services are as anonymous as they claim.  </p>
<p>Following a high-profile case of an individual using an &#8216;anonymous&#8217; VPN service that turned out to be not so private, TorrentFreak decided to ask a selection of VPN services some tough questions.</p>
<p>By popular demand we now present the third iteration of our VPN services &#8220;logging&#8221; review. In addition to questions about logging policies we also asked VPN providers about their stance towards file-sharing traffic, and what they believe the most secure VPN is. </p>
<p><strong>Last update: October 7, 2014 (added partial <a href="http://torrentfreak.com/%D0%BA%D0%B0%D0%BA%D0%BE%D0%B9-%D0%B8%D0%B7-vpn-%D1%81%D0%B5%D1%80%D0%B2%D0%B8%D1%81%D0%BE%D0%B2-%D1%80%D0%B5%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE-%D0%B7%D0%B0%D0%B1%D0%BE%D1%82%D0%B8%D1%82%D1%8C%D1%81%D1%8F/" title="Какой из VPN сервисов реально заботиться о Вашей анонимности? Результаты 2014 года.">Russian translation</a>)<br>
</strong><br>
&#8212;</p>
<p>1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long? </p>
<p>2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?</p>
<p>3. What tools are used to monitor and mitigate abuse of your service?</p>
<p>4. In the event you receive a DMCA takedown notice or European equivalent, how are these handled?</p>
<p>5. What steps are taken when a valid court order requires your company to identify an active user of your service?</p>
<p>6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?</p>
<p>7. Which payment systems do you use and how are these linked to individual user accounts?</p>
<p>8. What is the most secure VPN connection and encryption algorithm you would recommend to your users? </p>
<p>&#8212;</p>
<p>What follows is the list of responses from the VPN services, in their own words. Providers who didn&#8217;t answer our questions directly or failed by logging everything were excluded. Please note, however, that several VPN companies listed here do log to some extent. The order of the lists holds no value. </p>
<h2><a href="http://bit.ly/privateinternet">Private Internet Access</a></h2>
<p><a href="http://torrentfreak.com/images/pia.png"><img class="alignright size-full wp-image-41039" title="torrentprivacy" src="http://torrentfreak.com/images/pia.png" alt="" width="180" height="40"></a>1. We absolutely do not log any traffic nor session data of any kind, period. We have worked hard to meticulously fork all daemons that we utilize in order to achieve this functionality. It is definitely not an easy task, and we are very proud of our development team for helping Private Internet Access to achieve this unique ability.</p>
<p>2. We operate out of the US which is one of the few, if only, countries without a mandatory data retention law. We explored several other jurisdictions with the help of our professional legal team, and the US is still ideal for privacy-based VPN services.</p>
<p>We severely scrutinize the validity of any and all legal information requests. That being said, since we do not hold any traffic nor session data, we are unable to provide any information to any third-party. Our commitment and mission to preserve privacy is second to none.</p>
<p>3. We do not monitor any traffic, period. We block IPs/ports as needed to mitigate abuse when we receive a valid abuse notification.</p>
<p>4. We do not host any content and are therefore unable to remove any of said content. Additionally, our mission is to preserve and restore privacy on the Internet and society. As such, since we do not log or monitor anything, we&#8217;re unable to identify any users of our service.</p>
<p>5. Once again, we do not log any traffic or session data. Additionally, unlike the EU and many other countries, our users are protected by legal definition. For this reason, we&#8217;re unable to identify any user of our service. Lastly, consumer protection laws exist in the US, unlike many other countries. We must abide by our advertised privacy policy.</p>
<p>6. We do not discriminate against any kind of traffic/protocol on any of our servers, period. We believe in a free, open, and uncensored internet.</p>
<p>7. Bitcoin, Ripple, PayPal, Google Play (Mobile), OKPay, CashU, Amazon and any major Gift Card. We support plenty of anonymous payment methods. For this reason, the highest risk users should definitely use Bitcoin, Ripple or a major gift card with an anonymous e-mail account when subscribing to our privacy service.</p>
<p>8. We&#8217;re the only provider to date that provides a plethora of encryption cipher options. We recommend, mostly, using AES-128, SHA1 and RSA2048. </p>
<p><a href="http://bit.ly/privateinternet">Private Internet Access website</a> </p>
