<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; Search Results  &#187;  chilling effects</title>
	<atom:link href="http://torrentfreak.com/search/chilling+effects/feed/rss2/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 19:18:38 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Torrent Site Uses Google To Resurrect Taken Down Content</title>
		<link>http://torrentfreak.com/torrent-site-uses-google-to-resurrect-taken-down-content-141028/</link>
		<comments>http://torrentfreak.com/torrent-site-uses-google-to-resurrect-taken-down-content-141028/#comments</comments>
		<pubDate>Tue, 28 Oct 2014 13:06:30 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[filesoup]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[Necromancer]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95872</guid>
		<description><![CDATA[One of the oldest BitTorrent-related domains has been resurrected offering a brand new torrent site feature. Not only does FileSoup claim to be able to improve on the search results of the sites it proxies, it also claims to have implemented Necromancer, a system which scours Google's DMCA notice archive to put removed content back in search results. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Founded in 2003, UK-based FileSoup was one of the original torrent sites but in 2009 two former administrators of the site were <a href="http://torrentfreak.com/oldest-bittorrent-site-targeted-by-police-owner-arrested-090804/">arrested</a> following a FACT investigation. </p>
<p>Two years later, however, the case <a href="http://torrentfreak.com/court-drops-filesoup-bittorrent-case-administrators-walk-free-110224/">collapsed</a> and the men were free to go. Now, more than three years on, the <a href="http://filesoup.com">FileSoup domain</a> has been resurrected.</p>
<p><strong>It&#8217;s a search engine / proxy, but not as we know it</strong></p>
<p>The new site has no connections to the original owner, but there are several unique aspects to the relaunch of FileSoup that make for an interesting project.</p>
<p>On a basic level FileSoup acts as a meta-search engine variant. It covers four major torrent sites &#8211; The Pirate Bay, KickassTorrents, Torrentz and ExtraTorrent &#8211; each selectable via a drop-down box. It also acts as a reverse proxy for these sites to unblock them in countries where they are inaccessible, the UK for example.</p>
<p><center><img src="http://torrentfreak.com/images/filesoup1.png" alt="filesoup"></center></p>
<p><strong>Improving on search results</strong></p>
<p>But FileSoup is no ordinary proxy. Instead of simply mirroring the content it finds on sites such as KickassTorrents, it actually attempts to improve on the results by caching third party site indexes.</p>
<p>&#8220;Let&#8217;s say Kickass.to receives a [DMCA] notice and deletes the content. We are not simply proxying but also caching the site. This means we can provide the page content even if Kickass.to has deleted the URL due to a DMCA complaint,&#8221; FileSoup informs TorrentFreak.</p>
<p>So in theory (and given time to cache &#8211; the site is still getting off the ground), FileSoup should be able to provide access to content previously taken down from other sites it proxies. To see whether it&#8217;s anywhere near to that goal, we conducted a search for one of the most talked-about franchises of the year &#8211; Expendables.</p>
<p>The images below show the results from FileSoup and KickassTorrents for exactly the same search. FileSoup returned 139 results while KickAss returned 115. Also notable, aside from the inserted ads, is the prominence of highly-seeded Expendables 3 results in the top placed positions on FileSoup.</p>
<p><center><img src="http://torrentfreak.com/images/file-v-kick.png" alt="file-v-kick"></center></p>
<p><center><img src="http://torrentfreak.com/images/kick-v-file.png" alt="kick-v-file"></center></p>
<p>Other searches produced varied results but since FileSoup is just getting off the ground it will need more time to cache significant amounts of taken-down content. But what happens when FileSoup itself is subjected to takedown notices of its own?</p>
<p>&#8220;When FileSoup receives a DMCA abuse notice we create a new URL address for the same content. After that this URL lives till the next DMCA abuse notice,&#8221; the team explain.</p>
<p><strong>The Necromancer &#8211; using Google DMCA notices bypass Google&#8217;s takedowns</strong></p>
<p>The operators of FileSoup also addressed indirect search engine takedowns. Every week rightsholders force Google to remove torrent listings from its search results. For this problem FileSoup says it has a solution, and a controversial one it is too. </p>
<p>The team behind the site say they have developed a web crawler designed to pull the details of content subjected to DMCA notices from two sources &#8211; Google&#8217;s Transparency Report and the Chilling Effects Clearing House. From here the links are brought back to life.</p>
<p>&#8220;We created a technology that crawls DMCA notices and resurrects the torrent webpage under a different URL so it can appear in search results again. It was rather complicated to sharpen it, but eventually it works pretty well. We will use it on FileSoup.com for all the websites we proxy,&#8221; FileSoup explain.</p>
<p>&#8220;It will lead to a situation when KickaAss.FileSoup.com (for example) will have more pages indexed in Google than the original Kickass.to because we will revive pages banned by DMCA within Google search results. We call this technology the Necromancer.&#8221;</p>
<p>The idea of manipulating publicly available sources of copyright notices to reactivate access to infringing content is not new but this is the first time that a site has publicly admitted to putting theory into practice. Whether FileSoup will be able to pull this off remains to be seen, but if it does it could signal the biggest game of whac-a-mole yet.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/torrent-site-uses-google-to-resurrect-taken-down-content-141028/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Jennifer Lawrence Gets Google to Censor Leaked Pictures, Sort Of</title>
		<link>http://torrentfreak.com/jennifer-lawrence-gets-google-to-censor-leaked-pictures-sort-of-141019/</link>
		<comments>http://torrentfreak.com/jennifer-lawrence-gets-google-to-censor-leaked-pictures-sort-of-141019/#comments</comments>
		<pubDate>Sat, 18 Oct 2014 19:50:48 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[jeniffer lawrence]]></category>
		<category><![CDATA[The Fappening]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95416</guid>
		<description><![CDATA[Like many other "hacked" celebrities, Jennifer Lawrence is not happy that her leaked nudes are being distributed freely on the Internet.  To deal with the fallout she sent her lawyers after sites helping to distribute the photos. This includes Google, who took action this week after a careful inspection of the infringing material.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/pixelated.png"><img class="alignright size-full wp-image-94734" src="http://torrentfreak.com/images/pixelated.png" alt="pixelated" width="250" height="228"></a>Over the past several weeks hundreds of photos of naked celebrities leaked online. This “<a href="http://en.wikipedia.org/wiki/2014_celebrity_photo_leaks">fappening</a>” triggered a massive takedown operation targeting sites that host and link to the controversial images.</p>
<p>As a hosting provider and search engine Google inadvertently plays a role in distributing the compromising shots, much to the displeasure of the women involved.</p>
<p>More than a dozen of them <a href="http://pagesix.com/2014/10/01/lawyers-for-hacked-celebs-sue-google-for-failing-to-removing-nude-pics/">sent</a> Hollywood lawyer Marty Singer after the company. Earlier this month Singer penned an <a href="https://www.scribd.com/doc/241694649/Hacked-celebrities-threaten-to-sue">angry letter</a> to Google threatening legal action if it doesn&#8217;t remove the images from YouTube, Blogspot and its search results.</p>
<p>&#8220;It is truly reprehensible that Google allows its various sites, systems and search results to be used for this type of unlawful activity. If your wives, daughters or relatives were victims of such blatant violations of basic human rights, surely you would take appropriate action,” the letter reads.</p>
<p>While no legal action has yet been taken, some celebrities have also sent individual DMCA takedown requests to Google. On September 24 Jennifer Lawrence&#8217;s lawyers asked the search engine to <a href="https://www.chillingeffects.org/notices/2048561">remove two links</a> to thefappening.eu as these infringe on the star&#8217;s copyrights.</p>
<p><center><strong>The DMCA takedown request</strong><br></br></center><center><a href="http://torrentfreak.com/images/jlawdmca.png"><img class="alignnone size-full wp-image-95431" src="http://torrentfreak.com/images/jlawdmca.png" alt="jlawdmca" width="558" height="274"></a></center>Earlier this week the request was still pending, so TorrentFreak asked Google what was causing the delay. The company said it could not comment on individual cases but a day later the links in question were removed.</p>
<p>This means that both the thefappening.eu main domain and the tag archive of Jennifer Lawrence posts no longer appear in Google&#8217;s search results.</p>
