<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; Search Results  &#187;  snowden</title>
	<atom:link href="http://torrentfreak.com/search/snowden/feed/rss2/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 13:11:30 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Pirate Bay Founders Celebrated in Promo Bay Tribute</title>
		<link>http://torrentfreak.com/pirate-bay-founders-celebrated-in-promo-bay-tribute-141001/</link>
		<comments>http://torrentfreak.com/pirate-bay-founders-celebrated-in-promo-bay-tribute-141001/#comments</comments>
		<pubDate>Wed, 01 Oct 2014 17:51:07 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Dubioza]]></category>
		<category><![CDATA[pirate-bay]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94661</guid>
		<description><![CDATA[A band playing festivals all around Europe and currently featured on the homepage of The Pirate Bay have dedicated a track on their new EP to the site's jailed founders. Dubioza's FREE.mp3 (The Pirate Bay Song) is an infectious ska-influenced hip-hop folk track that will ring true will file-sharers around the globe.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/promo-bay.jpg" width="200" height="185" class="alignright">Since 2012, The Pirate Bay has been periodically donating its front page to artists looking to increase their profile and reach out to new fans.</p>
<p>The initiative, known as The Promo Bay, attracted <a href="https://torrentfreak.com/10000-artists-signed-up-for-pirate-bay-promotion-12110/">10,000 applications</a> in a matter of months, and has exposed dozens of artists to hundreds of millions of views, at zero cost to them.</p>
<p>Many bands have been featured to date, but the group currently featured on the front page could be one of the best &#8216;fits&#8217; to date.</p>
<p><a href="http://dubioza.org/">Dubioza Kolektiv</a> are an already successful band that have been selling records and playing festivals all around Europe for the past 11 years. Their views on the music industry are a great match for The Pirate Bay.</p>
<p>&#8220;We live in a fast changing world and the music industry is really struggling to maintain the monopolistic role they&#8217;ve enjoyed for decades,&#8221; Dubioza bass player Vedran Mujagić told TorrentFreak.</p>
<p>&#8220;They perceive this freedom of expression and ability to share culture and knowledge in the digital age as a major threat to their profits and they employ really ugly methods in trying to suppress these practices.&#8221; </p>
<p><center><img src="http://torrentfreak.com/images/promo112.jpg" alt="DE"></center></p>
<p>The seven piece group, who hail from Bosnia and Herzegovina and promote their style as a fusion of hip-hop, reggae, dub and rock, are currently front and center on The Promo Bay with a track from their new EP, and things are working out perfectly.</p>
<p>&#8220;We sent the video of our song &#8216;No Escape (from Balkans)&#8217; and our new EP &#8216;Happy Machine&#8217; to Pirate Bay and now the video has been on the TPB homepage for a little more than 48 hours. It resulted in big traffic and more than 200,000 views of our video on YouTube &#8211; and it keeps growing,&#8221; Vedran reveals.</p>
<p>&#8220;This was really great because the song and Dubioza Kolektiv got exposed to people who would otherwise might never have heard of the band &#8211; from Siberia to South Africa. Reactions and comments have been really positive so far.&#8221;</p>
<p>But while &#8216;<a href="https://www.youtube.com/watch?v=jtgA0jvhp2A">No Escape</a>&#8216; has captured the big views so far, the second track from the EP has been flying under the radar. It&#8217;s an infectious ska-influenced romp that was written with the jailed founders of The Pirate Bay in mind.</p>
<p>&#8220;Free.mp3 (The Pirate Bay Song) is dedicated to founders of thepiratebay.org website,&#8221; the band reveals. &#8220;Gottfrid Svartholm Warg a.k.a. <a href="http://torrentfreak.com/?s=gottfrid">Anakata</a> and who is currently being held in solitary confinement and is facing six-year prison sentence in Denmark and Peter Sunde Kolmisoppi a.k.a. <a href="http://torrentfreak.com/?s=sunde">brokep</a> who is incarcerated in Sweden.&#8221;</p>
<p>The track, which is upbeat, cheerful and extremely catchy, begins with a couple of BitTorrent terms and recounts how file-sharing scares the music industry.</p>
<p>Lines including <em>&#8216;We don’t give a shit about a copyright law we take it from the rich and give it to the poor&#8217;</em> give way to Games of Thrones downloads and name checks for Kim Dotcom, Barack Obama and Wikileaks.</p>
<p>&#8220;We admire enthusiasts like people from The Pirate Bay, people like Edward Snowden, people from Wikileaks &#8211; who are fighting big corporations and governments &#8211; not for profit but because they believe in these ideals, even at the price of their own personal freedoms. It is always inspiring to see people who are finding the way to outsmart the system,&#8221; Vedran says.</p>
<p>Dubioza say they aim to deliver positivity &#8220;that hits you like a blast of fresh air&#8221; and they&#8217;ve certainly hit the mark with their attitudes towards file-sharing. Both the new EP and their entire discography have been <a href="http://thepiratebay.se/user/dubioza/">uploaded in their name</a> on the The Pirate Bay in the past few days and are mirrored on sites including KickassTorrents.</p>
<p>Those enjoying the style and the band&#8217;s ethos can join <a href="http://dubioza.org/new-tour-dates/">them on tour</a> for the rest of the month.</p>
<p><center><iframe width="650" height="366" src="//www.youtube.com/embed/GS8-nNhWlw4" frameborder="0" allowfullscreen></iframe></center></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/pirate-bay-founders-celebrated-in-promo-bay-tribute-141001/feed/</wfw:commentRss>
		<slash:comments>31</slash:comments>
		</item>
		<item>
		<title>Dotcom&#8217;s Internet Party Fails to Enter New Zealand Parliament</title>
		<link>http://torrentfreak.com/dotcoms-internet-party-fails-to-enter-new-zealand-parliament-140920/</link>
		<comments>http://torrentfreak.com/dotcoms-internet-party-fails-to-enter-new-zealand-parliament-140920/#comments</comments>
		<pubDate>Sat, 20 Sep 2014 13:18:14 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Internet Party]]></category>
		<category><![CDATA[kim dotcom]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94177</guid>
		<description><![CDATA[Kim Dotcom's Internet Party has scored just over 1.2% of the vote in New Zealand's parliamentary elections. It's a disappointing result that doesn't come close to the 5% required for a seat in Parliament. Dotcom takes full responsibility for the failure which he attributes to his "poisoned brand."<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/internetparty.png"><img src="http://torrentfreak.com/images/internetparty.png" alt="internetparty" width="243" height="198" class="alignright size-full wp-image-90114"></a>January this year Kim Dotcom <a href="http://torrentfreak.com/dotcoms-internet-party-aims-to-shake-up-politics-140115/">launched his Internet Party</a> with an ambition to enter the New Zealand Parliament a few months later. </p>
<p>The Internet entrepreneur could not run for election himself, but as the party&#8217;s president and visionary he would gain significant political power.</p>
<p>Today New Zealanders went out to vote and the Internet Party was listed on the ballots in an alliance with the Mana Party. </p>
<p>Voting booths officially closed at 7 PM local time and the provisional <a href="http://www.stuff.co.nz/national/politics/election-results-2014/official-count">results</a> show that Internet Mana failed to win a seat.</p>
<p>The party managed 1.26% of the total vote, somewhat short of the 5% required to enter the New Zealand Parliament. A disappointing result after Dotcom spent more than $2 million on the party and its election campaign.</p>
<p><center><a href="http://torrentfreak.com/images/kiwi-results.png"><img src="http://torrentfreak.com/images/kiwi-results.png" alt="kiwi-results" width="608" height="292" class="alignnone size-full wp-image-94220"></a></center></p>
<p>Over the past several weeks Internet Mana received a lot of attention in the press. Dotcom actively campaigned against his arch-rival Prime Minister John Key, and earlier this week the party organized the &#8220;Moment of Truth&#8221; during which Edward Snowden, Glen Greenwald and Julian Assange all criticized New Zealand&#8217;s secret spying efforts. </p>
<p>Despite the heavy critique of the Prime Minister, Key&#8217;s National Party became the overwhelming winner of the elections with nearly half of all votes. </p>
<p>Following the defeat Dotcom apologized to Mana leader Hone Harawira and the Maori people. Mr Harawira lost his Parliament seat and Dotcom suggests that he may be to blame for the disappointing result.</p>
<p>&#8220;I take full responsibility,&#8221; Dotcom said in a short speech. &#8220;The brand Kim Dotcom was poisoned &#8230; and I did not see that before the last couple of weeks.&#8221;</p>
<p>After his speech Dotcom left the building, declining interview requests from local reporters.</p>
<p>In a tweet Dotcom later congratulated the Prime Minister and his National Party on their win. </p>
<p>&#8220;New Zealanders have chosen National and John Key to lead. I congratulate the Prime Minister. Please do your best for all Kiwis. Good luck,&#8221; he wrote.</p>
<p><center><a href="http://torrentfreak.com/images/dotcomkey.png"><img src="http://torrentfreak.com/images/dotcomkey.png" alt="dotcomkey" width="500" height="148" class="alignnone size-full wp-image-94233"></a></center></p>
<p>Responding to the results Internet Party leader Laila Harre said that the party&#8217;s policy went unreported in the media, which mostly focused on scandals and the dirty games being played.</p>
<p>Harre thanked Dotcom for the opportunity to shake up New Zealand politics. She said that Dotcom became the symbol of Internet Mana, but that the party likely underestimated the impact this would have on the campaign. </p>