<h2><a href="http://bit.ly/torguardvpn">TorGuard</a></h2>
<p><a href="http://torrentfreak.com/images/torguard.png"><img class="alignright size-full wp-image-50163" title="torguard" src="http://torrentfreak.com/images/torguard.png" alt="" width="180" height="59"></a>1. TorGuard does not store any IP address or time stamps on any VPN and proxy servers, not even for a second. Further, we do not store any logs or time stamps on user authentication servers connected to the VPN. In this way it is not even possible to match an external time stamp to a user that was simultaneously logged in. Because the VPN servers utilize a shared IP configuration, there can be hundreds of users sharing the same IP at any given moment further obfuscating the ability to single out any specific user on the network.</p>
<p>2. TorGuard is a privately owned company with parent ownership based in Nevis and our headquarters currently located in the US. Our legal representation at the moment is comfortable with the current corporate structuring however we wouldn’t hesitate to move all operations internationally should the ground shift beneath our feet. We now offer VPN access in 23+ countries worldwide and maintain all customer billing servers well outside US borders.</p>
<p>We would only be forced to communicate with a third-party in the event that our legal team received a court ordered subpoena to do so. This has yet to happen, however if it did we would proceed with complete transparency and further explain the nature of TorGuard’s shared VPN configuration. We have no logs to investigate, and thus no information to share.</p>
<p>3. Our network team uses commercial monitoring software with custom scripts to keep an eye on individual server load and service status/uptime so we can identify problems as fast as possible. If abuse reports are received from an upstream provider, we block it by employing various levels of filtering and global firewall rules to large clusters of servers. Instead of back tracing abuse by logging, our team mitigates things in real-time. We have a responsibility to provide fast, abuse-free VPN services for our clients and have perfected these methods over time.</p>
<p>4. In the event of receiving a DMCA notice, the request is immediately processed by our abuse team. Because it is impossible for us to locate which user on the server is actually responsible for the violation, we temporarily block the infringing server and apply global rules depending on the nature of the content and the server responsible. The system we use for filtering certain content is similar to keyword blocking but with much more accuracy. This ensures the content in question to no longer pass through the server and satisfies requirements from our bandwidth providers.</p>
<p>5. Due to the nature of shared VPN services and how our network is configured, it is not technically possible to effectively identity or single out one active user from a single IP address. If our legal department received a valid subpoena, we would proceed with complete transparency from day one. Our team is prepared to defend our client’s right to privacy to the fullest extent of the law.</p>
<p>6. BitTorrent is only allowed on select server locations. TorGuard now offers a variety of protocols like http/socks proxies, OpenVPN, SSH Tunnels, SSTP VPN and Stealth VPN (DPI Bypass), with each connection method serving a very specific purpose for usage. Since BitTorrent is largely bandwidth intensive, we do not encourage torrent usage on all servers. Locations that are optimized for torrent traffic include endpoints in: Canada, Netherlands, Iceland, Sweden, Romania, Russia and select servers in Hong Kong. This is a wide range of locations that works efficiently regardless of the continent you are trying to torrent from. </p>
<p>7. We currently accept payments through all forms of credit or debit card, PayPal, OKPAY, and Bitcoin. During checkout we may ask the user to verify a billing phone and address but this is simply to prevent credit card fraud, spammers, and keep the network running fast and clean. After payment it is possible to change this to something generic that offers more privacy. No VPN or Proxy usage can be linked back to a billing account due to the fact we hold absolutely no levels of logging on any one of our servers, not even timestamps! </p>
