<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; Search Results  &#187;  google Transparency Report</title>
	<atom:link href="http://torrentfreak.com/search/google+Transparency+Report/feed/rss2/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 08:05:56 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Torrent Site Uses Google To Resurrect Taken Down Content</title>
		<link>http://torrentfreak.com/torrent-site-uses-google-to-resurrect-taken-down-content-141028/</link>
		<comments>http://torrentfreak.com/torrent-site-uses-google-to-resurrect-taken-down-content-141028/#comments</comments>
		<pubDate>Tue, 28 Oct 2014 13:06:30 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[filesoup]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[Necromancer]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95872</guid>
		<description><![CDATA[One of the oldest BitTorrent-related domains has been resurrected offering a brand new torrent site feature. Not only does FileSoup claim to be able to improve on the search results of the sites it proxies, it also claims to have implemented Necromancer, a system which scours Google's DMCA notice archive to put removed content back in search results. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Founded in 2003, UK-based FileSoup was one of the original torrent sites but in 2009 two former administrators of the site were <a href="http://torrentfreak.com/oldest-bittorrent-site-targeted-by-police-owner-arrested-090804/">arrested</a> following a FACT investigation. </p>
<p>Two years later, however, the case <a href="http://torrentfreak.com/court-drops-filesoup-bittorrent-case-administrators-walk-free-110224/">collapsed</a> and the men were free to go. Now, more than three years on, the <a href="http://filesoup.com">FileSoup domain</a> has been resurrected.</p>
<p><strong>It&#8217;s a search engine / proxy, but not as we know it</strong></p>
<p>The new site has no connections to the original owner, but there are several unique aspects to the relaunch of FileSoup that make for an interesting project.</p>
<p>On a basic level FileSoup acts as a meta-search engine variant. It covers four major torrent sites &#8211; The Pirate Bay, KickassTorrents, Torrentz and ExtraTorrent &#8211; each selectable via a drop-down box. It also acts as a reverse proxy for these sites to unblock them in countries where they are inaccessible, the UK for example.</p>
<p><center><img src="http://torrentfreak.com/images/filesoup1.png" alt="filesoup"></center></p>
<p><strong>Improving on search results</strong></p>
<p>But FileSoup is no ordinary proxy. Instead of simply mirroring the content it finds on sites such as KickassTorrents, it actually attempts to improve on the results by caching third party site indexes.</p>
<p>&#8220;Let&#8217;s say Kickass.to receives a [DMCA] notice and deletes the content. We are not simply proxying but also caching the site. This means we can provide the page content even if Kickass.to has deleted the URL due to a DMCA complaint,&#8221; FileSoup informs TorrentFreak.</p>
<p>So in theory (and given time to cache &#8211; the site is still getting off the ground), FileSoup should be able to provide access to content previously taken down from other sites it proxies. To see whether it&#8217;s anywhere near to that goal, we conducted a search for one of the most talked-about franchises of the year &#8211; Expendables.</p>
<p>The images below show the results from FileSoup and KickassTorrents for exactly the same search. FileSoup returned 139 results while KickAss returned 115. Also notable (aside from the inserted malware ads on top of the search results) is the prominence of highly-seeded Expendables 3 results in the top placed positions on FileSoup.</p>
<p><center><img src="http://torrentfreak.com/images/file-v-kick.png" alt="file-v-kick"></center></p>
<p><center><img src="http://torrentfreak.com/images/kick-v-file.png" alt="kick-v-file"></center></p>
<p>Other searches produced varied results but since FileSoup is just getting off the ground it will need more time to cache significant amounts of taken-down content. But what happens when FileSoup itself is subjected to takedown notices of its own?</p>
<p>&#8220;When FileSoup receives a DMCA abuse notice we create a new URL address for the same content. After that this URL lives till the next DMCA abuse notice,&#8221; the team explain.</p>
<p><strong>The Necromancer &#8211; using Google DMCA notices bypass Google&#8217;s takedowns</strong></p>
<p>The operators of FileSoup also addressed indirect search engine takedowns. Every week rightsholders force Google to remove torrent listings from its search results. For this problem FileSoup says it has a solution, and a controversial one it is too. </p>
<p>The team behind the site say they have developed a web crawler designed to pull the details of content subjected to DMCA notices from two sources &#8211; Google&#8217;s Transparency Report and the Chilling Effects Clearing House. From here the links are brought back to life.</p>
<p>&#8220;We created a technology that crawls DMCA notices and resurrects the torrent webpage under a different URL so it can appear in search results again. It was rather complicated to sharpen it, but eventually it works pretty well. We will use it on FileSoup.com for all the websites we proxy,&#8221; FileSoup explain.</p>
<p>&#8220;It will lead to a situation when KickaAss.FileSoup.com (for example) will have more pages indexed in Google than the original Kickass.to because we will revive pages banned by DMCA within Google search results. We call this technology the Necromancer.&#8221;</p>
<p>The idea of manipulating publicly available sources of copyright notices to reactivate access to infringing content is not new but this is the first time that a site has publicly admitted to putting theory into practice. Whether FileSoup will be able to pull this off remains to be seen, but if it does it could signal the biggest game of whac-a-mole yet.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/torrent-site-uses-google-to-resurrect-taken-down-content-141028/feed/</wfw:commentRss>
		<slash:comments>49</slash:comments>
		</item>
		<item>
		<title>Kelly Brook Wants Fappening Nudes Removed From Google</title>
		<link>http://torrentfreak.com/kelly-brook-wants-fappening-nudes-removed-from-google-141026/</link>
		<comments>http://torrentfreak.com/kelly-brook-wants-fappening-nudes-removed-from-google-141026/#comments</comments>
		<pubDate>Sun, 26 Oct 2014 08:47:28 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[kelly brook]]></category>
		<category><![CDATA[The Fappening]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95714</guid>
		<description><![CDATA[Like many other "hacked" celebrities, UK  actress, model  and television presenter Kelly Brook is not happy that her leaked nudes are being distributed freely on the Internet. To deal with the fallout she asked Google to remove her photos, claiming that the compromising selfies infringe on her copyrights. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/brook.jpg"><img src="http://torrentfreak.com/images/brook.jpg" alt="brook" width="200" height="265" class="alignright size-full wp-image-95744"></a>Since late August hundreds of photos of naked celebrities have leaked online in what&#8217;s now known as &#8220;The Fappening.&#8221; </p>
<p>The leaks resulted in a massive takedown operation targeted at sites that host and link to the controversial images.</p>
<p>As a hosting provider and search engine Google inadvertently plays a role in distributing the compromising shots, much to the displeasure of the women involved.</p>
<p>Several celebrities threatened legal action against Google for its &#8220;unlawful activity,&#8221; demanding tgat the company should zap all their images. Others, including <a href="http://torrentfreak.com/jennifer-lawrence-gets-google-to-censor-leaked-pictures-sort-of-141019/">Jennifer Lawrence</a> and <a href="https://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/">Kate Upton</a>, used DMCA requests to remove the images from the public eye. </p>
<p>The famous UK actress, model and TV presenter <a href="http://en.wikipedia.org/wiki/Kelly_Brook">Kelly Brook</a> now joins this group as one of the latest Fappening victims. </p>
<p>Brook&#8217;s pictures leaked onto the Internet early October and last week she asked Google to remove three links to her pictures from search results, claiming that she holds the copyrights to the selfies. </p>
<p>The images are allegedly hosted on thefappening.so, and according to Google&#8217;s transparency report the request <a href="http://www.google.com/transparencyreport/removals/copyright/requests/1568971/">is still &#8220;pending&#8221;</a>. However, during this week something unusual happened.  </p>
<p><center><a href="http://torrentfreak.com/images/brook.png"><img src="http://torrentfreak.com/images/brook.png" alt="brook" width="609" height="361" class="alignnone size-full wp-image-95772"></a></center></p>
<p>For reasons unknown, Google has decided to <a href="https://www.google.com/?gws_rd=ncr#q=site:thefappening.so">remove all URLs of thefappening.so</a> from its search results. Whether the pages were removed because of the leaked pictures, or for another reason, is unknown. </p>
