<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; Search Results  &#187;  hosted by</title>
	<atom:link href="http://torrentfreak.com/search/hosted+by/feed/rss2/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 19:18:38 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Kelly Brook Wants Fappening Nudes Removed From Google</title>
		<link>http://torrentfreak.com/kelly-brook-wants-fappening-nudes-removed-from-google-141026/</link>
		<comments>http://torrentfreak.com/kelly-brook-wants-fappening-nudes-removed-from-google-141026/#comments</comments>
		<pubDate>Sun, 26 Oct 2014 08:47:28 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[kelly brook]]></category>
		<category><![CDATA[The Fappening]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95714</guid>
		<description><![CDATA[Like many other "hacked" celebrities, UK  actress, model  and television presenter Kelly Brook is not happy that her leaked nudes are being distributed freely on the Internet. To deal with the fallout she asked Google to remove her photos, claiming that the compromising selfies infringe on her copyrights. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/brook.jpg"><img src="http://torrentfreak.com/images/brook.jpg" alt="brook" width="200" height="265" class="alignright size-full wp-image-95744"></a>Since late August hundreds of photos of naked celebrities have leaked online in what&#8217;s now known as &#8220;The Fappening.&#8221; </p>
<p>The leaks resulted in a massive takedown operation targeted at sites that host and link to the controversial images.</p>
<p>As a hosting provider and search engine Google inadvertently plays a role in distributing the compromising shots, much to the displeasure of the women involved.</p>
<p>Several celebrities threatened legal action against Google for its &#8220;unlawful activity,&#8221; demanding tgat the company should zap all their images. Others, including <a href="http://torrentfreak.com/jennifer-lawrence-gets-google-to-censor-leaked-pictures-sort-of-141019/">Jennifer Lawrence</a> and <a href="https://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/">Kate Upton</a>, used DMCA requests to remove the images from the public eye. </p>
<p>The famous UK actress, model and TV presenter <a href="http://en.wikipedia.org/wiki/Kelly_Brook">Kelly Brook</a> now joins this group as one of the latest Fappening victims. </p>
<p>Brook&#8217;s pictures leaked onto the Internet early October and last week she asked Google to remove three links to her pictures from search results, claiming that she holds the copyrights to the selfies. </p>
<p>The images are allegedly hosted on thefappening.so, and according to Google&#8217;s transparency report the request <a href="http://www.google.com/transparencyreport/removals/copyright/requests/1568971/">is still &#8220;pending&#8221;</a>. However, during this week something unusual happened.  </p>
<p><center><a href="http://torrentfreak.com/images/brook.png"><img src="http://torrentfreak.com/images/brook.png" alt="brook" width="609" height="361" class="alignnone size-full wp-image-95772"></a></center></p>
<p>For reasons unknown, Google has decided to <a href="https://www.google.com/?gws_rd=ncr#q=site:thefappening.so">remove all URLs of thefappening.so</a> from its search results. Whether the pages were removed because of the leaked pictures, or for another reason, is unknown. </p>
<p>Kelly Brook is not the only celebrity to ask Google to remove thefappening.so links, Argentinian singer <a href="https://twitter.com/Mel_Lezcano">Melina Lezcano</a> did the same last week.</p>
<p>TorrentFreak asked Google whether the removal of the entire domain name is due to its content or if there&#8217;s another reason, but we have yet to receive a response. </p>
<p>Whatever the reason, Brook and Lezcano&#8217;s takedown requests are moot. Whether they will be relieved is doubtful though, as most of the Fappening photos are still being shared through thousands of other sites.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/kelly-brook-wants-fappening-nudes-removed-from-google-141026/feed/</wfw:commentRss>
		<slash:comments>110</slash:comments>
		</item>
		<item>
		<title>Pirate Bay Sends 100,000 New Users to &#8220;Free&#8221; VPN</title>
		<link>http://torrentfreak.com/pirate-bay-sends-100000-users-free-vpn-141024/</link>
		<comments>http://torrentfreak.com/pirate-bay-sends-100000-users-free-vpn-141024/#comments</comments>
		<pubDate>Fri, 24 Oct 2014 19:00:03 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[frootvpn]]></category>
		<category><![CDATA[tpb]]></category>
		<category><![CDATA[vpn]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95751</guid>
		<description><![CDATA[This week The Pirate Bay replaced its frontpage logo to promote a new VPN service, driving 100,000 new customers to the startup.  FrootVPN currently offers its services for free, but admits that this may not last forever.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/froot-vpn.jpg"><img src="http://torrentfreak.com/images/froot-vpn.jpg" alt="froot-vpn" width="300" height="270" class="alignright size-full wp-image-95752"></a>With an increasing number of BitTorrent users seeking solutions to hide their identities from the outside world, <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">VPN services</a> have seen a spike in customers in recent years. </p>
<p>Pirate Bay users also have a great interest in anonymity. A survey among the site&#8217;s users previously revealed that nearly 70% already had a VPN or proxy <a href="https://torrentfreak.com/the-pirate-bay-users-long-for-anonymity-111021/">or were interested</a> in signing up with one. </p>
<p>For this last group <a href="http://thepiratebay.se/">The Pirate Bay</a> has an interesting promotion running. For the past few days the site has replaced its iconic logo with an ad for <a href="https://www.frootvpn.com/">FrootVPN</a>, a new startup that offers free VPN accounts.</p>
<p>The promo has has been seen by millions of people, many of whom very interested in the costless offer. </p>
<p>Since VPNs are certainly not free to run, many people are wondering if there&#8217;s a catch behind this rather generous offer. Previously TPB advertised an <a href="http://torrentfreak.com/the-pirate-bay-did-not-launch-a-free-vpn-120827/">adware ridden</a> client so this suspicion is understandable.</p>
<p>TorrentFreak contact the Pirate Bay team for more information, and they informed us that the FrootVPN promotion is not a paid ad. It&#8217;s merely a friendly plug for a startup run by some guys they know.</p>
<p>While that&#8217;s assuring, it doesn&#8217;t explain how they can offer their service for free. We contacted the FrootVPN operators to find out more, and they told us that they started the free VPN to counter the commercialization of the VPN business.</p>
<p>&#8220;The whole idea behind FrootVPN was to provide a free simple VPN service without any bandwidth limitations. Of course the maintenance isn&#8217;t free but we had some resources over from our other projects from which we were able to launch FrootVPN.&#8221;</p>
<p>&#8220;We are a bunch of guys who support freedom of speech and don&#8217;t like the idea that VPN providers charge so much money for just a simple proxy, especially since the bandwidth costs nowadays is so cheap,&#8221; FrootVPN tells us. </p>
<p>While a free VPN sounded like a good idea, the VPN service has become a victim of its own success. They gained 100,000 users in less than a week and admit that it&#8217;s not sustainable to keep the service free forever.</p>
<p>&#8220;The word has spread rapidly and we thank all our promoters including TPB for supporting us. We got 100,000 users within a week, which we never expected. However, this does indicate that we will be forced to charge something for the service in order to maintain it,&#8221; FrootVPN says.</p>
<p>FrootVPN&#8217;s VPN servers are currently hosted at Portlane, who have been very helpful in accommodating the growth. During the weeks to come they hope to increase their capacity and FrootVPN has already bought several new servers to keep the quality of the service on par. </p>
<p>&#8220;We have 20x servers running currently with 2x10Gbps total capacity. We have now additionally bought 40x more servers and 4x10Gbps bandwidth from Portlane which will be ready within a week or two. We hope that after this upgrade the quality of our service will be much better,&#8221; they say.</p>
<p>While they may have to charge a few dollars in the future, one of the main motivations of the FrootVPN team remains in line with The Pirate Bay&#8217;s original philosophy. That is, to provide tools that help to bypass censorship and promote freedom of speech. </p>
<p>&#8220;FrootVPN supports freedom of speech and want the Internetz to be an uncensored place,&#8221; they say.</p>