<p>Whether this move has helped Lawrence much is doubtful though. The site in question had already redirected its site to a new domain at thefappening.so. These links remain indexed since they were not mentioned in the takedown request.</p>
<p>The good news is that many of Lawrence&#8217;s pictures are no longer hosted on the site itself. In fact, the URLs listed in the takedown request to Google no longer show any of the infringing photos in question, so technically Google had no obligation to remove the URLs.</p>
<p>A prominent disclaimer on the site points out that the operator will gladly take down the compromising photos if he&#8217;s asked to do so. Needless to say, this is much more effective than going after Google.</p>
<p><center><strong>The disclaimer</strong><br></br></center><center><a href="http://torrentfreak.com/images/attention.png"><img class="alignnone size-full wp-image-95437" src="http://torrentfreak.com/images/attention.png" alt="attention" width="545" height="120"></a></center></p>
<p style="text-align: right;"><a href="http://en.wikipedia.org/wiki/Jennifer_Lawrence#mediaviewer/File:Jennifer_Lawrence_2,_2013.jpg">Photo via </a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/jennifer-lawrence-gets-google-to-censor-leaked-pictures-sort-of-141019/feed/</wfw:commentRss>
		<slash:comments>96</slash:comments>
		</item>
		<item>
		<title>Google Refuses to Remove Links to Kate Upton&#8217;s &#8220;Fappening&#8221; Photos</title>
		<link>http://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/</link>
		<comments>http://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/#comments</comments>
		<pubDate>Fri, 12 Sep 2014 18:19:23 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[The Fappening]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93846</guid>
		<description><![CDATA[In an attempt to remove Kate Upton's leaked nudes from Google's search results, her boyfriend Jason Verlander instructed his lawyers to send a DMCA takedown request. Interestingly, Google has rejected nearly half of the links in the Detroit Tigers pitcher's copyright complaint. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/upton.png"><img src="http://torrentfreak.com/images/upton.png" alt="upton" width="250" height="266" class="alignright size-full wp-image-93850"></a>Nearly two weeks have passed since hundreds of photos of naked celebrities <a href="http://en.wikipedia.org/wiki/August_2014_celebrity_photo_leaks">leaked online</a>. This &#8220;fappening&#8221; triggered a massive takedown operation targeting sites that host and link to the images, Google included.</p>
<p>A few days ago Google received a request to remove links to Kate Upton&#8217;s stolen photos The request was not sent by Upton but by her boyfriend Jason Verlander, who also appears in a few of the leaked images. </p>
<p>The notice includes hundreds of URLs of sites such as thefappening.eu where the photos are hosted without permission.</p>
<p>It&#8217;s quite unusual for Google&#8217;s takedown team to be confronted with a long link of naked celebrity pictures. This may explain why it took a while before a decision was reached on the copyright-infringing status of the URLs, a process that may involve a cumbersome manual review. </p>
<p>Yesterday the first batch was processed and interestingly enough Google decided to leave nearly half of all URLs <a href="http://www.google.com/transparencyreport/removals/copyright/requests/1445734/">untouched</a>. The overview below shows that with 16 of the 444 links processed, only 45% were removed. </p>
<p>The big question is, of course, why?</p>
<p><center><center><strong>Verlander&#8217;s takedown request</strong></center><br></br><a href="http://torrentfreak.com/images/upton-google-fappening.png"><img src="http://torrentfreak.com/images/upton-google-fappening.png" alt="upton-google-fappening" width="600" height="442" class="alignnone size-full wp-image-93852"></a></center></p>
<p>Google doesn&#8217;t explain its decision keep the links in question in its search results. In some cases the original content had already been removed at the source site, so these URLs didn&#8217;t have to be removed.</p>
<p>Other rejections are more mysterious though. For example, the thefappening.eu URLs that remain online all pointed to stolen images when we checked. Most of these were not nudes, but they certainly weren&#8217;t posted with permission.</p>
<p>One possible explanation for Google&#8217;s inaction is that Verlander most likely claimed to own the copyright on the images, something he can only do with pictures he took himself. With Upton&#8217;s selfies this is hard to do, unless she signed away her rights.</p>
<p>While browsing through the reported URLs we also noticed another trend. Some sites have replaced Upton&#8217;s leaked photos with photos of other random naked women. Google&#8217;s takedown team apparently has a sharp eye because these were not removed by Google either.</p>
<p>Chilling Effects, who host Google&#8217;s takedown requests, just posted a redacted version of the <a href="http://www.chillingeffects.org/notice.cgi?sID=2021753">original notice</a> with Upton&#8217;s name removed. Unfortunately this doesn&#8217;t offer more clues to resolve this takedown mystery, so for now we can only guess why many of the links remain indexed.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
		</item>
		<item>
		<title>MPAA: We&#8217;re Not Going to Arrest 14 Year Olds, We Educate Them</title>
		<link>http://torrentfreak.com/mpaa-were-not-going-to-arrest-14-year-olds-we-educate-them-140911/</link>
		<comments>http://torrentfreak.com/mpaa-were-not-going-to-arrest-14-year-olds-we-educate-them-140911/#comments</comments>
		<pubDate>Thu, 11 Sep 2014 15:27:55 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[mpaa]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93802</guid>
		<description><![CDATA[In yet more signs that Hollywood is trying to repair its battered image over piracy, the head of the MPAA has indicated that fresh legislation will not solve the problem. "Arresting 14-year-olds" isn't going to work, Chris Dodd says, but making content widely available at a fair price is. Your move Google.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/mpaa-logo1.jpg"><img src="http://torrentfreak.com/images/mpaa-logo1.jpg" alt="mpaa-logo" width="200" height="112" class="alignright size-full wp-image-36694"></a>Three years ago, Hollywood had a dream. That dream centered around new legislation that would deal a body blow to Internet piracy, one that would starve sites of their revenue and seriously cut visitor numbers.</p>
<p>But in early 2012, following a huge backlash from the public and technology sector, the dream turned into a nightmare. SOPA was not only dead and buried, but Hollywood had made new enemies and re-ignited old rivalries too.</p>
<p>In the period since the studios have been working hard to paint the technology sector not as foes, but as vital partners with shared interests common goals. The aggressive rhetoric employed during the SOPA lobbying effort all but disappeared and a refocused, more gentle MPAA inexplicably took its place.</p>
<p>Yesterday, in ongoing efforts to humanize the behind-the-scenes movie making industry as regular people out to make a living, “Beyond the Red Carpet: TV &#038; Movie Magic Day&#8221; landed on Capitol Hill.</p>
<p>Among other things, the event aimed to show lawmakers that those involved in the movie making process are not only vital to the economy, but are the real victims when it comes to piracy. The message is laid out in this infographic from the <a href="http://creativerightscaucus-chu.house.gov/">Creative Rights Caucus</a>.</p>
<p><center><img src="http://torrentfreak.com/images/behindthescenes.png" alt="Behind"></center></p>
<p>As co-chair of the caucus, U.S. Rep. Judy Chu, D-Calif. will be hoping to maintain momentum on issues such as <a href="http://chu.house.gov/press-release/rep-chu-praises-tax-incentive-keep-film-and-tv-production-california">tax incentives</a> to keep film production in California, but yesterday the words of MPAA CEO Chris Dodd provided the most food for thought.</p>
<p>In comments to The Wrap, Dodd said that the MPAA is no longer seeking anti-piracy legislation from Congress.</p>
<p>“The world is changing at warp speed. We are not going to legislate or litigate our way out of it,” Dodd <a href="http://www.thewrap.com/hollywood-touts-new-anti-piracy-approach-economic-benefits-to-capitol-hill-crowd/">said</a>.</p>
<p>For an organization that has spent more than a decade and a half tightening up &#8216;Internet&#8217; copyright law in its favor, the admission is certainly a notable one, especially when the favored alternatives now include winning hearts and minds through education.</p>
<p>“We are going to innovate our way out by educating people about the hard work of people,&#8221; the MPAA CEO said.</p>
<p>“In this space everyone has to contribute to ensure that peoples’ content can be respected. Instead of finger pointing at everybody and arresting 14-year olds, the answer is making our product accessible in as many formats and distributive services as possible at price points they can afford. We are discovering that works.”</p>
<p>This tacit admission, that the industry itself has contributed to the piracy problems it faces today, is an interesting move. Over in Australia content providers and distributors have also been verbalizing the same shortcomings and they too have offered promises to remedy the situation.</p>