<p>&#8220;There&#8217;s been a two-year campaign of vilification of Kim and that was clearly impacted on our campaign,&#8221; Harre <a href="http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&#038;objectid=11328641">noted</a>.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/dotcoms-internet-party-fails-to-enter-new-zealand-parliament-140920/feed/</wfw:commentRss>
		<slash:comments>46</slash:comments>
		</item>
		<item>
		<title>Email: Warner Bros Conspired with New Zealand Over Kim Dotcom Extradition</title>
		<link>http://torrentfreak.com/email-warner-bros-conspired-with-new-zealand-over-kim-dotcom-extradition-140915/</link>
		<comments>http://torrentfreak.com/email-warner-bros-conspired-with-new-zealand-over-kim-dotcom-extradition-140915/#comments</comments>
		<pubDate>Mon, 15 Sep 2014 10:12:21 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93951</guid>
		<description><![CDATA[Kim Dotcom rolled out Julian Assange and Edward Snowden at his Moment of Truth event today, but despite promises to reveal "concrete evidence" in respect of his own case, a big reveal simply did not take place. An email reportedly set to be unveiled was dismissed as a fake by Warner Bros. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Ever since the raids of 2012, Kim Dotcom has pointed to what he sees as a contract shutdown of Megaupload. Designed by Hollywood and carried out by their partners in the Obama administration and the New Zealand Government, Dotcom claims that his fate was pre-determined and a result of corruption.</p>
<p>One of his claims is that despite the reservations of those in New Zealand&#8217;s intelligence departments, Dotcom was allowed to become a resident of the country. This, the entrepreneur says, was carried out to pin him down in a friendly location so that he could be dealt with by the United States.</p>
<p>This morning, at his Moment of Truth event, Dotcom rolled out big guns including journalist Glenn Greenwald, Wikileaks&#8217; Julian Assange and even Edward Snowden himself to deliver his &#8220;bombshell&#8221;. The latter appeared via video links, connections which Dotcom said we&#8217;re being run through a new encrypted browser-based platform under development at Mega.</p>
<p><center><img src="http://torrentfreak.com/images/moment.png" alt="Moment"></center></p>
<p>Much of the discussion centered around the alleged unlawful domestic surveillance of New Zealand citizens by their own Government, but the panel frequently weaved in elements of Dotcom&#8217;s own unique situation.</p>
<p>&#8220;We share the same prosecutor, so I understand what is going on there, on a very personal level,&#8221; Julian Assange said of Dotcom.</p>
<p>&#8220;[The United States Government] is trying to apply US law in as many countries as possible, applying their law in New Zealand to coerce and pluck out people to other states,&#8221; Assange said.</p>
<p>&#8220;When you are able to control their police forces you have succeeded in annexing that country. It&#8217;s a problem for me personally and it&#8217;s a problem for Kim Dotcom.&#8221;</p>
<p>Dotcom&#8217;s human rights lawyer Robert Amsterdam spoke at length on the perils of the Trans Pacific Partnership and criticized the New Zealand Government for its treatment of Dotcom.</p>
<p>&#8220;What they did [to Kim Dotcom during the 2012 raid] is so beyond the pale that the leader of that democratic government should have resigned on the spot that day,&#8221; Amsterdam said.</p>
<p>The event was highly polished and was well received by those in attendance, but failed to deliver on one key front. Dotcom previously said that he would present &#8220;absolutely concrete&#8221; evidence that Prime Minister John Key knew about him earlier than he had claimed. In the event, nothing remotely of that nature was presented.</p>
<p>However, several hours before the Moment of Truth got off the ground, New Zealand media began reporting that Dotcom would reveal an email at the event, one that would prove that Hollywood had an arrangement with Key to allow Dotcom into the country in order to extradite him to the United States.</p>
<p>The email in question, dated October 27, 2010, was allegedly sent by current Warner Bros CEO Kevin Tsujihara to Michael Ellis of the MPA/MPAA.</p>
<p>Tsujihara is one of the Warner executives the company sent to New Zealand in 2010 to deal with a dispute that was putting at risk the filming of the Hobbit movies in the country. During his visit Tsujihara met John Key and the email purports to report on one of those meetings.</p>
<p>&#8220;Hi Mike. We had a really good meeting with the Prime Minister. He&#8217;s a fan and we&#8217;re getting what we came for,&#8221; the leaked copy of the email reads.</p>
<p>&#8220;Your groundwork in New Zealand is paying off. I see strong support for our anti-piracy effort. John Key told me in private that they are granting Dotcom residency despite pushback from officials about his criminal past. His AG will do everything in his power to assist us with our case. VIP treatment and then a one-way ticket to Virginia.</p>
<p>&#8220;This is a game changer. The DOJ is against the Hong Kong option. No confidence in the Chinese. Great job,&#8221; the email concludes.</p>
<p><center><img src="http://torrentfreak.com/images/keymail.jpg" alt="keymail"></center></p>
<p>But while an email of this nature would have indeed warranted a &#8220;bombshell&#8221; billing, the Moment of Truth concluded without it or any other similar evidence being presented. Even before the event began, Warner Bros were on record describing the email as a fake.</p>
<p>&#8220;Kevin Tsujihara did not write or send the alleged email, and he never had any such conversation with Prime Minister Key,&#8221; <a href="http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&#038;objectid=11324988">said</a> Paul McGuire, Warner Bros.&#8217; senior vice president for worldwide communications.</p>
<p>&#8220;The alleged email is a fabrication,&#8221; he added.</p>
<p>The lack of the promised big reveal is fairly dramatic in itself. It&#8217;s certainly possible that Dotcom&#8217;s team lost confidence and pulled the reveal at the last minute, which would be a wise move if its authenticity was in doubt.</p>
<p>If the email is indeed proven to be a fake, big questions will need to be answered by the person who provided it because up until very recently Dotcom was staking his shirt on it. If it&#8217;s genuine, and proving that will be easier said than done now, we&#8217;ll definitely hear more as the weeks unfold.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/email-warner-bros-conspired-with-new-zealand-over-kim-dotcom-extradition-140915/feed/</wfw:commentRss>
		<slash:comments>50</slash:comments>
		</item>
		<item>
		<title>Which VPN Services Take Your Anonymity Seriously? 2014 Edition</title>
		<link>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/</link>
		<comments>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/#comments</comments>
		<pubDate>Tue, 09 Sep 2014 19:45:35 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Sidebar]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[vpn services]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=85262</guid>
		<description><![CDATA[Millions of people use a VPN service to protect their privacy, but not all VPNs are as anonymous as one might hope. In fact, some VPN services log users' IP-addresses for weeks. To find out how secure VPNs really are TorrentFreak asked the leading providers about their logging policies, and more.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/boxed.jpg"><img src="http://torrentfreak.com/images/boxed.jpg" alt="boxed" width="222" height="178" class="alignright size-full wp-image-36576"></a>By now most Internet users are well aware of the fact that pretty much every step they take on the Internet is logged or monitored. </p>
<p>To prevent their IP-addresses from being visible to the rest of the Internet, millions of people have signed up to a VPN service. Using a VPN allows users to use the Internet anonymously and prevent snooping.</p>
<p>Unfortunately, not all VPN services are as anonymous as they claim.  </p>
<p>Following a high-profile case of an individual using an &#8216;anonymous&#8217; VPN service that turned out to be not so private, TorrentFreak decided to ask a selection of VPN services some tough questions.</p>
<p>By popular demand we now present the third iteration of our VPN services &#8220;logging&#8221; review. In addition to questions about logging policies we also asked VPN providers about their stance towards file-sharing traffic, and what they believe the most secure VPN is. </p>
<p><strong>Last update: October 7, 2014 (added partial <a href="http://torrentfreak.com/%D0%BA%D0%B0%D0%BA%D0%BE%D0%B9-%D0%B8%D0%B7-vpn-%D1%81%D0%B5%D1%80%D0%B2%D0%B8%D1%81%D0%BE%D0%B2-%D1%80%D0%B5%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE-%D0%B7%D0%B0%D0%B1%D0%BE%D1%82%D0%B8%D1%82%D1%8C%D1%81%D1%8F/" title="Какой из VPN сервисов реально заботиться о Вашей анонимности? Результаты 2014 года.">Russian translation</a>)<br>
</strong><br>
&#8212;</p>
<p>1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long? </p>
<p>2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?</p>
<p>3. What tools are used to monitor and mitigate abuse of your service?</p>
<p>4. In the event you receive a DMCA takedown notice or European equivalent, how are these handled?</p>
<p>5. What steps are taken when a valid court order requires your company to identify an active user of your service?</p>
<p>6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?</p>
<p>7. Which payment systems do you use and how are these linked to individual user accounts?</p>
<p>8. What is the most secure VPN connection and encryption algorithm you would recommend to your users? </p>
<p>&#8212;</p>
<p>What follows is the list of responses from the VPN services, in their own words. Providers who didn&#8217;t answer our questions directly or failed by logging everything were excluded. Please note, however, that several VPN companies listed here do log to some extent. The order of the lists holds no value. </p>