<p>Although free VPNs are often not the fastest, especially not when they are growing with tens of thousands of users per day, FrootVPN says it will try to keep up. In any case, &#8220;free&#8221; is an offer that&#8217;s hard to refuse for those who are on a tight budget. </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/pirate-bay-sends-100000-users-free-vpn-141024/feed/</wfw:commentRss>
		<slash:comments>54</slash:comments>
		</item>
		<item>
		<title>Record Labels Obtain Order to Block 21 Torrent Sites</title>
		<link>http://torrentfreak.com/record-labels-obtain-orders-to-block-21-torrent-sites-141023/</link>
		<comments>http://torrentfreak.com/record-labels-obtain-orders-to-block-21-torrent-sites-141023/#comments</comments>
		<pubDate>Thu, 23 Oct 2014 13:34:10 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[block]]></category>
		<category><![CDATA[bpi]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95701</guid>
		<description><![CDATA[Several record labels in the UK have today obtained a High Court order to have local ISPs block yet more torrent sites. Sky, TalkTalk, Virgin, BT and EE are now instructed to block a total of 21 sites including LimeTorrents, Seedpeer and Torlock. Justice Arnold rejected the sites' attempts at copyright compliance by describing their efforts as "lipservice."<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/stop-blocked.jpg"><img src="http://torrentfreak.com/images/stop-blocked.jpg" alt="stop-blocked" width="200" height="168" class="alignright size-full wp-image-72076"></a>Having ISPs block file-sharing sites is a key anti-piracy strategy employed by major rightsholders in the UK. Both Hollywood-affiliated groups and the recording labels have obtained High Court orders alongside claims that the process is an effective way to hinder piracy.</p>
<p>Last week these rightsholders were joined by luxury brand owner Richemont, which successfully <a href="http://torrentfreak.com/high-court-orders-isps-to-block-counterfeiting-websites-141017/">obtained orders</a> to block sites selling counterfeit products. The outcome of that particular case had delayed decisions in other blocking applications, including one put forward by the record labels. Today the High Court ended its hiatus by processing a new injunction.</p>
<p>The application was made by record labels 1967, Dramatico Entertainment, Infectious Music, Liberation Music, Simco Limited, Sony Music and Universal Music. The labels represented themselves plus the BPI (British Recorded Music Industry) and PPL (Phonographic Performance Ltd) which together account for around 99% of all music legally available in the UK today.</p>
<p>Through their legal action the labels hoped to disrupt the activities of sites and services they believe to be enabling and facilitating the unlawful distribution of their copyright works. In this case the key targets were the 21 torrent sites listed below:</p>
<blockquote><p>(1) bittorrent.am, (2) btdigg.org, (3) btloft.com, (4) bts.to, (5) limetorrents.com, (6) nowtorrents.com, (7) picktorrent.com, (8) seedpeer.me, (9) torlock.com, (10) torrentbit.net, (11) torrentdb.li, (12) torrentdownload.ws, (13) torrentexpress.net, (14) torrentfunk.com, (15) torrentproject.com, (16) torrentroom.com, (17) torrents.net, (18) torrentus.eu, (19) torrentz.cd, (20) torrentzap.com and (21) vitorrent.org.</p></blockquote>
<p>As usual the UK&#8217;s leading Internet service providers &#8211; Sky, Virgin, TalkTalk, BT and EE &#8211; were named as defendants in the case. The ISPs neither consented to nor opposed the application but participated in order to negotiate the wording of any order granted.</p>
<p>In his ruling Justice Arnold noted that the sites listed in the application function in a broadly similar way to The Pirate Bay and KickassTorrents, sites that are already subjected to blocking orders. Perhaps surprisingly, efforts by some of the sites to cooperate with rightsholders meant little to the Court.</p>
<p>&#8220;All of [the sites] go to considerable lengths to facilitate and promote the downloading of torrent files, and hence infringing content, by their users,&#8221; Justice Arnold wrote.</p>
<p>&#8220;Although a few of the Target Websites pay lipservice to copyright protection, in reality they all flout it. Although a few of the Target Websites claim not to, they all have control over which torrent files they index.&#8221; </p>
<p>Also of interest is that Court didn&#8217;t differentiate between sites that allow users to upload torrents, those that store them, or those that simply harvest links to torrents hosted elsewhere.</p>
<p>&#8220;Thirteen of the Target Websites (bittorrent.am, btdigg.org, btloft.com, nowtorrents.com, picktorrent.com, torrentdb.li, torrentdownload.ws, torrentexpress.net, torrentproject.com, torrentroom.com, torrentus.eu, torrentz.cd and vitorrent.org) do not permit uploads of torrent files by users, but gather all their links to torrent files using &#8216;crawling&#8217; technology. No torrent files are stored on these websites&#8217; own servers,&#8221; Justice Arnold explained. </p>
<p>&#8220;Nevertheless, the way in which the torrent files (or rather the links thereto) are presented, and the underlying technology, is essentially the same as in the cases of the other Target Websites.&#8221;</p>
<p>The Judge also touched on the efficacy of website blockades, citing comScore data which suggests that, on average, the number of UK visitors to already blocked BitTorrent sites has declined by 87%.</p>
<p>&#8220;No doubt some of these users are using circumvention measures which are not reflected in the comScore data, but for the reasons given elsewhere it seems clear that not all users do this,&#8221; Justice Arnold wrote. </p>
<p><a href="/images/bpi.png"><img src="http://torrentfreak.com/images/bpi.png" alt="bpi" width="222" height="106" class="alignright size-full wp-image-94190"></a>Speaking with TF the BPI said that the 21 sites had been selected for blocking on the basis that they are amongst the most infringing sites available in the UK today. BPI Chief Executive Geoff Taylor said that having them rendered inaccessible would help both the music industry and consumers.</p>
<p>“Illegal sites dupe consumers and deny artists a fair reward for their work. The online black market stifles investment in new British music, holds back the growth of innovative legal services like Spotify and destroys jobs across Britain’s vital creative sector,&#8221; Taylor said.</p>
<p>&#8220;Sites such as these also commonly distribute viruses, malware and other unsafe or inappropriate content. These blocks will not only make the internet a safer place for music fans, they will help make sure there is more great British music in years to come.&#8221;</p>
<p>Finally, and mirroring a decision made in the Richemont case, Justice Arnold said that Internet subscribers affected by the block will be given the ability to apply to the High Court to discharge or vary the orders. Furthermore, when blocked site information pages are viewed by ISP subscribers in future, additional information will have to be displayed including details of the parties who obtained the block.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/record-labels-obtain-orders-to-block-21-torrent-sites-141023/feed/</wfw:commentRss>
		<slash:comments>48</slash:comments>
		</item>
		<item>
		<title>Jennifer Lawrence Gets Google to Censor Leaked Pictures, Sort Of</title>
		<link>http://torrentfreak.com/jennifer-lawrence-gets-google-to-censor-leaked-pictures-sort-of-141019/</link>
		<comments>http://torrentfreak.com/jennifer-lawrence-gets-google-to-censor-leaked-pictures-sort-of-141019/#comments</comments>
		<pubDate>Sat, 18 Oct 2014 19:50:48 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[jeniffer lawrence]]></category>
		<category><![CDATA[The Fappening]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95416</guid>
		<description><![CDATA[Like many other "hacked" celebrities, Jennifer Lawrence is not happy that her leaked nudes are being distributed freely on the Internet.  To deal with the fallout she sent her lawyers after sites helping to distribute the photos. This includes Google, who took action this week after a careful inspection of the infringing material.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/pixelated.png"><img class="alignright size-full wp-image-94734" src="http://torrentfreak.com/images/pixelated.png" alt="pixelated" width="250" height="228"></a>Over the past several weeks hundreds of photos of naked celebrities leaked online. This “<a href="http://en.wikipedia.org/wiki/2014_celebrity_photo_leaks">fappening</a>” triggered a massive takedown operation targeting sites that host and link to the controversial images.</p>
<p>As a hosting provider and search engine Google inadvertently plays a role in distributing the compromising shots, much to the displeasure of the women involved.</p>
