<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; Search Results  &#187;  paranoid</title>
	<atom:link href="http://torrentfreak.com/search/paranoid/feed/rss2/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 20:38:50 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Is Your VPN / Proxy Working? Check Your Torrent IP-Address</title>
		<link>http://torrentfreak.com/vpn-proxy-working-check-torrent-ip-address-140419/</link>
		<comments>http://torrentfreak.com/vpn-proxy-working-check-torrent-ip-address-140419/#comments</comments>
		<pubDate>Sat, 19 Apr 2014 18:51:11 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[vpn]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=86939</guid>
		<description><![CDATA[Millions of BitTorrent downloaders use proxies or VPN services to protect their privacy. These tools offer anonymity by replacing one's residential IP-address with that of the privacy service. But do they really work? Luckily, there's now an open source tool people can use to test their setup. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/boxed.jpg"><img src="http://torrentfreak.com/images/boxed.jpg" alt="boxed" width="222" height="178" class="alignright size-full wp-image-36576"></a>Every day dozens of millions of people share files using BitTorrent, willingly exposing their IP-addresses to the rest of the world. </p>
<p>For those who value their privacy this is a problem, so many sign up with a VPN provider or torrent proxy service. This is fine, but some people then forget to check whether their setup is actually working. </p>
<p>While it&#8217;s easy enough to test your web IP-address through one of the many IP-checking services, checking the IP-address that&#8217;s broadcasted via your torrent client is more complex.</p>
<p>There are a few services that offer a &#8220;torrent IP check&#8221; tool, but for the truly paranoid there&#8217;s now an Open Source solution as well.</p>
<p>The developer, who goes by the nickname &#8220;cbdev&#8221;, found most of the existing tools to be somewhat &#8220;fishy,&#8221; so he coded one for himself and those who want to run their own torrent IP checkers.  </p>
<p>&#8220;I&#8217;d rather have something I can control entirely,&#8221; cbdev tells TF.</p>
<p>&#8220;So, I wrote a tool people can install on their own servers, with the added bonus of it using magnet links, so &#8216;Tracking torrent&#8217; files are required,&#8221; he adds.</p>
<p>The <a href="http://dev.cbcdn.com/ipmagnet/">ipMagnet tool</a> allows BitTorrent users to download a magnet link which they can then load into their BitTorrent client. When the magnet link connects to the tracker, the user&#8217;s IP-address will be displayed on the site, alongside a time-stamp and the torrent client version. </p>
<p><center><a href="http://torrentfreak.com/images/ip-magnet.png"><img src="http://torrentfreak.com/images/ip-magnet.png" alt="ip-magnet" width="591" height="362" class="alignnone size-full wp-image-86944"></a></center></p>
<p>Alternatively, users can check out the tracker tab in their torrent clients, where the IP-address will be displayed as well. </p>
<p>For users who are connected to a VPN, the IP-address should be the same as the one they see in their web browser, and different from the IP-address that&#8217;s displayed when the VPN is disconnected. </p>
<p>Proxy users, on the other hand, should see a different IP-address than their browser displays, since torrent proxies only work through the torrent client.</p>
<p><center><a href="http://torrentfreak.com/images/torrent-ip.png"><img src="http://torrentfreak.com/images/torrent-ip.png" alt="torrent-ip" width="597" height="266" class="alignnone size-full wp-image-86958"></a></center></p>
<p>People are free to use the ipMagnet tool <a href="http://dev.cbcdn.com/ipmagnet/">demo here</a>, but are encouraged to run a copy on their own server. The whole project is <a href="https://github.com/cbdevnet/ipmagnet">less than 500 lines of code</a>, so those with basic knowledge of PHP, JavaScript and HTML can verify that it&#8217;s not doing anything nefarious.</p>
<p>If you&#8217;re setting up a copy of your own, feel free to promote it in the comments below. Those who want more tips can read up on how to make a <a href="http://torrentfreak.com/how-to-make-vpns-even-more-secure-120419/">VPN more secure</a>, and which VPN providers and torrent proxies really <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">take anonymity seriously</a>. </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/vpn-proxy-working-check-torrent-ip-address-140419/feed/</wfw:commentRss>
		<slash:comments>223</slash:comments>
		</item>
		<item>
		<title>Scary UFC Copyright Propaganda Matters to Everyone</title>
		<link>http://torrentfreak.com/scary-ufc-copyright-propaganda-matters-to-everyone-140216/</link>
		<comments>http://torrentfreak.com/scary-ufc-copyright-propaganda-matters-to-everyone-140216/#comments</comments>
		<pubDate>Sun, 16 Feb 2014 17:03:40 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[UFC]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=83903</guid>
		<description><![CDATA[You're probably thinking, I don't watch the Ultimate Fighting Championship, why should I care about what they have to say? Well, when a world leader in PPV can obtain a website's member list and set about threatening to sue each and every one of them for simply viewing an unauthorized stream, the gravity of the situation should start to sink in.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/ufc.jpg"><img src="http://torrentfreak.com/images/ufc.jpg" alt="ufc" width="200" height="146" class="alignright size-full wp-image-25323"></a>To some it&#8217;s just a couple of half-naked men or nowadays women (<a href="http://global.fncstatic.com/static/managed/img/fn-latino/sports/Rousey%20Tate%20ESPN%20Body.jpg">NSFW</a>) wriggling round in a sweat and blood filled cage in a pointless display of mindless violence. To others it&#8217;s the pinnacle of unarmed combat, the planet&#8217;s most elite warriors pushing their bodies and minds to the limit while showcasing the very best of martial arts.</p>
<p>Whatever your stance, the UFC and its aggressive approach to copyright enforcement matters to you, because where they tread today, others may tread tomorrow. And it&#8217;s a scary path indeed, one that would tick all the boxes of &#8220;overly-paranoid file-sharer&#8221;, if such a meme existed.</p>
<p>The file-sharing site honeytrap is a much-feared beast, set up to ensnare unsuspecting users in order to subject them to an awful but largely undocumented fate. But while in 2005 the MPAA were believed to have obtained the database of then-famous torrent site LokiTorrent, nothing has been publicly done with that data. Almost certainly, no one has been sued.</p>
<p>Since then dozens of sites have come and gone, many along with whispers that some evil entity or other has secured access to thousands of user&#8217;s details. No proof has ever surfaced to show a grain of truth in that notion, but now &#8211; not for the first but for the second time &#8211; the UFC is claiming to have done just that.</p>
<p>In 2012, the UFC <a href="http://torrentfreak.com/can-you-be-sued-for-simply-watching-an-illegal-video-stream-120317/">announced</a> that it had obtained the user database of a site called Greenfeedz, along with a promise it would chase down its members for watching unauthorized UFC streams.</p>
<p>While the announcement caused concern at the time, little was known about the outcome. However this week the UFC were back again, categorically stating they were going to sue people who watched unauthorized streams on another site. But how were those people identified? By the UFC obtaining the site&#8217;s database, that&#8217;s how.</p>
<p>&#8220;As part of the on-going initiative against online piracy, Zuffa, LLC, owner of the Ultimate Fighting Championship® (UFC®) organization, successfully took down and seized the records of www.cagewatcher.eu, a website that illegally streamed two UFC pay-per-view events,&#8221; the UFC announced.</p>
<p>&#8220;UFC has obtained details of the streaming site’s userbase, including email addresses, IP addresses, user names and information pertaining to individuals who watched pirated UFC events including UFC 169. Also recovered were chat transcripts from the website. Using this data, UFC will work with Lonstein Law Office to prosecute identified infringers.&#8221;</p>
<p>If the UFC is to be taken on face value, anyone watching an unauthorized video on YouTube or Vimeo for example, can be subjected to legal action by the UFC. However, rather than go through the messy process of subpoenas and the like, the UFC can turn up at any unauthorized site, threaten the owner, and walk away with the site&#8217;s entire database and use it for legal action.</p>
<p>The UFC says it&#8217;s carried through with its threats too, stating that Lonstein Law Office has &#8220;successfully prosecuted hundreds of claims for the UFC organization for sites illegally streaming content and individual users since 2007.&#8221;</p>
<p>In order to find out more, MMA site <a href="http://www.bloodyelbow.com/2014/2/11/5402548/ufc-won-steaming-lawsuit-individual">Bloody Elbow</a> did some digging and found a case dating to just after the UFC made its Greenfeedz announcement. It turns out the UFC did indeed have some success against one individual. However, the case navigated an extremely unusual track.</p>