<h2><a href="http://bit.ly/privateinternet">Private Internet Access</a></h2>
<p><a href="http://torrentfreak.com/images/pia.png"><img class="alignright size-full wp-image-41039" title="torrentprivacy" src="http://torrentfreak.com/images/pia.png" alt="" width="180" height="40"></a>1. We absolutely do not log any traffic nor session data of any kind, period. We have worked hard to meticulously fork all daemons that we utilize in order to achieve this functionality. It is definitely not an easy task, and we are very proud of our development team for helping Private Internet Access to achieve this unique ability.</p>
<p>2. We operate out of the US which is one of the few, if only, countries without a mandatory data retention law. We explored several other jurisdictions with the help of our professional legal team, and the US is still ideal for privacy-based VPN services.</p>
<p>We severely scrutinize the validity of any and all legal information requests. That being said, since we do not hold any traffic nor session data, we are unable to provide any information to any third-party. Our commitment and mission to preserve privacy is second to none.</p>
<p>3. We do not monitor any traffic, period. We block IPs/ports as needed to mitigate abuse when we receive a valid abuse notification.</p>
<p>4. We do not host any content and are therefore unable to remove any of said content. Additionally, our mission is to preserve and restore privacy on the Internet and society. As such, since we do not log or monitor anything, we&#8217;re unable to identify any users of our service.</p>
<p>5. Once again, we do not log any traffic or session data. Additionally, unlike the EU and many other countries, our users are protected by legal definition. For this reason, we&#8217;re unable to identify any user of our service. Lastly, consumer protection laws exist in the US, unlike many other countries. We must abide by our advertised privacy policy.</p>
<p>6. We do not discriminate against any kind of traffic/protocol on any of our servers, period. We believe in a free, open, and uncensored internet.</p>
<p>7. Bitcoin, Ripple, PayPal, Google Play (Mobile), OKPay, CashU, Amazon and any major Gift Card. We support plenty of anonymous payment methods. For this reason, the highest risk users should definitely use Bitcoin, Ripple or a major gift card with an anonymous e-mail account when subscribing to our privacy service.</p>
<p>8. We&#8217;re the only provider to date that provides a plethora of encryption cipher options. We recommend, mostly, using AES-128, SHA1 and RSA2048. </p>
<p><a href="http://bit.ly/privateinternet">Private Internet Access website</a> </p>
<h2><a href="http://bit.ly/torguardvpn">TorGuard</a></h2>
<p><a href="http://torrentfreak.com/images/torguard.png"><img class="alignright size-full wp-image-50163" title="torguard" src="http://torrentfreak.com/images/torguard.png" alt="" width="180" height="59"></a>1. TorGuard does not store any IP address or time stamps on any VPN and proxy servers, not even for a second. Further, we do not store any logs or time stamps on user authentication servers connected to the VPN. In this way it is not even possible to match an external time stamp to a user that was simultaneously logged in. Because the VPN servers utilize a shared IP configuration, there can be hundreds of users sharing the same IP at any given moment further obfuscating the ability to single out any specific user on the network.</p>
<p>2. TorGuard is a privately owned company with parent ownership based in Nevis and our headquarters currently located in the US. Our legal representation at the moment is comfortable with the current corporate structuring however we wouldn’t hesitate to move all operations internationally should the ground shift beneath our feet. We now offer VPN access in 23+ countries worldwide and maintain all customer billing servers well outside US borders.</p>
<p>We would only be forced to communicate with a third-party in the event that our legal team received a court ordered subpoena to do so. This has yet to happen, however if it did we would proceed with complete transparency and further explain the nature of TorGuard’s shared VPN configuration. We have no logs to investigate, and thus no information to share.</p>
<p>3. Our network team uses commercial monitoring software with custom scripts to keep an eye on individual server load and service status/uptime so we can identify problems as fast as possible. If abuse reports are received from an upstream provider, we block it by employing various levels of filtering and global firewall rules to large clusters of servers. Instead of back tracing abuse by logging, our team mitigates things in real-time. We have a responsibility to provide fast, abuse-free VPN services for our clients and have perfected these methods over time.</p>
<p>4. In the event of receiving a DMCA notice, the request is immediately processed by our abuse team. Because it is impossible for us to locate which user on the server is actually responsible for the violation, we temporarily block the infringing server and apply global rules depending on the nature of the content and the server responsible. The system we use for filtering certain content is similar to keyword blocking but with much more accuracy. This ensures the content in question to no longer pass through the server and satisfies requirements from our bandwidth providers.</p>
<p>5. Due to the nature of shared VPN services and how our network is configured, it is not technically possible to effectively identity or single out one active user from a single IP address. If our legal department received a valid subpoena, we would proceed with complete transparency from day one. Our team is prepared to defend our client’s right to privacy to the fullest extent of the law.</p>
<p>6. BitTorrent is only allowed on select server locations. TorGuard now offers a variety of protocols like http/socks proxies, OpenVPN, SSH Tunnels, SSTP VPN and Stealth VPN (DPI Bypass), with each connection method serving a very specific purpose for usage. Since BitTorrent is largely bandwidth intensive, we do not encourage torrent usage on all servers. Locations that are optimized for torrent traffic include endpoints in: Canada, Netherlands, Iceland, Sweden, Romania, Russia and select servers in Hong Kong. This is a wide range of locations that works efficiently regardless of the continent you are trying to torrent from. </p>
<p>7. We currently accept payments through all forms of credit or debit card, PayPal, OKPAY, and Bitcoin. During checkout we may ask the user to verify a billing phone and address but this is simply to prevent credit card fraud, spammers, and keep the network running fast and clean. After payment it is possible to change this to something generic that offers more privacy. No VPN or Proxy usage can be linked back to a billing account due to the fact we hold absolutely no levels of logging on any one of our servers, not even timestamps! </p>
<p>8. For best security we advise clients to choose OpenVPN connections only, and if higher encryption is called for use AES256 bit. This option is available on many locations and offers excellent security without degrading performance. For those that are looking to defeat Deep Packet Inspection firewalls (DPI) like what is encountered in countries such as China or Iran, TorGuard offers “Stealth” VPN connections in the Netherlands, UK and Canada. Stealth connections feature OpenVPN obfuscation technology that causes VPN traffic to appear as regular connections, allowing VPN access even behind the most strict corporate wifi networks or government regulated ISPs.</p>
<p><a href="http://bit.ly/torguardvpn">TorGuard website</a> </p>
<h2><a href="http://bit.ly/ipvanis">IPVanish</a></h2>
<p><a href="/images/ipvarnish.png"><img src="http://torrentfreak.com/images/ipvarnish.png" alt="ipvarnish" width="152" height="82" class="alignright size-full wp-image-51008"></a>1. IPVanish has a no-log policy. We keep no traffic logs.</p>
<p>2. IPVanish is headquartered in the US and thus operates under US law.</p>
<p>3. IPVanish has no monitoring in place. To elaborate, IPVanish does not sniff or monitor any user’s traffic or activity for any reason.</p>
<p>4. IPVanish keeps no logs of any user’s activity and responds accordingly.</p>
<p>5. IPVanish, like every other company, has to follow the law in order to remain in business. Only US law applies. </p>
<p>6. P2P is permitted. IPVanish in fact does not block or throttle any ports, protocols, servers or any type of traffic whatsoever.</p>
<p>7. PayPal and all major credit cards are accepted. Payments and product use are in no way linked. User authentication and billing info are help on completely different and independent platforms.</p>
<p>8. OpenVPN generally provides the strongest encryption algorithm, so that is the recommended encryption protocol. IPVanish also allows a choice between TCP and UDP, and UDP is generally recommended for better speed.</p>
<p><a href="http://bit.ly/ipvanis">IPVanish website</a></p>
<h2><a href="http://btguard.com/?a=discounts">BTGuard</a></h2>
<p><img src="http://torrentfreak.com/images/btguard2.jpg" align="right" alt="btguard">1. We do not keep any logs whatsoever.</p>
<p>2. The jurisdiction is Canada. Since we do not have log files, we have no information to share. We do not communicate with any third parties. The only event in which we would even communicate with a third-party is if we received a court order. We would then be forced to notify them we have no information. This has not happened yet.</p>
<p>3. If serious abuse is reported we enable tcpdump to confirm the abuse and locate the user. These dumps are immediately removed. If the user is abusing our service they will be terminated permanently but we have never shared user information with a 3rd party. </p>
<p>4. We do not have any open incoming ports, so it’s not possible for us to “takedown” any broadcasting content.</p>
<p>5. We take every step within the law to fight such an order.</p>
<p>6. Yes, all types of traffic our allowed with our services.</p>