<p>8. For best security we advise clients to choose OpenVPN connections only, and if higher encryption is called for use AES256 bit. This option is available on many locations and offers excellent security without degrading performance. For those that are looking to defeat Deep Packet Inspection firewalls (DPI) like what is encountered in countries such as China or Iran, TorGuard offers “Stealth” VPN connections in the Netherlands, UK and Canada. Stealth connections feature OpenVPN obfuscation technology that causes VPN traffic to appear as regular connections, allowing VPN access even behind the most strict corporate wifi networks or government regulated ISPs.</p>
<p><a href="http://bit.ly/torguardvpn">TorGuard website</a> </p>
<h2><a href="http://bit.ly/ipvanis">IPVanish</a></h2>
<p><a href="/images/ipvarnish.png"><img src="http://torrentfreak.com/images/ipvarnish.png" alt="ipvarnish" width="152" height="82" class="alignright size-full wp-image-51008"></a>1. IPVanish has a no-log policy. We keep no traffic logs.</p>
<p>2. IPVanish is headquartered in the US and thus operates under US law.</p>
<p>3. IPVanish has no monitoring in place. To elaborate, IPVanish does not sniff or monitor any user’s traffic or activity for any reason.</p>
<p>4. IPVanish keeps no logs of any user’s activity and responds accordingly.</p>
<p>5. IPVanish, like every other company, has to follow the law in order to remain in business. Only US law applies. </p>
<p>6. P2P is permitted. IPVanish in fact does not block or throttle any ports, protocols, servers or any type of traffic whatsoever.</p>
<p>7. PayPal and all major credit cards are accepted. Payments and product use are in no way linked. User authentication and billing info are help on completely different and independent platforms.</p>
<p>8. OpenVPN generally provides the strongest encryption algorithm, so that is the recommended encryption protocol. IPVanish also allows a choice between TCP and UDP, and UDP is generally recommended for better speed.</p>
<p><a href="http://bit.ly/ipvanis">IPVanish website</a></p>
<h2><a href="http://btguard.com/?a=discounts">BTGuard</a></h2>
<p><img src="http://torrentfreak.com/images/btguard2.jpg" align="right" alt="btguard">1. We do not keep any logs whatsoever.</p>
<p>2. The jurisdiction is Canada. Since we do not have log files, we have no information to share. We do not communicate with any third parties. The only event in which we would even communicate with a third-party is if we received a court order. We would then be forced to notify them we have no information. This has not happened yet.</p>
<p>3. If serious abuse is reported we enable tcpdump to confirm the abuse and locate the user. These dumps are immediately removed. If the user is abusing our service they will be terminated permanently but we have never shared user information with a 3rd party. </p>
<p>4. We do not have any open incoming ports, so it’s not possible for us to “takedown” any broadcasting content.</p>
<p>5. We take every step within the law to fight such an order.</p>
<p>6. Yes, all types of traffic our allowed with our services.</p>
<p>7. We accept PayPal and Bitcoin. All payments are linked to users accounts because they have to be for disputes and refunds.</p>
<p>8. 256-bit AES is the most secure. However 128-bit blowfish is plenty good. If you&#8217;re concerned about surveillance agencies such as the NSA, their capabilities are shrouded in secrecy and claiming to be able to protect you is offering you nothing but speculation. As far as what&#8217;s publicly available for deciphering encryption, both of the encryptions I mentioned are more than sufficient.</p>
<p><a href="http://btguard.com/?a=discounts">BTGuard website</a></p>
<h2><a href="https://privacy.io/">Privacy.io</a></h2>
<p><a href="http://torrentfreak.com/images/privacyio.jpg"><img class="alignright size-full wp-image-41044" title="privacy" src="http://torrentfreak.com/images/privacyio.jpg" alt="" width="180" height="50"></a>1. We do not log any information on our VPN servers. The only scenario is if a technical issue arises, but we request permission from the user first, and we only do it for the duration of the job, and then it is removed.</p>
<p>2. We are in the process of moving jurisdictions away from Australia at present as we are unsure what our current government plans to do in regards to our privacy. We have not decided where yet.</p>
<p>3. Only SMTP port 25 is filtered to mitigate spam, but we are working on some tools to make it easier for users to send mail.</p>
<p>4. Any DMCA request is ignored, as we have no logs to do anything about them.</p>
<p>5. Same as above, as we do not log, so we are unable to provide any information. If the law attempts to make us do such things, we will move our business to a location where that cannot occur, and if that fails we will close up shop before we provide any information.</p>
<p>6. All protocols are allowed with our service, with the only exception of SMTP port 25 currently being filtered.</p>