<p>Probably understanding they were on delicate ground in respect of a regular copyright infringement prosecution, the UFC took action under Title 47 of the United States Code, Section 553, which prohibits people from intercepting or receiving &#8220;any communications service offered over a cable system, unless specifically authorized to do so.&#8221; Basically the UFC claimed that the individual had received a PPV signal without paying for it.</p>
<p>Since the defendant didn&#8217;t show, the court noted this was an admission of guilt, even though it was established that &#8220;there is no evidence that defendant obtained any financial gain from his illegal receipt of the copyrighted broadcasts since he viewed them on his home computer.&#8221;</p>
<p>Case won by the UFC via default judgment, with the target landed with a bill for $11,948.70.</p>
<p>How the UFC is intimidating others into settling isn&#8217;t clear, but it seems very likely that this judgment will be waved in front of users from sites where the databases have been obtained, with the threat that they will suffer the same fate unless they pay a few thousand dollars.</p>
<p>And this is why the UFC&#8217;s actions are important to everyone.</p>
<p>If big companies like Zuffa can intimidate site owners into ratting out their users, those users can be bullied into paying settlements. Remember, there is no official discovery process here, no friendly ISP to contest the handing over of their subscribers&#8217; details. Just an aggressive copyright holder bullying victims over the simple viewing &#8211; not distribution &#8211; of a video stream.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/scary-ufc-copyright-propaganda-matters-to-everyone-140216/feed/</wfw:commentRss>
		<slash:comments>65</slash:comments>
		</item>
		<item>
		<title>Review: Is Your VPN Service Really Anonymous?</title>
		<link>http://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition/</link>
		<comments>http://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition/#comments</comments>
		<pubDate>Thu, 02 Jan 2014 21:08:44 +0000</pubDate>
		<dc:creator><![CDATA[Enigmax &#38; Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[Sidebar]]></category>
		<category><![CDATA[VPN Service Providers]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[vpn service]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=65440</guid>
		<description><![CDATA[More than a year ago TorrentFreak took a look at a selection of the web’s VPN services to see which ones really take privacy seriously. During the months that followed we received dozens of emails begging us to carry out an update and today here it is. The first installment in our list of VPN services that due to their setup cannot link user activity to external IP addresses and activities.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/boxed.jpg" alt="boxed" width="222" height="178" class="alignright size-full wp-image-36576">Prompted by a <a href="http://blog.hidemyass.com/2011/09/23/lulzsec-fiasco/">high-profile case</a> of an individual using an &#8216;anonymous&#8217; <strong>VPN service</strong> that turned out to offer less than expected protection, TorrentFreak decided to ask a selection of VPN services some tough questions.</p>
<p>With our findings we compiled a <a href="http://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/">report of VPN providers</a> that due to their setup were unable to link their outbound IP addresses with user accounts. Ever since we have received countless emails demanding an update. </p>
<p><strong>Update:</strong> New <strong>2014</strong> <a href="https://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">update is out</a>.</p>
<p>It&#8217;s taken a long time but today we bring the first installment in a series of posts highlighting VPN services that take privacy seriously. Our first article focuses on anonymity and a later installment will highlight file-sharing aspects and possible limitations.</p>
<p>We tried to ask direct questions that left VPN service providers with little room for maneuver. Providers who didn&#8217;t answer our questions directly, didn&#8217;t answer at all, or completely failed by logging everything, were simply left out. Sadly this meant that quite a few were disregarded.</p>
<p>This year we also asked more questions, which are as follows:</p>
<p><strong>1.</strong> Do you keep ANY logs which would allow you or a 3rd party to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold?</p>
<p><strong>2.</strong> Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?</p>
<p><strong>3.</strong> In the event you receive a DMCA takedown notice or European equivalent, how are these handled?</p>
<p><strong>4.</strong> Which payment systems do you operate and how are these linked to individual user accounts? </p>
<p>The list of VPN providers is a tiny sample of the thousands out there today and is not comprehensive by any means. VPN Providers not covered this time around will be added during the coming weeks. All responses listed below are in the words of VPN services themselves and the order of the list does not carry any meaning.</p>
<h2><a href="http://bit.ly/privateinternet">Private Internet Access</a></h2>
<p><a href="http://torrentfreak.com/images/pia.png"><img class="alignright size-full wp-image-41039" title="torrentprivacy" src="http://torrentfreak.com/images/pia.png" alt="" width="180" height="40"></a>1. We absolutely do not maintain any VPN logs of any kind. We utilize shared IP addresses rather than dynamic or static IPs, so it is not possible to match a user to an external IP. These are some of the many solutions we have implemented to enable the strongest levels of anonymity amongst VPN services. </p>
<p>2. Our company currently operates out of the United States with gigabit gateways in the US, Canada, Germany, France, UK, Switzerland, Sweden, the Netherlands and Romania.  We chose the US, since it is one of the few countries without a mandatory data retention law. We will not share any information with third parties without a valid court order. With that said, it is impossible to match a user to any activity on our system since we utilize shared IPs and maintain absolutely no logs.</p>
<p>3. We are in compliance with DMCA as all companies, world-wide, must be.  We have proprietary technology and an experienced legal team which allows us to comply without any risk to our users.</p>
<p>4. We accept many payment methods directly, including PayPal, CC, Google, Amazon, Bitcoin, Liberty Reserve, OKPay, and CashU. Further, we would like to encourage our users to use an anonymous e-mail and pay with Bitcoins to ensure even higher levels of anonymity should it be required. We only store the minimal information required to provide customers refunds.</p>
<p><a href="http://bit.ly/privateinternet">Private Internet Access website</a></p>
<h2><a href="http://btguard.com/?a=discounts">BTGuard</a></h2>
<p><img src="http://torrentfreak.com/images/btguard2.jpg" align="right" alt="btguard">1. We do not keep any logs whatsoever.</p>
<p>2. The jurisdiction is Canada. Since we do not have log files, we have no information to share. We do not communicate with any third parties. The only event we would even communicate with a third-party is if we received a court order. We would then be forced to notify them we have no information. This has not happened yet.</p>
<p>3. We do not have any open incoming ports, so it&#8217;s not possible for us to &#8220;takedown&#8221; any broadcasting content. </p>
<p>4. At the moment we only accept Paypal and Bitcoin. We have plans to accept alternative credit card processing in the near future.</p>
<p><a href="http://btguard.com/?a=discounts">BTguard website</a> (with discounts)</p>
<h2><a href="http://bit.ly/torguardvpn">Torguard</a></h2>
<p><a href="http://torrentfreak.com/images/torguard.png"><img class="alignright size-full wp-image-50163" title="torguard" src="http://torrentfreak.com/images/torguard.png" alt="" width="180" height="59"></a>1. TorGuard doesn’t store IP’s or time stamps on our VPN/proxy servers, not even for a second. It’s impossible to match what is not there. Since some people tend to misbehave when using a VPN , this raises the obvious question: how do we maintain a fast, abuse-free network? If even our network engineer can’t back track the abuser by IP, then how do we stop it?</p>
<p>Through packet level filtering at the firewall it’s possible to apply rules to an entire shared server, blocking the abuse immediately. For example, let’s say someone decides to use TorGuard to unlawfully promote their Ugg boots business (spam). In order for us to block this one individual, we simply implement new firewall rules, effectively blocking the abused protocol for everyone on that VPN server. Since there are no user logs to go by, we handle abuse per server, not per user.</p>
<p>2. TorGuard recently went through some corporate restructuring and has now moved its parent company to Nevis, West Indies. Our company abides by all International laws and data regulations imposed within our legal jurisdiction. We don’t share any information with anyone regarding our network or its users and won’t even consider communicating with a 3rd party unless they’ve first obtained adequate representation within our legal jurisdiction. Only in the event of an official court ordered ruling would we be forced to hand over blank hard drives. There’s nothing to hand over but an operating system.</p>
<p>3. TorGuard complies immediately (24 hours or less) with all DMCA takedown notices. Since it’s impossible for us to locate which user on the server is actually responsible for the violation, we block the infringing protocol in its entirety, whatever it may be &#8211; Kazaa, HTTP, Jabber, Citrix, Bittorrent, FTP, Gnucleus, eDonkey2000, etc. This ensures the content in violation is immediately removed from that server and no longer active on our network.</p>
