<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; Search Results  &#187;  windows 8</title>
	<atom:link href="http://torrentfreak.com/search/windows+8/feed/rss2/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 20:38:50 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Microsoft: We&#8217;ve Always Had Freemium, It&#8217;s Called Piracy</title>
		<link>http://torrentfreak.com/microsoft-weve-always-had-freemium-its-called-piracy-141021/</link>
		<comments>http://torrentfreak.com/microsoft-weve-always-had-freemium-its-called-piracy-141021/#comments</comments>
		<pubDate>Tue, 21 Oct 2014 11:22:40 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[piracy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95583</guid>
		<description><![CDATA[New comments from Microsoft CEO Satya Nadella suggest that luring people in with zero-cost products is of great interest to the company. However, while services such as OneDrive are free with premium options by design, Nadella says Microsoft has long had a freemium business model, but one that was forced upon it by pirates.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/microsoft-pirate.png"><img src="http://torrentfreak.com/images/microsoft-pirate.png" alt="microsoft-pirate" width="225" height="137" class="alignright size-full wp-image-51663"></a>In recent years the &#8216;freemium&#8217; business model has gained much traction in many areas from gaming to software services. But while the portmanteau describing the phenomenon is a relatively new addition to our language, the idea behind the business model is not.</p>
<p>In the 1980s, those with access to Bulletin Board Systems would download programs and share them with their friends, all with the full encouragement of the software&#8217;s creators. Shareware, as it was known, often encouraged users to send off a snail-mailed registration fee in return for a code to unlock premium features. Although basic, freemium had been born.</p>
<p>Today the concept has gone way beyond those humble roots. The App Store and Google Play are awash with free-to-play games with premium addons, and services such as Spotify and Dropbox offer decent free levels of service to get users onboard and primed to start parting with real cash.</p>
<p>If Joe Public was pressed into a snap judgment, Microsoft would probably be more associated with premium than free, with the company historically charging sizable amounts for its Windows and Office products, for example. However, speaking with <a href="http://www.cnbc.com/id/102101929#.">CNBC</a>, Microsoft CEO Satya Nadella says that the company has always had an eye on the freemium experience.</p>
<p>The idea, the CEO notes, is to get people on board with a product they find useful. Then, when it becomes clear how users are utilizing the service, options to monetize become available alongside their demands for improved service. He uses the company&#8217;s cloud-storage service as an example.</p>
<p>&#8220;We want everybody to use OneDrive. And then when you are starting to use it for business, that&#8217;s when we want to monetize. So we do not want to have you only start using us when you have a business license or subscription. We want to have you use us when you just want to save any file or any document, any artifact of yours. And then have a natural way for us to monetize as you use more of it in the commercial context,&#8221; Nadella explains.</p>
<p>By now millions of people online are familiar with &#8216;freemium&#8217; in one shape or another but comments from Nadella suggest that while this business model has been leveraged by Microsoft for quite some time, the company had it forced upon them.</p>
<p>&#8220;Well, we&#8217;ve always had freemium. Sometimes our freemium was called piracy,&#8221; Nadella reveals.</p>
<p>&#8220;[The] thing that I don&#8217;t want us as a company to shy away from is usage first. Because I think if anything, the new competition has taught is that, you know, what matters is do not try to equate revenue and usage day one.&#8221;</p>
<p>The &#8216;piracy is promotion&#8217; angle is something rarely spoken about by company execs, probably in fear of endorsing an illegal activity and validating it in the eyes of piracy proponents. However, by speaking of it alongside &#8216;freemium&#8217;, Microsoft&#8217;s CEO appears to have confirmed what many have been saying all along, that getting people on board for free &#8211; via piracy if necessary &#8211; is one the first steps on the monetization trail.</p>
<p>Indeed, this belief his held so strongly in some quarters that there are some who insist that it&#8217;s preferable for people to pirate the software of company &#8216;A&#8217; than switch to the opposition, whether paid or not.</p>
<p>That said, what Microsoft does not want is people selling pirated copies of its premium products &#8211; that kind of &#8216;promotion&#8217; is never welcome. If people use a free sample of Microsoft products at home, the company isn&#8217;t likely to kick down the door. Do the same in a business environment, however, and things aren&#8217;t anywhere near as open-minded.</p>
<p>There are no signs that Microsoft is going soft on piracy but as business models change, as they have with <a href="http://torrentfreak.com/tired-of-the-war-on-piracy-adobe-hopes-to-turn-pirates-into-customers-130625/">Adobe&#8217;s Creative Cloud</a>, free tiers attractive to would-be pirates will become more commonplace. And that can only mean one thing for piracy rates.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/microsoft-weve-always-had-freemium-its-called-piracy-141021/feed/</wfw:commentRss>
		<slash:comments>117</slash:comments>
		</item>
		<item>
		<title>FBI Screens Interns On Their Piracy Habits</title>
		<link>http://torrentfreak.com/fbi-screens-interns-on-their-piracy-habits-141010/</link>
		<comments>http://torrentfreak.com/fbi-screens-interns-on-their-piracy-habits-141010/#comments</comments>
		<pubDate>Fri, 10 Oct 2014 14:16:49 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[fbi]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=95003</guid>
		<description><![CDATA[Applicants to the FBI's internship program will have to answer potentially tricky questions if they want to be accepted by the investigative and intelligence agency. In addition to questions relating to drug use, potential interns are required to reveal their historic downloading habits.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/usdoj.jpg"><img src="http://torrentfreak.com/images/usdoj.jpg" alt="usdoj" width="190" height="190" class="alignright size-full wp-image-91397"></a>Over the last decade the FBI has been involved in numerous file-sharing related investigations, mainly in respect of large scale copyright infringement.</p>
<p>In 2005 the FBI <a href="http://torrentfreak.com/how-the-fbi-dismantled-a-bittorrent-community-080630/">shuttered EliteTorrents</a>, a popular &#8216;private&#8217; BitTorrent community that came to a sticky end after making available a pre-release &#8216;workprint&#8217; copy of Star Wars Episode III. By 2010 the agency was focusing its resources on Operation in Our Sites, an initiative which closed down several domains including the <a href="http://torrentfreak.com/ninjavideo-admins-and-uploaders-indicted-by-grand-jury-110910/">notorious NinjaVideo</a>. Then two years ago the FBI played a key role in the closure of Kim Dotcom&#8217;s Megaupload.</p>
<p>While few would doubt the gravity of the cases highlighted above, it may come as a surprise that in addition to commercial scale infringement, the FBI also views unauthorized personal copying as a serious offense. While it may not actively pursue individual pirates, it doesn&#8217;t want them in-house.</p>
<p>Monday this week <a href="http://www.statehornet.com/news/federal-bureau-seeks-sac-state-students-for-service/article_4f14150e-4f21-11e4-a30e-001a4bcf6878.html">Sacramento State</a>&#8216;s Career Center welcomed the FBI for a visit concerning recruitment of students for its <a href="https://www.fbijobs.gov/2.asp">paid internship program</a>. One of the topics discussed were historical actions that could exclude applicants from the program.</p>
<p>In addition to drug use, criminal activity and even defaulting on a student loan, students were informed that if they had illegally downloaded content in the past, that could rule them out of a position at the FBI. It appears that to the agency, downloading is tantamount to stealing.</p>
<p>While some students might be tempted to tell a white lie or two about their piracy experiences during their initial interviews, that appears to be a dangerous course of action. All responses are recorded and sent to a polygraph technician and if the student fails the lie detector test they are excluded from the FBI forever, even if they tried to cover up the smallest thing.</p>
<p>But what if applicants have a bit of personal piracy to hide, but choose to tell the truth? Information is limited, but a 2012 posting on <a href="http://www.911jobforums.com/f58/finally-found-out-certain-why-fbi-unexpectedly-discontinued-my-application-64655/">911JobForums</a> by a rejected applicant reveals that while honesty might be the best policy, it can be enough to rule someone out of a job.</p>