<p>Kelly Brook is not the only celebrity to ask Google to remove thefappening.so links, Argentinian singer <a href="https://twitter.com/Mel_Lezcano">Melina Lezcano</a> did the same last week.</p>
<p>TorrentFreak asked Google whether the removal of the entire domain name is due to its content or if there&#8217;s another reason, but we have yet to receive a response. </p>
<p>Whatever the reason, Brook and Lezcano&#8217;s takedown requests are moot. Whether they will be relieved is doubtful though, as most of the Fappening photos are still being shared through thousands of other sites.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/kelly-brook-wants-fappening-nudes-removed-from-google-141026/feed/</wfw:commentRss>
		<slash:comments>110</slash:comments>
		</item>
		<item>
		<title>Google Will Punish &#8220;Pirate&#8221; Sites Harder in Search Results</title>
		<link>http://torrentfreak.com/google-will-downrank-pirate-sites-starting-next-week-141018/</link>
		<comments>http://torrentfreak.com/google-will-downrank-pirate-sites-starting-next-week-141018/#comments</comments>
		<pubDate>Fri, 17 Oct 2014 21:04:50 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[google]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95491</guid>
		<description><![CDATA[Google announced today that it will roll out a new search update to "visibly" lower the search rankings of the most notorious pirate sites. The announcement is part of Google's improved anti-piracy efforts which are detailed in a new report.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/google-bay.jpg"><img src="http://torrentfreak.com/images/google-bay.jpg" alt="google-bay" width="200" height="177" class="alignright size-full wp-image-21875"></a>Over the past few years the entertainment industries have repeatedly asked Google to step up its game when it comes to anti-piracy efforts.</p>
<p>These remarks haven’t fallen on deaf ears and Google has slowly implemented various new anti-piracy measures in response. </p>
<p>Today Google released an updated version of its &#8220;<em>How Google Fights Piracy</em>&#8221; <a href="https://drive.google.com/file/d/0BwxyRPFduTN2NmdYdGdJQnFTeTA/view">report</a>. The company provides an overview of all the efforts it makes to combat piracy, but also stresses that copyright holders themselves have a responsibility to make content available. </p>
<p>One of the most prominent changes is a renewed effort to make &#8220;pirate&#8221; sites less visible in search results. Google has had a downranking system in place <a href="http://torrentfreak.com/google-starts-punishing-pirate-sites-in-search-results-120810/">since 2012</a>, but this lacked effectiveness according to the RIAA, MPAA and other copyright industry groups.</p>
<p>The improved version, which will roll out next week, aims to address this critique.</p>
<p>&#8220;We’ve now refined the signal in ways we expect to visibly affect the rankings of some of the most notorious sites. This update will roll out globally starting next week,&#8221; says Katherine Oyama, Google&#8217;s Copyright Policy Counsel.</p>
<p>The report notes that the new downranking system will still be based on the number of valid DMCA requests a site receives, among other factors. The pages of flagged sites remain indexed, but are less likely to be the top results.</p>
<p>&#8220;Sites with high numbers of removal notices may appear lower in search results. This ranking change helps users find legitimate, quality sources of content more easily,&#8221; the report reads.</p>
<p>Looking at the list of sites for which Google received <a href="http://www.google.com/transparencyreport/removals/copyright/domains/?r=all-time">the most DMCA takedown request</a>, we see that 4shared, Filestube and Dilandau can expect to lose some search engine traffic.</p>
<p>The report further highlights several other tweaks and improvements to Google&#8217;s anti-piracy efforts. For example, in addition to <a href="https://torrentfreak.com/google-starts-censoring-bittorrent-rapidshare-and-more-110126/">banning piracy related</a> AutoComplete words, Google now also downranks suggestions that return results with many &#8220;pirate&#8221; sites.</p>
<p>Finally, the report also <a href="http://torrentfreak.com/google-targets-pirate-searches-promote-legal-content-140721/">confirms our previous reporting</a> which showed that Google uses ads to promote legal movie services when people search for piracy related keywords such as torrent, DVDrip and Putlocker. This initiative aims to increase the visibility of legitimate sites.  </p>
<p>A full overview of Google&#8217;s anti-piracy efforts is <a href="https://drive.google.com/file/d/0BwxyRPFduTN2NmdYdGdJQnFTeTA/view?usp=sharing">available here</a>.  </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/google-will-downrank-pirate-sites-starting-next-week-141018/feed/</wfw:commentRss>
		<slash:comments>52</slash:comments>
		</item>
		<item>
		<title>Google Asked to Remove Half a Billion &#8220;Pirate&#8221; Search Results</title>
		<link>http://torrentfreak.com/google-asked-remove-half-billion-pirate-search-results-141002/</link>
		<comments>http://torrentfreak.com/google-asked-remove-half-billion-pirate-search-results-141002/#comments</comments>
		<pubDate>Thu, 02 Oct 2014 16:30:06 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[google]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94662</guid>
		<description><![CDATA[Google has been asked to remove half a billion copyright-infringing URLs since it started counting three years ago. The listing of pirate sites in Google's search results has turned into a heated conflict, which the search engine and copyright holders have yet to resolve.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/google-bay.jpg" alt="google-bay" width="200" height="177" class="alignright size-full wp-image-21875">In the hope of steering prospective customers away from pirate sites, copyright holders are overloading Google with DMCA takedown notices.</p>
<p>These requests have increased dramatically over the years. In 2008, the search engine received <a href="http://torrentfreak.com/google-takedown-notices-surge-140325/">only a few dozen</a> takedown notices during the entire year, but today it processes <a href="http://torrentfreak.com/google-asked-to-remove-1-million-pirate-links-per-day-140820/">a million per day</a> on average.</p>
<p>Adding up the numbers reported in Google&#8217;s <a href="http://www.google.com/transparencyreport/removals/copyright/">Transparency Report</a>, we found that since the release of the report three years ago Google has been asked to remove over 500 million links to allegedly infringing webpages.</p>
<p>The number of notices continues to increase at a rapid pace as nearly half of the requests, 240 million, were submitted during the first months of 2014. The graph below illustrates this sharp rise in takedown notices.</p>
<p><center><a href="http://torrentfreak.com/images/takedownincrease.png"><img src="http://torrentfreak.com/images/takedownincrease.png" alt="takedownincrease" width="536" height="275" class="alignnone size-full wp-image-94667"></a></center></p>
<p>Most of the reported webpages have indeed been removed and no longer appear in Google&#8217;s search results. As an example, more than <a href="https://torrentfreak.com/google-asked-censor-two-million-pirate-bay-urls-140420/">two million Pirate Bay pages</a> have quietly been wiped from Google. </p>
<p>TorrentFreak asked Google for a comment on the most recent milestone but the company has chosen not to respond on the record.</p>
<p>Despite the frequent use of the takedown process many copyright holders aren&#8217;t happy with the way things are going. While Google does its best to comply with its obligations under current law, some industry insiders claim that the search giant can and should do more to tackle the piracy problem. </p>
<p>The UK music industry group BPI, which is responsible for roughly 20% of all submitted URLs, points out that Google should do more to lower the visibility of unauthorized content in its search results. Despite promises to do so, the music group still sees very little improvement on this front</p>
<p>&#8220;Despite its clear knowledge as to which sites are engines of piracy, Google continues to help build their illegal businesses, by giving them a prominent ranking in search results,” BPI <a href="http://torrentfreak.com/bpi-hits-record-breaking-100-million-google-takedowns-140922/">told us</a> last week.</p>
<p>“Google can simply fix this problem by amending its algorithm. We hope they will respond positively to the invitation from Government to negotiate voluntary measures to do so.”</p>
<p>The BPI and other copyright holders are pushing for some sort of agreement to implement more far-reaching anti-piracy measures. However, thus far Google maintains that it&#8217;s already doing its best to address the concerns of copyright holders. </p>
<p>Last year the company released a report detailing the <a href="http://torrentfreak.com/how-google-helps-copyright-holders-to-fight-piracy-130911/">various anti-piracy measures</a> it uses. However, the company also stressed that copyright holders can do more to prevent piracy themselves. </p>
<p>Without legal options it’s hard to beat unauthorized copying, is the argument Google often repeats.</p>