<p>4. We accept all forms of credit card, Visa, Amex, Mastercard, Discover, PayPal , Google Checkout and Bitcoins. We also accept anonymous payments through our pre-paid PIN system. These pre-paid service PIN numbers can be purchased from one of our participating online resellers and redeemed during checkout on our website.</p>
<p>Our client billing area and VPN/Proxy user auth servers are two completely separate systems. This is to ensure the privacy and securities of our customer’s accounts are upheld at all times. While the customer’s chosen payment method will be linked to the client billing area login, this information is kept completely separate from their VPN/Proxy network. In this way, it’s virtually impossible to “connect the dots” of a paying customer with that of someone who is using the servers.  This can become a pain for clients as they are required to remember two sets of logins/passwords, but trust us – it’s in the best interest of security.</p>
<p><a href="http://bit.ly/torguardvpn">TorGuard website</a> </p>
<p>(Use the<strong> promo / coupon</strong> code TorrentFreak to get a 20% discount at <a href="http://bit.ly/torguardvpn">Torguard</a>.</p>
<h2><a href="http://www.torrentprivacy.com/?id=tf">TorrentPrivacy</a></h2>
<p><a href="http://torrentfreak.com/images/torrentprivacy.jpg"><img class="alignright size-full wp-image-41039" title="torrentprivacy" src="http://torrentfreak.com/images/torrentprivacy.jpg" alt="" width="180" height="40"></a>1. We don&#8217;t store any logs, it&#8217;s impossible to track users&#8217; activity through our VPN.</p>
<p>2. Our company is based on Seychelles. We do not disclose any information to 3rd parties and this can be done only in case of a certain lawsuit filed against our company.</p>
<p>3. If we receive a notice about DMCA infringement, our team of lawyers solves it immediately without any blocking of servers or protocols. We don&#8217;t store any content on our servers, users are anonymous, so, there are no problems with it. We promise our customers that they will not have problems with the DMCA.</p>
<p>4. PayPal and CommerceGate.</p>
<p><a href="http://www.torrentprivacy.com/?id=tf">TorrentPrivacy website</a></p>
<h2><a href="http://bit.ly/ipvanis">IPVanish</a></h2>
<p><a href="http://torrentfreak.com/images/ipvarnish.png"><img class="alignright size-full wp-image-51008" title="ipvarnish" src="http://torrentfreak.com/images/ipvarnish.png" alt="" width="152" height="82"></a>1. IPVanish has a no-log policy. We keep no traffic logs.</p>
<p>2. IPVanish is headquartered in the US and thus operates under US law.</p>
<p>3. We do not host content of any kind and have nothing to take down or remove.</p>
<p>4. We currently accept all major credit cards, PayPal and UltimatePay (which includes 85 different payment methods from 190 countries). UltimatePay also provides many anonymous cash payment options like Western Union, Alipay, Skrill and PaySafeCard.	 	</p>
<p><a href="http://bit.ly/ipvanis">IPVanish website</a></p>
<h2><a href="https://privacy.io/">Privacy.io</a></h2>
<p><a href="http://torrentfreak.com/images/privacyio.jpg"><img class="alignright size-full wp-image-41044" title="privacy" src="http://torrentfreak.com/images/privacyio.jpg" alt="" width="180" height="50"></a>1) We do not keep any logs on our servers. Neither us nor 3rd parties are able to match IPs to a username.</p>
<p>2) Privacy IO is an Australian Registered business. Under no circumstances will we provide any 3rd party information about our users. We are unable to comply with DMCA or equivalent as we have no access or power to do anything about it. As we keep no logs we can not link it to a user to apply said request. If the law attempts to make us do such things, we will move our business to a location where that can not occur, and if that fails we will close up shop before we provide any information.</p>
<p>3) See answer to question 2</p>
<p>4) At present we only accept PayPal and CC (processed by PayPal), but we are looking into alternative types of payments. We go out of our way to make sure that PayPal transactions are not linked to the users, we generate a unique key per transaction to verify payment for the account is made, and then nuke that unique key.</p>
<p><a href="https://privacy.io/">Privacy.io website</a></p>
<h2><a href="http://vikingvpn.com/">VikingVPN</a></h2>
<p><img src="http://torrentfreak.com/images/vikingvpn.jpg" alt="vikingvpn" width="180" height="203" class="alignright size-full wp-image-74962">1) We do not log any user activity at all.  We don&#8217;t know what IP addresses our own users connect from.  We have a shared IP address for our users, further increasing their anonymity   We also generate false traffic.</p>
<p>2) We currently operate out of the United States.  The United States does not have any mandatory data retention laws, which allows us not to log anything.  If we receive a valid warrant, we will turn over all required records, that we have available; we don&#8217;t have any records available, because we don&#8217;t log anything.</p>
<p>3) DMCA notices have some legal requirements that basically make them not apply to us.  We don&#8217;t host any content at all, we only provide bandwidth.  Also, a DMCA notice requires the notifier to positively identify an infringing individual &#8211; which is impossible given our security model.  Basically, it&#8217;s impossible to send us a valid DMCA notice.</p>
<p>4) We&#8217;re just getting started, so we&#8217;re currently simply taking credit cards.  Accepting bitcoin is a near term goal for us.  We&#8217;d also like to start accepting really exotic forms of payment like cash.</p>
<p><a href="http://vikingvpn.com/">VikingVPN website</a></p>
<h2><a href="https://www.anonine.com/en">Anonine</a></h2>
<p><img src="http://torrentfreak.com/images/anonine.png" align="right" alt="aninine">1. We store a users E-mail and username, that´s it. This means that we do not store, or have access to, any traffic logs of any kind. By traffic logs we mean, any kind of data that has the potential to, directly or indirectly, match a users original ip or identity with one of our IPs.</p>
<p>2. It is important to remember that we do not store any traffic logs, and therefore it would be physically impossible for us to hand something like that over to a 3rd party. This, next to the encryption, is the core of the entire anonymity aspect of the service. This is possible by the fact that we operate under Swedish jurisdiction and Swedish law.</p>
<p>3. Our no logging policy has never really caused us any trouble since we never have received any official requests to hand over any traffic logs.</p>
<p>4. We accept credit card payments through Paypal and Payson. For Swedish users we also accept payments through sms and phone. We do not store data from these services. However, each of these services store various types and amounts of data related to the payment, and the payment only, which we do have access to. This is what allows us to perform refunds, or to provide adequate support services etc.</p>
<p><a href="https://www.anonine.com/en">Anonine website</a> </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition/feed/</wfw:commentRss>
		<slash:comments>569</slash:comments>
		</item>
		<item>
		<title>How NSA-Proof Are VPN Service Providers?</title>
		<link>http://torrentfreak.com/how-nsa-proof-are-vpn-providers-131023/</link>
		<comments>http://torrentfreak.com/how-nsa-proof-are-vpn-providers-131023/#comments</comments>
		<pubDate>Wed, 23 Oct 2013 19:22:30 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[VPN Service Providers]]></category>
		<category><![CDATA[vpn]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=77211</guid>
		<description><![CDATA[The privacy of Internet users has become an extremely hot topic this year, largely thanks to the revelations of whistleblower Edward Snowden. This has resulted in many questions from concerned VPN users who want to know more about possible cracked encryption schemes, and how providers respond to gag orders and national security letters. Today we explore these topics with a handful of the leading VPN services.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/cameraspy.jpg"><img src="http://torrentfreak.com/images/cameraspy.jpg" alt="cameraspy" width="170" height="164" class="alignright size-full wp-image-49625"></a>Let&#8217;s start off by saying that no <a href="<a href="http://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/">VPN service provider</a> can ever guarantee your anonymity 100%. That said, there is good reason to believe that the most secure encryption schemes are nearly impossible to crack. </p>
<p>In theory, however, there&#8217;s always a possibility that certain agencies are operating several steps ahead of the game. For example, the NSA and others might be capable of cracking more advanced encryptions when data streams are stored for future decoding. </p>
<p>And then there&#8217;s the possibility of VPN providers being forced to hand over customer data. While <a href="http://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/">no-logging policies</a> protect against traditional court orders, things get more complicated when government agencies issue gag orders, such as those contained in United States <a href="http://en.wikipedia.org/wiki/National_security_letter">national security letters</a>.</p>