<p>But the development of new services doesn&#8217;t exist in a vacuum and time and again, across the United States to Europe and beyond, the insistence by Hollywood is that for legal services to flourish, use of pirate sources must be tackled, if not through legislation, by other means.</p>
<p>And here&#8217;s the key. Successfully humanizing the industry with lawmakers will provide Hollywood with much-needed momentum to push along its agenda of cooperation with its technology-focused partners.</p>
<p>ISPs will be encouraged to engage fully with the <a href="http://torrentfreak.com/six-strikes-anti-piracy-warnings-double-year-140830/">six-strikes</a> &#8220;educational&#8221; program currently underway across America and advertising companies and big brands <a href="http://torrentfreak.com/tech-giants-sign-deal-to-ban-advertising-on-pirate-websites-130715/">will be reminded</a> to further hone their systems to keep revenue away from pirate sites.</p>
<p>But perhaps the more pressing efforts will entail bringing companies like Google on board. Voluntary agreements with the search sector can certainly be influenced by those on Capitol Hill, but with Google&#8217;s insistence that Hollywood moves first, by providing content in a convenient manner at a fair price, the ball is back in the movie industry&#8217;s court.</p>
<p>Dodd, however, is now promising just that, so things should start to get interesting. And in the meantime the MPAA can continue to fund groups such as the <a href="http://torrentfreak.com/chillingeffects-dmca-archive-is-repugnant-copyright-group-says-140316/">Copyright Alliance</a>, a non-profit which regularly testifies before Congress on copyright and anti-piracy matters and of which the MPAA is a founding member.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/mpaa-were-not-going-to-arrest-14-year-olds-we-educate-them-140911/feed/</wfw:commentRss>
		<slash:comments>98</slash:comments>
		</item>
		<item>
		<title>Which VPN Services Take Your Anonymity Seriously? 2014 Edition</title>
		<link>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/</link>
		<comments>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/#comments</comments>
		<pubDate>Tue, 09 Sep 2014 19:45:35 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Sidebar]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[vpn services]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=85262</guid>
		<description><![CDATA[Millions of people use a VPN service to protect their privacy, but not all VPNs are as anonymous as one might hope. In fact, some VPN services log users' IP-addresses for weeks. To find out how secure VPNs really are TorrentFreak asked the leading providers about their logging policies, and more.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/boxed.jpg"><img src="http://torrentfreak.com/images/boxed.jpg" alt="boxed" width="222" height="178" class="alignright size-full wp-image-36576"></a>By now most Internet users are well aware of the fact that pretty much every step they take on the Internet is logged or monitored. </p>
<p>To prevent their IP-addresses from being visible to the rest of the Internet, millions of people have signed up to a VPN service. Using a VPN allows users to use the Internet anonymously and prevent snooping.</p>
<p>Unfortunately, not all VPN services are as anonymous as they claim.  </p>
<p>Following a high-profile case of an individual using an &#8216;anonymous&#8217; VPN service that turned out to be not so private, TorrentFreak decided to ask a selection of VPN services some tough questions.</p>
<p>By popular demand we now present the third iteration of our VPN services &#8220;logging&#8221; review. In addition to questions about logging policies we also asked VPN providers about their stance towards file-sharing traffic, and what they believe the most secure VPN is. </p>
<p><strong>Last update: October 7, 2014 (added partial <a href="http://torrentfreak.com/%D0%BA%D0%B0%D0%BA%D0%BE%D0%B9-%D0%B8%D0%B7-vpn-%D1%81%D0%B5%D1%80%D0%B2%D0%B8%D1%81%D0%BE%D0%B2-%D1%80%D0%B5%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE-%D0%B7%D0%B0%D0%B1%D0%BE%D1%82%D0%B8%D1%82%D1%8C%D1%81%D1%8F/" title="Какой из VPN сервисов реально заботиться о Вашей анонимности? Результаты 2014 года.">Russian translation</a>)<br>
</strong><br>
&#8212;</p>
<p>1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long? </p>
<p>2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?</p>
<p>3. What tools are used to monitor and mitigate abuse of your service?</p>
<p>4. In the event you receive a DMCA takedown notice or European equivalent, how are these handled?</p>
<p>5. What steps are taken when a valid court order requires your company to identify an active user of your service?</p>
<p>6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?</p>
<p>7. Which payment systems do you use and how are these linked to individual user accounts?</p>
<p>8. What is the most secure VPN connection and encryption algorithm you would recommend to your users? </p>
<p>&#8212;</p>
<p>What follows is the list of responses from the VPN services, in their own words. Providers who didn&#8217;t answer our questions directly or failed by logging everything were excluded. Please note, however, that several VPN companies listed here do log to some extent. The order of the lists holds no value. </p>
<h2><a href="http://bit.ly/privateinternet">Private Internet Access</a></h2>
<p><a href="http://torrentfreak.com/images/pia.png"><img class="alignright size-full wp-image-41039" title="torrentprivacy" src="http://torrentfreak.com/images/pia.png" alt="" width="180" height="40"></a>1. We absolutely do not log any traffic nor session data of any kind, period. We have worked hard to meticulously fork all daemons that we utilize in order to achieve this functionality. It is definitely not an easy task, and we are very proud of our development team for helping Private Internet Access to achieve this unique ability.</p>
<p>2. We operate out of the US which is one of the few, if only, countries without a mandatory data retention law. We explored several other jurisdictions with the help of our professional legal team, and the US is still ideal for privacy-based VPN services.</p>
<p>We severely scrutinize the validity of any and all legal information requests. That being said, since we do not hold any traffic nor session data, we are unable to provide any information to any third-party. Our commitment and mission to preserve privacy is second to none.</p>
<p>3. We do not monitor any traffic, period. We block IPs/ports as needed to mitigate abuse when we receive a valid abuse notification.</p>
<p>4. We do not host any content and are therefore unable to remove any of said content. Additionally, our mission is to preserve and restore privacy on the Internet and society. As such, since we do not log or monitor anything, we&#8217;re unable to identify any users of our service.</p>
<p>5. Once again, we do not log any traffic or session data. Additionally, unlike the EU and many other countries, our users are protected by legal definition. For this reason, we&#8217;re unable to identify any user of our service. Lastly, consumer protection laws exist in the US, unlike many other countries. We must abide by our advertised privacy policy.</p>
<p>6. We do not discriminate against any kind of traffic/protocol on any of our servers, period. We believe in a free, open, and uncensored internet.</p>
<p>7. Bitcoin, Ripple, PayPal, Google Play (Mobile), OKPay, CashU, Amazon and any major Gift Card. We support plenty of anonymous payment methods. For this reason, the highest risk users should definitely use Bitcoin, Ripple or a major gift card with an anonymous e-mail account when subscribing to our privacy service.</p>
<p>8. We&#8217;re the only provider to date that provides a plethora of encryption cipher options. We recommend, mostly, using AES-128, SHA1 and RSA2048. </p>
<p><a href="http://bit.ly/privateinternet">Private Internet Access website</a> </p>
<h2><a href="http://bit.ly/torguardvpn">TorGuard</a></h2>
<p><a href="http://torrentfreak.com/images/torguard.png"><img class="alignright size-full wp-image-50163" title="torguard" src="http://torrentfreak.com/images/torguard.png" alt="" width="180" height="59"></a>1. TorGuard does not store any IP address or time stamps on any VPN and proxy servers, not even for a second. Further, we do not store any logs or time stamps on user authentication servers connected to the VPN. In this way it is not even possible to match an external time stamp to a user that was simultaneously logged in. Because the VPN servers utilize a shared IP configuration, there can be hundreds of users sharing the same IP at any given moment further obfuscating the ability to single out any specific user on the network.</p>
<p>2. TorGuard is a privately owned company with parent ownership based in Nevis and our headquarters currently located in the US. Our legal representation at the moment is comfortable with the current corporate structuring however we wouldn’t hesitate to move all operations internationally should the ground shift beneath our feet. We now offer VPN access in 23+ countries worldwide and maintain all customer billing servers well outside US borders.</p>
<p>We would only be forced to communicate with a third-party in the event that our legal team received a court ordered subpoena to do so. This has yet to happen, however if it did we would proceed with complete transparency and further explain the nature of TorGuard’s shared VPN configuration. We have no logs to investigate, and thus no information to share.</p>