<p>“Piracy often arises when consumer demand goes unmet by legitimate supply. As services ranging from Netflix to Spotify to iTunes have demonstrated, the best way to combat piracy is with better and more convenient legitimate services,&#8221; the company previously explained.</p>
<p>&#8220;The right combination of price, convenience, and inventory will do far more to reduce piracy than enforcement can.”</p>
<p>While this standoff continues, copyright holders are expected to increase the volume of requests. At the current pace Google may have processed a billion URLs by the end of next year.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/google-asked-remove-half-billion-pirate-search-results-141002/feed/</wfw:commentRss>
		<slash:comments>56</slash:comments>
		</item>
		<item>
		<title>BPI Hits Record Breaking 100 Million Google Takedowns</title>
		<link>http://torrentfreak.com/bpi-hits-record-breaking-100-million-google-takedowns-140922/</link>
		<comments>http://torrentfreak.com/bpi-hits-record-breaking-100-million-google-takedowns-140922/#comments</comments>
		<pubDate>Mon, 22 Sep 2014 09:11:02 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[bpi]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[google]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94173</guid>
		<description><![CDATA[The BPI has reached a new milestone in its ongoing efforts to have pirated content removed from the Internet. This week the music industry group reported its 100 millionth URL to Google. Although the takedown notices are processed quickly, the music industry group believes that Google should do more to prevent piracy.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/bpi.png"><img src="http://torrentfreak.com/images/bpi.png" alt="bpi" width="222" height="106" class="alignright size-full wp-image-94190"></a>Despite the growing availability of legal music services in many countries, record labels are facing a constant stream of pirated music.</p>
<p>In an attempt to prevent these infringements, the BPI and other music industry groups send millions of takedown notices to Internet services every month. Most of these requests are directed at Google.  </p>
<p>This week the UK music industry group BPI reached a new milestone after notifying Google of the 100 millionth allegedly infringing URL, up from 50 million just 10 months ago. </p>
<p>As can be seen below, the latest update shows that the 100 million links were spread out over 274,810 separate DMCA takedown notices. </p>
<p><center><strong>BPI&#8217;s takedown notices</strong><br></br></center><center><a href="http://torrentfreak.com/images/bpi100m.png"><img src="http://torrentfreak.com/images/bpi100m.png" alt="bpi100m" width="600" height="184" class="alignnone size-full wp-image-94253"></a></center></p>
<p>With 100 million requests the BPI has broken a new milestone. Never before has a copyright holder representative reported so many allegedly infringing links to Google. Degban is currently second <a href="http://www.google.com/transparencyreport/removals/copyright/reporters/?r=all-time">in this list</a> with 99 million URLs, followed by the RIAA with 57 million.</p>
<p>For the BPI this record isn&#8217;t something to be proud of though. The music industry group tells us that it shows just how hard it is for copyright holders to have infringing content taken offline. </p>
<p>“This milestone makes two things very clear. First, that however much creators do, the system of &#8216;notice and takedown&#8217; will never be enough on its own to protect them or consumers from the online black market, or to spur growth in the digital economy,&#8221; a BPI spokesperson says.</p>
<p>&#8220;Second, that despite its clear knowledge as to which sites are engines of piracy, Google continues to help build their illegal businesses, by giving them a prominent ranking in search results.&#8221;</p>
<p>The BPI stresses that Google should do more to lower the visibility of unauthorized content in its search results. Despite promises to do so, the music group still sees very little improvement on this front.</p>
<p>“To illustrate: Google’s records show it has been told more than 10 million times that content on 4shared.com is illegal – yet it’s still the very first result today when we search for &#8216;Calvin Harris mp3&#8242; &#8211; ahead of Amazon and every other legal service,&#8221; BPI notes.</p>
<p>Addressing this issue is pretty straightforward, the BPI argues. Google should work with the entertainment industries to adjust its search algorithm, as the UK Government also <a href="https://torrentfreak.com/uk-government-plans-to-ensure-that-google-hinders-online-piracy-140202/">highlighted</a> recently.    </p>
<p>“Google can simply fix this problem by amending its algorithm. We hope they will respond positively to the invitation from Government to negotiate voluntary measures to do so,&#8221; BPI says, closing with an iconic lyric.  </p>
<p>&#8220;It’s time the media giant changed its tune &#8211; we need a little less conversation and a little more action please.”</p>
<p>Google has thus far been hesitant to fiddle with its search results. </p>
<p>The company has made <a href="http://torrentfreak.com/how-google-helps-copyright-holders-to-fight-piracy-130911/">several changes</a> to address the complaints of copyright holders. However, it also stressed that the entertainment industries themselves should take responsibility, arguing that piracy is primarily an <a href="http://torrentfreak.com/google-piracy-availability-pricing-problem-140310/">availability and pricing problem</a>.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/bpi-hits-record-breaking-100-million-google-takedowns-140922/feed/</wfw:commentRss>
		<slash:comments>70</slash:comments>
		</item>
		<item>
		<title>Google Refuses to Remove Links to Kate Upton&#8217;s &#8220;Fappening&#8221; Photos</title>
		<link>http://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/</link>
		<comments>http://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/#comments</comments>
		<pubDate>Fri, 12 Sep 2014 18:19:23 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[The Fappening]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93846</guid>
		<description><![CDATA[In an attempt to remove Kate Upton's leaked nudes from Google's search results, her boyfriend Jason Verlander instructed his lawyers to send a DMCA takedown request. Interestingly, Google has rejected nearly half of the links in the Detroit Tigers pitcher's copyright complaint. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/upton.png"><img src="http://torrentfreak.com/images/upton.png" alt="upton" width="250" height="266" class="alignright size-full wp-image-93850"></a>Nearly two weeks have passed since hundreds of photos of naked celebrities <a href="http://en.wikipedia.org/wiki/August_2014_celebrity_photo_leaks">leaked online</a>. This &#8220;fappening&#8221; triggered a massive takedown operation targeting sites that host and link to the images, Google included.</p>
<p>A few days ago Google received a request to remove links to Kate Upton&#8217;s stolen photos The request was not sent by Upton but by her boyfriend Jason Verlander, who also appears in a few of the leaked images. </p>
<p>The notice includes hundreds of URLs of sites such as thefappening.eu where the photos are hosted without permission.</p>
<p>It&#8217;s quite unusual for Google&#8217;s takedown team to be confronted with a long link of naked celebrity pictures. This may explain why it took a while before a decision was reached on the copyright-infringing status of the URLs, a process that may involve a cumbersome manual review. </p>
<p>Yesterday the first batch was processed and interestingly enough Google decided to leave nearly half of all URLs <a href="http://www.google.com/transparencyreport/removals/copyright/requests/1445734/">untouched</a>. The overview below shows that with 16 of the 444 links processed, only 45% were removed. </p>
<p>The big question is, of course, why?</p>
<p><center><center><strong>Verlander&#8217;s takedown request</strong></center><br></br><a href="http://torrentfreak.com/images/upton-google-fappening.png"><img src="http://torrentfreak.com/images/upton-google-fappening.png" alt="upton-google-fappening" width="600" height="442" class="alignnone size-full wp-image-93852"></a></center></p>
<p>Google doesn&#8217;t explain its decision keep the links in question in its search results. In some cases the original content had already been removed at the source site, so these URLs didn&#8217;t have to be removed.</p>
<p>Other rejections are more mysterious though. For example, the thefappening.eu URLs that remain online all pointed to stolen images when we checked. Most of these were not nudes, but they certainly weren&#8217;t posted with permission.</p>
<p>One possible explanation for Google&#8217;s inaction is that Verlander most likely claimed to own the copyright on the images, something he can only do with pictures he took himself. With Upton&#8217;s selfies this is hard to do, unless she signed away her rights.</p>
<p>While browsing through the reported URLs we also noticed another trend. Some sites have replaced Upton&#8217;s leaked photos with photos of other random naked women. Google&#8217;s takedown team apparently has a sharp eye because these were not removed by Google either.</p>