<p>&#8220;My reason for posting this is to help give fair warning to those who don&#8217;t think pirating copyrighted information from the internet will trip them up later on. While I sometimes ask myself what might have been, I can honestly say I gave it my best shot,&#8221; the poster explains.</p>
<p>&#8220;I had downloaded songs while at college 10 years prior (300+) and a few recently (<20). I had an illegal copy of Windows XP in my possession and 10 years ago had watched fewer than 8 pirated full-length movies which I had downloaded then promptly deleted. I had copied a Redbox DVD to my iPod I wasn't able to watch before returning but then promptly deleted the movie after watching once."</p>
<p>According to the student-run newspaper <a href="http://www.statehornet.com">The State Hornet</a>, the FBI are interested in the amount of illegal content applicants have downloaded, so it&#8217;s possible that people downloading very small amounts might be shown leniency.</p>
<p>Those interested in how the polygraph procedure itself works can find details of the equivalent CIA test <a href="https://antipolygraph.org/cgi-bin/forums/YaBB.pl?num=1308957294">here</a>. Interestingly the writer has a tip for former pirate students.</p>
<p>&#8220;[The CIA] were concerned mostly about crime, drugs, and misuse of technology systems.  Downloading music, though it is illegal, does not disqualify you.  Most people especially college students did this, just pretend you didn’t know that it was illegal,&#8221; he notes. </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/fbi-screens-interns-on-their-piracy-habits-141010/feed/</wfw:commentRss>
		<slash:comments>49</slash:comments>
		</item>
		<item>
		<title>Which VPN Services Take Your Anonymity Seriously? 2014 Edition</title>
		<link>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/</link>
		<comments>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/#comments</comments>
		<pubDate>Tue, 09 Sep 2014 19:45:35 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Sidebar]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[vpn services]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=85262</guid>
		<description><![CDATA[Millions of people use a VPN service to protect their privacy, but not all VPNs are as anonymous as one might hope. In fact, some VPN services log users' IP-addresses for weeks. To find out how secure VPNs really are TorrentFreak asked the leading providers about their logging policies, and more.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/boxed.jpg"><img src="http://torrentfreak.com/images/boxed.jpg" alt="boxed" width="222" height="178" class="alignright size-full wp-image-36576"></a>By now most Internet users are well aware of the fact that pretty much every step they take on the Internet is logged or monitored. </p>
<p>To prevent their IP-addresses from being visible to the rest of the Internet, millions of people have signed up to a VPN service. Using a VPN allows users to use the Internet anonymously and prevent snooping.</p>
<p>Unfortunately, not all VPN services are as anonymous as they claim.  </p>
<p>Following a high-profile case of an individual using an &#8216;anonymous&#8217; VPN service that turned out to be not so private, TorrentFreak decided to ask a selection of VPN services some tough questions.</p>
<p>By popular demand we now present the third iteration of our VPN services &#8220;logging&#8221; review. In addition to questions about logging policies we also asked VPN providers about their stance towards file-sharing traffic, and what they believe the most secure VPN is. </p>
<p><strong>Last update: October 7, 2014 (added partial <a href="http://torrentfreak.com/%D0%BA%D0%B0%D0%BA%D0%BE%D0%B9-%D0%B8%D0%B7-vpn-%D1%81%D0%B5%D1%80%D0%B2%D0%B8%D1%81%D0%BE%D0%B2-%D1%80%D0%B5%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE-%D0%B7%D0%B0%D0%B1%D0%BE%D1%82%D0%B8%D1%82%D1%8C%D1%81%D1%8F/" title="Какой из VPN сервисов реально заботиться о Вашей анонимности? Результаты 2014 года.">Russian translation</a>)<br>
</strong><br>
&#8212;</p>
<p>1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long? </p>
<p>2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?</p>
<p>3. What tools are used to monitor and mitigate abuse of your service?</p>
<p>4. In the event you receive a DMCA takedown notice or European equivalent, how are these handled?</p>
<p>5. What steps are taken when a valid court order requires your company to identify an active user of your service?</p>
<p>6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?</p>
<p>7. Which payment systems do you use and how are these linked to individual user accounts?</p>
<p>8. What is the most secure VPN connection and encryption algorithm you would recommend to your users? </p>
<p>&#8212;</p>
<p>What follows is the list of responses from the VPN services, in their own words. Providers who didn&#8217;t answer our questions directly or failed by logging everything were excluded. Please note, however, that several VPN companies listed here do log to some extent. The order of the lists holds no value. </p>
<h2><a href="http://bit.ly/privateinternet">Private Internet Access</a></h2>
<p><a href="http://torrentfreak.com/images/pia.png"><img class="alignright size-full wp-image-41039" title="torrentprivacy" src="http://torrentfreak.com/images/pia.png" alt="" width="180" height="40"></a>1. We absolutely do not log any traffic nor session data of any kind, period. We have worked hard to meticulously fork all daemons that we utilize in order to achieve this functionality. It is definitely not an easy task, and we are very proud of our development team for helping Private Internet Access to achieve this unique ability.</p>
<p>2. We operate out of the US which is one of the few, if only, countries without a mandatory data retention law. We explored several other jurisdictions with the help of our professional legal team, and the US is still ideal for privacy-based VPN services.</p>
<p>We severely scrutinize the validity of any and all legal information requests. That being said, since we do not hold any traffic nor session data, we are unable to provide any information to any third-party. Our commitment and mission to preserve privacy is second to none.</p>
<p>3. We do not monitor any traffic, period. We block IPs/ports as needed to mitigate abuse when we receive a valid abuse notification.</p>
<p>4. We do not host any content and are therefore unable to remove any of said content. Additionally, our mission is to preserve and restore privacy on the Internet and society. As such, since we do not log or monitor anything, we&#8217;re unable to identify any users of our service.</p>
<p>5. Once again, we do not log any traffic or session data. Additionally, unlike the EU and many other countries, our users are protected by legal definition. For this reason, we&#8217;re unable to identify any user of our service. Lastly, consumer protection laws exist in the US, unlike many other countries. We must abide by our advertised privacy policy.</p>
<p>6. We do not discriminate against any kind of traffic/protocol on any of our servers, period. We believe in a free, open, and uncensored internet.</p>
<p>7. Bitcoin, Ripple, PayPal, Google Play (Mobile), OKPay, CashU, Amazon and any major Gift Card. We support plenty of anonymous payment methods. For this reason, the highest risk users should definitely use Bitcoin, Ripple or a major gift card with an anonymous e-mail account when subscribing to our privacy service.</p>
<p>8. We&#8217;re the only provider to date that provides a plethora of encryption cipher options. We recommend, mostly, using AES-128, SHA1 and RSA2048. </p>
<p><a href="http://bit.ly/privateinternet">Private Internet Access website</a> </p>
<h2><a href="http://bit.ly/torguardvpn">TorGuard</a></h2>
<p><a href="http://torrentfreak.com/images/torguard.png"><img class="alignright size-full wp-image-50163" title="torguard" src="http://torrentfreak.com/images/torguard.png" alt="" width="180" height="59"></a>1. TorGuard does not store any IP address or time stamps on any VPN and proxy servers, not even for a second. Further, we do not store any logs or time stamps on user authentication servers connected to the VPN. In this way it is not even possible to match an external time stamp to a user that was simultaneously logged in. Because the VPN servers utilize a shared IP configuration, there can be hundreds of users sharing the same IP at any given moment further obfuscating the ability to single out any specific user on the network.</p>
<p>2. TorGuard is a privately owned company with parent ownership based in Nevis and our headquarters currently located in the US. Our legal representation at the moment is comfortable with the current corporate structuring however we wouldn’t hesitate to move all operations internationally should the ground shift beneath our feet. We now offer VPN access in 23+ countries worldwide and maintain all customer billing servers well outside US borders.</p>
<p>We would only be forced to communicate with a third-party in the event that our legal team received a court ordered subpoena to do so. This has yet to happen, however if it did we would proceed with complete transparency and further explain the nature of TorGuard’s shared VPN configuration. We have no logs to investigate, and thus no information to share.</p>