<p>7. We accept PayPal and Bitcoin. All payments are linked to users accounts because they have to be for disputes and refunds.</p>
<p>8. 256-bit AES is the most secure. However 128-bit blowfish is plenty good. If you&#8217;re concerned about surveillance agencies such as the NSA, their capabilities are shrouded in secrecy and claiming to be able to protect you is offering you nothing but speculation. As far as what&#8217;s publicly available for deciphering encryption, both of the encryptions I mentioned are more than sufficient.</p>
<p><a href="http://btguard.com/?a=discounts">BTGuard website</a></p>
<h2><a href="https://privacy.io/">Privacy.io</a></h2>
<p><a href="http://torrentfreak.com/images/privacyio.jpg"><img class="alignright size-full wp-image-41044" title="privacy" src="http://torrentfreak.com/images/privacyio.jpg" alt="" width="180" height="50"></a>1. We do not log any information on our VPN servers. The only scenario is if a technical issue arises, but we request permission from the user first, and we only do it for the duration of the job, and then it is removed.</p>
<p>2. We are in the process of moving jurisdictions away from Australia at present as we are unsure what our current government plans to do in regards to our privacy. We have not decided where yet.</p>
<p>3. Only SMTP port 25 is filtered to mitigate spam, but we are working on some tools to make it easier for users to send mail.</p>
<p>4. Any DMCA request is ignored, as we have no logs to do anything about them.</p>
<p>5. Same as above, as we do not log, so we are unable to provide any information. If the law attempts to make us do such things, we will move our business to a location where that cannot occur, and if that fails we will close up shop before we provide any information.</p>
<p>6. All protocols are allowed with our service, with the only exception of SMTP port 25 currently being filtered.</p>
<p>7. At present we only accept PayPal and CC (processed by PayPal), but we are looking into alternative types of payments. We go out of our way to make sure that PayPal transactions are not linked to the users, we generate a unique key per transaction to verify payment for the account is made, and then nuke that unique key. Bitcoin and Litecoin are also on the agenda.</p>
<p>8. At present we offer 128 bit for PPTP and 256 bit for OpenVPN, We plan to offer stronger encryption for the security conscious.</p>
<p><a href="https://privacy.io/">Privacy.io website</a></p>
<h2><a href="http://vikingvpn.com/">VikingVPN</a></h2>
<p><img src="http://torrentfreak.com/images/vikingvpn.jpg" alt="vikingvpn" width="180" height="203" class="alignright size-full wp-image-74962">1. No. We run a zero knowledge network and are unable to tie a user to an IP address.</p>
<p>2. United States, they don&#8217;t have data retention laws, despite their draconian surveillance programs. The only information we share with anyone is billing information to our payment gateway. This can be anonymized by using a pre-paid anonymous card. If asked to share specific data about our users and their habits, we would be unable to do so, because we don&#8217;t have any logs of that data.</p>
<p>3. That is mostly confidential information. However, we can assure our users that we do not use logging to achieve this goal.</p>
<p>4. In the event of a DMCA notice, we send out the DMCA policy published on our website. We haven&#8217;t yet received a VALID DMCA notice.</p>
<p>5. We exhaust all legal options to protect our users. Failing that, we would provide all of our logs, which do not actually exist. If required to wiretap a user under a National Security Letter, we have a passively triggered Warrant Canary. We would also likely choose to shut down our service and put it up elsewhere.</p>
<p>6. Yes. Those ports are all open, and we have no data caps.</p>
<p>7. We currently only take credit cards. Our payment provider is far more restrictive than we ever imagined they would be. We&#8217;re still trying to change payment providers. Fortunately, by using a pre-paid credit card, you can still have totally anonymous service from us.</p>
<p>8. A strong handshake (either RSA-4096+ or a non-standard elliptic curve as the NIST curves are suspect). A strong cipher such as AES-256-CBC or AES-256-GCM encryption (NOT EDE MODE). At least SHA1 for data integrity checks. SHA2 and the newly adopted SHA3 (Skein) hash functions are also fine, but slower and provide no real extra assurances of data integrity, and provide no further security beyond SHA1. The OpenVPN HMAC firewall option to harden the protocol against Man-in-the-Middle and Man-on-the-Side attacks.</p>
<p><a href="http://vikingvpn.com/">VikingVPN website</a> </p>
<h2><a href="http://www.ivpn.net/">IVPN</a></h2>
<p><a href="http://torrentfreak.com/images/ivpn.png"><img src="http://torrentfreak.com/images/ivpn.png" alt="ivpn" width="150" height="69" class="alignright size-full wp-image-85390"></a>1.  IVPN’s top priority is the privacy of its customers and therefor we do not store any connection logs or any other log that could be used to associate a connection to a customer.</p>
<p>2. IVPN is incorporated in Malta. We would ignore any request to share data unless it was served by a legal authority with jurisdiction in Malta in which case we would inform them that we don&#8217;t have the data to share. If we were served a subpoena which compelled us to log traffic we would find a way to inform our customers and relocate to a new jurisdiction.</p>
<p>3. We use a tool called PSAD to mitigate attacks originating from customers on our network. We also use rate-limiting in iptables to mitigate SPAM.</p>
<p>4. We ensure that our network providers understand the nature of our business and that we do not host any content. As a condition of the safe harbor provisions they are required to inform us of each infringement which includes the date, title of the content and the IP address of the gateway through which it was downloaded. We simply respond to each notice confirming that we do not host the content in question.</p>
<p>5. Assuming the court order is requesting an identity based on a timestamp and IP, our legal department would respond that we don&#8217;t have any record of the user&#8217;s identity nor are we legally compelled to do so.</p>
<p>6. We &#8216;allow&#8217; BitTorrent on all servers except gateways based in the USA. Our USA network providers are required to inform us of each copyright infringement and are required to process our response putting undue strain on their support resources (hundreds per day). For this reason providers won&#8217;t host our servers in the USA unless we take measures to mitigate P2P activity.</p>
<p>7. We currently accept Bitcoin, Cash and PayPal. No information relating to a customers payment account is stored with the exception of automated PayPal subscriptions where we are required to store the subscription ID in order to assign it to an invoice (only for the duration of the subscription after which it is deleted). Of course PayPal will always maintain a record that you have sent funds to IVPN but that is all they have. If you need to be anonymous to IVPN and don&#8217;t wish to be identified as a customer then we recommend using Bitcoin or cash.</p>
<p>8. We recommend and offer OpenVPN using the strongest AES-256 cipher. For key exchange and authentication 4096-bit RSA keys are used.</p>
<p><a href="http://www.ivpn.net/">IVPN website</a></p>
<h2><a href="https://privatevpn.com/">PrivatVPN</a></h2>
<p><a href="http://torrentfreak.com/images/privatvpn.jpg"><img class="alignright size-full wp-image-41044" title="privatvpn" src="http://torrentfreak.com/images/privatvpn.jpg" alt="" width="180" height="53"></a>1. We don’t keep ANY logs that allow us or a 3rd party to match an IP address and a time stamp to a user our service. The only thing we log are e-mails and user names but it’s not possible to bind an activity on the Internet to a user.</p>
<p>2. We operate in Swedish jurisdiction. Since we do not log any IP addresses we have nothing to disclose. Circumstances doesn&#8217;t matter in this case, we have no information regarding our customers’ IP addresses and activity on the Internet. Therefore we have no information to share with any 3rd party.</p>
<p>3. If there&#8217;s abuse, we advise that service to block our IP in the first instance, and second, we can block traffic to the abused service.</p>
<p>4. This depends on the country in which we’re receiving a DMCA takedown. For example, we’ve received a DMCA takedown for UK and Finland and our response was to close P2P traffic in those countries.</p>
<p>5. If we get a court order to monitor a specific IP then we need to do it, and this applies to every VPN company out there.</p>
<p>6. Yes, we allow Torrent traffic.</p>
<p>7. PayPal, Payson and Plimus. Every payment has an order number, which is linked to a user. Otherwise we wouldn&#8217;t know who has made a payment. To be clear, you can&#8217;t link a payment to an IP address you get from us.</p>
<p>8. OpenVPN TUN with AES-256. On top is a 2048-bit DH key.</p>
<p><a href="https://privatevpn.com/">PrivatVPN website</a></p>
<h2><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ</a></h2>
<p><img class="alignright size-full wp-image-49734" title="prq" src="http://torrentfreak.com/images/prq.png" alt="" width="129" height="102">1. No. Wo do not log anything and we only require a working e-mail address to be a customer.</p>
<p>2. Swedish. We do not share information with anyone.</p>
<p>3. Not disclosed.</p>
<p>4. Put it in the trash where it belongs!</p>
<p>5. None, since we do not have any customer information and no logs.</p>
<p>6. We host anything as long as it&#8217;s not SPAM related or child porn.</p>
<p>7. Visa/Mastercard, Bitcoin, PayPal. No correlation between payment data and customer data.</p>
<p>8. We provide OpenVPN services (along with dedicated servers and other hosting services).</p>
<p><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ website</a></p>
<h2><a href="http://www.tigervpn.com/en/home">tigerVPN</a></h2>