<p>3. Our network team uses commercial monitoring software with custom scripts to keep an eye on individual server load and service status/uptime so we can identify problems as fast as possible. If abuse reports are received from an upstream provider, we block it by employing various levels of filtering and global firewall rules to large clusters of servers. Instead of back tracing abuse by logging, our team mitigates things in real-time. We have a responsibility to provide fast, abuse-free VPN services for our clients and have perfected these methods over time.</p>
<p>4. In the event of receiving a DMCA notice, the request is immediately processed by our abuse team. Because it is impossible for us to locate which user on the server is actually responsible for the violation, we temporarily block the infringing server and apply global rules depending on the nature of the content and the server responsible. The system we use for filtering certain content is similar to keyword blocking but with much more accuracy. This ensures the content in question to no longer pass through the server and satisfies requirements from our bandwidth providers.</p>
<p>5. Due to the nature of shared VPN services and how our network is configured, it is not technically possible to effectively identity or single out one active user from a single IP address. If our legal department received a valid subpoena, we would proceed with complete transparency from day one. Our team is prepared to defend our client’s right to privacy to the fullest extent of the law.</p>
<p>6. BitTorrent is only allowed on select server locations. TorGuard now offers a variety of protocols like http/socks proxies, OpenVPN, SSH Tunnels, SSTP VPN and Stealth VPN (DPI Bypass), with each connection method serving a very specific purpose for usage. Since BitTorrent is largely bandwidth intensive, we do not encourage torrent usage on all servers. Locations that are optimized for torrent traffic include endpoints in: Canada, Netherlands, Iceland, Sweden, Romania, Russia and select servers in Hong Kong. This is a wide range of locations that works efficiently regardless of the continent you are trying to torrent from. </p>
<p>7. We currently accept payments through all forms of credit or debit card, PayPal, OKPAY, and Bitcoin. During checkout we may ask the user to verify a billing phone and address but this is simply to prevent credit card fraud, spammers, and keep the network running fast and clean. After payment it is possible to change this to something generic that offers more privacy. No VPN or Proxy usage can be linked back to a billing account due to the fact we hold absolutely no levels of logging on any one of our servers, not even timestamps! </p>
<p>8. For best security we advise clients to choose OpenVPN connections only, and if higher encryption is called for use AES256 bit. This option is available on many locations and offers excellent security without degrading performance. For those that are looking to defeat Deep Packet Inspection firewalls (DPI) like what is encountered in countries such as China or Iran, TorGuard offers “Stealth” VPN connections in the Netherlands, UK and Canada. Stealth connections feature OpenVPN obfuscation technology that causes VPN traffic to appear as regular connections, allowing VPN access even behind the most strict corporate wifi networks or government regulated ISPs.</p>
<p><a href="http://bit.ly/torguardvpn">TorGuard website</a> </p>
<h2><a href="http://bit.ly/ipvanis">IPVanish</a></h2>
<p><a href="/images/ipvarnish.png"><img src="http://torrentfreak.com/images/ipvarnish.png" alt="ipvarnish" width="152" height="82" class="alignright size-full wp-image-51008"></a>1. IPVanish has a no-log policy. We keep no traffic logs.</p>
<p>2. IPVanish is headquartered in the US and thus operates under US law.</p>
<p>3. IPVanish has no monitoring in place. To elaborate, IPVanish does not sniff or monitor any user’s traffic or activity for any reason.</p>
<p>4. IPVanish keeps no logs of any user’s activity and responds accordingly.</p>
<p>5. IPVanish, like every other company, has to follow the law in order to remain in business. Only US law applies. </p>
<p>6. P2P is permitted. IPVanish in fact does not block or throttle any ports, protocols, servers or any type of traffic whatsoever.</p>
<p>7. PayPal and all major credit cards are accepted. Payments and product use are in no way linked. User authentication and billing info are help on completely different and independent platforms.</p>
<p>8. OpenVPN generally provides the strongest encryption algorithm, so that is the recommended encryption protocol. IPVanish also allows a choice between TCP and UDP, and UDP is generally recommended for better speed.</p>
<p><a href="http://bit.ly/ipvanis">IPVanish website</a></p>
<h2><a href="http://btguard.com/?a=discounts">BTGuard</a></h2>
<p><img src="http://torrentfreak.com/images/btguard2.jpg" align="right" alt="btguard">1. We do not keep any logs whatsoever.</p>
<p>2. The jurisdiction is Canada. Since we do not have log files, we have no information to share. We do not communicate with any third parties. The only event in which we would even communicate with a third-party is if we received a court order. We would then be forced to notify them we have no information. This has not happened yet.</p>
<p>3. If serious abuse is reported we enable tcpdump to confirm the abuse and locate the user. These dumps are immediately removed. If the user is abusing our service they will be terminated permanently but we have never shared user information with a 3rd party. </p>
<p>4. We do not have any open incoming ports, so it’s not possible for us to “takedown” any broadcasting content.</p>
<p>5. We take every step within the law to fight such an order.</p>
<p>6. Yes, all types of traffic our allowed with our services.</p>
<p>7. We accept PayPal and Bitcoin. All payments are linked to users accounts because they have to be for disputes and refunds.</p>
<p>8. 256-bit AES is the most secure. However 128-bit blowfish is plenty good. If you&#8217;re concerned about surveillance agencies such as the NSA, their capabilities are shrouded in secrecy and claiming to be able to protect you is offering you nothing but speculation. As far as what&#8217;s publicly available for deciphering encryption, both of the encryptions I mentioned are more than sufficient.</p>
<p><a href="http://btguard.com/?a=discounts">BTGuard website</a></p>
<h2><a href="https://privacy.io/">Privacy.io</a></h2>
<p><a href="http://torrentfreak.com/images/privacyio.jpg"><img class="alignright size-full wp-image-41044" title="privacy" src="http://torrentfreak.com/images/privacyio.jpg" alt="" width="180" height="50"></a>1. We do not log any information on our VPN servers. The only scenario is if a technical issue arises, but we request permission from the user first, and we only do it for the duration of the job, and then it is removed.</p>
<p>2. We are in the process of moving jurisdictions away from Australia at present as we are unsure what our current government plans to do in regards to our privacy. We have not decided where yet.</p>
<p>3. Only SMTP port 25 is filtered to mitigate spam, but we are working on some tools to make it easier for users to send mail.</p>
<p>4. Any DMCA request is ignored, as we have no logs to do anything about them.</p>
<p>5. Same as above, as we do not log, so we are unable to provide any information. If the law attempts to make us do such things, we will move our business to a location where that cannot occur, and if that fails we will close up shop before we provide any information.</p>
<p>6. All protocols are allowed with our service, with the only exception of SMTP port 25 currently being filtered.</p>
<p>7. At present we only accept PayPal and CC (processed by PayPal), but we are looking into alternative types of payments. We go out of our way to make sure that PayPal transactions are not linked to the users, we generate a unique key per transaction to verify payment for the account is made, and then nuke that unique key. Bitcoin and Litecoin are also on the agenda.</p>
<p>8. At present we offer 128 bit for PPTP and 256 bit for OpenVPN, We plan to offer stronger encryption for the security conscious.</p>
<p><a href="https://privacy.io/">Privacy.io website</a></p>
<h2><a href="http://vikingvpn.com/">VikingVPN</a></h2>
<p><img src="http://torrentfreak.com/images/vikingvpn.jpg" alt="vikingvpn" width="180" height="203" class="alignright size-full wp-image-74962">1. No. We run a zero knowledge network and are unable to tie a user to an IP address.</p>
<p>2. United States, they don&#8217;t have data retention laws, despite their draconian surveillance programs. The only information we share with anyone is billing information to our payment gateway. This can be anonymized by using a pre-paid anonymous card. If asked to share specific data about our users and their habits, we would be unable to do so, because we don&#8217;t have any logs of that data.</p>
<p>3. That is mostly confidential information. However, we can assure our users that we do not use logging to achieve this goal.</p>
<p>4. In the event of a DMCA notice, we send out the DMCA policy published on our website. We haven&#8217;t yet received a VALID DMCA notice.</p>