<p>3. Our network team uses commercial monitoring software with custom scripts to keep an eye on individual server load and service status/uptime so we can identify problems as fast as possible. If abuse reports are received from an upstream provider, we block it by employing various levels of filtering and global firewall rules to large clusters of servers. Instead of back tracing abuse by logging, our team mitigates things in real-time. We have a responsibility to provide fast, abuse-free VPN services for our clients and have perfected these methods over time.</p>
<p>4. In the event of receiving a DMCA notice, the request is immediately processed by our abuse team. Because it is impossible for us to locate which user on the server is actually responsible for the violation, we temporarily block the infringing server and apply global rules depending on the nature of the content and the server responsible. The system we use for filtering certain content is similar to keyword blocking but with much more accuracy. This ensures the content in question to no longer pass through the server and satisfies requirements from our bandwidth providers.</p>
<p>5. Due to the nature of shared VPN services and how our network is configured, it is not technically possible to effectively identity or single out one active user from a single IP address. If our legal department received a valid subpoena, we would proceed with complete transparency from day one. Our team is prepared to defend our client’s right to privacy to the fullest extent of the law.</p>
<p>6. BitTorrent is only allowed on select server locations. TorGuard now offers a variety of protocols like http/socks proxies, OpenVPN, SSH Tunnels, SSTP VPN and Stealth VPN (DPI Bypass), with each connection method serving a very specific purpose for usage. Since BitTorrent is largely bandwidth intensive, we do not encourage torrent usage on all servers. Locations that are optimized for torrent traffic include endpoints in: Canada, Netherlands, Iceland, Sweden, Romania, Russia and select servers in Hong Kong. This is a wide range of locations that works efficiently regardless of the continent you are trying to torrent from. </p>
<p>7. We currently accept payments through all forms of credit or debit card, PayPal, OKPAY, and Bitcoin. During checkout we may ask the user to verify a billing phone and address but this is simply to prevent credit card fraud, spammers, and keep the network running fast and clean. After payment it is possible to change this to something generic that offers more privacy. No VPN or Proxy usage can be linked back to a billing account due to the fact we hold absolutely no levels of logging on any one of our servers, not even timestamps! </p>
<p>8. For best security we advise clients to choose OpenVPN connections only, and if higher encryption is called for use AES256 bit. This option is available on many locations and offers excellent security without degrading performance. For those that are looking to defeat Deep Packet Inspection firewalls (DPI) like what is encountered in countries such as China or Iran, TorGuard offers “Stealth” VPN connections in the Netherlands, UK and Canada. Stealth connections feature OpenVPN obfuscation technology that causes VPN traffic to appear as regular connections, allowing VPN access even behind the most strict corporate wifi networks or government regulated ISPs.</p>
<p><a href="http://bit.ly/torguardvpn">TorGuard website</a> </p>
<h2><a href="http://bit.ly/ipvanis">IPVanish</a></h2>
<p><a href="/images/ipvarnish.png"><img src="http://torrentfreak.com/images/ipvarnish.png" alt="ipvarnish" width="152" height="82" class="alignright size-full wp-image-51008"></a>1. IPVanish has a no-log policy. We keep no traffic logs.</p>
<p>2. IPVanish is headquartered in the US and thus operates under US law.</p>
<p>3. IPVanish has no monitoring in place. To elaborate, IPVanish does not sniff or monitor any user’s traffic or activity for any reason.</p>
<p>4. IPVanish keeps no logs of any user’s activity and responds accordingly.</p>
<p>5. IPVanish, like every other company, has to follow the law in order to remain in business. Only US law applies. </p>
<p>6. P2P is permitted. IPVanish in fact does not block or throttle any ports, protocols, servers or any type of traffic whatsoever.</p>
<p>7. PayPal and all major credit cards are accepted. Payments and product use are in no way linked. User authentication and billing info are help on completely different and independent platforms.</p>
<p>8. OpenVPN generally provides the strongest encryption algorithm, so that is the recommended encryption protocol. IPVanish also allows a choice between TCP and UDP, and UDP is generally recommended for better speed.</p>
<p><a href="http://bit.ly/ipvanis">IPVanish website</a></p>
<h2><a href="http://btguard.com/?a=discounts">BTGuard</a></h2>
<p><img src="http://torrentfreak.com/images/btguard2.jpg" align="right" alt="btguard">1. We do not keep any logs whatsoever.</p>
<p>2. The jurisdiction is Canada. Since we do not have log files, we have no information to share. We do not communicate with any third parties. The only event in which we would even communicate with a third-party is if we received a court order. We would then be forced to notify them we have no information. This has not happened yet.</p>
<p>3. If serious abuse is reported we enable tcpdump to confirm the abuse and locate the user. These dumps are immediately removed. If the user is abusing our service they will be terminated permanently but we have never shared user information with a 3rd party. </p>
<p>4. We do not have any open incoming ports, so it’s not possible for us to “takedown” any broadcasting content.</p>
<p>5. We take every step within the law to fight such an order.</p>
<p>6. Yes, all types of traffic our allowed with our services.</p>
<p>7. We accept PayPal and Bitcoin. All payments are linked to users accounts because they have to be for disputes and refunds.</p>
<p>8. 256-bit AES is the most secure. However 128-bit blowfish is plenty good. If you&#8217;re concerned about surveillance agencies such as the NSA, their capabilities are shrouded in secrecy and claiming to be able to protect you is offering you nothing but speculation. As far as what&#8217;s publicly available for deciphering encryption, both of the encryptions I mentioned are more than sufficient.</p>
<p><a href="http://btguard.com/?a=discounts">BTGuard website</a></p>
<h2><a href="https://privacy.io/">Privacy.io</a></h2>
<p><a href="http://torrentfreak.com/images/privacyio.jpg"><img class="alignright size-full wp-image-41044" title="privacy" src="http://torrentfreak.com/images/privacyio.jpg" alt="" width="180" height="50"></a>1. We do not log any information on our VPN servers. The only scenario is if a technical issue arises, but we request permission from the user first, and we only do it for the duration of the job, and then it is removed.</p>
<p>2. We are in the process of moving jurisdictions away from Australia at present as we are unsure what our current government plans to do in regards to our privacy. We have not decided where yet.</p>
<p>3. Only SMTP port 25 is filtered to mitigate spam, but we are working on some tools to make it easier for users to send mail.</p>
<p>4. Any DMCA request is ignored, as we have no logs to do anything about them.</p>
<p>5. Same as above, as we do not log, so we are unable to provide any information. If the law attempts to make us do such things, we will move our business to a location where that cannot occur, and if that fails we will close up shop before we provide any information.</p>
<p>6. All protocols are allowed with our service, with the only exception of SMTP port 25 currently being filtered.</p>
<p>7. At present we only accept PayPal and CC (processed by PayPal), but we are looking into alternative types of payments. We go out of our way to make sure that PayPal transactions are not linked to the users, we generate a unique key per transaction to verify payment for the account is made, and then nuke that unique key. Bitcoin and Litecoin are also on the agenda.</p>
<p>8. At present we offer 128 bit for PPTP and 256 bit for OpenVPN, We plan to offer stronger encryption for the security conscious.</p>
<p><a href="https://privacy.io/">Privacy.io website</a></p>
<h2><a href="http://vikingvpn.com/">VikingVPN</a></h2>
<p><img src="http://torrentfreak.com/images/vikingvpn.jpg" alt="vikingvpn" width="180" height="203" class="alignright size-full wp-image-74962">1. No. We run a zero knowledge network and are unable to tie a user to an IP address.</p>
<p>2. United States, they don&#8217;t have data retention laws, despite their draconian surveillance programs. The only information we share with anyone is billing information to our payment gateway. This can be anonymized by using a pre-paid anonymous card. If asked to share specific data about our users and their habits, we would be unable to do so, because we don&#8217;t have any logs of that data.</p>
<p>3. That is mostly confidential information. However, we can assure our users that we do not use logging to achieve this goal.</p>
<p>4. In the event of a DMCA notice, we send out the DMCA policy published on our website. We haven&#8217;t yet received a VALID DMCA notice.</p>