<p>More than a dozen of them <a href="http://pagesix.com/2014/10/01/lawyers-for-hacked-celebs-sue-google-for-failing-to-removing-nude-pics/">sent</a> Hollywood lawyer Marty Singer after the company. Earlier this month Singer penned an <a href="https://www.scribd.com/doc/241694649/Hacked-celebrities-threaten-to-sue">angry letter</a> to Google threatening legal action if it doesn&#8217;t remove the images from YouTube, Blogspot and its search results.</p>
<p>&#8220;It is truly reprehensible that Google allows its various sites, systems and search results to be used for this type of unlawful activity. If your wives, daughters or relatives were victims of such blatant violations of basic human rights, surely you would take appropriate action,” the letter reads.</p>
<p>While no legal action has yet been taken, some celebrities have also sent individual DMCA takedown requests to Google. On September 24 Jennifer Lawrence&#8217;s lawyers asked the search engine to <a href="https://www.chillingeffects.org/notices/2048561">remove two links</a> to thefappening.eu as these infringe on the star&#8217;s copyrights.</p>
<p><center><strong>The DMCA takedown request</strong><br></br></center><center><a href="http://torrentfreak.com/images/jlawdmca.png"><img class="alignnone size-full wp-image-95431" src="http://torrentfreak.com/images/jlawdmca.png" alt="jlawdmca" width="558" height="274"></a></center>Earlier this week the request was still pending, so TorrentFreak asked Google what was causing the delay. The company said it could not comment on individual cases but a day later the links in question were removed.</p>
<p>This means that both the thefappening.eu main domain and the tag archive of Jennifer Lawrence posts no longer appear in Google&#8217;s search results.</p>
<p>Whether this move has helped Lawrence much is doubtful though. The site in question had already redirected its site to a new domain at thefappening.so. These links remain indexed since they were not mentioned in the takedown request.</p>
<p>The good news is that many of Lawrence&#8217;s pictures are no longer hosted on the site itself. In fact, the URLs listed in the takedown request to Google no longer show any of the infringing photos in question, so technically Google had no obligation to remove the URLs.</p>
<p>A prominent disclaimer on the site points out that the operator will gladly take down the compromising photos if he&#8217;s asked to do so. Needless to say, this is much more effective than going after Google.</p>
<p><center><strong>The disclaimer</strong><br></br></center><center><a href="http://torrentfreak.com/images/attention.png"><img class="alignnone size-full wp-image-95437" src="http://torrentfreak.com/images/attention.png" alt="attention" width="545" height="120"></a></center></p>
<p style="text-align: right;"><a href="http://en.wikipedia.org/wiki/Jennifer_Lawrence#mediaviewer/File:Jennifer_Lawrence_2,_2013.jpg">Photo via </a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/jennifer-lawrence-gets-google-to-censor-leaked-pictures-sort-of-141019/feed/</wfw:commentRss>
		<slash:comments>96</slash:comments>
		</item>
		<item>
		<title>United States Hosts Most Pirate Sites, UK Crime Report Finds</title>
		<link>http://torrentfreak.com/united-states-hosts-most-pirate-sites-uk-crime-report-finds-141017/</link>
		<comments>http://torrentfreak.com/united-states-hosts-most-pirate-sites-uk-crime-report-finds-141017/#comments</comments>
		<pubDate>Fri, 17 Oct 2014 17:19:35 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[pirate sites]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[US]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95213</guid>
		<description><![CDATA[The latest UK IP Crime Report reveals that significant progress is being made in the fight against online piracy but still many challenges remain. One of the main problems traces back to U.S. hosting companies, who according to the report give shelter to most of the investigated pirate sites.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/sam-pirate.jpg"><img src="http://torrentfreak.com/images/sam-pirate.jpg" alt="sam-pirate" width="230" height="130" class="alignright size-full wp-image-50542"></a>The UK IP Crime Group, a coalition of law enforcement agencies, government departments and industry representatives, has released its latest <a href="https://www.gov.uk/government/publications/annual-ip-crime-report-2013-to-2014">IP Crime Report</a>.</p>
<p>The report is produced by the UK Government&#8217;s Intellectual Property Office and provides an overview of recent achievements and current challenges in the fight against piracy and counterfeiting. Increasingly, these threats are coming from the Internet.</p>
<p>&#8220;One of the key features in this year’s report is the continuing trend that the Internet is a major facilitator of IP crime,&#8221; the Crime Group writes.</p>
<p>The report notes that as in previous years, Hollywood-funded industry group FACT remains one of the key drivers of anti-piracy efforts in the UK. Over the past year they&#8217;ve targeted alleged pirate sites though various channels, including their hosting providers. </p>
<p>Not all hosts are receptive to FACT&#8217;s complaints though, and convincing companies that operate abroad is often a challenge. This includes the United States where the majority of the investigated sites are hosted. </p>
<p>&#8220;Only 14% of websites investigated by FACT are hosted in the UK. While it is possible to contact the hosts of these websites, there still remains a considerable number of copyright infringing websites that are hosted offshore and not within the jurisdiction of the UK.&#8221; </p>
<p>&#8220;Analysis has shown that the three key countries in which content is hosted are the UK, the USA and Canada. However, Investigating servers located offshore can cause specific problems for FACT’s law enforcement partners,&#8221; the report notes. </p>
<p><center><a href="http://torrentfreak.com/images/ushostpirate.png"><img src="http://torrentfreak.com/images/ushostpirate.png" alt="ushostpirate" width="527" height="540" class="alignnone size-full wp-image-95301"></a></center></p>
<p>The figure above comes as a bit of a surprise, as one would expect that United States authorities and industry groups would have been keeping their own houses in order. </p>
<p>Just a few months ago the US-based IIPA, which includes MPAA and RIAA as members, called out Canada because local hosting providers are &#8220;<a href="http://torrentfreak.com/canada-pirate-site-magnet-140210/">a magnet</a>&#8221; for pirate sites. However, it now appears they have still plenty of work to do inside U.S. borders.</p>
<p>But even when hosting companies are responsive to complaints from rightsholders the problem doesn&#8217;t always go away. The report mentions that most sites simply move on to another host, and continue business as usual there. </p>
<p>&#8220;In 2013, FACT closed a website after approaching the hosting provider on 63 occasions. Although this can be a very effective strategy, in most instances the website is swiftly transferred onto servers owned by another ISP, often located outside the UK.&#8221;</p>
<p>While downtime may indeed be relatively brief the report claims that it may still hurt the site, as visitors may move on to other legitimate or illegitimate sources.  </p>
<p>&#8220;The [moving] process usually involves a disruptive period of time whereby the website is offline, during which users will often find an alternative service, thus negatively affecting the website’s popularity.&#8221; </p>
<p>While hosting companies remain a main target, tackling the online piracy problem requires a multi-layered approach according to the UK Crime Group. </p>
<p>With the help of local law enforcement groups such as City of London&#8217;s PIPCU, copyright holders have rolled out a variety of anti-piracy measures in recent months. This includes domain name suspensions, cutting off payment processors and ad revenue, website blocking by ISPs and criminal prosecutions.</p>
<p>These and other efforts are expected to continue during the years to come. Whether that will be enough to put a real dent in piracy rates has yet to be seen.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/united-states-hosts-most-pirate-sites-uk-crime-report-finds-141017/feed/</wfw:commentRss>
		<slash:comments>39</slash:comments>
		</item>
		<item>
		<title>Pre-Release Music Pirate Pleads Guilty in Landmark Case</title>
		<link>http://torrentfreak.com/pre-release-music-pirate-plead-guilty-in-landmark-case-141016/</link>
		<comments>http://torrentfreak.com/pre-release-music-pirate-plead-guilty-in-landmark-case-141016/#comments</comments>
		<pubDate>Thu, 16 Oct 2014 12:14:42 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[bpi]]></category>
		<category><![CDATA[Dancing Jesus]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95352</guid>