<p>To explore these issues TorrentFreak talked to BlackVPN, IPredator, Private Internet Access, VikingVPN and TorGuard.  </p>
<p>Below is an overview of the responses we received. On the one hand they address which encryption schemes are still safe, and which ones should be avoided. Separately, the U.S. based providers shared their thoughts on the discussions regarding national security letters. </p>
<p><center><br>
<h3>Does encryption still work?</h3>
<p></center></p>
<p>The first question is whether encryption still works. A few weeks ago many VPN users got concerned after <a href="http://www.bbc.co.uk/news/technology-24173977">they read</a> that the NSA had compromised privacy software and cracked encryption algorithms.</p>
<p>So does that mean VPNs can no longer be trusted? While the various providers all have different opinions, they agree that the most secure encryptions are impossible to crack on the fly. Similarly, most providers warn that PPTP is flawed and should be avoided wherever possible. </p>
<h2><a href="https://www.blackvpn.com/">BlackVPN</a></h2>
<p>&#8220;OpenVPN is the best choice when available on your device. It&#8217;s easy to check that your VPN provider is using strong encryption algorithms and keys (like 256bit keys and AES encryption) by looking at the OpenVPN configuration files supplied by your VPN provider. Also it can be configured to use TCP on port 443 which makes it extremely difficult to block as it looks like standard HTTP over SSL traffic.&#8221; </p>
<p>&#8220;OpenVPN is slightly more effort to setup (download and install a client for Windows, OS X, IOS 5+ &#038; Android 4+) but it should be the default way for most people to connect to their VPN. We have been using OpenVPN securely (2048 bit RSA keys and AES-256) since our beginning in 2009 so previous traffic should still be secure from decryption.&#8221; </p>
<p>&#8220;L2TP/IPSec is a good choice if you want a quick and easy setup. However the encryption algorithms and keys used depend on your VPN provider and your device, and it is difficult to know if secure or insecure encryption is being used. Your data could be encrypted with AES-256 (more secure) or with 3DES (not secure) and you wouldn&#8217;t know. An evil or silly VPN provider could force all clients to use 3DES. Also Windows XP does not support AES and would use 3DES encryption instead.&#8221;</p>
<p>&#8220;PPTP has known security weaknesses and should only be used as last option or where nothing else works with your device. There are no good reasons to use PPTP unless IPSec traffic is being blocked and you cannot install openVPN on your device. We would recommend only use PPTP if your security and privacy are not a concern &#8211; for example if you just want to access websites or content blocked in your country.&#8221; </p>
<h2><a href="http://ipredator.se">IPredator</a></h2>
<p>Sweden-based IPredator is also clear on the point that PPTP should be avoided by users who are looking for the most secure setup, but in common with many other VPN providers, they still offer these connections. </p>
<p>&#8220;We explicitly tell users that PPTP is insecure and that it&#8217;s not suitable for privacy related things anymore to protect against a government attacker. We could just turn it off BUT then people would just go to other providers who still offer it, so in my opinion it&#8217;s better to educate them.&#8221; </p>
<p>According to iPredator, OpenSSL with ECDHE + AES and without RC4 is the most secure option for VPN users at the moment.</p>
<h2><a href="http://torguard.net/">TorGuard</a></h2>
<p>According to TorGuard many of the strongest encryptions can still be trusted, and the company sees Open Source Software as a key element to keep intelligence agencies for implementing backdoors. </p>
<p>&#8220;Encryption still works and nothing has been mathematically broken. What has been broken is the consumer trust relationship between government and big business. The NSA has attempted to undermine VPN encryption not by brute force or mathematics, but by sabotaging secure technologies at the corporate level.&#8221;</p>
<p>&#8220;Open source software is in the driver’s seat, everyone else is just along for the ride. Community driven code like what powers OpenVPN is continuously subject to scrutiny, making it virtually impossible for an outside agency to implement a secret backdoor.&#8221;</p>
<p>&#8220;It is also important to point out that there is no known method that even comes close to breaking 128bit Blowfish encryption. For the ultra-paranoid, TorGuard offers AES-256 bit &#8216;Stealth&#8217; connections that actually disguise packets as regular HTTP traffic on the network. We will soon be offering these stealth AES-256 connections on all servers as standard options.&#8221;</p>
<p>&#8220;True privacy in this digital age requires sound cryptography and companies who are willing to back it up – no matter the cost. If we expect to have any privacy in the future, the entrepreneurs and cypherpunks of today must work together in continuing to develop effective privacy solutions for tomorrow.&#8221;</p>
<p><center><br>
<h3>National Security Letters</h3>
<p></center></p>
<p>Aside from the worries about broken encryption and backdoors, there&#8217;s also the possibility that providers might find themselves served with a national security letter by U.S. security agencies or a foreign equivalent. Yesterday VPN provider <a href="http://torrentfreak.com/vpn-provider-shuts-down-after-lavabit-case-undermines-security-131022/">CryptoSeal shut its doors</a> in the belief it could no longer guarantee the privacy of its users following the Lavabit ordeal.</p>
<p>TorrentFreak asked three prominent U.S. based VPN providers to share their thoughts on this issue.</p>
<h2><a href="http://privateinternetaccess.com">Private Internet Access</a></h2>
<p>&#8220;Prior to the entire Lavabit ordeal, we had begun reaching out to the EFF, ACLU and FFTF in order to better understand the legal climate in which the internet operates such that we would better understand how we could hedge the company to better protect our &#8216;way of the internet&#8217;. Our CTO/co-founder, who many know as coderrr, the developer of privacy extensions from the early years of Bitcoin, moved out of the US along with our entire admin/development team.&#8221; </p>
<p>&#8220;Moving or establishing a VPN company outside of the US/EU would do little to protect against these kinds of issues as long as anyone with access to the machines remains within said regions. As such, he and the entire admin/development team are committed to remain outside of the US, and in fact, the team in its entirety are decentralized across the globe in countries that have historically been very reluctant to assist the US. Simultaneously, our research team has been implementing and increasing our available crypto-suite.&#8221;</p>
<p>&#8220;As for myself [Andrew Lee], I love my country. Please do not misunderstand, as a minority born, raised and living in the US, I am certainly not screaming, &#8216;MERIKA FUK YAH!&#8217; However, this country has provided a climate in which people can work hard to better their lives and, as well, enjoy great liberties which, in reality, most/many countries fail to match. As such, I, myself, remain in the US in order to help see to it that this country is able to continue/return to being a land of liberty and freedom. To this extent, we&#8217;re really putting our money where our mouths are.&#8221;</p>
<p>&#8220;However, to remain in the US, meant, as well, the relinquishing of my access to the PIA systems/network. Administrators, developers and co-founders everywhere can relate to the difficulty of doing so, but the reality is that it was a requirement if I was to remain here. This policy is in place, and relinquished access I have.&#8221; </p>
<p>&#8220;With regard to the gag orders, recently a US judge ruled the gag order provision to be unconstitutional, in violation of First Amendment rights. We do consider this to be a win for our side, in our quest to bring our privacy and civil liberties back to levels which we as a society can decide for ourselves. With that said, it&#8217;s not the end of the battle, as the ruling is currently being appealed, and as such, no decision is certain at present.&#8221;</p>
<p>&#8220;However, we&#8217;re a company that operates, as we said on our privacy policy, within the spirit and letter of the law. As such, we believe in constitutionally provided privacies and liberties and, to this extent, I&#8217;d like to make it unequivocally clear that we will fight any gag order to the fullest extent given that it clearly undermines First Amendment rights and the transparency of governmental interactions with private entities.&#8221;</p>
<p>&#8220;While I&#8217;d like to yell some kind of statement as many have before that most certainly could never be upheld, our customers and TorrentFreak readers deserve to know that we&#8217;re fighting to the best of our abilities, within the confines and maturity of the existing societal infrastructure. This is not the only way, but this is currently the best way for us to make a meaningful broad impact.&#8221;</p>
<h2><a href="http://torguard.net/">TorGuard</a></h2>
<p>&#8220;Lavabit’s actions to suspend operations and preserve its client’s privacy were truly inspiring. This serves as an excellent example for other companies to not let big government push them around and stand up by legally challenging unlawful data requests or gag orders. Curbing the power of government surveillance on the corporate sector won’t be easy, but it needs to start now with increased transparency and corporations that take an oath of privacy no matter the cost to business. In Lavabit’s case – if you can’t leave Texas then burn the servers.&#8221;</p>