<p>5. We exhaust all legal options to protect our users. Failing that, we would provide all of our logs, which do not actually exist. If required to wiretap a user under a National Security Letter, we have a passively triggered Warrant Canary. We would also likely choose to shut down our service and put it up elsewhere.</p>
<p>6. Yes. Those ports are all open, and we have no data caps.</p>
<p>7. We currently only take credit cards. Our payment provider is far more restrictive than we ever imagined they would be. We&#8217;re still trying to change payment providers. Fortunately, by using a pre-paid credit card, you can still have totally anonymous service from us.</p>
<p>8. A strong handshake (either RSA-4096+ or a non-standard elliptic curve as the NIST curves are suspect). A strong cipher such as AES-256-CBC or AES-256-GCM encryption (NOT EDE MODE). At least SHA1 for data integrity checks. SHA2 and the newly adopted SHA3 (Skein) hash functions are also fine, but slower and provide no real extra assurances of data integrity, and provide no further security beyond SHA1. The OpenVPN HMAC firewall option to harden the protocol against Man-in-the-Middle and Man-on-the-Side attacks.</p>
<p><a href="http://vikingvpn.com/">VikingVPN website</a> </p>
<h2><a href="http://www.ivpn.net/">IVPN</a></h2>
<p><a href="http://torrentfreak.com/images/ivpn.png"><img src="http://torrentfreak.com/images/ivpn.png" alt="ivpn" width="150" height="69" class="alignright size-full wp-image-85390"></a>1.  IVPN’s top priority is the privacy of its customers and therefor we do not store any connection logs or any other log that could be used to associate a connection to a customer.</p>
<p>2. IVPN is incorporated in Malta. We would ignore any request to share data unless it was served by a legal authority with jurisdiction in Malta in which case we would inform them that we don&#8217;t have the data to share. If we were served a subpoena which compelled us to log traffic we would find a way to inform our customers and relocate to a new jurisdiction.</p>
<p>3. We use a tool called PSAD to mitigate attacks originating from customers on our network. We also use rate-limiting in iptables to mitigate SPAM.</p>
<p>4. We ensure that our network providers understand the nature of our business and that we do not host any content. As a condition of the safe harbor provisions they are required to inform us of each infringement which includes the date, title of the content and the IP address of the gateway through which it was downloaded. We simply respond to each notice confirming that we do not host the content in question.</p>
<p>5. Assuming the court order is requesting an identity based on a timestamp and IP, our legal department would respond that we don&#8217;t have any record of the user&#8217;s identity nor are we legally compelled to do so.</p>
<p>6. We &#8216;allow&#8217; BitTorrent on all servers except gateways based in the USA. Our USA network providers are required to inform us of each copyright infringement and are required to process our response putting undue strain on their support resources (hundreds per day). For this reason providers won&#8217;t host our servers in the USA unless we take measures to mitigate P2P activity.</p>
<p>7. We currently accept Bitcoin, Cash and PayPal. No information relating to a customers payment account is stored with the exception of automated PayPal subscriptions where we are required to store the subscription ID in order to assign it to an invoice (only for the duration of the subscription after which it is deleted). Of course PayPal will always maintain a record that you have sent funds to IVPN but that is all they have. If you need to be anonymous to IVPN and don&#8217;t wish to be identified as a customer then we recommend using Bitcoin or cash.</p>
<p>8. We recommend and offer OpenVPN using the strongest AES-256 cipher. For key exchange and authentication 4096-bit RSA keys are used.</p>
<p><a href="http://www.ivpn.net/">IVPN website</a></p>
<h2><a href="https://privatevpn.com/">PrivatVPN</a></h2>
<p><a href="http://torrentfreak.com/images/privatvpn.jpg"><img class="alignright size-full wp-image-41044" title="privatvpn" src="http://torrentfreak.com/images/privatvpn.jpg" alt="" width="180" height="53"></a>1. We don’t keep ANY logs that allow us or a 3rd party to match an IP address and a time stamp to a user our service. The only thing we log are e-mails and user names but it’s not possible to bind an activity on the Internet to a user.</p>
<p>2. We operate in Swedish jurisdiction. Since we do not log any IP addresses we have nothing to disclose. Circumstances doesn&#8217;t matter in this case, we have no information regarding our customers’ IP addresses and activity on the Internet. Therefore we have no information to share with any 3rd party.</p>
<p>3. If there&#8217;s abuse, we advise that service to block our IP in the first instance, and second, we can block traffic to the abused service.</p>
<p>4. This depends on the country in which we’re receiving a DMCA takedown. For example, we’ve received a DMCA takedown for UK and Finland and our response was to close P2P traffic in those countries.</p>
<p>5. If we get a court order to monitor a specific IP then we need to do it, and this applies to every VPN company out there.</p>
<p>6. Yes, we allow Torrent traffic.</p>
<p>7. PayPal, Payson and Plimus. Every payment has an order number, which is linked to a user. Otherwise we wouldn&#8217;t know who has made a payment. To be clear, you can&#8217;t link a payment to an IP address you get from us.</p>
<p>8. OpenVPN TUN with AES-256. On top is a 2048-bit DH key.</p>
<p><a href="https://privatevpn.com/">PrivatVPN website</a></p>
<h2><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ</a></h2>
<p><img class="alignright size-full wp-image-49734" title="prq" src="http://torrentfreak.com/images/prq.png" alt="" width="129" height="102">1. No. Wo do not log anything and we only require a working e-mail address to be a customer.</p>
<p>2. Swedish. We do not share information with anyone.</p>
<p>3. Not disclosed.</p>
<p>4. Put it in the trash where it belongs!</p>
<p>5. None, since we do not have any customer information and no logs.</p>
<p>6. We host anything as long as it&#8217;s not SPAM related or child porn.</p>
<p>7. Visa/Mastercard, Bitcoin, PayPal. No correlation between payment data and customer data.</p>
<p>8. We provide OpenVPN services (along with dedicated servers and other hosting services).</p>
<p><a href="http://www.prq.se/?p=tunnel&amp;intl=1">PRQ website</a></p>
<h2><a href="http://www.tigervpn.com/en/home">tigerVPN</a></h2>
<p><a href="http://torrentfreak.com/images/tigervpn.png"><img src="http://torrentfreak.com/images/tigervpn.png" alt="tigervpn" width="180" height="73" class="alignright size-full wp-image-85421"></a>1. Absolutely not! We built tigerVPN to purge all data once the transmission of a IP package was completed successfully. Its impossible to trace back any customer. On top of that we decided to use shared IPs in order to further randomize and anonymize our customers. The combination of having absolutely no logs at all and multiple customers per IP, wipes our customers digital footprint</p>
<p>2. We are a limited liability company in Slovakia.  Slovakia does not have any data retention programs and furthermore encourage ISP’s to protect their customers privacy on the net. We are not required to share any information with 3rd party hence it would be illegal thanks to the law of telecom secrecy. </p>
<p>3. Since we don’t keep logs, we can&#8217;t monitor abusive behavior, which is the price for building a customer secure environment!</p>
<p>4. We can’t comply since we can’t identify customers, therefore it’s pointless to follow any requests. We have a specific folder for these eMails ;-)</p>
<p>5. Same as above. We seriously can’t tell which customer did what, when, where, at any given time.</p>
<p>6. It’s allowed on all servers although we gently ask our customers to use either Romania or Netherlands. Some infrastructure service providers do not want file sharing so it happened to us that we were asked to move our servers due to file sharing. We found some reliable partners in Romania and Netherlands which tolerate p2p so we kindly ask our customers to use these server parks.</p>
<p>7. Customers can pay with Visa, Mastercard and Debit. On top of that we also use PayPal. We use hash keys and tokens to identify a payment but it’s not logged or linked to the customer. We had to do this anyway hence we are a PCI Level 1 compliant merchant. Therefore we are not allowed to store any card or payment data with the records of our customers. These keys are pointless for anyone else so there is no chance to build a connection.</p>
<p>8. We offer PPTP, L2TP and OpenVPN, while out of nature OpenVPN comes with the highest encryption and algorithm. L2TP and OpenVPN are 256bit SSL  encrypted while PPTP comes with a solid 128bit. Although our customers are individual and have their own sense of why and what to use, we recommend L2TP as solid protocol. It’s less geeky and more secure than PPTP, but our customers can pick any of them in all the 47 network nodes around the globe.</p>
<p><a href="http://www.tigervpn.com/en/home">tigerVPN website</a></p>
<h2><a href="http://mullvad.net/en">Mullvad</a></h2>