<p>5. We exhaust all legal options to protect our users. Failing that, we would provide all of our logs, which do not actually exist. If required to wiretap a user under a National Security Letter, we have a passively triggered Warrant Canary. We would also likely choose to shut down our service and put it up elsewhere.</p>
<p>6. Yes. Those ports are all open, and we have no data caps.</p>
<p>7. We currently only take credit cards. Our payment provider is far more restrictive than we ever imagined they would be. We&#8217;re still trying to change payment providers. Fortunately, by using a pre-paid credit card, you can still have totally anonymous service from us.</p>
<p>8. A strong handshake (either RSA-4096+ or a non-standard elliptic curve as the NIST curves are suspect). A strong cipher such as AES-256-CBC or AES-256-GCM encryption (NOT EDE MODE). At least SHA1 for data integrity checks. SHA2 and the newly adopted SHA3 (Skein) hash functions are also fine, but slower and provide no real extra assurances of data integrity, and provide no further security beyond SHA1. The OpenVPN HMAC firewall option to harden the protocol against Man-in-the-Middle and Man-on-the-Side attacks.</p>
<p><a href="http://vikingvpn.com/">VikingVPN website</a> </p>
<h2><a href="http://www.ivpn.net/">IVPN</a></h2>
<p><a href="http://torrentfreak.com/images/ivpn.png"><img src="http://torrentfreak.com/images/ivpn.png" alt="ivpn" width="150" height="69" class="alignright size-full wp-image-85390"></a>1.  IVPN’s top priority is the privacy of its customers and therefor we do not store any connection logs or any other log that could be used to associate a connection to a customer.</p>
<p>2. IVPN is incorporated in Malta. We would ignore any request to share data unless it was served by a legal authority with jurisdiction in Malta in which case we would inform them that we don&#8217;t have the data to share. If we were served a subpoena which compelled us to log traffic we would find a way to inform our customers and relocate to a new jurisdiction.</p>
<p>3. We use a tool called PSAD to mitigate attacks originating from customers on our network. We also use rate-limiting in iptables to mitigate SPAM.</p>
<p>4. We ensure that our network providers understand the nature of our business and that we do not host any content. As a condition of the safe harbor provisions they are required to inform us of each infringement which includes the date, title of the content and the IP address of the gateway through which it was downloaded. We simply respond to each notice confirming that we do not host the content in question.</p>
<p>5. Assuming the court order is requesting an identity based on a timestamp and IP, our legal department would respond that we don&#8217;t have any record of the user&#8217;s identity nor are we legally compelled to do so.</p>
<p>6. We &#8216;allow&#8217; BitTorrent on all servers except gateways based in the USA. Our USA network providers are required to inform us of each copyright infringement and are required to process our response putting undue strain on their support resources (hundreds per day). For this reason providers won&#8217;t host our servers in the USA unless we take measures to mitigate P2P activity.</p>
<p>7. We currently accept Bitcoin, Cash and PayPal. No information relating to a customers payment account is stored with the exception of automated PayPal subscriptions where we are required to store the subscription ID in order to assign it to an invoice (only for the duration of the subscription after which it is deleted). Of course PayPal will always maintain a record that you have sent funds to IVPN but that is all they have. If you need to be anonymous to IVPN and don&#8217;t wish to be identified as a customer then we recommend using Bitcoin or cash.</p>
<p>8. We recommend and offer OpenVPN using the strongest AES-256 cipher. For key exchange and authentication 4096-bit RSA keys are used.</p>
<p><a href="http://www.ivpn.net/">IVPN website</a></p>
<h2><a href="https://privatevpn.com/">PrivatVPN</a></h2>
<p><a href="http://torrentfreak.com/images/privatvpn.jpg"><img class="alignright size-full wp-image-41044" title="privatvpn" src="http://torrentfreak.com/images/privatvpn.jpg" alt="" width="180" height="53"></a>1. We don’t keep ANY logs that allow us or a 3rd party to match an IP address and a time stamp to a user our service. The only thing we log are e-mails and user names but it’s not possible to bind an activity on the Internet to a user.</p>
<p>2. We operate in Swedish jurisdiction. Since we do not log any IP addresses we have nothing to disclose. Circumstances doesn&#8217;t matter in this case, we have no information regarding our customers’ IP addresses and activity on the Internet. Therefore we have no information to share with any 3rd party.</p>
<p>3. If there&#8217;s abuse, we advise that service to block our IP in the first instance, and second, we can block traffic to the abused service.</p>
<p>4. This depends on the country in which we’re receiving a DMCA takedown. For example, we’ve received a DMCA takedown for UK and Finland and our response was to close P2P traffic in those countries.</p>
<p>5. If we get a court order to monitor a specific IP then we need to do it, and this applies to every VPN company out there.</p>
<p>6. Yes, we allow Torrent traffic.</p>
<p>7. PayPal, Payson and Plimus. Every payment has an order number, which is linked to a user. Otherwise we wouldn&#8217;t know who has made a payment. To be clear, you can&#8217;t link a payment to an IP address you get from us.</p>
<p>8. OpenVPN TUN with AES-256. On top is a 2048-bit DH key.</p>
<p><a href="https://privatevpn.com/">PrivatVPN website</a></p>
<h2><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ</a></h2>
<p><img class="alignright size-full wp-image-49734" title="prq" src="http://torrentfreak.com/images/prq.png" alt="" width="129" height="102">1. No. Wo do not log anything and we only require a working e-mail address to be a customer.</p>
<p>2. Swedish. We do not share information with anyone.</p>
<p>3. Not disclosed.</p>
<p>4. Put it in the trash where it belongs!</p>
<p>5. None, since we do not have any customer information and no logs.</p>
<p>6. We host anything as long as it&#8217;s not SPAM related or child porn.</p>
<p>7. Visa/Mastercard, Bitcoin, PayPal. No correlation between payment data and customer data.</p>
<p>8. We provide OpenVPN services (along with dedicated servers and other hosting services).</p>
<p><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ website</a></p>
<h2><a href="http://www.tigervpn.com/en/home">tigerVPN</a></h2>
<p><a href="http://torrentfreak.com/images/tigervpn.png"><img src="http://torrentfreak.com/images/tigervpn.png" alt="tigervpn" width="180" height="73" class="alignright size-full wp-image-85421"></a>1. Absolutely not! We built tigerVPN to purge all data once the transmission of a IP package was completed successfully. Its impossible to trace back any customer. On top of that we decided to use shared IPs in order to further randomize and anonymize our customers. The combination of having absolutely no logs at all and multiple customers per IP, wipes our customers digital footprint</p>
<p>2. We are a limited liability company in Slovakia.  Slovakia does not have any data retention programs and furthermore encourage ISP’s to protect their customers privacy on the net. We are not required to share any information with 3rd party hence it would be illegal thanks to the law of telecom secrecy. </p>
<p>3. Since we don’t keep logs, we can&#8217;t monitor abusive behavior, which is the price for building a customer secure environment!</p>
<p>4. We can’t comply since we can’t identify customers, therefore it’s pointless to follow any requests. We have a specific folder for these eMails ;-)</p>
<p>5. Same as above. We seriously can’t tell which customer did what, when, where, at any given time.</p>
<p>6. It’s allowed on all servers although we gently ask our customers to use either Romania or Netherlands. Some infrastructure service providers do not want file sharing so it happened to us that we were asked to move our servers due to file sharing. We found some reliable partners in Romania and Netherlands which tolerate p2p so we kindly ask our customers to use these server parks.</p>
<p>7. Customers can pay with Visa, Mastercard and Debit. On top of that we also use PayPal. We use hash keys and tokens to identify a payment but it’s not logged or linked to the customer. We had to do this anyway hence we are a PCI Level 1 compliant merchant. Therefore we are not allowed to store any card or payment data with the records of our customers. These keys are pointless for anyone else so there is no chance to build a connection.</p>
<p>8. We offer PPTP, L2TP and OpenVPN, while out of nature OpenVPN comes with the highest encryption and algorithm. L2TP and OpenVPN are 256bit SSL  encrypted while PPTP comes with a solid 128bit. Although our customers are individual and have their own sense of why and what to use, we recommend L2TP as solid protocol. It’s less geeky and more secure than PPTP, but our customers can pick any of them in all the 47 network nodes around the globe.</p>
<p><a href="http://www.tigervpn.com/en/home">tigerVPN website</a></p>
<h2><a href="http://mullvad.net/en">Mullvad</a></h2>
<p><a href="http://torrentfreak.com/images/mullvad.jpg"><img class="alignright size-full wp-image-41059" title="mullvad" src="http://torrentfreak.com/images/mullvad.jpg" alt="" width="180" height="37"></a>1. No. This would make both us and our users more vulnerable so we<br>