		<description><![CDATA[A second defendant has pleaded guilty following a private copyright infringement prosecution initiated by music group BPI. In the most notable case of its type ever brought in the UK, the man will be sentenced next month for distributing more than 8,000 pre-release tracks.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/d-jesus.jpg" width="150" height="150" class="alignright">Earlier this month it was <a href="http://torrentfreak.com/bpi-set-to-privately-prosecute-pre-release-music-pirates-141005/">revealed</a> that following the lead of the Federation Against Copyright Theft, the BPI would begin their own private prosecution against alleged content pirates.</p>
<p>Their case involves former members of now-defunct file-sharing links forum Dancing Jesus. The site was taken down in 2011 following an investigation carried out by the BPI and IFPI, with assistance from the US Department of Homeland Security.</p>
<p>Two people were arrested by City of London Police, the owner of the site and the forum&#8217;s top uploader. Homeland Security assisted UK police by seizing a Dancing Jesus server hosted in the United States.</p>
<p>The trial, which began on October 6, took place at Newcastle Crown Court. One defendant, site owner and admin Kane Robinson of South Shields, had already pleaded guilty to illegally distributing music back in January 2014.</p>
<p>Richard Graham, the site&#8217;s alleged top uploader, went into the trial with a &#8220;not guilty&#8221; plea, but after evidence was presented in court earlier this week the Leicestershire man changed his plea to guilty. </p>
<p>“The guilty verdict confirms that posting illegal online links to music is a criminal offense which economically harms musicians and the labels that support them,&#8221; said David Wood, Director of BPI’s Copyright Protection Unit.</p>
<p>&#8220;Pre-release piracy, in particular, robs musicians of artistic control, leaving them with no say in when and how their music &#8211; which has taken blood, sweat and tears to produce &#8211; is released.</p>
<p>The case is significant in a number of ways, not least the scale of online infringement connected to the pair&#8217;s guilty plea. Add in the fact that Dancing Jesus was particularly well-known as a venue to obtain pre-release content and this becomes the most important UK music industry case since the <a href="https://torrentfreak.com/oink-admin-found-not-guilty-walks-free-100115/">failed 2010 prosecution</a> of the infamous OiNK BitTorrent tracker.</p>
<p>Graham and Robinson will be sentenced under the Copyright, Designs and Patents Act 1988. Their fate will be determined by Judge Sherwin early next month.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/pre-release-music-pirate-plead-guilty-in-landmark-case-141016/feed/</wfw:commentRss>
		<slash:comments>25</slash:comments>
		</item>
		<item>
		<title>Why Record Labels Want Kim Dotcom&#8217;s Album Taken Down</title>
		<link>http://torrentfreak.com/record-labels-take-kim-dotcoms-album-140923/</link>
		<comments>http://torrentfreak.com/record-labels-take-kim-dotcoms-album-140923/#comments</comments>
		<pubDate>Tue, 23 Sep 2014 10:44:52 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[kim dotcom]]></category>
		<category><![CDATA[Mega]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94263</guid>
		<description><![CDATA[In recent weeks various music industry groups have sent takedown requests targeting  Kim Dotcom's album Good Times. IFPI and others claim that Dotcom's music infringes the rights of their artists, but it appears that they fell victim to a DMCA prankster. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/goodtimes.jpg"><img src="http://torrentfreak.com/images/goodtimes.jpg" alt="goodtimes" width="180" height="179" class="alignright size-full wp-image-82494"></a>Earlier this year Kim Dotcom released his first music album &#8220;Good Times,&#8221; giving it away for free to anyone interested. </p>
<p>An official copy of the album was posted on the cloud hosting service <a href="http://mega.co.nz">Mega</a>, which is linked from <a href="http://kim.com/">Dotcom&#8217;s homepage</a>. This has never caused any issues, until a few weeks ago, when various copyright holders started sending unusual takedown requests to have the content removed. </p>
<p>IFPI, representing the major music labels, submitted several DMCA notices to Mega claiming that the file infringed the rights of various artists. This resulted in a game of whack-a-mole in which the album was removed and reinstated a few times. Currently it&#8217;s <a href="https://mega.co.nz/#!fNFSiJxa!ePxcgzjVYy6fxt0ep15iUyhnOgedIOcXQUs7U5myurE">unavailable yet again</a>.</p>
<p><center><a href="/images/megadown2.jpg"><img src="http://torrentfreak.com/images/megadown2.jpg" alt="megadown" width="588" height="205" class="alignnone size-full wp-image-93439"></a></center></p>
<p>When we <a href="http://torrentfreak.com/record-labels-take-down-kim-dotcoms-official-album-from-mega-140903/">previously covered</a> the issue, Mega stressed that the takedown requests were clearly mistaken. The company accused IFPI of not doing their homework and doubted the accuracy of their notices in general. </p>
<p>However, since the takedown notices kept targeting the same link, there was a good chance that these mistakes were orchestrated in some way. Assuming that someone was making IFPI and others believe that the link pointed to albums of other artists, we decided to do some research. </p>
<p>Eventually we stumbled upon a series of <a href="http://pastebin.com/search?cx=013305635491195529773%3A0ufpuq-fpt0&#038;cof=FORID%3A10&#038;ie=UTF-8&#038;q=https%3A%2F%2Fmega.co.nz%2F%23%21fNFSiJxa%21ePxcgzjVYy6fxt0ep15iUyhnOgedIOcXQUs7U5myurE&#038;sa.x=0&#038;sa.y=0&#038;sa=Search">Pastebin pages</a> where the URL of Dotcom&#8217;s album is linked to titles of other artists. Several of the artists mentioned in the pastes are the same as the one&#8217;s IFPI listed in their DMCA notices, so this would explain the mistakes.</p>
<p><center><a href="http://torrentfreak.com/images/kimdown.png"><img src="http://torrentfreak.com/images/kimdown.png" alt="kimdown" width="493" height="187" class="alignnone size-full wp-image-94302"></a></center></p>
<p>The above is concerning for several reasons. First of all, it shows that IFPI and others don&#8217;t verify the legitimacy of their takedown notices. This means that pranksters can easily get them to censor legitimate content. </p>
<p>Secondly, Mega usually can&#8217;t check the validity of a claim, or it simply doesn&#8217;t know whether or not a user has permission to publish it. So they have very little options to stop the abuse.</p>
<p>&#8220;Mega aims to process all takedowns promptly, within a few hours. It is impossible to verify the claims as the files are encrypted so we don’t know the contents (unless the full link is provided with the key included), and we can’t verify if the person has a valid ownership/license or not,&#8221; a Mega spokesperson told us.</p>
<p>Despite these restrictions, the cloud hosting provider says it&#8217;s setting up a system where repeated takedowns can be flagged to prevent this type of abuse in the future.</p>
<p>&#8220;We are improving our systems to monitor the takedown process and will eventually be able to identify repeated incorrect notices,&#8221; Mega says.</p>
<p>Until then, Dotcom&#8217;s album will most likely disappear from Mega a few more times. Luckily for the fans, there&#8217;s also a <a href="http://baboom.com/kimdotcom/downloads">copy hosted</a> on the soon-to-be-released music service Baboom.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/record-labels-take-kim-dotcoms-album-140923/feed/</wfw:commentRss>
		<slash:comments>59</slash:comments>
		</item>
		<item>
		<title>The Pirate Bay Runs on 21 &#8220;Raid-Proof&#8221; Virtual Machines</title>
		<link>http://torrentfreak.com/the-pirate-bay-runs-on-21-raid-proof-virtual-machines-140921/</link>
		<comments>http://torrentfreak.com/the-pirate-bay-runs-on-21-raid-proof-virtual-machines-140921/#comments</comments>
		<pubDate>Sun, 21 Sep 2014 12:18:28 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93871</guid>
		<description><![CDATA[With several million daily visitors The Pirate Bay is one of the 100 most-visited websites on the Internet. Despite its massive presence the website does not have a giant server park. Instead, it operates from the cloud, on  21 virtual machines that can be quickly moved if needed.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/pirate-cloud.jpg"><img src="http://torrentfreak.com/images/pirate-cloud.jpg" alt="pirate cloud" width="200" height="215" class="alignright size-full wp-image-58771"></a>Two years ago The Pirate Bay made an important change to its infrastructure by switching its entire operation <a href="http://torrentfreak.com/pirate-bay-moves-to-the-cloud-becomes-raid-proof-121017/">to the cloud</a>.</p>