<p><a href="http://torrentfreak.com/images/mullvad.jpg"><img class="alignright size-full wp-image-41059" title="mullvad" src="http://torrentfreak.com/images/mullvad.jpg" alt="" width="180" height="37"></a>1. No. This would make both us and our users more vulnerable so we<br>
certainly don&#8217;t. To make it harder to watch the activities of an IP address from the outside we also have many users share each address, both for IPv4 and our upcoming IPv6 support.</p>
<p>2. Swedish jurisdiction. Under no circumstance we will share information with a third-party. First of all we take pains to not actually possess information that could be of interest to third parties, to the extent possible. In the end there is no practical way for the Swedish government to get information about our users from us.</p>
<p>3. We don&#8217;t monitor our users. In the rare cases of such egregious network abuse that we can&#8217;t help but notice (such as DoS attacks) we stop it using basic network tools.</p>
<p>4. There is no such Swedish law that is applicable to us.</p>
<p>5. We make sure not to store sensitive information that can be tied to publicly available information, so that we have nothing to give out. We believe it is not possible in Swedish law to construct a court order that would compel us to actually give out information about our<br>
users. Not that we would anyway. We started this service for political reasons and would rather discontinue it than having it work against its purpose.</p>
<p>6. Yes.</p>
<p>7. Bitcoin (we were the first service to accept it), cash (in the mail), bank transfers, and PayPal / credit cards. Payments are tied to accounts but accounts are just random numbers with no personal information attached that users can create at will. With the anonymous payments possible with cash and Bitcoin it can be anonymous all the way.</p>
<p>8. We use OpenVPN. We also provide PPTP because some people want it but we strongly recommend against it. Encryption algorithms and key lengths are important but often get way too much attention at the expense of other important but harder to measure things such as leaks and computer security.</p>
<p><a href="http://mullvad.net/en">Mullvad website</a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/feed/</wfw:commentRss>
		<slash:comments>409</slash:comments>
		</item>
		<item>
		<title>BBC: ISPs Should Assume Heavy VPN Users are Pirates</title>
		<link>http://torrentfreak.com/bbc-isps-should-assume-heavy-vpn-users-are-pirates-140908/</link>
		<comments>http://torrentfreak.com/bbc-isps-should-assume-heavy-vpn-users-are-pirates-140908/#comments</comments>
		<pubDate>Mon, 08 Sep 2014 15:07:50 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[BBC]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93684</guid>
		<description><![CDATA[In a submission to the Australian Government on the issue of online piracy, the BBC Worldwide indicates that ISPs should be obliged to monitor their customers' activities.  Service providers should become suspicious that customers could be pirating if they use VPN-style services and consume a lot of bandwidth, the BBC says.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/bbc1.jpg"><img src="http://torrentfreak.com/images/bbc1.jpg" alt="bbc" width="200" height="160" class="alignright size-full wp-image-31596"></a>After cutting its teeth as a domestic broadcaster, the BBC is spreading its products all around the globe. Shows like Top Gear have done extremely well overseas and the trend of exploiting other shows in multiple territories is set to continue.</p>
<p>As a result the BBC is now getting involved in the copyright debates of other countries, notably Australia, where it operates four subscription channels. Following submissions from Hollywood interests and local ISPs, BBC Worldwide has now presented its own to the Federal Government. Its text shows that the corporation wants new anti-piracy measures to go further than ever before.</p>
<p>The BBC begins by indicating a preference for a co-operative scheme, one in which content owners and ISPs share responsibility to &#8220;reduce and eliminate&#8221; online copyright infringement. Educating consumers on both the impact of piracy and where content can be obtained legally online would be supported by improved availability of official offerings.</p>
<p>After providing general piracy statistics, the BBC turn to the <a href="http://torrentfreak.com/leaked-dr-who-episode-appears-on-the-pirate-bay-140714/">recent leaking</a> of the new series of Doctor Who to file-sharing networks which acted &#8220;as a spoiler&#8221; to the official global TV premiere.</p>
<p>&#8220;Despite the BBC dedicating considerable resources to taking down and blocking access to these Doctor Who materials, there were almost 13,000 download attempts of these materials from Australian IP addresses in the period between their unauthorized access and the expiration of the usual catch-up windows,&#8221; the BBC write.</p>
<p><strong>So what can be done?</strong></p>
<p>In common with all rightsholder submissions so far, the BBC wants to put pressure on ISPs to deal with their errant subscribers via a graduated response scheme of educational messages backed up by punitive measures for the most persistent of infringers.</p>
<p>&#8220;ISPs should warn  any alleged copyright infringers  through a graduated notification system that what they are doing is illegal and, at the same time, educate them about the law, the importance of copyright to funding content and services they enjoy and where they can access the material they want legally. However. if the consumers do not abide by the notifications then more serious action may need to be taken,&#8221; the BBC note.</p>
<p>Those sanctions could lead to a throttling of a users&#8217; Internet connection but should not normally lead to a complete disconnection. However, the BBC doesn&#8217;t rule that out, adding that such measures could be employed &#8220;in the most serious and egregious circumstances, as is the case in the United States.&#8221;</p>
<p>While little in the foregoing presents much of a surprise, the BBC goes further than any other rightsholder submission thus far in suggesting that ISPs should not only forward notices, but also spy on their customers&#8217; Internet usage habits.</p>
<p><strong>VPNs are pirate tools</strong></p>
<p>&#8220;Since the evolution of peer-to-peer software protocols to incorporate decentralized architectures, which has allowed users to download content from numerous host computers, the detection and prosecution of copyright violations has become a complex task. This situation is further amplified by the adoption of virtual private networks (VPNs) and proxy servers by some users, allowing them  to  circumvent geo-blocking technologies and further evade detection,&#8221; the BBC explain.</p>
<p>&#8220;It is reasonable for ISPs to be placed under an obligation to identify user behavior that is ‘suspicious’ and indicative of a user engaging in conduct that infringes copyright. Such behavior may include the illegitimate use by Internet users of IP obfuscation tools in combination with high download volumes.&#8221;</p>
<p>While the BBC goes on to state that &#8220;false positives&#8221; would need to be avoided in order to &#8220;safeguard the fundamental rights of consumers&#8221;, none of this will sit well with Internet service providers or the public. Throwing around accusations of illegal activity based on the existence of an encrypted tunnel and high bandwidth consumption is several steps beyond anything suggested before.</p>
<p><strong>Site blocking</strong></p>
<p>The BBC says it supports the blocking of overseas infringing sites at the ISP level after obtaining a court injunction. Of interest is a proposal to use a system which allows for injunctions to be modified after being issued in order to deal with sites finding ways to circumvent bans.</p>
<p>&#8220;It is important to have the ability to get existing injunctions varied by the court when defendants reappear in different guises, a useful tool in the United Kingdom,&#8221; the BBC writes.</p>
<p><strong>Who foots the bill?</strong></p>
<p>Who pays for all of the above has been the major sticking point in all Australian negotiations thus far. The ISPs largely believe they shouldn&#8217;t have to pay for anything, but most rightsholders &#8211; the BBC included &#8211; think that the costs need to be shared.</p>
<p>&#8220;In light of the fact that a large inducement for internet users to become customers of ISPs is to gain access to content (whether legally or illegally), it is paramount that ISPs are required to take an active role in preventing and fighting online copyright infringement  by establishing and contributing meaningfully to the cost of administering some form of graduated response scheme,&#8221; the BBC concludes.</p>
<p>Earlier submissions from Hollywood, ISPs and tech companies can be found here (<a href="http://torrentfreak.com/leaked-draft-reveals-hollywoods-anti-piracy-plans-140828/">1</a>), (<a href="http://torrentfreak.com/isp-alliance-accepts-piracy-crackdown-with-limits-140901/">2</a>), (<a href="http://torrentfreak.com/google-facebook-and-microsoft-reject-anti-piracy-proposals-140905/">3</a>)</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/bbc-isps-should-assume-heavy-vpn-users-are-pirates-140908/feed/</wfw:commentRss>