certainly don&#8217;t. To make it harder to watch the activities of an IP address from the outside we also have many users share each address, both for IPv4 and our upcoming IPv6 support.</p>
<p>2. Swedish jurisdiction. Under no circumstance we will share information with a third-party. First of all we take pains to not actually possess information that could be of interest to third parties, to the extent possible. In the end there is no practical way for the Swedish government to get information about our users from us.</p>
<p>3. We don&#8217;t monitor our users. In the rare cases of such egregious network abuse that we can&#8217;t help but notice (such as DoS attacks) we stop it using basic network tools.</p>
<p>4. There is no such Swedish law that is applicable to us.</p>
<p>5. We make sure not to store sensitive information that can be tied to publicly available information, so that we have nothing to give out. We believe it is not possible in Swedish law to construct a court order that would compel us to actually give out information about our<br>
users. Not that we would anyway. We started this service for political reasons and would rather discontinue it than having it work against its purpose.</p>
<p>6. Yes.</p>
<p>7. Bitcoin (we were the first service to accept it), cash (in the mail), bank transfers, and PayPal / credit cards. Payments are tied to accounts but accounts are just random numbers with no personal information attached that users can create at will. With the anonymous payments possible with cash and Bitcoin it can be anonymous all the way.</p>
<p>8. We use OpenVPN. We also provide PPTP because some people want it but we strongly recommend against it. Encryption algorithms and key lengths are important but often get way too much attention at the expense of other important but harder to measure things such as leaks and computer security.</p>
<p><a href="http://mullvad.net/en">Mullvad website</a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/feed/</wfw:commentRss>
		<slash:comments>409</slash:comments>
		</item>
		<item>
		<title>Music Group DMCA Notices Reveal Coffee Hatred</title>
		<link>http://torrentfreak.com/music-group-dmca-notices-reveal-coffee-hatred-140825/</link>
		<comments>http://torrentfreak.com/music-group-dmca-notices-reveal-coffee-hatred-140825/#comments</comments>
		<pubDate>Mon, 25 Aug 2014 17:46:32 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[DMCA]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93030</guid>
		<description><![CDATA[A German-based music group's month-long DMCA notice-sending spree has seen it trying to censor leading music stores and news outlets for no good reason. The outfit also took a bizarre dislike to the word "coffee" and issued takedowns against Walmart, Ikea, Fair Trade USA and Dunkin Donuts.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/wiped.png"><img src="http://torrentfreak.com/images/wiped.png" alt="wiped" width="196" height="122" class="alignright size-full wp-image-93042"></a>Thanks to Google and the Chilling Effects Clearinghouse, spotting potential abuses of the DMCA takedown process has become easier than ever. Both organizations carefully catalog the notices they receive and as a result it&#8217;s possible to bring issues to the attention of the public.</p>
<p>Most of the time problems arise with companies making the odd embarrassing mistake. At other times things get more serious. Today we bring news of another mess that would&#8217;ve ordinarily flown under the radar.</p>
<p>On its Twitter account, Total Wipes Music Group claims to work with 800 music labels and cooperates with <a href="https://www.totalwipesmusicgroup.com/partners">major digital music stores</a> such as iTunes, Beatport and Juno. Early July the company began sending DMCA notices to Google and out of more than 15,000 URLs sent so far the majority have been rejected.</p>
<p>In an <a href="http://www.google.com/transparencyreport/removals/copyright/requests/1278802/">early notice</a> the company asked Google to remove website pages of several of its partners including BeatPortCharts, Napster (UK and Germany), Rhapsody and TraxSource. Other notices targeted both iTunes and Apple.</p>
<p>In <a href="https://www.chillingeffects.org/notice.cgi?sID=1868771">this notice</a>, which claims to protect <a href="https://www.totalwipesmusicgroup.com/releases/reiz-musik/rm150_urban-glue">this content</a>, Total Wipes launched a full frontal assault on anyone daring to use any words used in the title of their clients&#8217; track &#8220;ROCK THE BASE &#038; BAD FORMAT&#8221;. The results are awful.</p>
<p>In April this year DJ E-Z Rock, best known for the track &#8216;It Takes Two&#8217; with partner Rob Base, sadly passed away. MTV, Rolling Stone and a number of news outlets all wrote about the event but in their notice Total Wipes demand that Google de-list all of their reports. They also attack a wide range of other random sites, some which dared to mention &#8220;rock&#8221; climbing and others which mentioned a rock festival on a military &#8220;base&#8221;.</p>
<p><center><a href="http://torrentfreak.com/images/rockdmca.png"><img src="http://torrentfreak.com/images/rockdmca.png" alt="rockdmca" width="627" height="145" class="alignnone size-full wp-image-93043"></a></center></p>
<p>For no apparent reason, another <a href="http://www.google.com/transparencyreport/removals/copyright/requests/1322122/">notice</a> targeted The School of Performance and Cultural Industries at Leeds University in the UK, stopping off to admonish music mag Pitchfork Media and the evil PC gaming bloggers over at Rock, Paper, Shotgun.</p>
<p><center><a href="http://torrentfreak.com/images/shotdmca.png"><img src="http://torrentfreak.com/images/shotdmca.png" alt="shotdmca" width="627" height="143" class="alignnone size-full wp-image-93045"></a></center></p>
<p>Perhaps the weirdest notice, currently <a href="http://www.google.com/transparencyreport/removals/copyright/requests/1408739/">being processed</a> by Google, sees the music outfit target a wide range of sites with the word &#8216;coffee&#8217; in their URLs. Cariboucoffee, cartelcoffeelab, clivecoffee, coavacoffee, coffee.org, coffeeandtealtd, coffeebean and coffeegeek are just the tip of a very large iceberg.</p>
<p>Quite what Ikea, Walmart, Fair Trade and Dunkin Donuts did to warrant inclusion is a mystery, but our money is on their connections to coffee. Github&#8217;s crime will be revealed in due course.</p>
<p><center><img src="http://torrentfreak.com/images/coffee.png" alt="coffee"></center></p>
<p>The end result is that Google has rejected what appears to be the lions&#8217; share of more than 15,000 URLs sent by Total Wipes, even those that appear to target well-known &#8216;pirate&#8217; sites.</p>
<p>There are far too many URLs for us to check individually but some poor soul at Google is probably going to have to do just that. It&#8217;s a dirty job, but someone has to do it.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/music-group-dmca-notices-reveal-coffee-hatred-140825/feed/</wfw:commentRss>
		<slash:comments>58</slash:comments>
		</item>
		<item>
		<title>WWE Asked Google to Hit Live Piracy&#8230;From the Future</title>
		<link>http://torrentfreak.com/wwe-asked-google-to-hit-live-piracy-from-the-future-140817/</link>
		<comments>http://torrentfreak.com/wwe-asked-google-to-hit-live-piracy-from-the-future-140817/#comments</comments>
		<pubDate>Sun, 17 Aug 2014 16:02:50 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[DMCA]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=92571</guid>
		<description><![CDATA[An anti-piracy company working on behalf of World Wrestling Entertainment has sent a rather unusual DMCA notice to Google. The takedown requested the removal of dozens of URLs  related to a live event scheduled for two days after the notice.  Which means, of course, it hadn't even aired yet.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/WWE2.jpg"><img src="http://torrentfreak.com/images/WWE2.jpg" alt="WWE2" width="180" height="120" class="alignright size-full wp-image-85514"></a>Removing content from the Internet has become big business in recent years, with rightsholders from all over the globe seeking to limit access to infringing content.</p>
<p>As the world&#8217;s leading search engine, Google receives millions of DMCA-style notices every week. Its internal systems, both automated and human-reviewed, then attempt to assess the validity of the notices before removing URLs from its indexes.</p>
<p>What these notices all have in common is that they refer to infringements that have already taken place, since that&#8217;s the nature of a takedown. However, a notice that recently appeared in Google&#8217;s Transparency Report reveals that for at least one organization, looking into the future is now also on the agenda.</p>
<p>The notice was sent by an anti-piracy company working on behalf of World Wrestling Entertainment, or WWE as it&#8217;s more commonly known. The notice aimed to tackle piracy of a WWE Event titled Money In The Bank 2014, which took place on June 29, 2014. However, the notice was sent to Google two days before, on June 27.</p>
<p>&#8220;The following links infringe on WWE&#8217;s copyrighted Pay Per View event Money In The Bank 2014, set to air this Sunday, June 29, by one or more of the following means,&#8221; the notice begins.</p>
<p>WWE then sets out three potential infringements.</p>