<p>Instead of buying their own hardware The Pirate Bay decided to serve its users from several cloud hosting providers scattered around the world. This saved costs, guaranteed better uptime, and made the site more portable and thus harder to take down.</p>
<p>The operational change also had a downside. Before the move the notorious torrent site had a dedicated page displaying its hardware and server setup, which was something true geeks kept a close eye on.</p>
<p>Today the site no longer owns any crucial pieces of hardware. However, it&#8217;s worth taking a look at the virtual setup the site is running on now. TorrentFreak asked the Pirate Bay team for an update and they were happy to oblige. </p>
<p>At the time of writing the site uses 21 &#8220;virtual machines&#8221; (VMs) hosted at different providers. This is up four machines from two years ago, in part due to the steady increase in traffic.  </p>
<p>Most of the VMs, eight in total, are used for serving the web pages. The searches take up another six machines, and the site&#8217;s database currently runs on two VMs. </p>
<p>The remaining five virtual machines are used for load balancing, statistics, the proxy site on port 80, torrent storage and for the controller.</p>
<p>In total the VMs use 182 GB of RAM and 94 CPU cores. The total storage capacity is 620 GB, but that&#8217;s not all used. Needless to say, that is relatively modest considering the size of the site. </p>
<p><em>- 8 web<br>
- 6 search<br>
- 2 database<br>
- 1 lvs<br>
- 1 stats<br>
- 1 for proxy site on .80,<br>
- 1 torrents<br>
- 1 control</em></p>
<p>All virtual machines are hosted with commercial cloud hosting providers, who have no clue that The Pirate Bay is among their customers. All traffic goes through the load balancer, which masks what the other VMs are doing. This also means that none of the IP-addresses of the cloud hosting providers are publicly linked to TPB. </p>
<p>According to the Pirate Bay team the current setup works pretty well. Although small issues pop up every now and then, the site has had no major downtime recently. </p>
<p>If the police come knocking in the future the cloud servers can of course be disconnected. However, with the site&#8217;s current setup it would be fairly easy to continue operating from another provider in a relatively short time. </p>
<p>For now, the most vulnerable spot appears to be the site&#8217;s domain. Just last year the site burnt through five separate domain names due to takedown threats from registrars. </p>
<p>But then again, this doesn&#8217;t appear to be much of a concern for TPB as the operators have dozens of alternative domain names standing by.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/the-pirate-bay-runs-on-21-raid-proof-virtual-machines-140921/feed/</wfw:commentRss>
		<slash:comments>81</slash:comments>
		</item>
		<item>
		<title>Google Refuses to Remove Links to Kate Upton&#8217;s &#8220;Fappening&#8221; Photos</title>
		<link>http://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/</link>
		<comments>http://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/#comments</comments>
		<pubDate>Fri, 12 Sep 2014 18:19:23 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[The Fappening]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93846</guid>
		<description><![CDATA[In an attempt to remove Kate Upton's leaked nudes from Google's search results, her boyfriend Jason Verlander instructed his lawyers to send a DMCA takedown request. Interestingly, Google has rejected nearly half of the links in the Detroit Tigers pitcher's copyright complaint. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/upton.png"><img src="http://torrentfreak.com/images/upton.png" alt="upton" width="250" height="266" class="alignright size-full wp-image-93850"></a>Nearly two weeks have passed since hundreds of photos of naked celebrities <a href="http://en.wikipedia.org/wiki/August_2014_celebrity_photo_leaks">leaked online</a>. This &#8220;fappening&#8221; triggered a massive takedown operation targeting sites that host and link to the images, Google included.</p>
<p>A few days ago Google received a request to remove links to Kate Upton&#8217;s stolen photos The request was not sent by Upton but by her boyfriend Jason Verlander, who also appears in a few of the leaked images. </p>
<p>The notice includes hundreds of URLs of sites such as thefappening.eu where the photos are hosted without permission.</p>
<p>It&#8217;s quite unusual for Google&#8217;s takedown team to be confronted with a long link of naked celebrity pictures. This may explain why it took a while before a decision was reached on the copyright-infringing status of the URLs, a process that may involve a cumbersome manual review. </p>
<p>Yesterday the first batch was processed and interestingly enough Google decided to leave nearly half of all URLs <a href="http://www.google.com/transparencyreport/removals/copyright/requests/1445734/">untouched</a>. The overview below shows that with 16 of the 444 links processed, only 45% were removed. </p>
<p>The big question is, of course, why?</p>
<p><center><center><strong>Verlander&#8217;s takedown request</strong></center><br></br><a href="http://torrentfreak.com/images/upton-google-fappening.png"><img src="http://torrentfreak.com/images/upton-google-fappening.png" alt="upton-google-fappening" width="600" height="442" class="alignnone size-full wp-image-93852"></a></center></p>
<p>Google doesn&#8217;t explain its decision keep the links in question in its search results. In some cases the original content had already been removed at the source site, so these URLs didn&#8217;t have to be removed.</p>
<p>Other rejections are more mysterious though. For example, the thefappening.eu URLs that remain online all pointed to stolen images when we checked. Most of these were not nudes, but they certainly weren&#8217;t posted with permission.</p>
<p>One possible explanation for Google&#8217;s inaction is that Verlander most likely claimed to own the copyright on the images, something he can only do with pictures he took himself. With Upton&#8217;s selfies this is hard to do, unless she signed away her rights.</p>
<p>While browsing through the reported URLs we also noticed another trend. Some sites have replaced Upton&#8217;s leaked photos with photos of other random naked women. Google&#8217;s takedown team apparently has a sharp eye because these were not removed by Google either.</p>
<p>Chilling Effects, who host Google&#8217;s takedown requests, just posted a redacted version of the <a href="http://www.chillingeffects.org/notice.cgi?sID=2021753">original notice</a> with Upton&#8217;s name removed. Unfortunately this doesn&#8217;t offer more clues to resolve this takedown mystery, so for now we can only guess why many of the links remain indexed.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/google-refuses-remove-links-kate-uptons-fappening-images-140912/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
		</item>
		<item>
		<title>Which VPN Services Take Your Anonymity Seriously? 2014 Edition</title>
		<link>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/</link>
		<comments>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/#comments</comments>
		<pubDate>Tue, 09 Sep 2014 19:45:35 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Sidebar]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[vpn services]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=85262</guid>
		<description><![CDATA[Millions of people use a VPN service to protect their privacy, but not all VPNs are as anonymous as one might hope. In fact, some VPN services log users' IP-addresses for weeks. To find out how secure VPNs really are TorrentFreak asked the leading providers about their logging policies, and more.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/boxed.jpg"><img src="http://torrentfreak.com/images/boxed.jpg" alt="boxed" width="222" height="178" class="alignright size-full wp-image-36576"></a>By now most Internet users are well aware of the fact that pretty much every step they take on the Internet is logged or monitored. </p>
<p>To prevent their IP-addresses from being visible to the rest of the Internet, millions of people have signed up to a VPN service. Using a VPN allows users to use the Internet anonymously and prevent snooping.</p>
<p>Unfortunately, not all VPN services are as anonymous as they claim.  </p>
<p>Following a high-profile case of an individual using an &#8216;anonymous&#8217; VPN service that turned out to be not so private, TorrentFreak decided to ask a selection of VPN services some tough questions.</p>
<p>By popular demand we now present the third iteration of our VPN services &#8220;logging&#8221; review. In addition to questions about logging policies we also asked VPN providers about their stance towards file-sharing traffic, and what they believe the most secure VPN is. </p>