		<slash:comments>147</slash:comments>
		</item>
		<item>
		<title>Bleep&#8230; BitTorrent Unveils Serverless &amp; Encrypted Chat Client</title>
		<link>http://torrentfreak.com/bleep-bittorrent-unveils-serverless-chat-client-140730/</link>
		<comments>http://torrentfreak.com/bleep-bittorrent-unveils-serverless-chat-client-140730/#comments</comments>
		<pubDate>Wed, 30 Jul 2014 21:23:00 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[bittorrent bleep]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=91847</guid>
		<description><![CDATA[BitTorrent Inc., the company behind the popular file-sharing client uTorrent , unveiled its serverless chat client today. BitTorrent Bleep allows users to communicate via text or voice, fully encrypted and without the need for central servers. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/bleep.jpg"><img src="http://torrentfreak.com/images/bleep.jpg" alt="bleep" width="250" height="111" class="alignright size-full wp-image-91848"></a>Encrypted Internet traffic <a href="http://torrentfreak.com/encrypted-internet-traffic-surges-140514/">surged</a> worldwide after the Snowden revelations, with several developers releasing new tools to enable people to better protect their privacy. </p>
<p>Today BitTorrent Inc. contributes with the release of BitTorrent Bleep, a communication tool that allows people to exchange information without the need for any central servers. Combined with state of the art end-to-end encryption, the company sees Bleep as the ideal tool to evade government snooping.</p>
<p>Bleep&#8217;s main advantage over some other encrypted messaging applications is the absence of central servers. This means that there are no logs stored, all metadata goes through other peers in the network.</p>
<p>&#8220;Many messaging apps are advertising privacy and security by offering end-to-end encryption for messages. But when it comes to handling metadata, they are still leaving their users exposed,&#8221; BitTorrent&#8217;s Farid Fadaie explains.</p>
<p>&#8220;We reimagined how modern messaging should work. Our platform enables us to offer features in Bleep that are unique and meaningfully different from what is currently available.&#8221;</p>
<p><center><strong>Bleep Bleep</strong><br></br></center><center><a href="http://torrentfreak.com/images/BleepScreen.jpg"><img src="http://torrentfreak.com/images/BleepScreen.jpg" alt="BleepScreen" width="1000" height="759" class="alignnone size-full wp-image-91866"></a></center></p>
<p>The application&#8217;s development is still in the early stages and the current release only works on Windows 7 and 8. Support for other operating systems including popular mobile platforms will follow in the future. </p>
<p>Aspiring Bleep users can create an account via an email or mobile phone number, but an incognito mode without the need to provide any personal details is also supported.</p>
<p>The new messaging app is not the only ‘breach safe’ tool the company is currently working on. Last year BitTorrent launched its Sync application which provides a secure alternative to centralized cloud backup solutions such as Dropbox and Google Drive.</p>
<p>BitTorrent Inc. is inviting people to test the new Bleep application, but warns there are still some bugs. </p>
<p>Those who want to give BitTorrent Bleep a try can head over to BitTorrent&#8217;s <a href="http://labs.bittorrent.com/experiments/bleep/">experiments section</a> to sign up for the pre-Alpha release.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/bleep-bittorrent-unveils-serverless-chat-client-140730/feed/</wfw:commentRss>
		<slash:comments>57</slash:comments>
		</item>
		<item>
		<title>Popcorn Time Adds Apple TV Support, iOS App Coming Soon</title>
		<link>http://torrentfreak.com/popcorn-time-adds-apple-tv-support-ios-app-coming-soon-140730/</link>
		<comments>http://torrentfreak.com/popcorn-time-adds-apple-tv-support-ios-app-coming-soon-140730/#comments</comments>
		<pubDate>Wed, 30 Jul 2014 09:35:09 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Apple TV]]></category>
		<category><![CDATA[Popcorn Time]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=91802</guid>
		<description><![CDATA[When the Popcorn Time app brought BitTorrent streaming to the masses this year the "Netflix for pirates" gained the hearts of millions. Today, one of the most popular Popcorn Time forks continues to innovate by adding Airplay support, and a native iOS app is coming soon.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/popcorn.png"><img src="http://torrentfreak.com/images/popcorn.png" alt="popcorn" width="203" height="102" class="alignright size-full wp-image-89282"></a>The Popcorn Time phenomenon is one of the biggest piracy stories of the year thus far. </p>
<p>The software became an instant hit by offering BitTorrent-powered streaming in an easy-to-use Netflix-style interface.</p>
<p>While the original app was <a href="http://torrentfreak.com/popcorn-time-devs-drop-like-flies-but-no-one-will-talk-140420/">shut down</a> by the developers after a few weeks, the project was quickly picked up by others. This resulted in several popular forks that have gained <a href="http://torrentfreak.com/popcorn-time-has-millions-of-users-140709/">millions of users</a> in recent months.  </p>
<p>Today one of the most popular <a href="http://time4popcorn.eu ">Popcorn Time</a> forks releases a highly anticipated feature. The developers inform TorrentFreak that the latest version now has Airplay support, making it possible to stream movies directly to Apple TVs and other supported devices.</p>
<p>Ironically, Airplay support is currently limited to the Windows release, but a Mac version is due early next week and the Linux release will follow shortly after.</p>
<p>The latest feature follows the addition of Chromecast support a few weeks ago, but this is by no means the last planned development.</p>
<p><center><strong>Popcorn Time adds Airplay support</strong></center><br></br><center><a href="http://torrentfreak.com/images/popcorn_time_appletv_airplay.jpg"><img src="http://torrentfreak.com/images/popcorn_time_appletv_airplay.jpg" alt="popcorn_time_appletv_airplay" width="700" height="510" class="alignnone size-full wp-image-91804"></a></center></p>
<p>Looking ahead the developers hope to bring the Popcorn Time experience to as many operating systems and devices as possible.</p>
<p>&#8220;Our ultimate goal is to bring Popcorn Time to every platform, operating system and device that can play videos, so Airplay is one particle of a huge revolution we&#8217;re making to the torrents and movies world online,&#8221; the time4popcorn.eu team told us. </p>
<p>&#8220;This is only the beginning&#8230; You know us, we have many more surprises coming your way,&#8221; they add. </p>
<p>One of the &#8220;surprises&#8221; is a native iOS app. Although it probably won&#8217;t be featured in Apple&#8217;s App Store anytime soon, Popcorn Time will be available on jailbroken iPhones and iPads in the near future.</p>
<p>&#8220;Support for iOS devices will be ready in August. It&#8217;s already working in our development environment and it&#8217;s looking beautiful,&#8221; the team notes.</p>
<p>Popcorn Time&#8217;s popularity hasn&#8217;t gone unnoticed by Hollywood. A few weeks ago the MPAA pushed back and managed to get two popular forks <a href="http://torrentfreak.com/mpaa-pulls-popcorn-time-off-github-140711/">removed from Github</a> claiming that the apps are hurting the major movie studios. </p>
<p>While this was a setback, it doesn&#8217;t seem to have hindered development much. Both Popcorn Time forks are still around and new features are being rolled out faster than ever. </p>
<p><strong>Update:</strong> Time4Popcorn <a href="http://torrentfreak.com/popcorn-time-legal-investigation-switches-domain-141014/">lost its domain name</a> and switched to <a href="http://www.popcorn-time.se/">Popcorn-time.se</a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/popcorn-time-adds-apple-tv-support-ios-app-coming-soon-140730/feed/</wfw:commentRss>
		<slash:comments>36</slash:comments>
		</item>
		<item>
		<title>TorrenTV Instantly Streams Movie Torrents to Apple TV</title>
		<link>http://torrentfreak.com/torrentv-instantly-streams-movie-torrents-to-apple-tv-140727/</link>
		<comments>http://torrentfreak.com/torrentv-instantly-streams-movie-torrents-to-apple-tv-140727/#comments</comments>
		<pubDate>Sun, 27 Jul 2014 09:41:28 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Apple TV]]></category>
		<category><![CDATA[Popcorn Time]]></category>
		<category><![CDATA[torrentv]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=91225</guid>
		<description><![CDATA[TorrenTV is a cross-platform movie streaming app that allows people to stream torrents directly to Apple TV. The open source application has a simple drag and drop torrent interface and also supports streaming of previously downloaded videos.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/appletv.jpg"><img src="http://torrentfreak.com/images/appletv.jpg" alt="appletv" width="233" height="161" class="alignright size-full wp-image-91233"></a>Earlier this year <a href="http://torrentfreak.com/open-source-torrent-streaming-a-netflix-for-pirates-140308/">Popcorn Time</a> made headlines all over the Internet as one of the first apps to combine a simple and stylish user interface with an effective way to stream torrents.</p>