<p>7. At present we only accept PayPal and CC (processed by PayPal), but we are looking into alternative types of payments. We go out of our way to make sure that PayPal transactions are not linked to the users, we generate a unique key per transaction to verify payment for the account is made, and then nuke that unique key. Bitcoin and Litecoin are also on the agenda.</p>
<p>8. At present we offer 128 bit for PPTP and 256 bit for OpenVPN, We plan to offer stronger encryption for the security conscious.</p>
<p><a href="https://privacy.io/">Privacy.io website</a></p>
<h2><a href="http://vikingvpn.com/">VikingVPN</a></h2>
<p><img src="http://torrentfreak.com/images/vikingvpn.jpg" alt="vikingvpn" width="180" height="203" class="alignright size-full wp-image-74962">1. No. We run a zero knowledge network and are unable to tie a user to an IP address.</p>
<p>2. United States, they don&#8217;t have data retention laws, despite their draconian surveillance programs. The only information we share with anyone is billing information to our payment gateway. This can be anonymized by using a pre-paid anonymous card. If asked to share specific data about our users and their habits, we would be unable to do so, because we don&#8217;t have any logs of that data.</p>
<p>3. That is mostly confidential information. However, we can assure our users that we do not use logging to achieve this goal.</p>
<p>4. In the event of a DMCA notice, we send out the DMCA policy published on our website. We haven&#8217;t yet received a VALID DMCA notice.</p>
<p>5. We exhaust all legal options to protect our users. Failing that, we would provide all of our logs, which do not actually exist. If required to wiretap a user under a National Security Letter, we have a passively triggered Warrant Canary. We would also likely choose to shut down our service and put it up elsewhere.</p>
<p>6. Yes. Those ports are all open, and we have no data caps.</p>
<p>7. We currently only take credit cards. Our payment provider is far more restrictive than we ever imagined they would be. We&#8217;re still trying to change payment providers. Fortunately, by using a pre-paid credit card, you can still have totally anonymous service from us.</p>
<p>8. A strong handshake (either RSA-4096+ or a non-standard elliptic curve as the NIST curves are suspect). A strong cipher such as AES-256-CBC or AES-256-GCM encryption (NOT EDE MODE). At least SHA1 for data integrity checks. SHA2 and the newly adopted SHA3 (Skein) hash functions are also fine, but slower and provide no real extra assurances of data integrity, and provide no further security beyond SHA1. The OpenVPN HMAC firewall option to harden the protocol against Man-in-the-Middle and Man-on-the-Side attacks.</p>
<p><a href="http://vikingvpn.com/">VikingVPN website</a> </p>
<h2><a href="http://www.ivpn.net/">IVPN</a></h2>
<p><a href="http://torrentfreak.com/images/ivpn.png"><img src="http://torrentfreak.com/images/ivpn.png" alt="ivpn" width="150" height="69" class="alignright size-full wp-image-85390"></a>1.  IVPN’s top priority is the privacy of its customers and therefor we do not store any connection logs or any other log that could be used to associate a connection to a customer.</p>
<p>2. IVPN is incorporated in Malta. We would ignore any request to share data unless it was served by a legal authority with jurisdiction in Malta in which case we would inform them that we don&#8217;t have the data to share. If we were served a subpoena which compelled us to log traffic we would find a way to inform our customers and relocate to a new jurisdiction.</p>
<p>3. We use a tool called PSAD to mitigate attacks originating from customers on our network. We also use rate-limiting in iptables to mitigate SPAM.</p>
<p>4. We ensure that our network providers understand the nature of our business and that we do not host any content. As a condition of the safe harbor provisions they are required to inform us of each infringement which includes the date, title of the content and the IP address of the gateway through which it was downloaded. We simply respond to each notice confirming that we do not host the content in question.</p>
<p>5. Assuming the court order is requesting an identity based on a timestamp and IP, our legal department would respond that we don&#8217;t have any record of the user&#8217;s identity nor are we legally compelled to do so.</p>
<p>6. We &#8216;allow&#8217; BitTorrent on all servers except gateways based in the USA. Our USA network providers are required to inform us of each copyright infringement and are required to process our response putting undue strain on their support resources (hundreds per day). For this reason providers won&#8217;t host our servers in the USA unless we take measures to mitigate P2P activity.</p>