<p>&#8220;A big misconception going around is that one’s data is far safer from scrutiny with foreign based corporations. Unfortunately, the US isn&#8217;t the only country with a spy agency and they certainly are not confined by domestic borders. We&#8217;ve seen countless incidents in the recent past where both domestic and international surveillance agencies abused power to gain access to servers and customer data – no gag order required.&#8221; </p>
<p>&#8220;Just because a company is incorporated in &#8216;Timbuktu&#8217; doesn&#8217;t mean the third-party data centers they lease servers from won’t open the door when federal agents come knocking. That’s why more transparency is needed on a global scale, not just from US service providers, but also by these international based ISPs, Data Centers, Domain Registrars and Merchant Providers..(the list goes on).&#8221;</p>
<p>&#8220;While TorGuard does have US-based representation, we are an internationally owned company with 90% of our employees and server resources based abroad. As owner/operator, I’ve pledged an oath of privacy to our client base and I intend to uphold this promise to the best of my abilities, even if it means temporarily suspending services or relocating company assets. We have backup plans for our backup plans, and travel light.&#8221;</p>
<h2><a href="https://vikingvpn.com/">VikingVPN</a></h2>
<p>&#8220;Knowing whether or not a company has been compromised by a national security letter is deceptively simple. All you have to do is ask. Right now, I can confidently say that VikingVPN has not been served a National Security Letter. Feel free to ask me again later. If I don&#8217;t reply at some point in the future when you ask me, then you&#8217;ll know. See how easy that was?&#8221;  </p>
<p>&#8220;The reason this works is that the Govt. cannot compel you to lie, but they can (apparently) compel you to remain silent. I would actually argue that the national security letters, and indeed the entire PRISM/XKeyScore system are illegal and unconstitutional, but obviously I don&#8217;t sit on the FISA court or Supreme Court, so my opinion holds little weight.&#8221;</p>
<p>&#8220;I would encourage TorrentFreak to reach out to all the US VPN providers and simply ask them if they have received a national security letter. If they don&#8217;t reply within a reasonable time-frame you will have your answer. I would even encourage you to keep a running list of VPN providers that reply. You could ask them once a month.&#8221;</p>
<p>&#8220;Further, VPNs have always been about trust. You&#8217;re entrusting your data to the VPN service provider, and hoping they don&#8217;t betray you. Any VPN service provider could be secretly logging and passing your data to a 3rd party without your permission. Some of this trust can be gained (or lost) from reputation.&#8221;  </p>
<p>&#8220;Do users of the service report betrayals in the form of legal notices? Some of the trust has to come from knowing just who runs the VPN service. VikingVPN has been very transparent about this. You can see who myself and my partners, Justin Greene &#038; Derek Zimmer, are. You can see that we&#8217;re not connected to any Intelligence Agencies or Copyright bodies. You can also view the kinds of political speech we engage in. We&#8217;re vehemently anti-spying and anti-PRISM.&#8221;</p>
<p>&#8220;US VPNs can still be trusted because you can place a honeypot anywhere in the world when it comes to VPN services. The paranoia surrounding US-based VPNs simply is not thought through very well. The UK and Sweden both have similarly intrusive dragnet programs, and there seems to be little concern for VPN services out of those nations. Furthermore, you can save all the packets you want, unless the VPN itself is compromised it isn&#8217;t going to matter.&#8221;</p>
<h3>Conclusion</h3>
<p>The conclusion brings us right back to the start of this article. No VPN provider can guarantee that any type of encryption is 100% secure. Hopefully the above has given people some pointers on what to avoid, and what the more secure alternatives are. </p>
<p>But even if people pick the strongest encryption possible, one still has to <a href="http://torrentfreak.com/can-you-trust-your-vpn-provider-130929/">trust VPN providers</a> to keep his or her data safe, regardless of where the company is located. </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/how-nsa-proof-are-vpn-providers-131023/feed/</wfw:commentRss>
		<slash:comments>157</slash:comments>
		</item>
		<item>
		<title>Downloading: The Databases that Store Everything You Do</title>
		<link>http://torrentfreak.com/downloading-the-databases-that-store-everything-you-do-130811/</link>
		<comments>http://torrentfreak.com/downloading-the-databases-that-store-everything-you-do-130811/#comments</comments>
		<pubDate>Sun, 11 Aug 2013 18:56:21 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=75245</guid>
		<description><![CDATA[At the same time that VPNs and other kinds of encryption are becoming some of web security's hottest topics, when it comes to file-sharing user data there is an elephant in the room. Many BitTorrent trackers, which pride themselves on having some of the best security around, are collecting and storing vast quantities of sensitive user data and almost none of it is encrypted. Is the time right for sites to take a fresh look at the way they handle data retention?<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Which companies have access to my web browsing habits? Will the government peek at my emails? Who&#8217;s using the data mined from my Facebook activity and what will they end up doing with it in future? Are there really people out there who can monitor my every online move? </p>
<p>Until recently these were the kinds of issues pondered by those with an interest in Internet security and the very paranoid. In the post Edward Snowden world, these are things that are starting to matter to everyone.</p>
<p>Security is a pretty big issue among file-sharers for a number of reasons. Obviously there are many who would like to keep their activities private, but it&#8217;s common for file-sharers to be tech-savvy users who are generally more aware of online privacy issues.</p>
<h2>Public v Private</h2>
<p><a href="http://torrentfreak.com/images/private.jpg"><img src="http://torrentfreak.com/images/private.jpg" alt="private" width="180" height="120" class="alignright size-full wp-image-75301"></a>By now, those using public BitTorrent sites should be well aware that their activities are, to put it bluntly, extremely public. At any time spies of all kinds can jump into a torrent swarm and start gathering data. The most important pieces of data &#8211; times and IP addresses &#8211; can be scooped up in an instant and are often enough for trolls to start filing lawsuits.</p>
<p>Private torrent sites, on the other hand, offer a walled garden environment. They are often very hard to gain access to which means that generally speaking there are less spies and fewer chances of being monitored or busted &#8211; or so the anecdotes go. Truth is no one is sure how many undesirables may exist on these sites but it&#8217;s likely that very few sites will have a completely clean bill of health.</p>
<p>The public vs private security debate has been done to death over the years but what is not often discussed is how sites &#8211; private ones in particular &#8211; handle the data entrusted to them by their users.</p>
<p>When someone signs up to a site via invite they hand over both their email and IP addresses. Immediate checks are made &#8211; has this email or IP address been used on this site before? If so, in many cases the chances of getting account are already reduced to near zero. If there&#8217;s no match, the user making the application is in &#8211; congratulations.</p>
<p>This is where the fun starts and something less entertaining kicks in behind the scenes. You can buy a <a href="http://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/">zero-logging VPN</a> incredibly simply these days but the same cannot be said about private torrent sites. At every opportunity they log just about everything they can.</p>
<h2>Private site logging</h2>
<p><a href="http://torrentfreak.com/images/data.jpg"><img src="http://torrentfreak.com/images/data.jpg" alt="data" width="180" height="120" class="alignright size-full wp-image-75303"></a>Obviously, a certain level logging is required for people to merely have an account. As a matter of course sites log their sign up date along with users&#8217; email addresses, passwords and everything said in their forums. No surprises so far really. </p>
<p>However, sites also log every single torrent downloaded and every IP address used to do so. They log how much data was downloaded and how much was uploaded. Not only that, sites know which other users the downloads came from and to which users the uploads were sent and in what quantity.</p>
<p>Once this information is logged (often against hundreds of torrents per user), sites know all there is to know about their users, real-life identities aside. And the worrying thing is that in many cases the information is never deleted, even when users have left the site. So why is that the case?</p>
<p>The answer is simple &#8211; it&#8217;s all about keeping the site and its file-sharing ecosystem functioning in an optimal fashion.</p>