<p>Chilling Effects, who host Google&#8217;s takedown requests, just posted a redacted version of the <a href="http://www.chillingeffects.org/notice.cgi?sID=2021753">original notice</a> with Upton&#8217;s name removed. Unfortunately this doesn&#8217;t offer more clues to resolve this takedown mystery, so for now we can only guess why many of the links remain indexed.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
		</item>
		<item>
		<title>Which VPN Services Take Your Anonymity Seriously? 2014 Edition</title>
		<link>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/</link>
		<comments>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/#comments</comments>
		<pubDate>Tue, 09 Sep 2014 19:45:35 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Sidebar]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[vpn services]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=85262</guid>
		<description><![CDATA[Millions of people use a VPN service to protect their privacy, but not all VPNs are as anonymous as one might hope. In fact, some VPN services log users' IP-addresses for weeks. To find out how secure VPNs really are TorrentFreak asked the leading providers about their logging policies, and more.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/boxed.jpg"><img src="http://torrentfreak.com/images/boxed.jpg" alt="boxed" width="222" height="178" class="alignright size-full wp-image-36576"></a>By now most Internet users are well aware of the fact that pretty much every step they take on the Internet is logged or monitored. </p>
<p>To prevent their IP-addresses from being visible to the rest of the Internet, millions of people have signed up to a VPN service. Using a VPN allows users to use the Internet anonymously and prevent snooping.</p>
<p>Unfortunately, not all VPN services are as anonymous as they claim.  </p>
<p>Following a high-profile case of an individual using an &#8216;anonymous&#8217; VPN service that turned out to be not so private, TorrentFreak decided to ask a selection of VPN services some tough questions.</p>
<p>By popular demand we now present the third iteration of our VPN services &#8220;logging&#8221; review. In addition to questions about logging policies we also asked VPN providers about their stance towards file-sharing traffic, and what they believe the most secure VPN is. </p>
<p><strong>Last update: October 7, 2014 (added partial <a href="http://torrentfreak.com/%D0%BA%D0%B0%D0%BA%D0%BE%D0%B9-%D0%B8%D0%B7-vpn-%D1%81%D0%B5%D1%80%D0%B2%D0%B8%D1%81%D0%BE%D0%B2-%D1%80%D0%B5%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE-%D0%B7%D0%B0%D0%B1%D0%BE%D1%82%D0%B8%D1%82%D1%8C%D1%81%D1%8F/" title="Какой из VPN сервисов реально заботиться о Вашей анонимности? Результаты 2014 года.">Russian translation</a>)<br>
</strong><br>
&#8212;</p>
<p>1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long? </p>
<p>2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?</p>
<p>3. What tools are used to monitor and mitigate abuse of your service?</p>
<p>4. In the event you receive a DMCA takedown notice or European equivalent, how are these handled?</p>
<p>5. What steps are taken when a valid court order requires your company to identify an active user of your service?</p>
<p>6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?</p>
<p>7. Which payment systems do you use and how are these linked to individual user accounts?</p>
<p>8. What is the most secure VPN connection and encryption algorithm you would recommend to your users? </p>
<p>&#8212;</p>
<p>What follows is the list of responses from the VPN services, in their own words. Providers who didn&#8217;t answer our questions directly or failed by logging everything were excluded. Please note, however, that several VPN companies listed here do log to some extent. The order of the lists holds no value. </p>
<h2><a href="http://bit.ly/privateinternet">Private Internet Access</a></h2>
<p><a href="http://torrentfreak.com/images/pia.png"><img class="alignright size-full wp-image-41039" title="torrentprivacy" src="http://torrentfreak.com/images/pia.png" alt="" width="180" height="40"></a>1. We absolutely do not log any traffic nor session data of any kind, period. We have worked hard to meticulously fork all daemons that we utilize in order to achieve this functionality. It is definitely not an easy task, and we are very proud of our development team for helping Private Internet Access to achieve this unique ability.</p>
<p>2. We operate out of the US which is one of the few, if only, countries without a mandatory data retention law. We explored several other jurisdictions with the help of our professional legal team, and the US is still ideal for privacy-based VPN services.</p>
<p>We severely scrutinize the validity of any and all legal information requests. That being said, since we do not hold any traffic nor session data, we are unable to provide any information to any third-party. Our commitment and mission to preserve privacy is second to none.</p>
<p>3. We do not monitor any traffic, period. We block IPs/ports as needed to mitigate abuse when we receive a valid abuse notification.</p>
<p>4. We do not host any content and are therefore unable to remove any of said content. Additionally, our mission is to preserve and restore privacy on the Internet and society. As such, since we do not log or monitor anything, we&#8217;re unable to identify any users of our service.</p>
<p>5. Once again, we do not log any traffic or session data. Additionally, unlike the EU and many other countries, our users are protected by legal definition. For this reason, we&#8217;re unable to identify any user of our service. Lastly, consumer protection laws exist in the US, unlike many other countries. We must abide by our advertised privacy policy.</p>
<p>6. We do not discriminate against any kind of traffic/protocol on any of our servers, period. We believe in a free, open, and uncensored internet.</p>
<p>7. Bitcoin, Ripple, PayPal, Google Play (Mobile), OKPay, CashU, Amazon and any major Gift Card. We support plenty of anonymous payment methods. For this reason, the highest risk users should definitely use Bitcoin, Ripple or a major gift card with an anonymous e-mail account when subscribing to our privacy service.</p>
<p>8. We&#8217;re the only provider to date that provides a plethora of encryption cipher options. We recommend, mostly, using AES-128, SHA1 and RSA2048. </p>
<p><a href="http://bit.ly/privateinternet">Private Internet Access website</a> </p>
<h2><a href="http://bit.ly/torguardvpn">TorGuard</a></h2>
<p><a href="http://torrentfreak.com/images/torguard.png"><img class="alignright size-full wp-image-50163" title="torguard" src="http://torrentfreak.com/images/torguard.png" alt="" width="180" height="59"></a>1. TorGuard does not store any IP address or time stamps on any VPN and proxy servers, not even for a second. Further, we do not store any logs or time stamps on user authentication servers connected to the VPN. In this way it is not even possible to match an external time stamp to a user that was simultaneously logged in. Because the VPN servers utilize a shared IP configuration, there can be hundreds of users sharing the same IP at any given moment further obfuscating the ability to single out any specific user on the network.</p>
<p>2. TorGuard is a privately owned company with parent ownership based in Nevis and our headquarters currently located in the US. Our legal representation at the moment is comfortable with the current corporate structuring however we wouldn’t hesitate to move all operations internationally should the ground shift beneath our feet. We now offer VPN access in 23+ countries worldwide and maintain all customer billing servers well outside US borders.</p>
<p>We would only be forced to communicate with a third-party in the event that our legal team received a court ordered subpoena to do so. This has yet to happen, however if it did we would proceed with complete transparency and further explain the nature of TorGuard’s shared VPN configuration. We have no logs to investigate, and thus no information to share.</p>
<p>3. Our network team uses commercial monitoring software with custom scripts to keep an eye on individual server load and service status/uptime so we can identify problems as fast as possible. If abuse reports are received from an upstream provider, we block it by employing various levels of filtering and global firewall rules to large clusters of servers. Instead of back tracing abuse by logging, our team mitigates things in real-time. We have a responsibility to provide fast, abuse-free VPN services for our clients and have perfected these methods over time.</p>
<p>4. In the event of receiving a DMCA notice, the request is immediately processed by our abuse team. Because it is impossible for us to locate which user on the server is actually responsible for the violation, we temporarily block the infringing server and apply global rules depending on the nature of the content and the server responsible. The system we use for filtering certain content is similar to keyword blocking but with much more accuracy. This ensures the content in question to no longer pass through the server and satisfies requirements from our bandwidth providers.</p>