<p><a href="http://torrentfreak.com/images/tigervpn.png"><img src="http://torrentfreak.com/images/tigervpn.png" alt="tigervpn" width="180" height="73" class="alignright size-full wp-image-85421"></a>1. Absolutely not! We built tigerVPN to purge all data once the transmission of a IP package was completed successfully. Its impossible to trace back any customer. On top of that we decided to use shared IPs in order to further randomize and anonymize our customers. The combination of having absolutely no logs at all and multiple customers per IP, wipes our customers digital footprint</p>
<p>2. We are a limited liability company in Slovakia.  Slovakia does not have any data retention programs and furthermore encourage ISP’s to protect their customers privacy on the net. We are not required to share any information with 3rd party hence it would be illegal thanks to the law of telecom secrecy. </p>
<p>3. Since we don’t keep logs, we can&#8217;t monitor abusive behavior, which is the price for building a customer secure environment!</p>
<p>4. We can’t comply since we can’t identify customers, therefore it’s pointless to follow any requests. We have a specific folder for these eMails ;-)</p>
<p>5. Same as above. We seriously can’t tell which customer did what, when, where, at any given time.</p>
<p>6. It’s allowed on all servers although we gently ask our customers to use either Romania or Netherlands. Some infrastructure service providers do not want file sharing so it happened to us that we were asked to move our servers due to file sharing. We found some reliable partners in Romania and Netherlands which tolerate p2p so we kindly ask our customers to use these server parks.</p>
<p>7. Customers can pay with Visa, Mastercard and Debit. On top of that we also use PayPal. We use hash keys and tokens to identify a payment but it’s not logged or linked to the customer. We had to do this anyway hence we are a PCI Level 1 compliant merchant. Therefore we are not allowed to store any card or payment data with the records of our customers. These keys are pointless for anyone else so there is no chance to build a connection.</p>
<p>8. We offer PPTP, L2TP and OpenVPN, while out of nature OpenVPN comes with the highest encryption and algorithm. L2TP and OpenVPN are 256bit SSL  encrypted while PPTP comes with a solid 128bit. Although our customers are individual and have their own sense of why and what to use, we recommend L2TP as solid protocol. It’s less geeky and more secure than PPTP, but our customers can pick any of them in all the 47 network nodes around the globe.</p>
<p><a href="http://www.tigervpn.com/en/home">tigerVPN website</a></p>
<h2><a href="http://mullvad.net/en">Mullvad</a></h2>
<p><a href="http://torrentfreak.com/images/mullvad.jpg"><img class="alignright size-full wp-image-41059" title="mullvad" src="http://torrentfreak.com/images/mullvad.jpg" alt="" width="180" height="37"></a>1. No. This would make both us and our users more vulnerable so we<br>
certainly don&#8217;t. To make it harder to watch the activities of an IP address from the outside we also have many users share each address, both for IPv4 and our upcoming IPv6 support.</p>
<p>2. Swedish jurisdiction. Under no circumstance we will share information with a third-party. First of all we take pains to not actually possess information that could be of interest to third parties, to the extent possible. In the end there is no practical way for the Swedish government to get information about our users from us.</p>
<p>3. We don&#8217;t monitor our users. In the rare cases of such egregious network abuse that we can&#8217;t help but notice (such as DoS attacks) we stop it using basic network tools.</p>
<p>4. There is no such Swedish law that is applicable to us.</p>
<p>5. We make sure not to store sensitive information that can be tied to publicly available information, so that we have nothing to give out. We believe it is not possible in Swedish law to construct a court order that would compel us to actually give out information about our<br>
users. Not that we would anyway. We started this service for political reasons and would rather discontinue it than having it work against its purpose.</p>
<p>6. Yes.</p>
<p>7. Bitcoin (we were the first service to accept it), cash (in the mail), bank transfers, and PayPal / credit cards. Payments are tied to accounts but accounts are just random numbers with no personal information attached that users can create at will. With the anonymous payments possible with cash and Bitcoin it can be anonymous all the way.</p>
<p>8. We use OpenVPN. We also provide PPTP because some people want it but we strongly recommend against it. Encryption algorithms and key lengths are important but often get way too much attention at the expense of other important but harder to measure things such as leaks and computer security.</p>
<p><a href="http://mullvad.net/en">Mullvad website</a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/feed/</wfw:commentRss>
		<slash:comments>409</slash:comments>
		</item>
		<item>
		<title>Bleep&#8230; BitTorrent Unveils Serverless &amp; Encrypted Chat Client</title>
		<link>http://torrentfreak.com/bleep-bittorrent-unveils-serverless-chat-client-140730/</link>
		<comments>http://torrentfreak.com/bleep-bittorrent-unveils-serverless-chat-client-140730/#comments</comments>
		<pubDate>Wed, 30 Jul 2014 21:23:00 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[bittorrent bleep]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=91847</guid>
		<description><![CDATA[BitTorrent Inc., the company behind the popular file-sharing client uTorrent , unveiled its serverless chat client today. BitTorrent Bleep allows users to communicate via text or voice, fully encrypted and without the need for central servers. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/bleep.jpg"><img src="http://torrentfreak.com/images/bleep.jpg" alt="bleep" width="250" height="111" class="alignright size-full wp-image-91848"></a>Encrypted Internet traffic <a href="http://torrentfreak.com/encrypted-internet-traffic-surges-140514/">surged</a> worldwide after the Snowden revelations, with several developers releasing new tools to enable people to better protect their privacy. </p>
<p>Today BitTorrent Inc. contributes with the release of BitTorrent Bleep, a communication tool that allows people to exchange information without the need for any central servers. Combined with state of the art end-to-end encryption, the company sees Bleep as the ideal tool to evade government snooping.</p>
<p>Bleep&#8217;s main advantage over some other encrypted messaging applications is the absence of central servers. This means that there are no logs stored, all metadata goes through other peers in the network.</p>
<p>&#8220;Many messaging apps are advertising privacy and security by offering end-to-end encryption for messages. But when it comes to handling metadata, they are still leaving their users exposed,&#8221; BitTorrent&#8217;s Farid Fadaie explains.</p>
<p>&#8220;We reimagined how modern messaging should work. Our platform enables us to offer features in Bleep that are unique and meaningfully different from what is currently available.&#8221;</p>
<p><center><strong>Bleep Bleep</strong><br></br></center><center><a href="http://torrentfreak.com/images/BleepScreen.jpg"><img src="http://torrentfreak.com/images/BleepScreen.jpg" alt="BleepScreen" width="1000" height="759" class="alignnone size-full wp-image-91866"></a></center></p>
<p>The application&#8217;s development is still in the early stages and the current release only works on Windows 7 and 8. Support for other operating systems including popular mobile platforms will follow in the future. </p>
<p>Aspiring Bleep users can create an account via an email or mobile phone number, but an incognito mode without the need to provide any personal details is also supported.</p>
<p>The new messaging app is not the only ‘breach safe’ tool the company is currently working on. Last year BitTorrent launched its Sync application which provides a secure alternative to centralized cloud backup solutions such as Dropbox and Google Drive.</p>
<p>BitTorrent Inc. is inviting people to test the new Bleep application, but warns there are still some bugs. </p>
<p>Those who want to give BitTorrent Bleep a try can head over to BitTorrent&#8217;s <a href="http://labs.bittorrent.com/experiments/bleep/">experiments section</a> to sign up for the pre-Alpha release.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/bleep-bittorrent-unveils-serverless-chat-client-140730/feed/</wfw:commentRss>
		<slash:comments>57</slash:comments>
		</item>
		<item>
		<title>Why Activism Isn&#8217;t Enough</title>
		<link>http://torrentfreak.com/activism-isnt-enough-140601/</link>
		<comments>http://torrentfreak.com/activism-isnt-enough-140601/#comments</comments>
		<pubDate>Sun, 01 Jun 2014 20:38:20 +0000</pubDate>
		<dc:creator><![CDATA[Rick Falkvinge]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[copyright]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=89015</guid>
		<description><![CDATA[Every now and then it's being questioned why the Pirate Party chose the political route to safeguard privacy and other liberties, as well as reform those monopolies that stand in its way, such as the copyright monopoly. The answer is simple: activism isn't enough.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>It can be very educational to watch the behavior of career politicians. They frequently have opinions about individual activists and activist movements. You can hear them praising the efforts to change society and participate in the democratic process, in the media, in articles, and in person.</p>
<p>And then they move ahead with a bill that does the exact opposite.</p>
<p>To wit: In Sweden, in the week after the European Elections, a temporary and controversial wiretapping bill was made permanent. It may look like a coincidence. Then again, Peter Sunde, the spokesperson of the Pirate Bay, was arrested in the same week. </p>
<p>That&#8217;s another coincidence, just as when the Appeals Court hearings for The Pirate Bay mock trial which were slated for the week right after an election. And there was another coincidence when the evaluation of the illegal Data Retention Directive was to be presented right after the elections, rather than facing the music and abolishing it once it was declared illegal.</p>