<p><center><img src="http://torrentfreak.com/images/wwe-bank.png" alt="wwe-bank"></center></p>
<p>&#8220;Providing a link to a free (pirated) stream of this event&#8221; is misleading since it&#8217;s impossible to link to an event that hasn&#8217;t aired yet. Conceivably an advance static link could have been setup to air the event come June 29, but on June 27 the event had definitely not aired, hence no piracy.</p>
<p>&#8220;Providing a promise of DIRECT free streaming of this event on the identified site&#8221; seems no different from the allegation made above. It&#8217;s certainly possible that some of the sites promised to illegally stream the event, but at the date of the notice that would have been impossible.</p>
<p>The fact that WWE resorted to telling Google that the event&#8217;s <a href="http://www.wwe.com/shows/moneyinthebank/2014/wwe-money-in-the-bank-2014-predictions-26410927">predictions show</a> was the source material being infringed upon shows that no actual live event infringements had yet taken place.</p>
<p>The final claim &#8211; &#8220;Using copyrighted images, logos and celebrity photos to promote the site&#8221; &#8211; is one that carries far more weight than the two key instances of infringement alleged above. Some of the sites listed did use WWE artwork to promote their upcoming streams, but there were some notable omissions, not least the homepage of Justin.tv. Google refused to comply in this and three other instances.</p>
<p>The notice from WWE, which can be <a href="http://www.chillingeffects.org/notice.cgi?sID=1808458">viewed here</a>, illustrates the problems faced by companies airing live events. While outfits such as WWE often know where streams and links to streams will appear once an event goes live, taking them down quickly once it actually begins may not always go as smoothly as they would like.</p>
<p>While attempts at a pro-active DMCA-style notice like this might work on a small scale, it&#8217;s not difficult to imagine the chaos that would ensue if all rightsholders tried to have unauthorized content removed before it even appeared online.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/wwe-asked-google-to-hit-live-piracy-from-the-future-140817/feed/</wfw:commentRss>
		<slash:comments>25</slash:comments>
		</item>
		<item>
		<title>Google Protects Chilling Effects From Takedown Notices</title>
		<link>http://torrentfreak.com/google-protects-chilling-effects-from-takedown-notices-140727/</link>
		<comments>http://torrentfreak.com/google-protects-chilling-effects-from-takedown-notices-140727/#comments</comments>
		<pubDate>Sun, 27 Jul 2014 18:00:47 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Chilling Effects]]></category>
		<category><![CDATA[google]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=91601</guid>
		<description><![CDATA[Chilling Effects is the largest public repository of DMCA notices on the planet, providing a unique insight into the Internet's copyright battles. However, each month people try to de-index pages of the site but Google has Chilling Effects' back and routinely rejects copyright claims.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/google-bay.jpg"><img src="http://torrentfreak.com/images/google-bay.jpg" alt="google-bay" width="200" height="177" class="alignright size-full wp-image-21875"></a>Each week many millions of DMCA-style copyright notices are sent to sites and services around the planet. Initially the process flew almost entirely under the radar, with senders and recipients dealing with complaints privately.</p>
<p>In 2001, that began to change with the advent of Chilling Effects, an archive created by activists who had become concerned that increasing volumes of cease-and-desist letters were having a &#8220;chilling effect&#8221; on speech.</p>
<p>In the decade-and-a-third that followed the archive grew to unprecedented levels, with giants such as Google and Twitter routinely sending received notices to the site for public retrieval.</p>
<p>However, while Chilling Effects strives to maintain free speech, several times a month rightsholders from around the world (probably unintentionally) try to silence the archive in specific ways by asking Google to de-index pages from the site.</p>
<p>As can be seen from the tables below, Home Box Office has tried to de-index Chilling Effects pages 240 times, with Microsoft and NBC Universal making 99 and 65 attempts respectively.</p>
<p><center><img src="http://torrentfreak.com/images/chilling1.png" alt="Chilling1"></center></p>
<p>The &#8216;problem&#8217; for these copyright holders is two-fold. Firstly, Chilling Effects does indeed list millions of URLs that potentially link to infringing content. That does not sit well with copyright holders.</p>
<p>&#8220;Because the site does not redact information about the infringing URLs identified in the notices, it has effectively become the largest repository of URLs hosting infringing content on the internet,&#8221; the Copyright Alliance&#8217;s Sandra Aistars <a href="http://torrentfreak.com/chillingeffects-dmca-archive-is-repugnant-copyright-group-says-140316/">complained</a> earlier this year.</p>
<p><img src="http://torrentfreak.com/images/chilling.jpg" width="180" height="110" class="alignright">However, what Aistars omits to mention is that Chilling Effects has a huge team of lawyers under the hood who know only too well that their archive receives protection under the law. Chilling Effects isn&#8217;t a pirate index, it&#8217;s an educational, informational, research resource.</p>
<p>Thanks to Google, which routinely throws out all attempts at removing Chilling Effects URLs from its indexes, we are able to see copyright holder attempts at de-indexing.</p>
<p>Earlier this month, for example, Wild Side Video and their anti-piracy partners LeakID sent <a href="http://www.chillingeffects.org/notice.cgi?sID=1825380">this notice</a> to Google aiming to protect their title &#8220;Young Detective Dee.&#8221; As shown below, the notice contained several Chilling Effects URLs.</p>
<p><center><img src="http://torrentfreak.com/images/chilling2.png" alt="chill2"></center></p>
<p>Each URL links to other DMCA notices on Chilling Effects, each sent by rival anti-piracy outfit Remove Your Media on behalf of Well Go USA Entertainment. They also target &#8220;Young Detective Dee&#8221;. This is an interesting situation that offers the potential for an endless loop, with the anti-piracy companies reporting each others&#8217; &#8220;infringing&#8221; links on Chilling Effects in fresh notices, each time failing to get them removed.</p>
<p><center><img src="http://torrentfreak.com/images/chilling3.png" alt="chilling3"></center></p>
<p>The seeds of the &#8220;endless loop&#8221; phenomenon were also experienced by HBO for a while, with the anti-piracy company sending notices (such as <a href="http://www.chillingeffects.org/notice.cgi?sID=1599781">this one</a>) targeting dozens of Chilling Effects pages listing notices previously sent by the company.</p>
<p>While publishing notices is entirely legal, the potential for these loops really angers some notice senders.</p>
<p>On April 10 this year a Peter Walley <a href="http://www.chillingeffects.org/notice.cgi?sID=1625581">sent a notice</a> to Google complaining that his book was being made available on a &#8220;pirate site&#8221; without permission. Google removed the link in its indexes but, as is standard practice, linked to the notice on Chilling Effects. This enraged Walley.</p>
<p><center><img src="http://torrentfreak.com/images/chilling4.png" alt="chilling4"></center></p>
<p>None of these rantings had any effect, except to place <a href="http://www.chillingeffects.org/notice.cgi?sID=1768222">yet another notice</a> on Chilling Effects highlighting where the infringing material could be found.</p>
<p>It&#8217;s a lesson <a href="http://www.chillingeffects.org/notice.cgi?sID=1804935">others</a> should learn from too.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/google-protects-chilling-effects-from-takedown-notices-140727/feed/</wfw:commentRss>
		<slash:comments>34</slash:comments>
		</item>
		<item>
		<title>Google Processes Millions of Useless DMCA Notices</title>
		<link>http://torrentfreak.com/google-processes-millions-of-useless-dmca-notices-140715/</link>
		<comments>http://torrentfreak.com/google-processes-millions-of-useless-dmca-notices-140715/#comments</comments>
		<pubDate>Tue, 15 Jul 2014 18:20:24 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[google]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=91071</guid>
		<description><![CDATA[The world's biggest copyright holders send Google millions of DMCA notices each week, many of them sent by the most notable anti-piracy companies around. But for reasons best known to themselves, hundreds of thousands being processed by Google are completely useless and a waste of time and money.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/google-bay.jpg" width="200" height="177" class="alignright">A major Internet anti-piracy strategy is to trawl the Internet for infringing content in order to send sites a DMCA-style notice. This, if all goes to plan, results in the content, or at the least a link to it, being removed from availability.</p>
<p>The world&#8217;s largest recipient of these notices is Google and in the interests of transparency the company publishes a report detailing the requests it receives. But while the majority of the requests are processed without further issue, increasing numbers serve absolutely no purpose whatsoever.</p>