<p>7. We currently accept Bitcoin, Cash and PayPal. No information relating to a customers payment account is stored with the exception of automated PayPal subscriptions where we are required to store the subscription ID in order to assign it to an invoice (only for the duration of the subscription after which it is deleted). Of course PayPal will always maintain a record that you have sent funds to IVPN but that is all they have. If you need to be anonymous to IVPN and don&#8217;t wish to be identified as a customer then we recommend using Bitcoin or cash.</p>
<p>8. We recommend and offer OpenVPN using the strongest AES-256 cipher. For key exchange and authentication 4096-bit RSA keys are used.</p>
<p><a href="http://www.ivpn.net/">IVPN website</a></p>
<h2><a href="https://privatevpn.com/">PrivatVPN</a></h2>
<p><a href="http://torrentfreak.com/images/privatvpn.jpg"><img class="alignright size-full wp-image-41044" title="privatvpn" src="http://torrentfreak.com/images/privatvpn.jpg" alt="" width="180" height="53"></a>1. We don’t keep ANY logs that allow us or a 3rd party to match an IP address and a time stamp to a user our service. The only thing we log are e-mails and user names but it’s not possible to bind an activity on the Internet to a user.</p>
<p>2. We operate in Swedish jurisdiction. Since we do not log any IP addresses we have nothing to disclose. Circumstances doesn&#8217;t matter in this case, we have no information regarding our customers’ IP addresses and activity on the Internet. Therefore we have no information to share with any 3rd party.</p>
<p>3. If there&#8217;s abuse, we advise that service to block our IP in the first instance, and second, we can block traffic to the abused service.</p>
<p>4. This depends on the country in which we’re receiving a DMCA takedown. For example, we’ve received a DMCA takedown for UK and Finland and our response was to close P2P traffic in those countries.</p>
<p>5. If we get a court order to monitor a specific IP then we need to do it, and this applies to every VPN company out there.</p>
<p>6. Yes, we allow Torrent traffic.</p>
<p>7. PayPal, Payson and Plimus. Every payment has an order number, which is linked to a user. Otherwise we wouldn&#8217;t know who has made a payment. To be clear, you can&#8217;t link a payment to an IP address you get from us.</p>
<p>8. OpenVPN TUN with AES-256. On top is a 2048-bit DH key.</p>
<p><a href="https://privatevpn.com/">PrivatVPN website</a></p>
<h2><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ</a></h2>
<p><img class="alignright size-full wp-image-49734" title="prq" src="http://torrentfreak.com/images/prq.png" alt="" width="129" height="102">1. No. Wo do not log anything and we only require a working e-mail address to be a customer.</p>
<p>2. Swedish. We do not share information with anyone.</p>
<p>3. Not disclosed.</p>
<p>4. Put it in the trash where it belongs!</p>
<p>5. None, since we do not have any customer information and no logs.</p>
<p>6. We host anything as long as it&#8217;s not SPAM related or child porn.</p>
<p>7. Visa/Mastercard, Bitcoin, PayPal. No correlation between payment data and customer data.</p>
<p>8. We provide OpenVPN services (along with dedicated servers and other hosting services).</p>
<p><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ website</a></p>
<h2><a href="http://www.tigervpn.com/en/home">tigerVPN</a></h2>
<p><a href="http://torrentfreak.com/images/tigervpn.png"><img src="http://torrentfreak.com/images/tigervpn.png" alt="tigervpn" width="180" height="73" class="alignright size-full wp-image-85421"></a>1. Absolutely not! We built tigerVPN to purge all data once the transmission of a IP package was completed successfully. Its impossible to trace back any customer. On top of that we decided to use shared IPs in order to further randomize and anonymize our customers. The combination of having absolutely no logs at all and multiple customers per IP, wipes our customers digital footprint</p>
<p>2. We are a limited liability company in Slovakia.  Slovakia does not have any data retention programs and furthermore encourage ISP’s to protect their customers privacy on the net. We are not required to share any information with 3rd party hence it would be illegal thanks to the law of telecom secrecy. </p>
<p>3. Since we don’t keep logs, we can&#8217;t monitor abusive behavior, which is the price for building a customer secure environment!</p>
<p>4. We can’t comply since we can’t identify customers, therefore it’s pointless to follow any requests. We have a specific folder for these eMails ;-)</p>