<p>There are many more examples.</p>
<p>And then those career politicians usher more warm words over the activists for liberty &#8211; people who are personally responsible for you and me having some of our liberties we wouldn&#8217;t have otherwise. Let&#8217;s name a few of them.</p>
<p>Assange. Brown. Svartholm-Warg. Hammond. Sunde. Manning.</p>
<p>All of these have provided exemplary transparency and resistance to power grabs by overreaching and shameless governments. Each and every one of us owes a significant amount of liberty to each of these individuals. They also have another thing in common: They are all confined to a small room, their freedom of movement gone, their liberty shackled.</p>
<p>There are many more who find it impossible to return to their home country after such exemplary civic duty. Snowden. Appelbaum. Many anonymous people who have chosen to leave. The list just goes on.</p>
<p>Activism just isn&#8217;t enough. The fate of our best and brightest activists can be seen right here. As an activity, on its own, it&#8217;s not producing the necessary results. Not on its own.</p>
<p>It&#8217;s at this point that we need to look closer at the behavior of career politicians.</p>
<p>It&#8217;s important to realize that the first problem that a career politician tries to solve is how to get elected. The second problem a career politician tries to solve is how to get <em>re-</em>elected. Whatever comes in third place is so far behind the first two that it&#8217;ll never really surface.</p>
<p>In short, unless you threaten politicians&#8217; <em>jobs</em> over their dismantling of liberty, they&#8217;ll not notice in the slightest but just smile at your proposals, praise you for engaging in civic society, kiss some babies, and then introduce more surveillance.</p>
<p>That&#8217;s why activism for liberty remains extremely necessary. That&#8217;s also why activism remains not sufficient. We absolutely, positively need to put politicians&#8217; jobs on the line over Orwelling the world we live in.</p>
<p>That&#8217;s why the Pirate Party chose the political route, putting Orwellian politicians&#8217; jobs on the line. But the party as a movement can&#8217;t function without tens of thousands of activists who also help in the common cause.</p>
<p><center>
<div class="alignfull" style="border:2px solid #3F3F3F;width:100%;padding:15px;padding-top:8px;padding-bottom:4px;margin-top:20px;margin-bottom:10px;border-radius:10px">
<h3 style="margin-top:0px;margin-bottom:10px">
<div style="float:right;height:130px;width:39px;margin-left:20px;margin-right:10px"><img src="http://falkvinge.net/wp-content/themes/WpNewspaper/images/falkvinge/Rick_Falkvinge_39x130.jpg" style="border:none;-moz-box-shadow:none;-webkit-box-shadow:none" class="quimby_search_image"></div>
<p><span style="color:#3F3F3F;font-size:125%">About The</span> <span style="color:#FF3C78;font-size:125%">Author</span></p>
</h3>
<p style="font-family:PTSansRegular,Arial,Sans-Serif;font-weight:400;line-height:150%;margin-bottom:14px"><small>Rick Falkvinge is a regular columnist on TorrentFreak, sharing his thoughts every other week. He is the founder of the Swedish and first Pirate Party, a whisky aficionado, and a low-altitude motorcycle pilot. His blog at <a href="http://falkvinge.net">falkvinge.net</a> focuses on information policy.</small></p>
<div style="float:right;position:relative;top:-12px">
<p><small>Book Falkvinge <a href="http://falkvinge.net/keynotes/">as speaker</a>?</small></p>
</div>
<p><a href="http://twitter.com/Falkvinge" class="twitter-follow-button">Follow @Falkvinge</a></p>
</div>
<p></center></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/activism-isnt-enough-140601/feed/</wfw:commentRss>
		<slash:comments>52</slash:comments>
		</item>
		<item>
		<title>PirateBox Delivers Brand New Anonymous Sharing Release</title>
		<link>http://torrentfreak.com/piratebox-delivers-brand-new-anonymous-sharing-release-140531/</link>
		<comments>http://torrentfreak.com/piratebox-delivers-brand-new-anonymous-sharing-release-140531/#comments</comments>
		<pubDate>Sat, 31 May 2014 18:06:15 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[David Darts]]></category>
		<category><![CDATA[PirateBox]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=88921</guid>
		<description><![CDATA[In 2012 a device called PirateBox excited users with the prospect of anonymous wireless file-sharing anywhere, no Internet required, and at a cost of just a few dollars. Now the project has released PirateBox 1.0 and a brand new website. TorrentFreak caught up with PirateBox founder David Darts for the lowdown.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/piratebox1.jpg" width="190" height="167" class="alignright">Inspired by the local communications power of traditional pirate radio, in 2011 NYU art professor David Darts created the PirateBox. Part WiFi hotspot, part file server, PirateBox provides quick, easy and above all anonymous access to the files onboard.</p>
<p>In 2012 and following a <a href="http://torrentfreak.com/piratebox-takes-file-sharing-off-the-radar-and-offline-for-next-to-nothing-120311/">breakthrough update</a>, the cost of creating a PirateBox dropped from a very reasonable $100 to an extremely attractive $50. Anonymous offline file-sharing was now within everyone&#8217;s reach.</p>
<p>Since then PirateBox has gathered an extremely enthusiastic following, something which has spurred its developers on. Yesterday PirateBox delivered its v1.0 update and a <a href="http://piratebox.cc/">brand new website</a> so to celebrate the occasion TorrentFreak caught up with creator David Darts.</p>
<p><strong>TF:</strong> PirateBox was warmly welcomed by the community in 2012. How has community feedback shaped the PirateBox project since?</p>
<p><strong>DD:</strong> The community has had a big impact on the development of PirateBox. When I originally released the project, it was essentially just an offline browser-based file sharing system. My first prototype was basically a proof-of-concept &#8211; a light-weight python web server running on a hacked Seagate Dockstar network adapter connected to a pocket wireless router. </p>
<p>Almost immediately after publishing the project online, I started receiving feedback from developers and hackers around the world who were interested in using and contributing to the project. My inbox also started filling up with support requests, which is why I set up the <a href="http://forum.piratebox.cc">PirateBox Discussion Forum</a>.</p>
<p>While I believe in the Free Open Source ethos of providing tech support for my peers (I&#8217;ve been the beneficiary of this support many times), I simply couldn&#8217;t handle the volume of requests. Fortunately, the community stepped up and helped out with support (and testing, and development) through the discussion forum. </p>
<p>Many of the key features of the PirateBox, like the chat room and UI, have been co-developed by the community. Matthias Strubel, who is now the project&#8217;s lead developer, was one of the community members who reached out and joined the PirateBox team. He has really helped push the project forward.</p>
<p><center><img src="http://torrentfreak.com/images/pbox-4.jpg" alt="pbox-4"></center></p>
<p><strong>TF:</strong> Has PirateBox been used in any unexpected or innovative ways?</p>
<p><strong>DD:</strong> As designers know all too well, their creations are often used in ways they didn&#8217;t necessarily intend. The PirateBox is no exception.</p>
<p>It has been used by musicians and bands to distribute their music at festivals and gigs, by teachers to distribute and collect digital materials from students, and by emergency response workers and volunteers to distribute local first aid information and community updates. Conference organizers have used it to distribute conference materials and to provide local wireless commenting during presentations, and it&#8217;s been utilized by CryptoParty workshop volunteers to <a href="https://www.cryptoparty.in/">securely share cryptographic keys</a>.</p>
<p><center><img src="http://torrentfreak.com/images/pbox-1.jpg" alt="pbox-1"></center></p>
<p><strong>TF:</strong> How many users of PirateBox are there today? </p>
<p><strong>DD:</strong> Well, we don&#8217;t track our users but the project has grown &#8220;rhizomatically&#8221; across several websites and languages so it&#8217;s a little tricky to estimate how many PirateBoxes are out in the wild today.</p>
<p>It is possible, and sometimes preferable, to distribute the PirateBox software locally (and anonymously) using a PirateBox and, because the boxes never go online, it&#8217;s impossible to really keep track of them. Generally speaking, this is a good thing. </p>
<p><strong>TF:</strong> Technology is always on the move &#8211; which developments have most affected today&#8217;s PirateBox compared to the one that launched two years ago?</p>
<p><strong>DD:</strong> Two big tech trends have helped push PirateBox 1.0 development forward: The proliferation of small screens, which is how we increasingly interact with the network and each other, and the increased availability of tiny, inexpensive computers (including wireless routers, single board systems like the Raspberry Pi and other embedded &#8220;Internet of things&#8221; devices) which are rapidly filling up our world.</p>
<p><center><img src="http://torrentfreak.com/images/pbox-3.jpg" alt="pbox-3"></center></p>
<p>Version 1.0 is thus designed with mobility and low cost hardware in mind. We&#8217;ve reworked the UI and based it on Twitter&#8217;s Bootstap so that the software plays nicely with small screens. And we&#8217;ve built PirateBox 1.0 to run natively on inexpensive hardware.</p>