<p>The application also inspired dozens of developers to start their own spinoffs. While most of these apps mimicked the looks and functionality of the original application, <a href="http://torrentv.github.io/">TorrenTV</a> offers something completely different. </p>
<p>Instead of providing a Netflix-style index of movies, TorrenTV allows people to add their own torrents and stream these directly to an Apple TV. </p>
<p>&#8220;Popcorn Time is beautiful in code and in looks but I wanted to do two things that PopcornTime didn&#8217;t allow me, watch movies directly on my TV and add new torrents which Popcorn Time doesn&#8217;t have yet,&#8221; TorrenTV developer Carlos tells TorrentFreak. </p>
<p>Carlos started coding and a few weeks later TorrenTV was born. The application works by simply dropping a torrent or magnet link into it. The video file starts downloading and via Airplay it can be streamed directly to an Apple TV.</p>
<p><center><strong>TorrenTV for Linux, Mac and Windows</strong><br></br></center><center><a href="http://torrentfreak.com/images/torrentv-apps.png"><img src="http://torrentfreak.com/images/torrentv-apps.png" alt="torrentv-apps" width="619" height="265" class="alignnone size-full wp-image-91232"></a></center></p>
<p>TorrenTV uses Popcorn Time code and is built on the same Peerflix and torrent-stream libraries. There are plans to extend its functionality by adding Chromecast and Roku support in the future, but its simplicity will remain. </p>
<p>One of the main differences compared to Popcorn time is that TorrenTV doesn&#8217;t offer an index of movies. This may be a downside for some, but according to Carlos this is an advantage. </p>
<p>With no index of pirated content it can&#8217;t be taken down by the MPAA, which happened to Popcorn Time a <a href="http://torrentfreak.com/mpaa-pulls-popcorn-time-off-github-140711/">few weeks ago</a>.</p>
<p>For those who are interested in taking it for a spin, TorrenTV is available for Mac, Windows and Linux and can be downloaded from the <a href="http://torrentv.github.io/">official site</a>.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/torrentv-instantly-streams-movie-torrents-to-apple-tv-140727/feed/</wfw:commentRss>
		<slash:comments>33</slash:comments>
		</item>
		<item>
		<title>Vuze Releases Leap, a Simple and Lightweight Torrent Client</title>
		<link>http://torrentfreak.com/vuze-releases-leap-a-simple-and-lightweight-torrent-client-140722/</link>
		<comments>http://torrentfreak.com/vuze-releases-leap-a-simple-and-lightweight-torrent-client-140722/#comments</comments>
		<pubDate>Tue, 22 Jul 2014 20:34:15 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[vuze]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=91379</guid>
		<description><![CDATA[The makers of the popular file-sharing software Vuze have released a brand new BitTorrent client. Vuze Leap is a dummy-proof application with a simple interface, which uses minimal resources. According to the company there is a massive demand for a clean and straightforward BitTorrent client. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/Vuze_bw_logo.png"><img src="http://torrentfreak.com/images/Vuze_bw_logo.png" alt="Vuze_bw_logo" width="222" height="106" class="alignright size-full wp-image-91380"></a>Vuze is one of the most recognized BitTorrent brands. Their client is used by millions of people each day and has a steadily growing user-base.</p>
<p>In recent years Vuze’s <a href="http://www.vuze.com/">core BitTorrent client</a> has evolved into an advanced download solution with every complex feature heavy BitTorrent users could wish for. </p>
<p>The downside of being so complete is that the application can be quite overwhelming to newcomers. In addition the application is somewhat of a resource hog. The Vuze team has taken these complaints to heart and coded &#8220;Vuze Leap,&#8221; a brand new client that is both simple and lightweight.</p>
<p>&#8220;We sought to deliver a simpler experience as a counterpart to the powerful, full-featured core Vuze BitTorrent Client that has pleased millions of users for years.  Even with file-sharing being a part of internet usage for years, we continued to hear, from some users a desire to have a simpler experience that was less resource intensive,&#8221; Vuze&#8217;s Claude Tolbert tells TorrentFreak.</p>
<p>Today the first Vuze Leap beta is unveiled to the public. The torrent client works out of the box. Users are presented with a big search box which they can use to search for torrents without having to leave the application. </p>
<p><center><a href="http://torrentfreak.com/images/leap_beta_home_screen-s.png"><img src="http://torrentfreak.com/images/leap_beta_home_screen-s.png" alt="leap_beta_home_screen-s" width="650" height="406" class="alignnone size-full wp-image-91381"></a></center></p>
<p>When a search term is entered, Vuze Leap will automatically search for matching content on Google, the Internet Archive and elsewhere. This can then be downloaded with a single click. </p>
<p>After a download is completed users can play media files directly from the client, or navigate to the download folder as they would do with other torrent clients. Vuze Leap automatically categorizes files into various categories to keep the library organized.</p>
<p><center><a href="http://torrentfreak.com/images/leap_beta_find_screen-s.png"><img src="http://torrentfreak.com/images/leap_beta_find_screen-s.png" alt="leap_beta_find_screen-s" width="650" height="406" class="alignnone size-full wp-image-91382"></a></center></p>
<p>Vuze&#8217;s new BitTorrent client is best suited to less tech-savvy users who don&#8217;t necessarily need all the advanced features the core Vuze client has to offer. Through its simpler interface Vuze Leap should make BitTorrent more accessible to people who are new to torrents.</p>
<p>&#8220;We believe that Vuze Leap extends usability to users who may be new to filesharing or don&#8217;t require the power and functionality that the core Vuze BitTorrent Client provides.  However, both provide an outstanding experience to users,&#8221; Tolbert says.</p>
<p>TorrentFreak tested the application and it works as advertised. It certainly feels much lighter and faster than the core Vuze client. The built-in search is handy as well, although users may have to scroll down to get the best search results, which often come from Google.</p>
<p>The application is currently only available for Windows but support for other operating systems is expected to follow in the future. </p>
<p>Those who are interested in taking Vuze Leap for a spin can download the <a href="http://www.vuze.com/vuze-leap-beta-tester/">latest beta release</a> after signing up for the beta test. The <a href="http://www.vuze.com/leap-beta/download/VuzeLeapSetup.exe">download link</a> comes with the confirmation email. </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/vuze-releases-leap-a-simple-and-lightweight-torrent-client-140722/feed/</wfw:commentRss>
		<slash:comments>58</slash:comments>
		</item>
		<item>
		<title>&#8216;Popcorn Time&#8217; Remains Popular With Millions of Users</title>
		<link>http://torrentfreak.com/popcorn-time-has-millions-of-users-140709/</link>
		<comments>http://torrentfreak.com/popcorn-time-has-millions-of-users-140709/#comments</comments>
		<pubDate>Wed, 09 Jul 2014 17:44:56 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Popcorn Time]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=90733</guid>
		<description><![CDATA[The Popcorn Time app brought BitTorrent streaming to the masses and despite early setbacks the "Netflix for pirates" appears to be here to stay.  One of the most popular Popcorn Time forks currently has millions of users and is downloaded tens of thousands of time a day.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/popcorn.png"><img src="http://torrentfreak.com/images/popcorn.png" alt="popcorn" width="203" height="102" class="alignright size-full wp-image-89282"></a>The Popcorn Time phenomenon took the Internet by storm earlier this year. The software became the subject of hundreds of news articles by offering P2P streaming in an easy to use <a href="http://torrentfreak.com/open-source-torrent-streaming-a-netflix-for-pirates-140308/">Netflix-style interface</a>.</p>
<p>Overwhelmed by the response and the legal pressure that came with it the original team <a href="http://torrentfreak.com/popcorn-time-devs-drop-like-flies-but-no-one-will-talk-140420/">quickly retired</a>. However, since the code is open source, many competing forks quickly adopted the project, each taking it in a different direction.</p>
<p>The storm calmed down somewhat after a few months, but it appears that the &#8220;Netflix for pirates&#8221; idea is here to stay. TorrentFreak reached out to one of the most popular <a href="http://www.time4popcorn.eu/">Popcorn Time</a> forks at time4popcorn.eu to find out how they are faring.</p>
<p>While the developers are hesitant to reveal any hard data about their software&#8217;s popularity, they note that they have acquired millions of users over the past several months. On an average day tens of thousands of people download the application, with Sunday being the most popular day by far.</p>