<p>Sites rely on users playing fair, such as sharing content in a way determined by the sites rules. When this breaks down so does the site, so site logs are used to weed out the bad players. These include those who damage the ecosystem by not doing their part or &#8211; heaven forbid &#8211; those evil users who try to cheat the ratio system.</p>
<p>Once these users are found (which is only possible by keeping detailed logs on the activities of all users) they are kicked out. However, their accounts are not usually deleted because they carry useful information which will be used to ensure that the same user doesn&#8217;t try to get back on the site in future. To combat these users many sites also ban the use of VPNs, which means that not even good users can enjoy the security they offer.</p>
<h2>Logs can be used to keep the enemy out</h2>
<p>Site logs are also used to hunt down the private tracker&#8217;s worst enemies &#8211; anti-piracy companies and those users who make a business out of buying and selling site invites. These two groups can be closely related, since when an invite seller offers his product in public, it&#8217;s possible that spies can pick them up for a few dollars and gain access to an otherwise private site in a matter of minutes.</p>
<p>So, as we can see, site logs are there to protect the health of the tracker. However, it would be an absolute nightmate if they fell into the wrong hands. While that doesn&#8217;t happen often, it does happen.</p>
<p>Just this week the UFC <a href="http://www.reviewjournal.com/sports/mma-ufc/ufc-cracks-down-website-it-says-illegally-streamed-fight-shows">announced</a> that it had targeted a site called BestFreeUFC and as a result has obtained the site&#8217;s database which includes email addresses, IP addresses, user names and chatlogs of individuals who have illegally accessed UFC events. UFC owners Zuffa say they will now go after the infringers.</p>
<h2>The future &#8211; encryption?</h2>
<p><a href="http://torrentfreak.com/images/encryption.jpg"><img src="http://torrentfreak.com/images/encryption.jpg" alt="encryption" width="180" height="135" class="alignright size-full wp-image-75305"></a>So what can be done to increase site security? TorrentFreak spoke with a couple of admins who informed us that while they would prefer not to carry logs, they are essential for maintaining a healthy tracker and keeping undesirables out. Passwords on Gazelle trackers are encrypted, which is welcome, but currently no other data is encrypted as standard.</p>
<p>One admin told us he would like to add full encryption but from a technical perspective it would seriously complicate matters. Furthermore, much more grunt in both the software and hardware departments would be required, along with a fresh view of the entire situation.</p>
<p>So while email providers start <a href="http://www.theverge.com/2013/8/9/4605290/deutsche-telekom-email-made-in-germany-initiative">adding encryption</a> as standard and companies like Dotcom&#8217;s Mega have security built in from the ground up, the question now is whether private torrent sites will maintain their positions or continue as normal.</p>
<p>This might just be another case of citizens having to sacrifice some of their privacy in order to obtain a valuable service, or perhaps in the overall scheme of things, security is tight enough already&#8230;..</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/downloading-the-databases-that-store-everything-you-do-130811/feed/</wfw:commentRss>
		<slash:comments>72</slash:comments>
		</item>
		<item>
		<title>CISPA Bill Lets ISPs Spy On and Report Pirating Subscribers</title>
		<link>http://torrentfreak.com/cispa-bill-lets-isps-spy-on-and-report-pirating-subscribers-120409/</link>
		<comments>http://torrentfreak.com/cispa-bill-lets-isps-spy-on-and-report-pirating-subscribers-120409/#comments</comments>
		<pubDate>Mon, 09 Apr 2012 18:10:33 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[cispa]]></category>
		<category><![CDATA[sopa]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=49339</guid>
		<description><![CDATA[After the SOPA and PIPA uproar the Internet has become increasingly aware of the US Government's attempts at meddling with the web. In recent days the Cyber Intelligence Sharing and Protection Act (CISPA) has moved to the forefront. Critics of the bill point out that it would allow companies to spy on Internet users, and as it's written CISPA would further allow ISPs to block allegedly infringing transfers and report pirating users to a variety of organizations.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/spy.jpg" alt="spy" align="right">When it comes to legislation involving the Internet, the masses have become quite paranoid. Perhaps rightly so.</p>
<p>The latest bill to gain attention online is <a href="http://www.govtrack.us/congress/bills/112/hr3523">CISPA</a>, or the Cyber Intelligence Sharing and Protection Act. As the title suggests the main goal of the bill is to deal with &#8220;cybersecurity,&#8221; but with a lack of definition as to what that actually entails, it&#8217;s also one of the major weaknesses.</p>
<p>In short CISPA would allow companies to spy on Internet users and collect and share this data with third-party companies or Government agencies. As long as the company states that these privacy violations are needed to protect against &#8220;cybersecurity&#8221; threats, they are immune from civil and criminal liabilities.</p>
<p>Some have described the bill as a new SOPA, but it&#8217;s nothing like it. Where SOPA was focused on the shutting down of copyright infringing websites, CISPA is directly targeted at individual Internet subscribers, including copyright infringers.</p>
<p>While the definition of a cybersecurity threat is rather vague, intellectual property is specifically mentioned in the bill. For example, among many other descriptions CISPA defines a cybersecurity purpose as follows.</p>
<p style="padding-left: 30px;"><em>&#8220;A system designed or employed to [...] protect a system or network from [...] theft or misappropriation of [...] intellectual property.&#8221;</em></p>
<p>In other words, the bill would make it possible for ISPs to actively monitor the private communications of subscribers to detect and censor the transfers of copyrighted content. In addition, the personal details of these users could then be freely shared with third parties.</p>
<p>It&#8217;s hard to not interpret the above as a <a href="http://www.techdirt.com/articles/20120402/04425118325/forget-sopa-you-should-be-worried-about-this-cybersecurity-bill.shtml">huge problem</a> for people&#8217;s right to private communications.</p>
<p>While there is little known about how companies and authorities plan to use the bill, it is the vagueness and broad definitions that get people worried. Copyright holders should have tools to protect their rights, but as it stands CISPA completely destroys people&#8217;s right to privacy under certain circumstances.</p>
<p>This has caused great concern among the public, and a few days ago digital rights group EFF also sent out an alarming message <a href="https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=8444">warning</a> people about the looming threat posed by CISPA.</p>
<p>&#8220;There are almost no restrictions on what can be collected and how it can be used, provided a company can claim it was motivated by &#8216;cybersecurity purposes&#8217;,&#8221; EFF writes.</p>
<p>&#8220;That means a company like Google, Facebook, Twitter, or AT&#038;T could intercept your emails and text messages, send copies to one another and to the government, and modify those communications or prevent them from reaching their destination if it fits into their plan to stop cybersecurity threats.&#8221;</p>
<p>In recent weeks CISPA has gained support from over <a href="http://intelligence.house.gov/press-release/co-sponsors-top-100-rogers-ruppersberger-bipartisan-cyber-bill">100 lawmakers</a> in Congress,  anti-piracy lobby groups such as the BSA and US Chamber of Commerce, but also tech companies including <a href="http://intelligence.house.gov/bill/cyber-intelligence-sharing-and-protection-act-2011">Facebook, Microsoft and Verizon</a>. </p>
<p>These supporters are likely to argue that the bill wont be used as a massive spying machine, but if that&#8217;s the case the text should be amended to reflect that. To a certain degree CISPA faces the same problem as SOPA, in that the vagueness of the definitions give rise to speculations, in this case horrific 1984-like spying systems.  </p>
<p>In its current form CISPA serves only to fuel the paranoid concerns of the public in which ironically the bill itself exists as the security threat.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/cispa-bill-lets-isps-spy-on-and-report-pirating-subscribers-120409/feed/</wfw:commentRss>
		<slash:comments>149</slash:comments>
		</item>
		<item>
		<title>Reports: Feds Bust IMAGiNE Movie Release Group</title>
		<link>http://torrentfreak.com/reports-feds-bust-imagine-movie-release-group-110913/</link>
		<comments>http://torrentfreak.com/reports-feds-bust-imagine-movie-release-group-110913/#comments</comments>
		<pubDate>Tue, 13 Sep 2011 21:21:33 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[DiGiTALiNK]]></category>
		<category><![CDATA[EP1C]]></category>
		<category><![CDATA[ICE]]></category>
		<category><![CDATA[IMAGiNE]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=40017</guid>