<p>5. Due to the nature of shared VPN services and how our network is configured, it is not technically possible to effectively identity or single out one active user from a single IP address. If our legal department received a valid subpoena, we would proceed with complete transparency from day one. Our team is prepared to defend our client’s right to privacy to the fullest extent of the law.</p>
<p>6. BitTorrent is only allowed on select server locations. TorGuard now offers a variety of protocols like http/socks proxies, OpenVPN, SSH Tunnels, SSTP VPN and Stealth VPN (DPI Bypass), with each connection method serving a very specific purpose for usage. Since BitTorrent is largely bandwidth intensive, we do not encourage torrent usage on all servers. Locations that are optimized for torrent traffic include endpoints in: Canada, Netherlands, Iceland, Sweden, Romania, Russia and select servers in Hong Kong. This is a wide range of locations that works efficiently regardless of the continent you are trying to torrent from. </p>
<p>7. We currently accept payments through all forms of credit or debit card, PayPal, OKPAY, and Bitcoin. During checkout we may ask the user to verify a billing phone and address but this is simply to prevent credit card fraud, spammers, and keep the network running fast and clean. After payment it is possible to change this to something generic that offers more privacy. No VPN or Proxy usage can be linked back to a billing account due to the fact we hold absolutely no levels of logging on any one of our servers, not even timestamps! </p>
<p>8. For best security we advise clients to choose OpenVPN connections only, and if higher encryption is called for use AES256 bit. This option is available on many locations and offers excellent security without degrading performance. For those that are looking to defeat Deep Packet Inspection firewalls (DPI) like what is encountered in countries such as China or Iran, TorGuard offers “Stealth” VPN connections in the Netherlands, UK and Canada. Stealth connections feature OpenVPN obfuscation technology that causes VPN traffic to appear as regular connections, allowing VPN access even behind the most strict corporate wifi networks or government regulated ISPs.</p>
<p><a href="http://bit.ly/torguardvpn">TorGuard website</a> </p>
<h2><a href="http://bit.ly/ipvanis">IPVanish</a></h2>
<p><a href="/images/ipvarnish.png"><img src="http://torrentfreak.com/images/ipvarnish.png" alt="ipvarnish" width="152" height="82" class="alignright size-full wp-image-51008"></a>1. IPVanish has a no-log policy. We keep no traffic logs.</p>
<p>2. IPVanish is headquartered in the US and thus operates under US law.</p>
<p>3. IPVanish has no monitoring in place. To elaborate, IPVanish does not sniff or monitor any user’s traffic or activity for any reason.</p>
<p>4. IPVanish keeps no logs of any user’s activity and responds accordingly.</p>
<p>5. IPVanish, like every other company, has to follow the law in order to remain in business. Only US law applies. </p>
<p>6. P2P is permitted. IPVanish in fact does not block or throttle any ports, protocols, servers or any type of traffic whatsoever.</p>
<p>7. PayPal and all major credit cards are accepted. Payments and product use are in no way linked. User authentication and billing info are help on completely different and independent platforms.</p>
<p>8. OpenVPN generally provides the strongest encryption algorithm, so that is the recommended encryption protocol. IPVanish also allows a choice between TCP and UDP, and UDP is generally recommended for better speed.</p>
<p><a href="http://bit.ly/ipvanis">IPVanish website</a></p>
<h2><a href="http://btguard.com/?a=discounts">BTGuard</a></h2>
<p><img src="http://torrentfreak.com/images/btguard2.jpg" align="right" alt="btguard">1. We do not keep any logs whatsoever.</p>
<p>2. The jurisdiction is Canada. Since we do not have log files, we have no information to share. We do not communicate with any third parties. The only event in which we would even communicate with a third-party is if we received a court order. We would then be forced to notify them we have no information. This has not happened yet.</p>
<p>3. If serious abuse is reported we enable tcpdump to confirm the abuse and locate the user. These dumps are immediately removed. If the user is abusing our service they will be terminated permanently but we have never shared user information with a 3rd party. </p>
<p>4. We do not have any open incoming ports, so it’s not possible for us to “takedown” any broadcasting content.</p>
<p>5. We take every step within the law to fight such an order.</p>
<p>6. Yes, all types of traffic our allowed with our services.</p>
<p>7. We accept PayPal and Bitcoin. All payments are linked to users accounts because they have to be for disputes and refunds.</p>
<p>8. 256-bit AES is the most secure. However 128-bit blowfish is plenty good. If you&#8217;re concerned about surveillance agencies such as the NSA, their capabilities are shrouded in secrecy and claiming to be able to protect you is offering you nothing but speculation. As far as what&#8217;s publicly available for deciphering encryption, both of the encryptions I mentioned are more than sufficient.</p>
<p><a href="http://btguard.com/?a=discounts">BTGuard website</a></p>
<h2><a href="https://privacy.io/">Privacy.io</a></h2>
<p><a href="http://torrentfreak.com/images/privacyio.jpg"><img class="alignright size-full wp-image-41044" title="privacy" src="http://torrentfreak.com/images/privacyio.jpg" alt="" width="180" height="50"></a>1. We do not log any information on our VPN servers. The only scenario is if a technical issue arises, but we request permission from the user first, and we only do it for the duration of the job, and then it is removed.</p>
<p>2. We are in the process of moving jurisdictions away from Australia at present as we are unsure what our current government plans to do in regards to our privacy. We have not decided where yet.</p>
<p>3. Only SMTP port 25 is filtered to mitigate spam, but we are working on some tools to make it easier for users to send mail.</p>
<p>4. Any DMCA request is ignored, as we have no logs to do anything about them.</p>
<p>5. Same as above, as we do not log, so we are unable to provide any information. If the law attempts to make us do such things, we will move our business to a location where that cannot occur, and if that fails we will close up shop before we provide any information.</p>
<p>6. All protocols are allowed with our service, with the only exception of SMTP port 25 currently being filtered.</p>
<p>7. At present we only accept PayPal and CC (processed by PayPal), but we are looking into alternative types of payments. We go out of our way to make sure that PayPal transactions are not linked to the users, we generate a unique key per transaction to verify payment for the account is made, and then nuke that unique key. Bitcoin and Litecoin are also on the agenda.</p>
<p>8. At present we offer 128 bit for PPTP and 256 bit for OpenVPN, We plan to offer stronger encryption for the security conscious.</p>
<p><a href="https://privacy.io/">Privacy.io website</a></p>
<h2><a href="http://vikingvpn.com/">VikingVPN</a></h2>
<p><img src="http://torrentfreak.com/images/vikingvpn.jpg" alt="vikingvpn" width="180" height="203" class="alignright size-full wp-image-74962">1. No. We run a zero knowledge network and are unable to tie a user to an IP address.</p>
<p>2. United States, they don&#8217;t have data retention laws, despite their draconian surveillance programs. The only information we share with anyone is billing information to our payment gateway. This can be anonymized by using a pre-paid anonymous card. If asked to share specific data about our users and their habits, we would be unable to do so, because we don&#8217;t have any logs of that data.</p>
<p>3. That is mostly confidential information. However, we can assure our users that we do not use logging to achieve this goal.</p>
<p>4. In the event of a DMCA notice, we send out the DMCA policy published on our website. We haven&#8217;t yet received a VALID DMCA notice.</p>
<p>5. We exhaust all legal options to protect our users. Failing that, we would provide all of our logs, which do not actually exist. If required to wiretap a user under a National Security Letter, we have a passively triggered Warrant Canary. We would also likely choose to shut down our service and put it up elsewhere.</p>
<p>6. Yes. Those ports are all open, and we have no data caps.</p>
<p>7. We currently only take credit cards. Our payment provider is far more restrictive than we ever imagined they would be. We&#8217;re still trying to change payment providers. Fortunately, by using a pre-paid credit card, you can still have totally anonymous service from us.</p>
<p>8. A strong handshake (either RSA-4096+ or a non-standard elliptic curve as the NIST curves are suspect). A strong cipher such as AES-256-CBC or AES-256-GCM encryption (NOT EDE MODE). At least SHA1 for data integrity checks. SHA2 and the newly adopted SHA3 (Skein) hash functions are also fine, but slower and provide no real extra assurances of data integrity, and provide no further security beyond SHA1. The OpenVPN HMAC firewall option to harden the protocol against Man-in-the-Middle and Man-on-the-Side attacks.</p>