<p><strong>Last update: October 7, 2014 (added partial <a href="http://torrentfreak.com/%D0%BA%D0%B0%D0%BA%D0%BE%D0%B9-%D0%B8%D0%B7-vpn-%D1%81%D0%B5%D1%80%D0%B2%D0%B8%D1%81%D0%BE%D0%B2-%D1%80%D0%B5%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE-%D0%B7%D0%B0%D0%B1%D0%BE%D1%82%D0%B8%D1%82%D1%8C%D1%81%D1%8F/" title="Какой из VPN сервисов реально заботиться о Вашей анонимности? Результаты 2014 года.">Russian translation</a>)<br>
</strong><br>
&#8212;</p>
<p>1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long? </p>
<p>2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?</p>
<p>3. What tools are used to monitor and mitigate abuse of your service?</p>
<p>4. In the event you receive a DMCA takedown notice or European equivalent, how are these handled?</p>
<p>5. What steps are taken when a valid court order requires your company to identify an active user of your service?</p>
<p>6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?</p>
<p>7. Which payment systems do you use and how are these linked to individual user accounts?</p>
<p>8. What is the most secure VPN connection and encryption algorithm you would recommend to your users? </p>
<p>&#8212;</p>
<p>What follows is the list of responses from the VPN services, in their own words. Providers who didn&#8217;t answer our questions directly or failed by logging everything were excluded. Please note, however, that several VPN companies listed here do log to some extent. The order of the lists holds no value. </p>
<h2><a href="http://bit.ly/privateinternet">Private Internet Access</a></h2>
<p><a href="http://torrentfreak.com/images/pia.png"><img class="alignright size-full wp-image-41039" title="torrentprivacy" src="http://torrentfreak.com/images/pia.png" alt="" width="180" height="40"></a>1. We absolutely do not log any traffic nor session data of any kind, period. We have worked hard to meticulously fork all daemons that we utilize in order to achieve this functionality. It is definitely not an easy task, and we are very proud of our development team for helping Private Internet Access to achieve this unique ability.</p>
<p>2. We operate out of the US which is one of the few, if only, countries without a mandatory data retention law. We explored several other jurisdictions with the help of our professional legal team, and the US is still ideal for privacy-based VPN services.</p>
<p>We severely scrutinize the validity of any and all legal information requests. That being said, since we do not hold any traffic nor session data, we are unable to provide any information to any third-party. Our commitment and mission to preserve privacy is second to none.</p>
<p>3. We do not monitor any traffic, period. We block IPs/ports as needed to mitigate abuse when we receive a valid abuse notification.</p>
<p>4. We do not host any content and are therefore unable to remove any of said content. Additionally, our mission is to preserve and restore privacy on the Internet and society. As such, since we do not log or monitor anything, we&#8217;re unable to identify any users of our service.</p>
<p>5. Once again, we do not log any traffic or session data. Additionally, unlike the EU and many other countries, our users are protected by legal definition. For this reason, we&#8217;re unable to identify any user of our service. Lastly, consumer protection laws exist in the US, unlike many other countries. We must abide by our advertised privacy policy.</p>
<p>6. We do not discriminate against any kind of traffic/protocol on any of our servers, period. We believe in a free, open, and uncensored internet.</p>
<p>7. Bitcoin, Ripple, PayPal, Google Play (Mobile), OKPay, CashU, Amazon and any major Gift Card. We support plenty of anonymous payment methods. For this reason, the highest risk users should definitely use Bitcoin, Ripple or a major gift card with an anonymous e-mail account when subscribing to our privacy service.</p>
<p>8. We&#8217;re the only provider to date that provides a plethora of encryption cipher options. We recommend, mostly, using AES-128, SHA1 and RSA2048. </p>
<p><a href="http://bit.ly/privateinternet">Private Internet Access website</a> </p>
<h2><a href="http://bit.ly/torguardvpn">TorGuard</a></h2>
<p><a href="http://torrentfreak.com/images/torguard.png"><img class="alignright size-full wp-image-50163" title="torguard" src="http://torrentfreak.com/images/torguard.png" alt="" width="180" height="59"></a>1. TorGuard does not store any IP address or time stamps on any VPN and proxy servers, not even for a second. Further, we do not store any logs or time stamps on user authentication servers connected to the VPN. In this way it is not even possible to match an external time stamp to a user that was simultaneously logged in. Because the VPN servers utilize a shared IP configuration, there can be hundreds of users sharing the same IP at any given moment further obfuscating the ability to single out any specific user on the network.</p>
<p>2. TorGuard is a privately owned company with parent ownership based in Nevis and our headquarters currently located in the US. Our legal representation at the moment is comfortable with the current corporate structuring however we wouldn’t hesitate to move all operations internationally should the ground shift beneath our feet. We now offer VPN access in 23+ countries worldwide and maintain all customer billing servers well outside US borders.</p>
<p>We would only be forced to communicate with a third-party in the event that our legal team received a court ordered subpoena to do so. This has yet to happen, however if it did we would proceed with complete transparency and further explain the nature of TorGuard’s shared VPN configuration. We have no logs to investigate, and thus no information to share.</p>
<p>3. Our network team uses commercial monitoring software with custom scripts to keep an eye on individual server load and service status/uptime so we can identify problems as fast as possible. If abuse reports are received from an upstream provider, we block it by employing various levels of filtering and global firewall rules to large clusters of servers. Instead of back tracing abuse by logging, our team mitigates things in real-time. We have a responsibility to provide fast, abuse-free VPN services for our clients and have perfected these methods over time.</p>
<p>4. In the event of receiving a DMCA notice, the request is immediately processed by our abuse team. Because it is impossible for us to locate which user on the server is actually responsible for the violation, we temporarily block the infringing server and apply global rules depending on the nature of the content and the server responsible. The system we use for filtering certain content is similar to keyword blocking but with much more accuracy. This ensures the content in question to no longer pass through the server and satisfies requirements from our bandwidth providers.</p>
<p>5. Due to the nature of shared VPN services and how our network is configured, it is not technically possible to effectively identity or single out one active user from a single IP address. If our legal department received a valid subpoena, we would proceed with complete transparency from day one. Our team is prepared to defend our client’s right to privacy to the fullest extent of the law.</p>
<p>6. BitTorrent is only allowed on select server locations. TorGuard now offers a variety of protocols like http/socks proxies, OpenVPN, SSH Tunnels, SSTP VPN and Stealth VPN (DPI Bypass), with each connection method serving a very specific purpose for usage. Since BitTorrent is largely bandwidth intensive, we do not encourage torrent usage on all servers. Locations that are optimized for torrent traffic include endpoints in: Canada, Netherlands, Iceland, Sweden, Romania, Russia and select servers in Hong Kong. This is a wide range of locations that works efficiently regardless of the continent you are trying to torrent from. </p>
<p>7. We currently accept payments through all forms of credit or debit card, PayPal, OKPAY, and Bitcoin. During checkout we may ask the user to verify a billing phone and address but this is simply to prevent credit card fraud, spammers, and keep the network running fast and clean. After payment it is possible to change this to something generic that offers more privacy. No VPN or Proxy usage can be linked back to a billing account due to the fact we hold absolutely no levels of logging on any one of our servers, not even timestamps! </p>
<p>8. For best security we advise clients to choose OpenVPN connections only, and if higher encryption is called for use AES256 bit. This option is available on many locations and offers excellent security without degrading performance. For those that are looking to defeat Deep Packet Inspection firewalls (DPI) like what is encountered in countries such as China or Iran, TorGuard offers “Stealth” VPN connections in the Netherlands, UK and Canada. Stealth connections feature OpenVPN obfuscation technology that causes VPN traffic to appear as regular connections, allowing VPN access even behind the most strict corporate wifi networks or government regulated ISPs.</p>