<p>Last year alone, Google <a href="https://torrentfreak.com/google-discarded-21000000-takedown-requests-in-2013-131227/">discarded 21 million</a> takedown requests, either because the claims were invalid or were duplicates of previously sent notices.</p>
<p>In 2014 the duplication problem appears to be getting worse, with even the BPI (who in all fairness are more accurate than most with their takedowns) sending large volumes of notices that contain high percentages of links that have already been taken down.</p>
<p><center><img src="http://torrentfreak.com/images/bpi-dup.jpg" alt="BPI-dup"></center></p>
<p>Across the Atlantic, Fox &#8211; which is the fifth all-time greatest sender of notices (28 million) &#8211; is also having difficulty remembering which URLs it has already asked to be erased. How Google can remember what takedowns Fox has already sent and why the studio cannot isn&#8217;t clear, but the high percentages in the refusal column suggests the numbers are significant.</p>
<p><center><img src="http://torrentfreak.com/images/fox-dup.jpg" alt="Fox-dup"></center></p>
<p>That being said, these numbers should be put into perspective. The BPI has asked Google to take down more than 86 million URLs and Fox 28 million, so even many tens of thousands of duplicates are a relatively low percentage of the total. However, there is a far more depressing trend that suggests that some anti-piracy companies don&#8217;t check to see if the links they&#8217;re complaining about are actually infringing copyright at all.</p>
<p>The image below shows a selection of notices sent to Google this month by NBC, with a percentage of each rejected by Google. The reason for that is that they&#8217;re directed at isoHunt.com, a site that was shut down by NBC&#8217;s Hollywood allies last year. The links and the site itself simply do not exist.</p>
<p><center><img src="http://torrentfreak.com/images/iso-notice.jpg" alt="Iso-notice"></center></p>
<p>Another instance, shown below, lists several TV and movie companies plus software companies Adobe and Lynda looking to take down URLs from another allegedly infringing site. Except this one, Hotfile.com, is not only dead, but was actually taken down by the studios themselves. For reference, these notices were sent four days ago and Hotfile <a href="http://torrentfreak.com/hotfile-shuts-down-and-takes-user-files-with-it-131204/">closed down</a> last December.</p>
<p><center><img src="http://torrentfreak.com/images/hot-notice.jpg" alt="hot-notice"></center></p>
<p>To see how prevalent this problem is we dug through the TorrentFreak archives to find sites that have been closed by copyright holders or the police in the last couple of years, to see if anti-piracy companies have updated their records.</p>
<p>Despite huge publicity, even now plenty of companies are <a href="http://www.google.com/transparencyreport/removals/copyright/domains/megaupload.com/">wasting Google&#8217;s time</a> with notices for content hosted on Megaupload, even though it has been closed for two and a half years. Just last month on the Usenet front, publisher Lynda <a href="http://www.chillingeffects.org/notice.cgi?sID=1019336">targeted</a> <a href="https://torrentfreak.com/hollywoods-fact-forces-shutdown-of-nzbsrus-130627/">dead-since-last-year</a> NZBsRus.</p>
<p>Also living in the past are the people at Viacom, who this month sent a flurry of notices asking for content to be removed from BTjunkie, a site that <a href="http://torrentfreak.com/btjunkie-shuts-down-for-good-120206/">shut down</a> 30 months ago in the wake of the Megaupload fiasco. Viacom are definitely not on their own though, as <a href="http://www.google.com/transparencyreport/removals/copyright/domains/btjunkie.org/">this link shows</a>.</p>
<p>Finishing up, Warner Bros., whose UK-based anti-piracy group FACT shut down streaming site SurftheChannel in 2012 and helped to get its owner jailed, <a href="http://www.chillingeffects.org/notice.cgi?sID=249604">sent a notice</a> to Google in March asking for it to remove links to The Big Bang Theory.</p>
<p>And Fox (shown earlier to be sending lots of duplicates), plus HBO, Evil Angel, NBC and Viacom are apparently <a href="http://www.google.com/transparencyreport/removals/copyright/domains/filecrop.com/">still unaware</a> that the UK Police Intellectual Property Crime Unit <a href="http://torrentfreak.com/uk-police-shutdown-file-host-search-engine-filecrop-140524/">shut down Filecrop</a> back in May.</p>
<p>Why this activity continues is anyone&#8217;s guess, but these takedowns either aren&#8217;t subjected to scrutiny or are deliberately passed with the knowledge that they&#8217;re invalid. Both options are causing unnecessary workloads for those employed to process them and putting money in the pockets of anti-piracy companies in return for zero effectiveness.</p>
<p>Some might argue that&#8217;s nothing new.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/google-processes-millions-of-useless-dmca-notices-140715/feed/</wfw:commentRss>
		<slash:comments>42</slash:comments>
		</item>
		<item>
		<title>Twitter Removes Users &#8220;Pirated&#8221; World Cup Avatars</title>
		<link>http://torrentfreak.com/twitter-removes-pirated-world-cup-avatars-fifa-pressure-140704/</link>
		<comments>http://torrentfreak.com/twitter-removes-pirated-world-cup-avatars-fifa-pressure-140704/#comments</comments>
		<pubDate>Fri, 04 Jul 2014 17:13:52 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[world cup 2014]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=90545</guid>
		<description><![CDATA[Twitter has removed the profile pictures of several of its users after the company received a takedown notice from World Cup organizer FIFA. The football organization forbids the use of any of its official logos and emblems on social media, including pictures of the World Cup trophy.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/fifa-takedown.png"><img src="http://torrentfreak.com/images/fifa-takedown.png" alt="fifa-takedown" width="275" height="174" class="alignright size-full wp-image-90551"></a>While over a billion people are enjoying the 2014 World Cup in Brazil, organizer FIFA is working around the clock to make sure that their rights are protected. </p>
<p><a href="http://torrentfreak.com/millions-watch-world-cup-through-pirated-live-streams-140701/">Stopping pirated live streams</a> is one of the main priorities, but there is another concern. In all the excitement many social media users have added World Cup related logos and other pictures as their avatars, something that&#8217;s strictly forbidden by FIFA. </p>
<p>The football organization fears that use of their logos and emblems by others may cause serious damage. FIFA believes that this endangers the entire worldwide football community. </p>
<p>&#8220;Any unauthorized use of the Official Marks not only undermines the integrity of the FIFA World Cup™ and its marketing programme, but also puts the interests of the worldwide football community at stake,&#8221; FIFA says in an official statement.</p>
<p>Social media is particularly worrisome because the official logos may lead followers to believe that the user is somehow related to FIFA.</p>
<p>&#8220;FIFA’s official logos, symbols and other graphic trade marks may not be used on any social media platform. FIFA’s Protected Terms may not be used to create the impression that a page is officially related to the 2014 FIFA World Cup,&#8221; FIFA notes. </p>
<p>Considering the above FIFA sees no other option than to crackdown on Twitter users with official FIFA logos and images as avatars. In recent weeks Twitter has been <a href="http://chillingeffects.org/N/1811549">asked to take action</a> against several of its users, by removing their infringing profile pictures. </p>
<p><center><strong>FIFA takedown notice</strong><br></br></center><center><a href="http://torrentfreak.com/images/fifa-dmca.png"><img src="http://torrentfreak.com/images/fifa-dmca.png" alt="fifa-dmca" width="649" height="311" class="alignnone size-full wp-image-90562"></a></center></p>
<p>The requests were made for a wide variety of images including the World Cup emblem, logo and even the trophy. Twitter appears to have honored the requests and has replaced the infringing avatars <a href="https://twitter.com/Brazil2014HD">with the default egg</a>.</p>
<p>Most of the targeted accounts seem to be specifically related to football. However FIFA has also asked Twitter to remove the profile picture of <a href="https://twitter.com/afobajee">@afobajee</a>, a relatively random user.</p>
<p>Most of the affected users have changed their profile pictures to <a href="https://twitter.com/JustFutball">something non-infringing</a>. However, others appear to have simply switched back to using <a href="https://twitter.com/Worldcup_com">official FIFA material</a>. </p>
<p>We expect that FIFA still has their eye on the ball, so these infringing profile pictures probably won&#8217;t stay online for very long.</p>
<p><center><strong>Infringing profile picture</strong><br></br></center><center><a href="http://torrentfreak.com/images/wc-twitter.jpg"><img src="http://torrentfreak.com/images/wc-twitter.jpg" alt="wc-twitter" width="650" height="514" class="alignnone size-full wp-image-90558"></a></center></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/twitter-removes-pirated-world-cup-avatars-fifa-pressure-140704/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
		</item>
	</channel>
</rss>