<p>Another &#8220;technology&#8221; development that helped increase interest in the PirateBox project was the confirmation through the Snowden leaks last year that the US government was operating near universal mass-surveillance programs around the world, often in partnership or, at least, with the complicit support of several large technology and Internet companies. While this has obviously raised very serious questions and concerns around the world, these revelations have at least helped push important conversations about privacy, surveillance, censorship, freedom, etc. to the forefront. These are all issues that the PirateBox project engages with and thus it has helped inspire new users to join the project.</p>
<p><center><img src="http://torrentfreak.com/images/pbox-2.jpg" alt="pbox-2"></center></p>
<p><strong>TF:</strong> What is so special about the release of PirateBox 1.0, why should existing users upgrade, and what do new users have to look forward to?</p>
<p><strong>DD:</strong> Along with the increased stability of PirateBox 1.0, the key new feature is Matthias Strubel&#8217;s &#8220;box-installer&#8221; which radically simplifies the process of building or upgrading a PirateBox. It is now possible to build a new PirateBox in just a <a href="http://piratebox.cc/openwrt:diy">few easy steps</a>. </p>
<p>One of my favorite new features of PirateBox 1.0 is the UPnP media server which starts streaming video and audio files over the network as soon as they&#8217;ve been uploaded to the box. I&#8217;ve actually been using this feature for awhile. It works perfectly as a backend to XBMC for instance and is also a great way of streaming movies to your mobile devices when traveling. </p>
<p>PirateBox 1.0 also offers a image/message bullet board called <a href="http://wakaba.c3.cx/s/web/wakaba_kareha">Kareha</a> by default which is similar to the software used on 4chan. This means that PirateBox 1.0 offers 4chan in a box functionality, which I think is pretty cool. And of course, it also comes with a chat room and browser-based file sharing system. </p>
<p><strong>TF:</strong> What role do you see PirateBox fulfilling in the future and what plans do you have for the next 12 months?</p>
<p><strong>DD:</strong> The holy grail of offline networking is wireless mesh and we&#8217;ve been experimenting with it in the PirateBox. Matthias has been playing with <a href="http://www.foo.be/forban/">Forban</a>  over the last year and we&#8217;ve successfully deployed and connected small sets of PirateBoxes using the <a href="http://www.open-mesh.org/projects/open-mesh/wiki">B.A.T.M.A.N. protocol</a>. This is really just an experimental feature at this point but it is something we&#8217;re planning to keep developing. </p>
<p>I&#8217;ve also been experimenting with connecting the PirateBox to the Internet, which, in some ways, is counter to the philosophy of the project as an offline file sharing and communications system.</p>
<p>However, I also think there&#8217;s real value in providing people with ways to connect online that help preserve their privacy. This is especially important for those who are less tech-savy and thus may not know how to protect themselves from tracking, etc. While the PirateBox will continue to be an offline file sharing and communications system, we may consider providing an optional feature in the future that allows it to be used online. Or this may become a new fork of the project&#8230;..</p>
<p>Interested in making your own PirateBox? <a href="http://piratebox.de/openwrt:diy">Try here</a>.    </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/piratebox-delivers-brand-new-anonymous-sharing-release-140531/feed/</wfw:commentRss>
		<slash:comments>19</slash:comments>
		</item>
		<item>
		<title>Encrypted Internet Traffic Surges in a Year, Research Shows</title>
		<link>http://torrentfreak.com/encrypted-internet-traffic-surges-140514/</link>
		<comments>http://torrentfreak.com/encrypted-internet-traffic-surges-140514/#comments</comments>
		<pubDate>Wed, 14 May 2014 14:37:36 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[sandvine]]></category>
		<category><![CDATA[vpn]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=88053</guid>
		<description><![CDATA[Encrypted Internet traffic is surging worldwide according to data published by Canadian broadband management company Sandvine. After the Snowden revelations the bandwidth consumed by encrypted traffic doubled in North America, and in Europe and Latin America the share of encrypted traffic quadrupled.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/boxed.jpg"><img src="http://torrentfreak.com/images/boxed.jpg" alt="boxed" width="222" height="178" class="alignright size-full wp-image-36576"></a>Over the years we have been following various reports on Internet traffic changes, mostly focusing on file-sharing traffic. </p>
<p>A new report <a href="https://www.sandvine.com/trends/global-internet-phenomena/">published by Sandvine</a> this morning sheds light on the most recent developments. As in previous years, the trend is one of BitTorrent losing its share of peak Internet traffic in the U.S. while continuing to grow in Europe. </p>
<p>However, there is a far more interesting trend hidden in the report, something which the traffic management company itself appears to have missed entirely. Comparing this year&#8217;s data to that of <a href="http://torrentfreak.com/bittorrent-accounts-for-35-of-all-upload-traffic-vpns-are-booming-130518/">last year</a> reveals that encrypted Internet traffic is booming.</p>
<p>The change is most pronounced in Europe where the percentage of encrypted Internet traffic during peak hours quadrupled from a measly 1.47% to 6.10% in a year. Since overall Internet traffic increased as well, the increase is even greater for the absolute bandwidth that&#8217;s consumed.</p>
<p><center><strong>Top 10 Peak Period Applications (Europe, Fixed Access)</strong></center><center><a href="http://torrentfreak.com/images/sandvine20141e.png"><img src="http://torrentfreak.com/images/sandvine20141e.png" alt="sandvine20141e" width="577" height="326" class="alignnone size-full wp-image-88055"></a></center></p>
<p>In North America the percentage of encrypted Internet traffic during peak hours increased as well, from 2.29% early last year to 3.80% this year. </p>
<p>Keeping in mind that absolute Internet traffic increases between 20% and 40% each year the bandwidth consumed by encrypted traffic doubled in this period.</p>
<p><center><strong>Top 10 Peak Period Applications (North America, Fixed Access)</strong></center><center><a href="http://torrentfreak.com/images/sandvine20141.png"><img src="http://torrentfreak.com/images/sandvine20141.png" alt="sandvine20141" width="580" height="321" class="alignnone size-full wp-image-88054"></a></center></p>
<p>The increase in encrypted traffic is a global phenomenon. In Latin America the share of bandwidth consumed by SSL shot up from 1.80% to 10.37% in a year. Also, a similar pattern emerges on mobile networks, where encrypted traffic is also booming. </p>
<p>The changes in encrypted traffic can be directly linked to the surveillance revelations of Edward Snowden. As a result, the number of users of <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">VPN services</a> and other anonymizers <a href="https://torrentfreak.com/nsa-spying-and-anti-piracy-laws-boost-demand-for-vpns-130824/">increased sharply</a>. In addition, Google and other web services turned on <a href="http://searchengineland.com/post-prism-google-secure-searches-172487">SSL by default</a>.</p>
<p>In previous years we revealed a similar trend among BitTorrent users, who increasingly searched for options to hide their download footprints in response to anti-piracy measures. A survey among Pirate Bay users, for example, <a href="https://torrentfreak.com/the-pirate-bay-users-long-for-anonymity-111021/">revealed</a> that 70% utilize a VPN or proxy, or are interested in doing so in the future.</p>
<p>It will be interesting to see how these trends develop in the years to come. In any case, it&#8217;s clear that Internet services and their users are becoming more aware of their privacy online, which is generally a good development.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/encrypted-internet-traffic-surges-140514/feed/</wfw:commentRss>
		<slash:comments>39</slash:comments>
		</item>
		<item>
		<title>NSA Authorized Monitoring of Pirate Bay and Proxy Users</title>
		<link>http://torrentfreak.com/nsa-authorized-monitoring-of-pirate-bay-and-proxy-users-140218/</link>
		<comments>http://torrentfreak.com/nsa-authorized-monitoring-of-pirate-bay-and-proxy-users-140218/#comments</comments>
		<pubDate>Tue, 18 Feb 2014 10:40:56 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[nsa]]></category>
		<category><![CDATA[the pirate bay]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=84001</guid>
		<description><![CDATA[New leaked documents from whistleblower Edward Snowden reveal that the NSA authorized the monitoring of torrent sites including "malicious foreign actor" The Pirate Bay.  The internal discussions further indicate that tracking people through multiple proxies is possible and suggest that once a release is made on Pirate Bay it's possible to go back over old traffic to see where it originated from.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/cameraspy.jpg"><img src="http://torrentfreak.com/images/cameraspy.jpg" alt="cameraspy" width="170" height="164" class="alignright size-full wp-image-49625"></a>The revelations of former NSA contractor Edward Snowden have caused shockwaves around the world and resonated in all corners of the online community. Today the leaked material is of particular interest to torrent site users.</p>
<p>Published on Glenn Greenwald&#8217;s The Intercept, the new papers reveal internal NSA discussions over what can and cannot be monitored in various circumstances.</p>
<p>In <a href="https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters">Q&#038;A</a>&#8216;s between NSA staff, Threat Operations Center Oversight and Compliance (NOC), and the NSA&#8217;s Office of General Council (OGC), torrent sites are mentioned on a number of occasions, with The Pirate Bay sitting front and center.</p>
<p><strong>Tracking The Pirate Bay and its users</strong></p>
<p>The first question concerns the querying of non US-based IP addresses which have been obtained from home soil.</p>