<p>5. Same as above. We seriously can’t tell which customer did what, when, where, at any given time.</p>
<p>6. It’s allowed on all servers although we gently ask our customers to use either Romania or Netherlands. Some infrastructure service providers do not want file sharing so it happened to us that we were asked to move our servers due to file sharing. We found some reliable partners in Romania and Netherlands which tolerate p2p so we kindly ask our customers to use these server parks.</p>
<p>7. Customers can pay with Visa, Mastercard and Debit. On top of that we also use PayPal. We use hash keys and tokens to identify a payment but it’s not logged or linked to the customer. We had to do this anyway hence we are a PCI Level 1 compliant merchant. Therefore we are not allowed to store any card or payment data with the records of our customers. These keys are pointless for anyone else so there is no chance to build a connection.</p>
<p>8. We offer PPTP, L2TP and OpenVPN, while out of nature OpenVPN comes with the highest encryption and algorithm. L2TP and OpenVPN are 256bit SSL  encrypted while PPTP comes with a solid 128bit. Although our customers are individual and have their own sense of why and what to use, we recommend L2TP as solid protocol. It’s less geeky and more secure than PPTP, but our customers can pick any of them in all the 47 network nodes around the globe.</p>
<p><a href="http://www.tigervpn.com/en/home">tigerVPN website</a></p>
<h2><a href="http://mullvad.net/en">Mullvad</a></h2>
<p><a href="http://torrentfreak.com/images/mullvad.jpg"><img class="alignright size-full wp-image-41059" title="mullvad" src="http://torrentfreak.com/images/mullvad.jpg" alt="" width="180" height="37"></a>1. No. This would make both us and our users more vulnerable so we<br>
certainly don&#8217;t. To make it harder to watch the activities of an IP address from the outside we also have many users share each address, both for IPv4 and our upcoming IPv6 support.</p>
<p>2. Swedish jurisdiction. Under no circumstance we will share information with a third-party. First of all we take pains to not actually possess information that could be of interest to third parties, to the extent possible. In the end there is no practical way for the Swedish government to get information about our users from us.</p>
<p>3. We don&#8217;t monitor our users. In the rare cases of such egregious network abuse that we can&#8217;t help but notice (such as DoS attacks) we stop it using basic network tools.</p>
<p>4. There is no such Swedish law that is applicable to us.</p>
<p>5. We make sure not to store sensitive information that can be tied to publicly available information, so that we have nothing to give out. We believe it is not possible in Swedish law to construct a court order that would compel us to actually give out information about our<br>
users. Not that we would anyway. We started this service for political reasons and would rather discontinue it than having it work against its purpose.</p>
<p>6. Yes.</p>
<p>7. Bitcoin (we were the first service to accept it), cash (in the mail), bank transfers, and PayPal / credit cards. Payments are tied to accounts but accounts are just random numbers with no personal information attached that users can create at will. With the anonymous payments possible with cash and Bitcoin it can be anonymous all the way.</p>
<p>8. We use OpenVPN. We also provide PPTP because some people want it but we strongly recommend against it. Encryption algorithms and key lengths are important but often get way too much attention at the expense of other important but harder to measure things such as leaks and computer security.</p>
<p><a href="http://mullvad.net/en">Mullvad website</a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/feed/</wfw:commentRss>
		<slash:comments>409</slash:comments>
		</item>
		<item>
		<title>Leaked Draft Reveals Hollywood&#8217;s Anti-Piracy Plans</title>
		<link>http://torrentfreak.com/leaked-draft-reveals-hollywoods-anti-piracy-plans-140828/</link>
		<comments>http://torrentfreak.com/leaked-draft-reveals-hollywoods-anti-piracy-plans-140828/#comments</comments>
		<pubDate>Thu, 28 Aug 2014 09:59:35 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93163</guid>
		<description><![CDATA[A leaked draft prepared for government submission has revealed Hollywood's Australian anti-piracy strategy. Among other things, the paper says that providers should be held liable for infringing customers even when they only "reasonably suspect" that infringement is taking place.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/us-aus.jpg"><img src="http://torrentfreak.com/images/us-aus.jpg" alt="us-aus" width="200" height="172" class="alignright size-full wp-image-45442"></a>As the discussions over the future of anti-piracy legislation in Australia continue, a draft submission has revealed the wish-list of local movie groups and their Hollywood paymasters.</p>