<p><a href="http://bit.ly/torguardvpn">TorGuard website</a> </p>
<h2><a href="http://bit.ly/ipvanis">IPVanish</a></h2>
<p><a href="/images/ipvarnish.png"><img src="http://torrentfreak.com/images/ipvarnish.png" alt="ipvarnish" width="152" height="82" class="alignright size-full wp-image-51008"></a>1. IPVanish has a no-log policy. We keep no traffic logs.</p>
<p>2. IPVanish is headquartered in the US and thus operates under US law.</p>
<p>3. IPVanish has no monitoring in place. To elaborate, IPVanish does not sniff or monitor any user’s traffic or activity for any reason.</p>
<p>4. IPVanish keeps no logs of any user’s activity and responds accordingly.</p>
<p>5. IPVanish, like every other company, has to follow the law in order to remain in business. Only US law applies. </p>
<p>6. P2P is permitted. IPVanish in fact does not block or throttle any ports, protocols, servers or any type of traffic whatsoever.</p>
<p>7. PayPal and all major credit cards are accepted. Payments and product use are in no way linked. User authentication and billing info are help on completely different and independent platforms.</p>
<p>8. OpenVPN generally provides the strongest encryption algorithm, so that is the recommended encryption protocol. IPVanish also allows a choice between TCP and UDP, and UDP is generally recommended for better speed.</p>
<p><a href="http://bit.ly/ipvanis">IPVanish website</a></p>
<h2><a href="http://btguard.com/?a=discounts">BTGuard</a></h2>
<p><img src="http://torrentfreak.com/images/btguard2.jpg" align="right" alt="btguard">1. We do not keep any logs whatsoever.</p>
<p>2. The jurisdiction is Canada. Since we do not have log files, we have no information to share. We do not communicate with any third parties. The only event in which we would even communicate with a third-party is if we received a court order. We would then be forced to notify them we have no information. This has not happened yet.</p>
<p>3. If serious abuse is reported we enable tcpdump to confirm the abuse and locate the user. These dumps are immediately removed. If the user is abusing our service they will be terminated permanently but we have never shared user information with a 3rd party. </p>
<p>4. We do not have any open incoming ports, so it’s not possible for us to “takedown” any broadcasting content.</p>
<p>5. We take every step within the law to fight such an order.</p>
<p>6. Yes, all types of traffic our allowed with our services.</p>
<p>7. We accept PayPal and Bitcoin. All payments are linked to users accounts because they have to be for disputes and refunds.</p>
<p>8. 256-bit AES is the most secure. However 128-bit blowfish is plenty good. If you&#8217;re concerned about surveillance agencies such as the NSA, their capabilities are shrouded in secrecy and claiming to be able to protect you is offering you nothing but speculation. As far as what&#8217;s publicly available for deciphering encryption, both of the encryptions I mentioned are more than sufficient.</p>
<p><a href="http://btguard.com/?a=discounts">BTGuard website</a></p>
<h2><a href="https://privacy.io/">Privacy.io</a></h2>
<p><a href="http://torrentfreak.com/images/privacyio.jpg"><img class="alignright size-full wp-image-41044" title="privacy" src="http://torrentfreak.com/images/privacyio.jpg" alt="" width="180" height="50"></a>1. We do not log any information on our VPN servers. The only scenario is if a technical issue arises, but we request permission from the user first, and we only do it for the duration of the job, and then it is removed.</p>
<p>2. We are in the process of moving jurisdictions away from Australia at present as we are unsure what our current government plans to do in regards to our privacy. We have not decided where yet.</p>
<p>3. Only SMTP port 25 is filtered to mitigate spam, but we are working on some tools to make it easier for users to send mail.</p>
<p>4. Any DMCA request is ignored, as we have no logs to do anything about them.</p>
<p>5. Same as above, as we do not log, so we are unable to provide any information. If the law attempts to make us do such things, we will move our business to a location where that cannot occur, and if that fails we will close up shop before we provide any information.</p>
<p>6. All protocols are allowed with our service, with the only exception of SMTP port 25 currently being filtered.</p>
<p>7. At present we only accept PayPal and CC (processed by PayPal), but we are looking into alternative types of payments. We go out of our way to make sure that PayPal transactions are not linked to the users, we generate a unique key per transaction to verify payment for the account is made, and then nuke that unique key. Bitcoin and Litecoin are also on the agenda.</p>
<p>8. At present we offer 128 bit for PPTP and 256 bit for OpenVPN, We plan to offer stronger encryption for the security conscious.</p>
<p><a href="https://privacy.io/">Privacy.io website</a></p>
<h2><a href="http://vikingvpn.com/">VikingVPN</a></h2>
<p><img src="http://torrentfreak.com/images/vikingvpn.jpg" alt="vikingvpn" width="180" height="203" class="alignright size-full wp-image-74962">1. No. We run a zero knowledge network and are unable to tie a user to an IP address.</p>
<p>2. United States, they don&#8217;t have data retention laws, despite their draconian surveillance programs. The only information we share with anyone is billing information to our payment gateway. This can be anonymized by using a pre-paid anonymous card. If asked to share specific data about our users and their habits, we would be unable to do so, because we don&#8217;t have any logs of that data.</p>
<p>3. That is mostly confidential information. However, we can assure our users that we do not use logging to achieve this goal.</p>
<p>4. In the event of a DMCA notice, we send out the DMCA policy published on our website. We haven&#8217;t yet received a VALID DMCA notice.</p>
<p>5. We exhaust all legal options to protect our users. Failing that, we would provide all of our logs, which do not actually exist. If required to wiretap a user under a National Security Letter, we have a passively triggered Warrant Canary. We would also likely choose to shut down our service and put it up elsewhere.</p>
<p>6. Yes. Those ports are all open, and we have no data caps.</p>
<p>7. We currently only take credit cards. Our payment provider is far more restrictive than we ever imagined they would be. We&#8217;re still trying to change payment providers. Fortunately, by using a pre-paid credit card, you can still have totally anonymous service from us.</p>
<p>8. A strong handshake (either RSA-4096+ or a non-standard elliptic curve as the NIST curves are suspect). A strong cipher such as AES-256-CBC or AES-256-GCM encryption (NOT EDE MODE). At least SHA1 for data integrity checks. SHA2 and the newly adopted SHA3 (Skein) hash functions are also fine, but slower and provide no real extra assurances of data integrity, and provide no further security beyond SHA1. The OpenVPN HMAC firewall option to harden the protocol against Man-in-the-Middle and Man-on-the-Side attacks.</p>
<p><a href="http://vikingvpn.com/">VikingVPN website</a> </p>
<h2><a href="http://www.ivpn.net/">IVPN</a></h2>
<p><a href="http://torrentfreak.com/images/ivpn.png"><img src="http://torrentfreak.com/images/ivpn.png" alt="ivpn" width="150" height="69" class="alignright size-full wp-image-85390"></a>1.  IVPN’s top priority is the privacy of its customers and therefor we do not store any connection logs or any other log that could be used to associate a connection to a customer.</p>
<p>2. IVPN is incorporated in Malta. We would ignore any request to share data unless it was served by a legal authority with jurisdiction in Malta in which case we would inform them that we don&#8217;t have the data to share. If we were served a subpoena which compelled us to log traffic we would find a way to inform our customers and relocate to a new jurisdiction.</p>
<p>3. We use a tool called PSAD to mitigate attacks originating from customers on our network. We also use rate-limiting in iptables to mitigate SPAM.</p>
<p>4. We ensure that our network providers understand the nature of our business and that we do not host any content. As a condition of the safe harbor provisions they are required to inform us of each infringement which includes the date, title of the content and the IP address of the gateway through which it was downloaded. We simply respond to each notice confirming that we do not host the content in question.</p>
<p>5. Assuming the court order is requesting an identity based on a timestamp and IP, our legal department would respond that we don&#8217;t have any record of the user&#8217;s identity nor are we legally compelled to do so.</p>