<p>The developers further reveal that roughly half of all Popcorn Time downloads are for the Windows platform. The Mac version is in second place with 25%, followed by Android and Linux with 20% and 5% respectively. </p>
<p>For the developers this popularity is one of the main reasons to continue innovating through new features. For example, last month they <a href="http://torrentfreak.com/popcorn-time-gives-users-anonymity-with-a-free-built-in-vpn-140607/">integrated</a> a free VPN so users can hide their IP-address from the rest of the world.</p>
<p>&#8220;The million of users are the wind in our sails. We tell this to them all the time &#8211; they are the reason we&#8217;re putting in all the hard we&#8217;ve been putting in for the past 3.5 months,&#8221; the Time4Popcorn team tells TorrentFreak. </p>
<p>&#8220;In none of our previous projects did we experience this kind of &#8216;madness&#8217;. This is really what keeps us working around the clock on this project,&#8221; they add.  </p>
<p>This week the Popcorn Time variant released another highly anticipated feature in their <a href="http://time4popcorn.eu/alpha.html">latest Alpha release</a>, support for Chromecast. This means that users can now stream films directly to Chromecast with just a simple click.</p>
<p><center><a href="http://torrentfreak.com/images/popcornchrome.jpg"><img src="http://torrentfreak.com/images/popcornchrome.jpg" alt="popcornchrome" width="712" height="516" class="alignnone size-full wp-image-90738"></a></center></p>
<p>Chromecast support was one of the most requested Popcorn Time features, the developers told us. It&#8217;s also directly in line with one of the main goals of the software, which is creating an optimal viewing experience.</p>
<p>&#8220;The first goal for Popcorn Time is to make the best viewing experience for all our users, and the other is to make the safest watching experience so all our users can fulfill the first goal without getting in trouble,&#8221; the Time4Popcorn team says.</p>
<p>While Chromecast support is a milestone, the developers mention that there is more exiting news ahead in the not too distant future. </p>
<p>&#8220;This week&#8217;s Alpha release with Chromecast support is nothing compared to what we have coming,&#8221; we were told.</p>
<p>Stay tuned&#8230;</p>
<p><strong>Update:</strong> Time4Popcorn <a href="http://torrentfreak.com/popcorn-time-legal-investigation-switches-domain-141014/">lost its domain name</a> and switched to <a href="http://www.popcorn-time.se/">Popcorn-time.se</a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/popcorn-time-has-millions-of-users-140709/feed/</wfw:commentRss>
		<slash:comments>45</slash:comments>
		</item>
		<item>
		<title>The File-Sharing Wars Are Anything But Over</title>
		<link>http://torrentfreak.com/the-file-sharing-wars-are-anything-but-over-140629/</link>
		<comments>http://torrentfreak.com/the-file-sharing-wars-are-anything-but-over-140629/#comments</comments>
		<pubDate>Sun, 29 Jun 2014 21:36:25 +0000</pubDate>
		<dc:creator><![CDATA[Rick Falkvinge]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[opinion]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=90347</guid>
		<description><![CDATA[The past year, the copyright industry appears to have calmed down a bit, thinking it won the file-sharing wars. At the same time, people sharing culture and knowledge have done the same thing. This conflict is far from over.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/cassette.jpg"><img src="http://torrentfreak.com/images/cassette.jpg" alt="cassette" width="200" height="150" class="alignright size-full wp-image-84245"></a>The two sides in the conflict over sharing culture and knowledge have rarely been further from each other in their view of the world.</p>
<p>On one hand, you have the copyright industry, now content thinking it won the war against the net generation &#8211; or net generations by now (plural). File-sharing has stopped growing, the copyright industry observes, and controlled streaming is growing exponentially. New technology has produced a better offering that outcompeted the inferior pirate alternatives, and in the end, people wanted to do the legal thing, the copyright industry argues.</p>
<p>But this is very far from the truth. The only true part of it is that the number of people sharing culture and knowledge is no longer growing exponentially, but that&#8217;s because the habit is saturated. One-third of young people in the US and Europe today share culture &#8211; in violation of the copyright monopoly &#8211; daily or almost-daily. A phenomenon can&#8217;t keep growing exponentially forever in a finite population: eventually, everybody&#8217;s doing it, and that&#8217;s the point we have arrived at now.</p>
<p>Apart from that, it is true that the copyright industry has produced better offerings: Pandora, Netflix, and HBO streaming. But so have the people who manufacture their copies without a license. The Pirate Bay is ten years old; almost as old as Microsoft&#8217;s Windows XP, to put it in context. (Anybody remember Microsoft?) Yet, despite HBO&#8217;s successful and profitable subscription model, <a href="http://torrentfreak.com/game-thrones-season-finale-sets-piracy-record-140616/">record numbers</a> of us get our latest fix of Game of Thrones delivered automatically directly to our desktop the instant it is available, courtesy of RSS torrenting and EZTV, or your own favorite supplier.</p>
<p>And if we don&#8217;t like torrenting, but actually like streaming? Turns out that the pirate equivalents of the commercial offerings far surpass the simplicity, accessibility, and ease of use of the copyright industry&#8217;s technology &#8211; and that&#8217;s not even going into selection and absence of laughingly stupid &#8220;not available in your country&#8221; messages. From <a href="http://torrentfreak.com/popcorn-time-gives-users-anonymity-with-a-free-built-in-vpn-140607/">Popcorn Time</a> to <a href="https://torrentfreak.com/zona-is-a-popcorn-time-beater-and-a-pirates-dream-140425/">Zona</a>, the happy amateur sharers are miles and leagues ahead of the copyright industry. The technology that the copyright industry claims &#8220;already has won the war&#8221; for that obsolete industry? Well, it turns out that the net generation could use the same technology to build a lot better services still. Teens today make absolutely no distinction whether services are &#8220;legal&#8221; or not; they just grab stuff from where it&#8217;s easiest.</p>
<p>In this environment, people on the other side &#8211; the people manufacturing unlicensed copies of knowledge and culture, and sharing those copies in turn &#8211; have also taken a victory for granted. We&#8217;re getting our Game of Thrones, we&#8217;re getting our movies and porn as we always have, what&#8217;s the big deal? The Pirate Bay team was sentenced in a mock trial five years ago to largely no effect whatsoever (except for those poor individuals), the site itself is still up, and new great services for manufacturing our own copies of knowledge and culture are appearing by the month. Why bother fighting? This is long over, right?</p>
<p>Not so fast. SOPA and ACTA was just two years ago, in 2012. They were struck back, but their obfuscated spawn are already appearing. We&#8217;ve seen and heard the acronyms TPP, TTIP, CISP, CETA, and others. The copyright industry keeps working, it just does so out of the sunlight.</p>
<p><strong>In the end, this is about the <a href="https://torrentfreak.com/the-net-vs-the-power-of-narratives-120429/">power of narratives</a>, the greatest power anybody has ever had. And the copyright industry isn&#8217;t giving it up without a fight.</strong></p>
<p>The file-sharing wars are far from over. There may be a bit of silence on the fronts at the moment. Enjoy it, and prepare for what&#8217;s coming.</p>
<p><center>
<div class="alignfull" style="border:2px solid #3F3F3F;width:100%;padding:15px;padding-top:8px;padding-bottom:4px;margin-top:20px;margin-bottom:10px;border-radius:10px">
<h3 style="margin-top:0px;margin-bottom:10px">
<div style="float:right;height:130px;width:39px;margin-left:20px;margin-right:10px"><img src="http://falkvinge.net/wp-content/themes/WpNewspaper/images/falkvinge/Rick_Falkvinge_39x130.jpg" style="border:none;-moz-box-shadow:none;-webkit-box-shadow:none" class="quimby_search_image"></div>
<p><span style="color:#3F3F3F;font-size:125%">About The</span> <span style="color:#FF3C78;font-size:125%">Author</span></p>
</h3>
<p style="font-family:PTSansRegular,Arial,Sans-Serif;font-weight:400;line-height:150%;margin-bottom:14px"><small>Rick Falkvinge is a regular columnist on TorrentFreak, sharing his thoughts every other week. He is the founder of the Swedish and first Pirate Party, a whisky aficionado, and a low-altitude motorcycle pilot. His blog at <a href="http://falkvinge.net">falkvinge.net</a> focuses on information policy.</small></p>
<div style="float:right;position:relative;top:-12px">
<p><small>Book Falkvinge <a href="http://falkvinge.net/keynotes/">as speaker</a>?</small></p>
</div>
<p><a href="http://twitter.com/Falkvinge" class="twitter-follow-button">Follow @Falkvinge</a></p>
</div>
<p></center></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/the-file-sharing-wars-are-anything-but-over-140629/feed/</wfw:commentRss>
		<slash:comments>46</slash:comments>
		</item>
	</channel>
</rss>