<p>The draft, a response to a request by Attorney-General George Brandis and Communications Minister Malcolm Turnbull for submissions on current <a href="http://torrentfreak.com/leaked-paper-reveals-aussie-anti-piracy-crackdown-musings-140725/">anti-piracy proposals</a>, shows a desire to apply extreme pressure to local ISPs.</p>
<p>The authors of the draft (<em>obtained by Crikey, <a href="http://www.crikey.com.au/2014/08/28/the-foreign-copyright-cartel-goes-gunning-for-aussie-isps/?wpmp_switcher=mobile">subscription</a>, </em>) are headed up by the Australia Screen Association, the anti-piracy group previously known as AFACT. While local company Village Roadshow is placed front and center, members including the Motion Picture Association, Disney, Paramount, Sony, Twentieth Century Fox, Universal and Warner make for a more familiar read.</p>
<p><strong>Australian citizens &#8211; the world&#8217;s worst pirates</strong></p>
<p>The companies begin with scathing criticism of the Australian public, branding them the world&#8217;s worst pirates, despite the &#8216;fact&#8217; that content providers &#8220;have ensured the ready availability of online digital platforms and education of consumers on where they can acquire legitimate digital content.&#8221; It&#8217;s a bold claim that will anger many Australians, who even today feel like second-class consumers who have to wait longer and pay more for their content.</p>
<p>So what can be done about the piracy problem?</p>
<p>The draft makes it clear &#8211; litigation against individuals isn&#8217;t going to work and neither is legal action against &#8220;predominantly overseas&#8221; sites. The answer, Hollywood says, can be found in tighter control of what happens on the Internet.</p>
<p><strong>Increased ISP liability</strong></p>
<p>In a nutshell, the studios are still stinging over their loss to ISP iiNet in 2012. So now, with the help of the government, they hope to introduce amendments to copyright law in order to remove service providers&#8217; safe harbor if they even suspect infringement is taking place on their networks but fail to take action. </p>
<p>&#8220;A new provision would deem authorization [of infringement] to occur where an ISP fails to take reasonable steps – which are also defined inclusively to include compliance with a Code or Regulations – in response to infringements of copyright it knows or reasonably suspects are taking place on its network,&#8221; the draft reads.</p>
<p>&#8220;A provision in this form would provide great clarity around the steps that an ISP would be required to take to avoid a finding of authorization and provide the very kind of incentive for the ISP to cooperate in the development of a Code.&#8221;</p>
<p>With &#8220;incentives&#8221; in place for them to take &#8220;reasonable steps&#8221;, ISPs would be expected to agree to various measures (outlined by a &#8216;Code&#8217; or legislation) to &#8220;discourage or reduce&#8221; online copyright infringement in order to maintain their safe harbor. It will come as no surprise that subscriber warnings are on the table.</p>
<p><strong>&#8216;Voluntary&#8217; Graduated Response</strong></p>
<p>&#8220;These schemes, known as ‘graduated response schemes’, are based on a clear allocation of liability to ISPs that do not (by complying with the scheme) take steps to address copyright infringement by their users,&#8221; the studios explain.</p>
<p>&#8220;While this allocation of liability does not receive significant attention in most discussions of graduated response schemes, common sense dictates that the schemes would be unlikely to exist (much less be complied with by ISPs) in the absence of this basic incentive structure.&#8221;</p>
<p>While pointing out that such schemes are in place in eight countries worldwide, the movie and TV companies say that a number of them contain weaknesses, a trap that Australia must avoid.</p>
<p>&#8220;There are flaws in a number of these models, predominantly around the allocation of costs and lack of effective mitigation measures which, if mirrored in Australia, would make such a scheme ineffective and unlikely to be used,&#8221; the paper reads.</p>
<p>It appears that the studios believe that the US model, the Copyright Alerts System (CAS), is what Australia should aim for since it has &#8220;effective mitigation measures&#8221; and they don&#8217;t have to foot the entire bill.</p>