<p>6. We &#8216;allow&#8217; BitTorrent on all servers except gateways based in the USA. Our USA network providers are required to inform us of each copyright infringement and are required to process our response putting undue strain on their support resources (hundreds per day). For this reason providers won&#8217;t host our servers in the USA unless we take measures to mitigate P2P activity.</p>
<p>7. We currently accept Bitcoin, Cash and PayPal. No information relating to a customers payment account is stored with the exception of automated PayPal subscriptions where we are required to store the subscription ID in order to assign it to an invoice (only for the duration of the subscription after which it is deleted). Of course PayPal will always maintain a record that you have sent funds to IVPN but that is all they have. If you need to be anonymous to IVPN and don&#8217;t wish to be identified as a customer then we recommend using Bitcoin or cash.</p>
<p>8. We recommend and offer OpenVPN using the strongest AES-256 cipher. For key exchange and authentication 4096-bit RSA keys are used.</p>
<p><a href="http://www.ivpn.net/">IVPN website</a></p>
<h2><a href="https://privatevpn.com/">PrivatVPN</a></h2>
<p><a href="http://torrentfreak.com/images/privatvpn.jpg"><img class="alignright size-full wp-image-41044" title="privatvpn" src="http://torrentfreak.com/images/privatvpn.jpg" alt="" width="180" height="53"></a>1. We don’t keep ANY logs that allow us or a 3rd party to match an IP address and a time stamp to a user our service. The only thing we log are e-mails and user names but it’s not possible to bind an activity on the Internet to a user.</p>
<p>2. We operate in Swedish jurisdiction. Since we do not log any IP addresses we have nothing to disclose. Circumstances doesn&#8217;t matter in this case, we have no information regarding our customers’ IP addresses and activity on the Internet. Therefore we have no information to share with any 3rd party.</p>
<p>3. If there&#8217;s abuse, we advise that service to block our IP in the first instance, and second, we can block traffic to the abused service.</p>
<p>4. This depends on the country in which we’re receiving a DMCA takedown. For example, we’ve received a DMCA takedown for UK and Finland and our response was to close P2P traffic in those countries.</p>
<p>5. If we get a court order to monitor a specific IP then we need to do it, and this applies to every VPN company out there.</p>
<p>6. Yes, we allow Torrent traffic.</p>
<p>7. PayPal, Payson and Plimus. Every payment has an order number, which is linked to a user. Otherwise we wouldn&#8217;t know who has made a payment. To be clear, you can&#8217;t link a payment to an IP address you get from us.</p>
<p>8. OpenVPN TUN with AES-256. On top is a 2048-bit DH key.</p>
<p><a href="https://privatevpn.com/">PrivatVPN website</a></p>
<h2><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ</a></h2>
<p><img class="alignright size-full wp-image-49734" title="prq" src="http://torrentfreak.com/images/prq.png" alt="" width="129" height="102">1. No. Wo do not log anything and we only require a working e-mail address to be a customer.</p>
<p>2. Swedish. We do not share information with anyone.</p>
<p>3. Not disclosed.</p>
<p>4. Put it in the trash where it belongs!</p>
<p>5. None, since we do not have any customer information and no logs.</p>
<p>6. We host anything as long as it&#8217;s not SPAM related or child porn.</p>
<p>7. Visa/Mastercard, Bitcoin, PayPal. No correlation between payment data and customer data.</p>
<p>8. We provide OpenVPN services (along with dedicated servers and other hosting services).</p>
<p><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ website</a></p>
<h2><a href="http://www.tigervpn.com/en/home">tigerVPN</a></h2>
<p><a href="http://torrentfreak.com/images/tigervpn.png"><img src="http://torrentfreak.com/images/tigervpn.png" alt="tigervpn" width="180" height="73" class="alignright size-full wp-image-85421"></a>1. Absolutely not! We built tigerVPN to purge all data once the transmission of a IP package was completed successfully. Its impossible to trace back any customer. On top of that we decided to use shared IPs in order to further randomize and anonymize our customers. The combination of having absolutely no logs at all and multiple customers per IP, wipes our customers digital footprint</p>
<p>2. We are a limited liability company in Slovakia.  Slovakia does not have any data retention programs and furthermore encourage ISP’s to protect their customers privacy on the net. We are not required to share any information with 3rd party hence it would be illegal thanks to the law of telecom secrecy. </p>
<p>3. Since we don’t keep logs, we can&#8217;t monitor abusive behavior, which is the price for building a customer secure environment!</p>
<p>4. We can’t comply since we can’t identify customers, therefore it’s pointless to follow any requests. We have a specific folder for these eMails ;-)</p>
<p>5. Same as above. We seriously can’t tell which customer did what, when, where, at any given time.</p>
<p>6. It’s allowed on all servers although we gently ask our customers to use either Romania or Netherlands. Some infrastructure service providers do not want file sharing so it happened to us that we were asked to move our servers due to file sharing. We found some reliable partners in Romania and Netherlands which tolerate p2p so we kindly ask our customers to use these server parks.</p>
<p>7. Customers can pay with Visa, Mastercard and Debit. On top of that we also use PayPal. We use hash keys and tokens to identify a payment but it’s not logged or linked to the customer. We had to do this anyway hence we are a PCI Level 1 compliant merchant. Therefore we are not allowed to store any card or payment data with the records of our customers. These keys are pointless for anyone else so there is no chance to build a connection.</p>
<p>8. We offer PPTP, L2TP and OpenVPN, while out of nature OpenVPN comes with the highest encryption and algorithm. L2TP and OpenVPN are 256bit SSL  encrypted while PPTP comes with a solid 128bit. Although our customers are individual and have their own sense of why and what to use, we recommend L2TP as solid protocol. It’s less geeky and more secure than PPTP, but our customers can pick any of them in all the 47 network nodes around the globe.</p>
<p><a href="http://www.tigervpn.com/en/home">tigerVPN website</a></p>
<h2><a href="http://mullvad.net/en">Mullvad</a></h2>
<p><a href="http://torrentfreak.com/images/mullvad.jpg"><img class="alignright size-full wp-image-41059" title="mullvad" src="http://torrentfreak.com/images/mullvad.jpg" alt="" width="180" height="37"></a>1. No. This would make both us and our users more vulnerable so we<br>
certainly don&#8217;t. To make it harder to watch the activities of an IP address from the outside we also have many users share each address, both for IPv4 and our upcoming IPv6 support.</p>
<p>2. Swedish jurisdiction. Under no circumstance we will share information with a third-party. First of all we take pains to not actually possess information that could be of interest to third parties, to the extent possible. In the end there is no practical way for the Swedish government to get information about our users from us.</p>
<p>3. We don&#8217;t monitor our users. In the rare cases of such egregious network abuse that we can&#8217;t help but notice (such as DoS attacks) we stop it using basic network tools.</p>
<p>4. There is no such Swedish law that is applicable to us.</p>
<p>5. We make sure not to store sensitive information that can be tied to publicly available information, so that we have nothing to give out. We believe it is not possible in Swedish law to construct a court order that would compel us to actually give out information about our<br>
users. Not that we would anyway. We started this service for political reasons and would rather discontinue it than having it work against its purpose.</p>
<p>6. Yes.</p>
<p>7. Bitcoin (we were the first service to accept it), cash (in the mail), bank transfers, and PayPal / credit cards. Payments are tied to accounts but accounts are just random numbers with no personal information attached that users can create at will. With the anonymous payments possible with cash and Bitcoin it can be anonymous all the way.</p>
<p>8. We use OpenVPN. We also provide PPTP because some people want it but we strongly recommend against it. Encryption algorithms and key lengths are important but often get way too much attention at the expense of other important but harder to measure things such as leaks and computer security.</p>
<p><a href="http://mullvad.net/en">Mullvad website</a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/feed/</wfw:commentRss>
		<slash:comments>409</slash:comments>
		</item>
	</channel>
</rss>