<p><a href="http://vikingvpn.com/">VikingVPN website</a> </p>
<h2><a href="http://www.ivpn.net/">IVPN</a></h2>
<p><a href="http://torrentfreak.com/images/ivpn.png"><img src="http://torrentfreak.com/images/ivpn.png" alt="ivpn" width="150" height="69" class="alignright size-full wp-image-85390"></a>1.  IVPN’s top priority is the privacy of its customers and therefor we do not store any connection logs or any other log that could be used to associate a connection to a customer.</p>
<p>2. IVPN is incorporated in Malta. We would ignore any request to share data unless it was served by a legal authority with jurisdiction in Malta in which case we would inform them that we don&#8217;t have the data to share. If we were served a subpoena which compelled us to log traffic we would find a way to inform our customers and relocate to a new jurisdiction.</p>
<p>3. We use a tool called PSAD to mitigate attacks originating from customers on our network. We also use rate-limiting in iptables to mitigate SPAM.</p>
<p>4. We ensure that our network providers understand the nature of our business and that we do not host any content. As a condition of the safe harbor provisions they are required to inform us of each infringement which includes the date, title of the content and the IP address of the gateway through which it was downloaded. We simply respond to each notice confirming that we do not host the content in question.</p>
<p>5. Assuming the court order is requesting an identity based on a timestamp and IP, our legal department would respond that we don&#8217;t have any record of the user&#8217;s identity nor are we legally compelled to do so.</p>
<p>6. We &#8216;allow&#8217; BitTorrent on all servers except gateways based in the USA. Our USA network providers are required to inform us of each copyright infringement and are required to process our response putting undue strain on their support resources (hundreds per day). For this reason providers won&#8217;t host our servers in the USA unless we take measures to mitigate P2P activity.</p>
<p>7. We currently accept Bitcoin, Cash and PayPal. No information relating to a customers payment account is stored with the exception of automated PayPal subscriptions where we are required to store the subscription ID in order to assign it to an invoice (only for the duration of the subscription after which it is deleted). Of course PayPal will always maintain a record that you have sent funds to IVPN but that is all they have. If you need to be anonymous to IVPN and don&#8217;t wish to be identified as a customer then we recommend using Bitcoin or cash.</p>
<p>8. We recommend and offer OpenVPN using the strongest AES-256 cipher. For key exchange and authentication 4096-bit RSA keys are used.</p>
<p><a href="http://www.ivpn.net/">IVPN website</a></p>
<h2><a href="https://privatevpn.com/">PrivatVPN</a></h2>
<p><a href="http://torrentfreak.com/images/privatvpn.jpg"><img class="alignright size-full wp-image-41044" title="privatvpn" src="http://torrentfreak.com/images/privatvpn.jpg" alt="" width="180" height="53"></a>1. We don’t keep ANY logs that allow us or a 3rd party to match an IP address and a time stamp to a user our service. The only thing we log are e-mails and user names but it’s not possible to bind an activity on the Internet to a user.</p>
<p>2. We operate in Swedish jurisdiction. Since we do not log any IP addresses we have nothing to disclose. Circumstances doesn&#8217;t matter in this case, we have no information regarding our customers’ IP addresses and activity on the Internet. Therefore we have no information to share with any 3rd party.</p>
<p>3. If there&#8217;s abuse, we advise that service to block our IP in the first instance, and second, we can block traffic to the abused service.</p>
<p>4. This depends on the country in which we’re receiving a DMCA takedown. For example, we’ve received a DMCA takedown for UK and Finland and our response was to close P2P traffic in those countries.</p>
<p>5. If we get a court order to monitor a specific IP then we need to do it, and this applies to every VPN company out there.</p>
<p>6. Yes, we allow Torrent traffic.</p>
<p>7. PayPal, Payson and Plimus. Every payment has an order number, which is linked to a user. Otherwise we wouldn&#8217;t know who has made a payment. To be clear, you can&#8217;t link a payment to an IP address you get from us.</p>
<p>8. OpenVPN TUN with AES-256. On top is a 2048-bit DH key.</p>
<p><a href="https://privatevpn.com/">PrivatVPN website</a></p>
<h2><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ</a></h2>
<p><img class="alignright size-full wp-image-49734" title="prq" src="http://torrentfreak.com/images/prq.png" alt="" width="129" height="102">1. No. Wo do not log anything and we only require a working e-mail address to be a customer.</p>
<p>2. Swedish. We do not share information with anyone.</p>
<p>3. Not disclosed.</p>
<p>4. Put it in the trash where it belongs!</p>
<p>5. None, since we do not have any customer information and no logs.</p>
<p>6. We host anything as long as it&#8217;s not SPAM related or child porn.</p>
<p>7. Visa/Mastercard, Bitcoin, PayPal. No correlation between payment data and customer data.</p>
<p>8. We provide OpenVPN services (along with dedicated servers and other hosting services).</p>
<p><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ website</a></p>
<h2><a href="http://www.tigervpn.com/en/home">tigerVPN</a></h2>
<p><a href="http://torrentfreak.com/images/tigervpn.png"><img src="http://torrentfreak.com/images/tigervpn.png" alt="tigervpn" width="180" height="73" class="alignright size-full wp-image-85421"></a>1. Absolutely not! We built tigerVPN to purge all data once the transmission of a IP package was completed successfully. Its impossible to trace back any customer. On top of that we decided to use shared IPs in order to further randomize and anonymize our customers. The combination of having absolutely no logs at all and multiple customers per IP, wipes our customers digital footprint</p>
<p>2. We are a limited liability company in Slovakia.  Slovakia does not have any data retention programs and furthermore encourage ISP’s to protect their customers privacy on the net. We are not required to share any information with 3rd party hence it would be illegal thanks to the law of telecom secrecy. </p>
<p>3. Since we don’t keep logs, we can&#8217;t monitor abusive behavior, which is the price for building a customer secure environment!</p>
<p>4. We can’t comply since we can’t identify customers, therefore it’s pointless to follow any requests. We have a specific folder for these eMails ;-)</p>
<p>5. Same as above. We seriously can’t tell which customer did what, when, where, at any given time.</p>
<p>6. It’s allowed on all servers although we gently ask our customers to use either Romania or Netherlands. Some infrastructure service providers do not want file sharing so it happened to us that we were asked to move our servers due to file sharing. We found some reliable partners in Romania and Netherlands which tolerate p2p so we kindly ask our customers to use these server parks.</p>
<p>7. Customers can pay with Visa, Mastercard and Debit. On top of that we also use PayPal. We use hash keys and tokens to identify a payment but it’s not logged or linked to the customer. We had to do this anyway hence we are a PCI Level 1 compliant merchant. Therefore we are not allowed to store any card or payment data with the records of our customers. These keys are pointless for anyone else so there is no chance to build a connection.</p>
<p>8. We offer PPTP, L2TP and OpenVPN, while out of nature OpenVPN comes with the highest encryption and algorithm. L2TP and OpenVPN are 256bit SSL  encrypted while PPTP comes with a solid 128bit. Although our customers are individual and have their own sense of why and what to use, we recommend L2TP as solid protocol. It’s less geeky and more secure than PPTP, but our customers can pick any of them in all the 47 network nodes around the globe.</p>
<p><a href="http://www.tigervpn.com/en/home">tigerVPN website</a></p>
<h2><a href="http://mullvad.net/en">Mullvad</a></h2>
<p><a href="http://torrentfreak.com/images/mullvad.jpg"><img class="alignright size-full wp-image-41059" title="mullvad" src="http://torrentfreak.com/images/mullvad.jpg" alt="" width="180" height="37"></a>1. No. This would make both us and our users more vulnerable so we<br>
certainly don&#8217;t. To make it harder to watch the activities of an IP address from the outside we also have many users share each address, both for IPv4 and our upcoming IPv6 support.</p>
<p>2. Swedish jurisdiction. Under no circumstance we will share information with a third-party. First of all we take pains to not actually possess information that could be of interest to third parties, to the extent possible. In the end there is no practical way for the Swedish government to get information about our users from us.</p>
<p>3. We don&#8217;t monitor our users. In the rare cases of such egregious network abuse that we can&#8217;t help but notice (such as DoS attacks) we stop it using basic network tools.</p>
<p>4. There is no such Swedish law that is applicable to us.</p>