<p>&#8220;Copyright owners would pay their own costs of identifying the infringements and notifying these to the ISP, while ISPs would bear the costs of matching the IP addresses in the infringement notices to subscribers, issuing the notices and taking any necessary technical mitigation measures,&#8221; they explain.</p>
<p>In common with the CAS in the United States, providers would be allowed discretion on mitigation measures for persistent infringers. However, the studios also imply that ISPs&#8217; &#8216;power to prevent&#8217; piracy should extend to the use of customer contracts.</p>
<p>&#8220;[Power] to prevent piracy would include both direct and indirect power and definitions around the nature of the relationship which would recognize the significance of contractual relationships and the power that they provide to prevent or avoid online piracy,&#8221; they write.</p>
<p><strong>Voluntary agreements, required by law, one way or another</strong></p>
<p>The key is to make ISPs liable first, the studios argue, then negotiations on a &#8220;voluntary&#8221; scheme should fall into place.</p>
<p>&#8220;Once the authorization liability scheme is amended to make clear that ISPs will be liable for infringements of copyright by their subscribers which they know about but do not take reasonable steps to prevent or avoid, an industry code prescribing the content of those ‘reasonable steps’ is likely to be agreed between rightsholders and ISPs without excessively protracted negotiations.&#8221;</p>
<p>However, any failure by the ISPs to come to the table voluntarily should be met by legislative change.</p>
<p>&#8220;In the absence of any current intention of and incentive for ISPs in Australia to support such a scheme (and the strong opposition from some ISPs) legislative recognition of the reasonable steps involved in such a scheme is necessary,&#8221; they write. </p>
<p><strong>Site blocking</strong></p>
<p>Due to &#8220;weakness&#8221; in current Australian law in respect of ISP liability, site blocking has proved problematic. What the studios want is a &#8220;no-fault&#8221; injunction (similar to the model in Ireland) which requires ISPs to block sites like The Pirate Bay without having to target the ISPs themselves.</p>
<p>&#8220;Not being the target of a finding against it, an ISP is unlikely to  oppose the injunction – as long as the procedural requirements for the injunction are met. Once made, a blocking injunction would immediately prevent Australian internet users from being tempted to or accessing the blocked sites,&#8221; the studios explain.</p>
<p>Despite The Pirate Bay <a href="https://torrentfreak.com/pirate-bay-traffic-doubles-despite-isp-blockades-140717/">doubling its traffic</a> in the face of extensive blocking across Europe, the movie companies believe that not blocking in Australia is part of the problem.</p>
<p>&#8220;The absence of a no-fault procedure may explain the very high rates of film and TV piracy in Australia when compared with European countries<br>
that have such a procedure,&#8221; they write.</p>
<p>Unsurprisingly, the studios want to keep the bar low when it comes to such injunctions.</p>
<p>&#8220;The extended injunctive relief provision should <strong>not</strong> require the Court to be satisfied that the dominant purpose of the website is to infringe copyright,&#8221; they urge.</p>
<p>&#8220;Raising the level of proof in this way would severely compromise the effectiveness of the new provision in that it would become significantly more difficult for rightsholders to obtain an injunction under the scheme: allegedly non-infringing content would be pointed to in each case, not for reasons of freedom of access to information on the internet, but purely as a basis to defeat the order.&#8221;</p>
<p>The studios also want the ISPs to pick up the bill on site-blocking.</p>
<p>&#8220;[Courts in Europe] have ordered the costs of site blocking injunctions be borne by the ISP. The Australian Film/TV Bodies submit that the same position should be adopted in Australia, especially as it is not likely that the evidence would be any different on a similar application here,&#8221; they add.</p>
<p><strong>Conclusion</strong></p>
<p>If the studios get everything they&#8217;ve asked for in Australia, the ensuing framework could become the benchmark for models of the future. There&#8217;s a still a long way to go, however, and some ISPs &#8211; iiNet in particular &#8211; won&#8217;t be an easy nut to crack.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/leaked-draft-reveals-hollywoods-anti-piracy-plans-140828/feed/</wfw:commentRss>
		<slash:comments>102</slash:comments>
		</item>
	</channel>
</rss>