<p>&#8220;If we run across foreign malicious actors at home (spam email, router/IDS logs, torrent sites, etc) can we bring those IPs here and use the SIGINT [intelligence-gathering by interception] system to monitor these guys?&#8221; the member of staff asked.</p>
<p>&#8220;It might be okay,&#8221; NOC and OGC responded, &#8220;but wait for confirmation.&#8221;</p>
<p>The second instance came from a staff member asking questions over the monitoring of servers overseas, alongside the possibility that U.S. citizens may be using them.</p>
<p><a href="/images/pirate-bay.jpg"><img src="http://torrentfreak.com/images/pirate-bay-150x150.jpg" alt="pirate bay" width="180" height="180" class="alignright size-thumbnail wp-image-53470"></a>&#8220;Is it okay to query against a foreign server known to be malicious even if there is a possibility that a US person could be using it as well? Example, thepiratebay.org,&#8221; the NSA employee wrote.</p>
<p>No problem, came the reply, but exercise caution.</p>
<p>&#8220;Okay to go after foreign servers which US people use also (with no defeats). But try to minimize to &#8216;post&#8217; only, for example, to filter out non-pertinent information,&#8221; NOC and OGC wrote back.</p>
<p>From the documents it&#8217;s clear that the NSA sees both The Pirate Bay and Wikileaks as organizations that threaten U.S. security through their distribution of U.S. secrets. What follows is a question which seems to suggests that once a torrent has been released on The Pirate Bay, it&#8217;s possible to analyze traffic sent <em>before the release was made</em> in order to trace the leaker.</p>
<p>&#8220;[If a] list of .mil passwords [were] released to thepiratebay.org&#8230;can we go back into XKS-SIGINT (using a custom created fingerprint) to search for all traffic containing that password in foreign traffic just before the release? the NSA worker asked.</p>
<p><strong>Tracking people using proxies to hide their activities</strong></p>
<p>While many consider proxies as useful tools to mask their online activities, it has to be presumed that organizations such as the NSA have the ability to track individuals using even multiple instances. The next set of questions skip over the mechanics of how that might be possible (with the clear implication that it is) and jump straight to what is permissible.</p>
<p><a href="/images/spy.jpg"><img src="http://torrentfreak.com/images/spy-150x150.jpg" alt="spy" width="180" height="180" class="alignright size-thumbnail wp-image-39770"></a>[When an actor is]&#8230;.posting to thepiratebay.org (a foreign web-server)&#8230;.through multiple proxied hops, are we allowed to back-trace that communication even if it hops through US based proxies?&#8221; an NSA worker asked.</p>
<p>&#8220;In other words, back-trace the post from thepiratebay.org to a Chinese base proxy which came through a US based proxy, which came through another US based proxy, which came through a Russian based proxy etc&#8221;</p>
<p>&#8220;Assuming you mean via SIGINT metadata,&#8221; came the NOC response, &#8220;then <a href="http://www.nytimes.com/interactive/2013/09/29/us/documents-on-nsa-efforts-to-diagram-social-networks-of-us-citizens.html">SPCMA-trained</a> [Supplemental Procedures Governing Communications Metadata Analysis] analysts would be able to use <a href="http://www.emptywheel.net/2014/02/17/spcma-the-other-nsa-dragnet-sucking-in-americans/">SPCMA</a>-enabled tools to chain through U.S. based proxies. It is not authorized otherwise.&#8221;</p>
<p>While on the one hand these discussions suggest that some kind of effort is being made to protect US citizens from NSA spying, on the other it&#8217;s fairly obvious that they are being swept up en masse whether they like it or not.</p>
<p>Furthermore, the odds of being caught up in that dragnet only increase should U.S. citizens dare to become involved in organizations like Wikileaks or use torrent sites including The Pirate Bay. Worryingly, the threshold for becoming categorized as an associate of a &#8220;malicious foreign actor&#8221; appears to be lower than ever.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/nsa-authorized-monitoring-of-pirate-bay-and-proxy-users-140218/feed/</wfw:commentRss>
		<slash:comments>181</slash:comments>
		</item>
		<item>
		<title>Take Action to Protect Your Privacy on The Internet</title>
		<link>http://torrentfreak.com/take-action-protect-privacy-internet-140211/</link>
		<comments>http://torrentfreak.com/take-action-protect-privacy-internet-140211/#comments</comments>
		<pubDate>Tue, 11 Feb 2014 11:15:20 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[nsa]]></category>
		<category><![CDATA[sopa]]></category>
		<category><![CDATA[TheDayWeFightBack]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=83695</guid>
		<description><![CDATA[The value of privacy is something that most people can appreciate but there are those that wish to systematically dismantle this basic human right. Today, however, in a battle to mirror and celebrate the fight against SOPA and its inspiration Aaron Swartz, the Internet will tell the NSA and their mass surveillance partners that erosion of freedoms will never be accepted.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/dayfight.jpg"><img src="http://torrentfreak.com/images/dayfight.jpg" alt="dayfight" width="180" height="180" class="alignright size-full wp-image-83734"></a>Two years ago, websites including Google, Wikipedia, Reddit and the one you&#8217;re reading now, took drastic action to protect the Internet. In an inspiring show of collective defiance, hundreds of websites went dark to protest against the Stop Online Piracy Act, a rising piece of legislation with the potential to increase censorship and hamper innovation.</p>
<p>Sparked and guided by Aaron Swartz, the end result of the movement was nothing short of ground-breaking. The unity shown on January 18, 2012, led to Congress backing down and forcing some of the world&#8217;s most powerful copyright-focused companies into retreat. SOPA was done, but an even bigger issue was just around the corner.</p>
<p>Revelations by Edward Snowden, that unveiled a shocking level of mass surveillance being carried out by the U.S. government and its allies, caused turmoil around the world. Their plan was to become the all-seeing all-knowing eye, spying on communications everywhere and sucking up mind-boggling quantities of electronic data both on-and-offline. </p>
<p>These authorities now routinely spy on the Internet, telephone calls and other communication channels used by their very own citizens, undermining the basic level of privacy people believed would be upheld by their own democratically elected governments. The mantra that those who have nothing to hide have nothing to worry about holds no water, as entities including the NSA and GCHQ systematically spy wherever they like, whether their targets are suspected of crimes or not.</p>
<p>But today is a special day. Thousands of websites, this one included, will join together to demand progress towards restoring our right to privacy and the reigning in of mass surveillance. Two years after the historic SOPA protests, <a href="https://thedaywefightback.org/international/">The Day We Fight Back</a> has arrived.</p>
<p>Today&#8217;s anti-surveillance web protest, held in memory of hacktivist Aaron Swartz, is being headed up by a coalition including Demand Progress, Access, EFF, and sites such as Reddit, Mozilla and BoingBoing. It provides an unprecedented opportunity to fight back against the greatest invasion of privacy the world has ever known.</p>
<p>&#8220;Today the greatest threat to a free Internet, and broader free society, is the National Security Agency&#8217;s mass spying regime,&#8221; says David Segal, executive director of Demand Progress.</p>
<p>&#8220;If Aaron were alive he&#8217;d be on the front lines, fighting back against these practices that undermine our ability to engage with each other as genuinely free human beings.&#8221; </p>
<p>While Aaron is tragically no longer with us, all Internet users concerned about the activities of the NSA can step up to the front lines and fight back with a few clicks.</p>
<p>1. Visit <a href="https://thedaywefightback.org">TheDayWeFightBack.org</a><br>
2. Sign up to indicate that you&#8217;ll participate and receive updates.<br>
3. Install widgets on websites encouraging its visitors to fight back against surveillance.<br>
4. Use the social media tools on the site to announce your participation.<br>
5. Develop memes, tools, websites, and do whatever else you can to participate &#8212; and encourage others to do the same.</p>
<p>While a large proportion of Internet users have been blind-sided by the revelations of the past year, being monitored is something that those connected to the file-sharing scene have become aware of for a decade or more. Privacy solutions have existed for some time but it took the launch of the Pirate Party-affiliated Relakks VPN service in 2006 to really boost the awareness of encrypted communications in the file-sharing space. Today, privacy companies including <a href="https://www.privateinternetaccess.com/">Private Internet Access</a> and <a href="https://www.blackvpn.com/">BlackVPN</a> will join the protests.</p>
<p>Many hundreds of thousands &#8211; millions &#8211; of file-sharers and other privacy conscious individuals currently and routinely <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">encrypt their communications</a> in order to mitigate the effects of online spying. But while that&#8217;s a good day-to-day solution, more needs to be done.</p>
<p>Fighting back requires people to contact politicians and lawmakers and urge them to engage on the issues of cyber surveillance and other dangers to the free Internet. But be warned. Unlike the fight against SOPA this battle won&#8217;t be over in a month or two. The Day We Fight Back will go on for much, much longer.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/take-action-protect-privacy-internet-140211/feed/</wfw:commentRss>
		<slash:comments>171</slash:comments>
		</item>
	</channel>
</rss>