<p>5. We make sure not to store sensitive information that can be tied to publicly available information, so that we have nothing to give out. We believe it is not possible in Swedish law to construct a court order that would compel us to actually give out information about our<br>
users. Not that we would anyway. We started this service for political reasons and would rather discontinue it than having it work against its purpose.</p>
<p>6. Yes.</p>
<p>7. Bitcoin (we were the first service to accept it), cash (in the mail), bank transfers, and PayPal / credit cards. Payments are tied to accounts but accounts are just random numbers with no personal information attached that users can create at will. With the anonymous payments possible with cash and Bitcoin it can be anonymous all the way.</p>
<p>8. We use OpenVPN. We also provide PPTP because some people want it but we strongly recommend against it. Encryption algorithms and key lengths are important but often get way too much attention at the expense of other important but harder to measure things such as leaks and computer security.</p>
<p><a href="http://mullvad.net/en">Mullvad website</a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/feed/</wfw:commentRss>
		<slash:comments>409</slash:comments>
		</item>
		<item>
		<title>Oh No! Web Sheriff Targets &#8216;Pirating&#8217; Reddit Users</title>
		<link>http://torrentfreak.com/oh-no-web-sheriff-targets-pirating-reddit-users-140907/</link>
		<comments>http://torrentfreak.com/oh-no-web-sheriff-targets-pirating-reddit-users-140907/#comments</comments>
		<pubDate>Sun, 07 Sep 2014 19:21:27 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[reddit]]></category>
		<category><![CDATA[web-sheriff]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=90814</guid>
		<description><![CDATA[Reddit users beware, the Web Sheriff is back in town, and he's coming after your submissions. In recent months copyright holders have increasingly targeted "infringing" Reddit links and the Web Sheriff is one of the most active senders.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/sheriff1.jpg"><img src="http://torrentfreak.com/images/sheriff1.jpg" alt="sheriff1" width="300" height="74" class="alignright size-full wp-image-90919"></a>The <a href="http://www.websheriff.com/">Web Sheriff</a>, aka John Giacobbi, has been protecting the Internet from pirates for roughly a decade.</p>
<p>In the early days he became somewhat of a cult figure thanks to his polite style and trademarked <a href="http://torrentfreak.com/images/web-sheriff-mistake.jpg">letterhead</a>. This set him apart from other anti-piracy crusaders who usually sent DMCA takedown requests with a more aggressive lawyer-like style.</p>
<p>The Sheriff once had a lively discussion with The Pirate Bay folks, who then sent him <a href="http://thepiratebay.se/static/interweb.pdf">this invoice</a> fax. Not much later relationships deteriorated even further after Giacobbi announced he would sue the site&#8217;s operators in  the US, France and Sweden, but not much came of that. </p>
<p>In recent years things have quietened down a bit, but The Web Sheriff and his deputies are still active. In recent years they have taken down over half a million URLs from Google alone. Most recently, the Sheriff has been targeting several Reddit.com pages. </p>
<p>In one of the most recent complaints the Sheriff demands the takedown of <a href="http://www.reddit.com/r/megalinks/comments/20loav/movienymphomaniac_2013_vol_1_and_2_pt2_in_comments/">a submission</a> in the r/megalinks subreddit, linking to two parts of the movie Nymphomaniac hosted on Mega.co.nz.</p>
<p><center><a href="/images/reddit-websher.png"><img src="http://torrentfreak.com/images/reddit-websher.png" alt="reddit-websher" width="600" height="162" class="alignnone size-full wp-image-93635"></a></center></p>
<p>The request for removal was sent to Google last week but the search engine decided not to remove the URLs. It&#8217;s unclear why, but one reason for the inaction may be that the Mega links are no longer active.</p>
<p>Not all links reported by the Web Sheriff are &#8220;infringing&#8221; though. Another recent submission shows that he also tried to get <a href="http://www.reddit.com/r/AlanPartridge/comments/1ku0ws/alan_partridge_alpha_papa_has_a_north_american/">this submission</a> take down, which points to a perfectly legitimate news article from Variety.</p>
<p><center><a href="http://torrentfreak.com/images/redd2.png"><img src="http://torrentfreak.com/images/redd2.png" alt="redd2" width="600" height="184" class="alignnone size-full wp-image-93644"></a></center></p>
<p>This year copyright holders have increasingly targeted allegedly infringing Reddit links, Google&#8217;s data shows. The Web Sheriff is currently <a href="http://www.google.com/transparencyreport/removals/copyright/domains/reddit.com/">ranked second</a> in number of URLs sent, placed after LeakID and before Disney.  </p>
<p>Even the MPAA went after Reddit a few weeks ago. The Hollywood group <a href="http://torrentfreak.com/mpaa-targets-reddit-movie-piracy-140624/">tried to take down</a> the subreddit r/fulllengthfilms, but failed and drove <a href="http://www.reddit.com/r/FullLengthFilms/about/traffic">hundreds of thousands</a> of eyeballs to the page instead. </p>
<p>Thus far the Web Sheriff hasn&#8217;t booked any real successs either, but Reddit users are warned. The Sheriff is watching and will shoot down your submissions whenever he can.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/oh-no-web-sheriff-targets-pirating-reddit-users-140907/feed/</wfw:commentRss>
		<slash:comments>35</slash:comments>
		</item>
		<item>
		<title>Anti-Piracy Outfit Denies DDoS&#8217;ing Anime Sites</title>
		<link>http://torrentfreak.com/anti-piracy-outfit-denies-ddosing-anime-sites-140904/</link>
		<comments>http://torrentfreak.com/anti-piracy-outfit-denies-ddosing-anime-sites-140904/#comments</comments>
		<pubDate>Thu, 04 Sep 2014 10:35:43 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[anime]]></category>
		<category><![CDATA[horriblesubs]]></category>
		<category><![CDATA[nyaa]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93476</guid>
		<description><![CDATA[The effects of a DDoS attack that crippled NYAA, one of the largest anime torrent sites, continue today with fingers being pointed at everyone from the Japanese government to an anti-piracy group working with anime distributors. Subtitling site HorribleSubs, which was also affected, has its own ideas.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/anime.jpg"><img src="http://torrentfreak.com/images/anime.jpg" alt="anime" width="180" height="150" class="alignright size-full wp-image-93485"></a>Distributed Denial of Service or DDoS attacks are a relatively common occurrence in the file-sharing community and something that many <a href="http://torrentfreak.com/popcorn-time-hit-by-massive-ddos-attack-140814/">sites are subjected to</a> throughout the course of a year. They disrupt service and can often cost money to mitigate.</p>
<p>Those carrying out the attacks have a variety of motives, from extortion and blackmail to &#8220;<a href="http://knowyourmeme.com/memes/i-did-it-for-the-lulz">the lulz</a>&#8220;, and a dozen reasons in between. Often the reasons are never discovered.</p>
<p>During the past few days several sites involved in the unauthorized sharing of anime have been targeted by DDoS-style attacks. <a href="http://swaps4.com/why-and-who-is-attacking-anime-related-websites/">Swaps4</a> reported that Haruhichan, Tokyo Toshokan and AnimeTake were under assault from assailants unknown, although all now appear to be back online.</p>
<p>A far more serious situation has played out at NYAA.se, however. The site is probably the largest public dedicated anime torrent index around and after being hit with an attack last weekend it remains offline today. The attack on NYAA had wider effects too.</p>
<p>NYAA and leading fan-subbing site HorribleSubs reportedly shared the same hosting infrastructure so the DDoS attack took down both sites. That&#8217;s significant, not least since at the end of August HorribleSubs reported that their titles had been downloaded <a href="http://i.imgur.com/fMheSdP.jpg">half a billion times</a>.</p>
<p><center><img src="http://torrentfreak.com/images/horrible1.png" alt="horrible1"></center></p>
<p>As the image above shows it now appears that HorribleSubs has recovered (and <a href="http://horriblesubs.info/2014/09/were-back/">added torrent magnet links</a>) but the same cannot be said about NYAA. The site&#8217;s extended downtime continues with no apparent end in sight. This has resulted in a backlash from the site&#8217;s fans and somewhat inevitably accusatory fingers are being pointed at potential DDoS suspects.</p>
<p>As far-fetched as it might sound, one of the early suspects was the Japanese government itself. The launch of a brand new <a href="http://torrentfreak.com/japan-to-crack-down-on-anime-and-manga-piracy-140728/">anti-piracy campaign</a> last month in partnership with 15 producers certainly provided a motive, but a nation carrying out this kind of assault seems unlikely in the extreme.</p>
<p>Quickly, however, an announcement from HorribleSubs turned attentions elsewhere.</p>
<p><Center><img src="http://torrentfreak.com/images/horriblesubs.jpg" alt="horriblesubs"></center></p>