		<description><![CDATA[According to reports, movie release group IMAGiNE have been busted and their private BitTorrent tracker taken offline. The leader of release group EP1C, who declared war on IMAGiNE earlier in the year, told TorrentFreak that nine individuals were arrested following an Immigration and Customs Enforcement "joint operation."<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>At the end of July 2011, the admin of XtremeSpeeds.net, a private BitTorrent tracker, <a href="http://torrentfreak.com/xtremespeeds-bittorrent-admin-busted-110730/">reported</a> that his house had been raided by the authorities. He said that he was questioned under suspicion of being part of IMAGiNE, one of the leading P2P release groups.</p>
<p>Although the XS admin denied begin connected, he did admit renting out a server to &#8220;a guy who rented it out,” a suggestion that he perhaps had suspicions about potential connections, intended or otherwise.</p>
<p>XtremeSpeeds then disappeared completely and a promised August update from the site&#8217;s admin never materialized. What followed was an information black-hole, a common feature of ongoing piracy investigations where authorities aren&#8217;t yet ready to shout about their achievements and lawyers advise their clients to keep their mouths shut.</p>
<p>Now the rumor mill is turning again. According to reports, IMAGiNE &#8211; one of the P2P scene&#8217;s <a href="http://www.vcdq.com/browse/1/0/3_2/10_9_21_22_23_24_6_28_32_19_11_3_2/imagine/2011/0/0/0/0/0">most prominent</a> release groups &#8211; have been busted by Immigration and Customs Enforcement. The reports, which have proven impossible to confirm from any official source at this stage, state up to nine arrests.</p>
<p><center><img src="http://torrentfreak.com/images/unleashthenet.jpg" alt="Unleashthenet"></center></p>
<p>Last year, IMAGiNE launched their own &#8220;secret&#8221; private BitTorrent tracker that remained under the radar for roughly 10 minutes. The site, UnleashTheNet, also known by its acronym  UtN, was hosted in Canada but in the last few days it simply disappeared.</p>
<p>This morning TorrentFreak spoke with the site&#8217;s host who informed us that they haven&#8217;t heard anything about any raids or arrests. A traceroute timed-out at the site&#8217;s IP address.</p>
<p>However, there is one person who claims to know the details of IMAGiNE&#8217;s fate and he spoke with us just a few hours ago. So, has IMAGiNE really been busted?</p>
<p>&#8220;Yep,&#8221; says DiGiTALiNK, founder of P2P release group EP1C. &#8220;ICE joint operation got them.&#8221;</p>
<p>In an email to TorrentFreak, DiGiTALiNK went on to say that 9 people were arrested including IMAGiNE members Spunky, HoD, Jason, Tank, TheStash and Spangy, all of them within the United States. [See update below]</p>
<p>If these words do indeed turn out to be true, this latest development marks yet another event in a turbulent few months for EP1C, IMAGiNE, and associated sites and individuals.</p>
<p>In June this year, IMAGiNE published a warning on their site which declared that EP1C members had been banned and that anyone inviting them back would share their fate. It was claimed that DiGiTALiNK, EP1C&#8217;s founder, had &#8220;turned in one if not more of his members to the feds&#8221; and that a private FTP site of his was being watched by the authorities.</p>
<p>In the hugely political world of private trackers, claims like this are not unusual. In many file-sharing circles paranoia reigns supreme but, as they say, just because you&#8217;re paranoid it doesn&#8217;t mean they aren&#8217;t out to get you.</p>
<p>When EP1C&#8217;s DiGiTALiNK delivered his response to IMAGiNE&#8217;s claims, the focus was on escalating the conflict.</p>
<p>&#8220;They crossed paths with the wrong person, they lie, cheat, steal and have a fake identity to make people think they care about there [sic] safety, but in fact many of there [sic] source providers have been busted because they have no regard for your safety, only want the fame of that release,&#8221; the response began.</p>
<p>&#8220;Within the next few releases I will be providing proof of all this to the public and including all there [sic] personal identification information.. haha if I was a snitch they would have already been busted. IMAGiNE, are [expletives removed].&#8221;</p>
<p>Immediately some details related to the identity of one IMAGiNE member were released followed by the locations of others along with the words: &#8220;Get ready for a War.&#8221;</p>
<p>But those hoping to learn more from future EP1C revelations would be left disappointed. EP1C made their final releases on <a href="http://www.vcdq.com/browse/1/0/3_2/10_9_21_22_23_24_6_28_32_19_11_3_2/ep1c/2011/0/0/0/0/0">June 14th and 15th</a>, dates which to within a week coincided with the accusations made by IMAGiNE.</p>
<p>TorrentFreak pointed out the history of bad-blood between EP1C and IMAGiNE to DiGiTALiNK and asked if he had a comment. We also asked how he came by the more specific details of the alleged arrests. At the time of publication we&#8217;re yet to receive a response.</p>
<p>After making releases of high-profile movies every few days for the last few months, last week on September 9th IMAGiNE made their most recent release &#8211; The.Guard.2011.DVDSCR.XViD.AC3-IMAGiNE. Nothing has been heard from them since.</p>
<p>The group did not respond to correspondence sent to a secure account so only time will tell if this release turns out to be their last.</p>
<p><strong>Update:</strong> Fresh sources confirm that four people were visited by ICE</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/reports-feds-bust-imagine-movie-release-group-110913/feed/</wfw:commentRss>
		<slash:comments>378</slash:comments>
		</item>
		<item>
		<title>Major BitTorrent Uploader Used No Anonymity &#8211; Bring Out The Straightjacket?</title>
		<link>http://torrentfreak.com/major-bittorrent-uploader-used-no-anonymity-bring-out-the-straightjacket-110310/</link>
		<comments>http://torrentfreak.com/major-bittorrent-uploader-used-no-anonymity-bring-out-the-straightjacket-110310/#comments</comments>
		<pubDate>Thu, 10 Mar 2011 12:51:01 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[DRM and Other Evil]]></category>
		<category><![CDATA[Opinion]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=32522</guid>
		<description><![CDATA[Now accused of uploading more than 1,000 movies, a major uploader at one of the world's oldest BitTorrent sites was arrested at his home last month. Worryingly, the prosecutor in the case has just revealed that tracking the man was simple since he made no effort to hide his IP address, which was both residential and static. Is it now a sign of madness to even go online without some kind of protection?<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Just a little over 3 years ago we published an <a href="http://torrentfreak.com/how-a-bittorrent-tracker-owner-hides-from-the-anti-pirates-080206/">article</a> titled &#8220;How a BitTorrent Tracker Owner Hides from the MPAA/RIAA&#8221; where we published the techniques one site admin used to keep himself secure and sleeping well at night. While some appreciated the information provided, others saw the precautions as completely over the top and totally unnecessary.</p>
<p>&#8220;You are worse than the MAFIAA&#8217;s scare tactics,&#8221; one annoyed reader wrote to me in response. &#8220;Why all the paranoia, nothing is this bad? You make people terrified.&#8221;</p>
<p>Three years on and not only are the points in the article even more relevant than they were in 2008, but in hindsight should have been taken on board by more than just admins.</p>
<p>Earlier this month the Swedish authorities and local anti-piracy outfit Antipiratbyran revealed that a major uploader to the now-defunct Swebits tracker &#8211; one the oldest BitTorrent sites &#8211; had <a href="http://torrentfreak.com/swebits-bittorrent-tracker-shuts-down-following-uploaders-arrest-110301/">been arrested</a> by the police. The 25-year-old now stands accused of uploading more than 1,000 movies and, if prosecutor Henrik Rassmusson is to be believed, catching him was a breeze.</p>
<p>&#8220;He had been using his personal Internet account, and he had a static IP address associated with an ISP, so it was not hard to get hold of him,&#8221; Rassmusson <a href="http://sverigesradio.se/sida/artikel.aspx?programid=1646&#038;artikel=4392506">told</a> Swedish Radio yesterday.</p>
<p>While trying to be sympathetic to this guy (who is undoubtedly in pretty serious trouble) isn&#8217;t conducting this kind of activity unencrypted or without some level of anonymity simply crazy these days? Isn&#8217;t using a VPN or proxy in a foreign land a standard requirement now? Isn&#8217;t presuming and preparing for the worst a required skill in 2011? Perhaps it should be.</p>
<p>In the 2008 article our friendly admin said he would never pick up his emails without hiding his IP address and again, some people said that was going too far. The recently <a href="http://torrentfreak.com/feds-arrest-owner-of-seized-sports-streaming-domain-110304/">arrested admin</a> of ChannelSurfing.net might disagree. Google coughed up his records to the feds last month in the blink of an eye.</p>
<p>Going even further, the admin said he took precautions to hide his IP address not just on his own site, but when on those operated by others too. Some people laughed &#8211; the admin was clearly a paranoid fool, they argued.</p>