<p>&#8220;Chill down. It&#8217;s not just us. Every famous anime sites [are] getting DDoS attacks, but that doesn&#8217;t mean this is the end,&#8221; the site&#8217;s operator <a href="https://www.facebook.com/Horriblesubs/posts/922201454476688">wrote</a> on Facebook.</p>
<p>&#8220;We have located where DDoS are coming from. It&#8217;s from ‪#‎Crunchyroll‬ and ‪#‎Funimation‬ Employees.&#8221;</p>
<p><em>Update: HorribleSubs inform TF that the Facebook page listed is &#8220;in no way managed nor affiliated with HorribleSubs and as such all opinions and views expressed on that page does not reflect the views and opinions of the HorribleSubs management.&#8221;</em></p>
<p>Funimation is an US television and film production company best known for its distribution of anime while Crunchyroll is a website and community focused on, among other things, Asian anime and manga. While both could at least have a motive to carry out a DDoS, no evidence has been produced to back up the HorribleSubs claims. That said, HorribleSubs admits that its key motivation is to annoy Crunchyroll.</p>
<p>&#8220;We do not translate our own shows because we rip from Crunchyroll, FUNimation, Hulu, The Anime Network, Niconico, and Daisuki,&#8221; the site&#8217;s <a href="http://horriblesubs.info/about-us/">about</a> page reads, adding: &#8220;We aren’t doing this <strike>for e-penis</strike> but for the sole reason of pissing off Crunchyroll.&#8221;</p>
<p>Shortly after, attention turned to anti-piracy outfit Remove Your Media (RYM). The company works with anime companies Funimation and Viz Media, which includes the sending of <a href="http://www.google.com/transparencyreport/removals/copyright/reporters/1504/Remove-Your-Media-LLC/">millions of DMCA notices</a> to Google. The spark came when the company published a tweet (now removed) which threatened to send &#8220;thousands&#8221; of warning letters to NYAA users once the site was back online.</p>
<p><center><img src="http://torrentfreak.com/images/RYM.png" alt="RYM"></center></p>
<p>This doesn&#8217;t seem like an idle threat. A few weeks ago the company posted a screenshot on Twitter containing an <a href="https://twitter.com/removepiracy/status/500755137187835905">unredacted list</a> of Comcast, Charter and CenturyLink IP addresses said to have been monitored infringing copyright. Due to the NYAA downtime, RYM later <a href="https://twitter.com/removepiracy/status/506965697574871040/photo/1">indicated</a> it had switched to warning users of Kickass.to.</p>
<p>This involvement with anime companies combined with the warning notice statement led to DDoS accusations being directed at RYM. TorrentFreak spoke to the company&#8217;s Eric Green and asked if they knew anything about the attacks.</p>
<p>&#8220;The short answer is No. In fact we were waiting for [NYAA] to go back<br>
online to begin monitoring illegal transfers again. Sorry to disappoint but we<br>
had no involvement,&#8221; Green told TF.</p>
<p>Just a couple of hours ago RYM made a new announcement on Twitter, stating that the original tweet had been removed due to false accusations.</p>
<p>&#8220;Nyaa post deleted due to all the Ddos libel directed at this account. Infringement notices continue to ISPs, for piracy, regardless of tracker,&#8221; they <a href="https://twitter.com/removepiracy/status/507397021888946176">conclude</a>.</p>
<p>Although it&#8217;s impossible to say who is behind the attacks, it does seem improbable that an anti-piracy company getting paid to send notices would do something that is a) seriously illegal and b) counter-productive to getting paid for sending notices.</p>
<p>That said, it seems likely that someone who doesn&#8217;t appreciate unofficial anime sites operating smoothly is behind the attack. Who that might be will remain a mystery, at least for now.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/anti-piracy-outfit-denies-ddosing-anime-sites-140904/feed/</wfw:commentRss>
		<slash:comments>86</slash:comments>
		</item>
		<item>
		<title>In The Fappening&#8217;s Wake, 4chan Intros DMCA Policy</title>
		<link>http://torrentfreak.com/in-the-fappenings-wake-4chan-intros-dmca-policy-140903/</link>
		<comments>http://torrentfreak.com/in-the-fappenings-wake-4chan-intros-dmca-policy-140903/#comments</comments>
		<pubDate>Wed, 03 Sep 2014 10:21:54 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[4chan]]></category>
		<category><![CDATA[The Fappening]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93435</guid>
		<description><![CDATA[After doing without an element needed for safe harbor protection, 4chan has just introduced an official DMCA policy. The decision comes in the wake of the celebrity photo leak known as The Fappening and 4chan users' connections to it. In the meantime, the leaked image library has clocked a million torrent downloads.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/4chan.png"><img src="http://torrentfreak.com/images/4chan.png" alt="4chan" width="180" height="72" class="alignright size-full wp-image-93452"></a>Every now and again a phenomenon takes the Internet by storm. They&#8217;re situations that the term &#8216;going viral&#8217; was made for. A couple of weeks ago it was ice buckets, and since the weekend its been leaked celebrity pictures.</p>
<p>The event, which needs little introduction, saw the iCloud accounts of many prominent female celebrities accessed illegally and their personal (in many cases intimately so) photographs leaked online. The FBI are investigating and for the leakers this probably isn&#8217;t going to end well.</p>
<p>But for the users of 4chan this leak, which was rumored to have begun on the board itself, was the gift that just kept on giving. Excited users quickly came up with a portmanteau based on &#8216;happening&#8217; plus &#8216;fapping&#8217; and The Fappening was born, a prelude to taking the Internet by storm.</p>
<p>While the event itself appears to be dying down, the leak and the worldwide attention it bestowed on 4chan may have prompted a surprise decision by the site&#8217;s operator. Whether the leak was directly responsible will become clear in due course (we&#8217;ve reached out to the site for a response), but sometime yesterday 4chan introduced a DMCA policy.</p>
<p><center><img src="http://torrentfreak.com/images/4chan-dmca.jpg" alt="4chan-DMCA"></center></p>
<p>The policy registers a DMCA agent for 4chan, which helps to afford the site safe harbor protection under the Digital Millennium Copyright Act. Although not yet listed in the <a href="http://www.copyright.gov/onlinesp/list/num-syms.html">numerical section</a> of Copyright.gov, the designated agent will now become the point of contact for copyright complaints and DMCA notices when content owners believe that their ownership rights have been violated on 4chan.</p>
<p>While most US-based user-generated content websites should not entertain operating without safe harbor, the way 4chan is set up provides a unique scenario in respect of infringing content being posted by its users.</p>
<p>&#8220;Threads expire and are pruned by 4chan&#8217;s software at a relatively high rate. Since most boards are limited to eleven or sixteen pages, content is usually available for only a few hours or days before it is removed,&#8221; the site&#8217;s <a href="http://www.4chan.org/faq#prunedelete">FAQ</a> explains.</p>
<p>4chan&#8217;s Chris Poole (&#8216;moot&#8217;) previously told the Washington Post his deletion policy was both a necessarily evil and a plus to the site.</p>
<p>“It’s one of the few sites that has no memory. It’s forgotten the next day,” he said.</p>
<p>Despite the board&#8217;s userbase being notoriously rebellious, the deletion policy appears to work well. To date Google&#8217;s Transparency Report <a href="http://www.google.com/transparencyreport/removals/copyright/domains/4chan.org/">lists</a> takedowns for just 706 URLs.</p>
<p>“I don’t have resources like YouTube to deal with $1 billion lawsuit with Viacom,&#8221; Poole said in 2012. &#8220;Don’t store what you absolutely don’t need. People are pre-disposed to wanting to store everything.”</p>
<p>Of course, it&#8217;s not only companies such as Viacom on the warpath. Yesterday a spokesman for Jennifer Lawrence said that the authorities had been contacted and anyone found posting &#8216;stolen&#8217; photos of the actress online would be prosecuted.</p>
<p>While the scope of that action isn&#8217;t entirely clear, many of the leaked photos were &#8216;selfies&#8217; to which Lawrence has first shout on copyright. They&#8217;re still being posted on hundreds if not thousands of Internet sites even today, so having a DMCA policy in place will help those sites avoid liability, even if in 4chan&#8217;s case the images are only present for a few hours.</p>
<p>In the meantime, sites such as The Pirate Bay who care substantially less about copyright law than 4chan does today are continuing to spread the full currently-available &#8216;Fappening&#8217; archives at a rapid rate. Statistics collected by TorrentFreak suggest that the packs have been downloaded well over a million times.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/in-the-fappenings-wake-4chan-intros-dmca-policy-140903/feed/</wfw:commentRss>
		<slash:comments>212</slash:comments>
		</item>
	</channel>
</rss>