<p>But roll on to 2011 and many completely innocent fans of PS3 hacker Geohotz are about to have their IP addresses <a href="http://torrentfreak.com/been-to-any-geohots-websites-sony-wants-your-ip-address-110305/">handed over to Sony</a> by Google, YouTube and Twitter. Suddenly it&#8217;s not so amusing anymore.</p>
<p>When Internet users aren&#8217;t even free to watch videos on YouTube and read comments on Twitter without being exposed to the prying eyes of big corporations like Sony and their aggressive lawsuits, isn&#8217;t it time to consider some level of <a href="http://btguard.com/">anonymity</a> as a prerequisite to even going online?</p>
<p>No? We&#8217;ll report back in another 3 years. You will have changed your mind &#8211; guaranteed.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/major-bittorrent-uploader-used-no-anonymity-bring-out-the-straightjacket-110310/feed/</wfw:commentRss>
		<slash:comments>126</slash:comments>
		</item>
		<item>
		<title>Why uTorrent Collects Info From Its Users</title>
		<link>http://torrentfreak.com/why-utorrent-collects-info-from-its-users-110222/</link>
		<comments>http://torrentfreak.com/why-utorrent-collects-info-from-its-users-110222/#comments</comments>
		<pubDate>Tue, 22 Feb 2011 21:58:30 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[utorrent]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=31994</guid>
		<description><![CDATA[uTorrent parent company BitTorrent Inc. has revealed that it's working on putting together an overview of ISP performances worldwide. Data collected from millions of users will be used to rank Internet providers based on the speed of their network, and will possibly expose those that throttle. Valuable data that's for sure, but also a situation that triggers worries among paranoid BitTorrent users. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com//images/utorrent_logo.png" align="right" alt="utorrent">With 100 million active users every month, uTorrent and BitTorrent mainline have close to a 50 percent market share of all BitTorrent clients. Both pieces of software are based on the same code, which is developed by the San Francisco based company BitTorrent Inc.</p>
<p>A few days ago FastCompany <a href="http://www.fastcompany.com/1728751/bittorrent-netflix-isp-report-card-sneak-peek-network-performance-data#self">reported</a> that BitTorrent Inc. has started work on a new and quite intriguing project. The company has been gathering detailed statistics reported by uTorrent users in order to create an overview of the network speeds of nearly all Internet providers worldwide.</p>
<p>BitTorrent’s VP of Product Management Simon Morris explains it as follows:</p>
<p>&#8220;We have download traffic, upload traffic, BitTorrent traffic, and we have HTTP traffic. So we can answer questions like: I live in this city in the world&#8211;it could be anywhere, literally anywhere&#8211;which ISP should I use? Which is the fastest? Which ISP is messing with BitTorrent traffic? Because we have this data, we can see the difference in speeds by time of day.&#8221;</p>
<p>For now, the results of this huge dataset are only visible to the BitTorrent team, but in the near future they might decide to open them up to the public. This would then allow people to look for the most BitTorrent-friendly ISPs in their area, and potentially avoid those providers that throttle traffic. A very rough graph is provided below.</p>
<div align="center">
<h5>BitTorrent speeds per ISP in San Francisco </h5>
<p><img src="http://torrentfreak.com/images/bittorrent-sf-tracking1.jpg" alt="speed"></div>
<p>Although this kind of data can actually benefit BitTorrent users, the revelation by the BitTorrent team also raised concerns among a sub-group of naturally paranoid file-sharers. Graphing data by ISP and region requires uTorrent to send the IP-addresses of users to the San Francisco headquarters. This, in addition to detailed info on transfer speeds and download times.</p>
<p>Since the announcement a few concerned users asked TorrentFreak what data BitTorrent Inc. actually stores. A good question. The privacy policy posted on uTorrent.com says the following on the data collected via uTorrent.</p>
<p>&#8220;We also aggregate some data from our software applications (including µTorrent) regarding total traffic flows and content delivery performance of our Applications as well as other data collected in the use of our products or services in order to understand usability and monitor network conditions and compare the performance of Bittorrent and HTTP protocols on the public internet, <a href="http://www.utorrent.com/legal/privacy">it reads</a>.</p>
<p>It further states that end users may opt out of providing this information through a preference setting in uTorrent (&#8220;send back detailed info&#8221;). </p>
<p>What&#8217;s not apparent from reading the privacy policy is what kind of data is sent back to BitTorrent Inc. In an attempt to find out more and address the concerns of some users, we contacted BitTorrent&#8217;s Simon Morris, who assured us that they value the privacy of their users.</p>
<p>&#8220;We restrict our technical performance monitoring to data which tells us how well our BitTorrent clients are behaving – we have no interest in and do not collect any more private data about what people are doing with their BitTorrent clients,&#8221; he said.</p>
<p>We wouldn&#8217;t expect to hear anything else, of course, but it still says little about the kind of data that&#8217;s collected. Morris said that a fuller technical disclosure may be an option, but that this has to be discussed internally first. He was willing to share 4 broad categories where the collected data falls into.</p>
<p>* Software and system configuration (client version, country code, OS version, etc.).<br>
* Bytes transfer details (how much, how fast, what time of day, etc.).<br>
* Software feature usage stats (transfer cap, scheduler usage, labels usage, etc.).<br>
* Other technical protocol details (TCP connections, closes, resets, UT connections, etc.).</p>
<p>The above also includes the IP-address of the sender, which is used to compare the data across cities, countries and ISPs. To the more paranoid BitTorrent users this might sound worrying, but it is not much different from the type of data most websites on the Internet collect. If BitTorrent decides to post anything in public &#8211; which is not certain yet &#8211; all data will be aggregated and no individual information will be revealed.</p>
<p>Although we believe that every BitTorrent client should ideally provide a transparent and full disclosure of the data being logged, we are rather excited about the possibilities BitTorrent Inc&#8217;s plan offers. At the moment most ISPs are rather secretive about their bandwidth management practices. A speed comparison tool for BitTorrent users can therefore be a great help in choosing an Internet provider.</p>
<p>TorrentFreak will keep an eye on the developments, and provide an update and hopefully a preview of the project when more information becomes available. </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/why-utorrent-collects-info-from-its-users-110222/feed/</wfw:commentRss>
		<slash:comments>83</slash:comments>
		</item>
		<item>
		<title>Your Face is a Saxophone, A New BitTorrent Powered Animated Series</title>
		<link>http://torrentfreak.com/your-face-is-a-saxophone-110213/</link>
		<comments>http://torrentfreak.com/your-face-is-a-saxophone-110213/#comments</comments>
		<pubDate>Sun, 13 Feb 2011 21:19:23 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[Bits]]></category>
		<category><![CDATA[bittorrent-song]]></category>
		<category><![CDATA[Yfias]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=31701</guid>
		<description><![CDATA[Increasingly, content producers are adopting BitTorrent as a distribution platform. Zacqary Adam Green is one of the people involved in such a project, and he wantes to bring it to the attention of TorrentFreak&#8217;s readers. &#8220;My team and I just released the pilot episode of Your Face is a Saxophone, an animated series about the [&#8230;]<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Increasingly, content producers are adopting BitTorrent as a distribution platform. Zacqary Adam Green is one of the people involved in such a project, and he wantes to bring it to the attention of TorrentFreak&#8217;s readers.</p>
<p>&#8220;My team and I just released the pilot episode of Your Face is a Saxophone, an animated series about the advertising industry and people with inanimate objects for heads. It&#8217;s free to share, copy, modify, and released under Kopimi with CC-BY in the fine print, in case some paranoid lawyer wants something legally binding.&#8221;</p>
<p>&#8220;In addition to streaming it on YouTube, we&#8217;ve made it <a href="http://thepiratebay.org/torrent/6155937/">available on BitTorrent</a>.&#8221;</p>
<p>&#8220;We&#8217;re taking a similar route to Pioneer One and raising money through Kickstarter to produce a full season. The difference between us and <a href="http://torrentfreak.com/pioneer-one-a-bittorrent-exclusive-tv-series-100608/">Pioneer One</a>, of course, is that we&#8217;ve only started funding after finishing a whole pilot.&#8221;</p>
<p>More information is available at <a href="http://yfias.com">Yfias.com</a>.</p>
<div align="center"><iframe frameborder="0" height="410px" src="https://www.kickstarter.com/projects/zacqary/your-face-is-a-saxophone-a-free-animated-comedy-se/widget/video.html" width="480px"></iframe></div>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/your-face-is-a-saxophone-110213/feed/</wfw:commentRss>
		<slash:comments>23</slash:comments>
		</item>
	</channel>
</rss>
