<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; peerguardian</title>
	<atom:link href="http://torrentfreak.com/tag/peerguardian/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 13:30:09 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>PeerBlock File-Sharing Safety Tool Clocks 100,000 Downloads</title>
		<link>http://torrentfreak.com/peerblock-file-sharing-safety-tool-clocks-100000-downloads-091111/</link>
		<comments>http://torrentfreak.com/peerblock-file-sharing-safety-tool-clocks-100000-downloads-091111/#comments</comments>
		<pubDate>Wed, 11 Nov 2009 21:58:58 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[PeerBlock]]></category>
		<category><![CDATA[peerguardian]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=18810</guid>
		<description><![CDATA[PeerBlock is a tool which can control who can connect to your computer on the Internet. In addition to hindering monitoring by anti-P2P companies, it's also capable of blocking malicious software. As the team is currently celebrating more than 100,000 downloads, TorrentFreak caught up with the creators for the lowdown.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Peerblock is a piece of software which lets you control who your computer communicates with on the Internet.  By utilizing lists of &#8216;known bad&#8217; computers, it&#8217;s possible for it to block P2P companies from monitoring a user&#8217;s file-sharing activities, along with spyware and other malicious software.</p>
<p>Just over a month has passed since the first stable public release of the software and PeerBlock has now managed to clock up more than 100,000 downloads. To mark this milestone, TorrentFreak caught up with Mark from the project for the lowdown.</p>
<p>Mark told us that the creation of PeerBlock was inspired by him upgrading his PC from 32 to 64 bit in order to utilize 6gb of RAM. Everything worked fine &#8211; until he tried to get PeerGuardian (another IP blocker) to work.</p>
<p>Having hacked away and jumped through hoops to get around driver-signing it would still only work half the time and often crashed without warning. As a software engineer who has worked in the commercial sector for more than 13 years, Mark &#8211; who admits to being &#8220;an arrogant bastard who truly believes he can do just about anything better than just about anybody,&#8221; decided he could find a solution. It was &#8220;put up or shut up time,&#8221; he told TorrentFreak.</p>
<p>Noticing that the PeerGuardian code was open-source but hadn&#8217;t been touched for a couple of years, Mark contacted another developer who had the same thing in mind, but having heard nothing back, he went at it alone.</p>
<p>&#8220;I started setting up a Sourceforge.net project for it so we could get free source-control, but they took too long to set it up for me so I instead created a project over at Google Code where it was ready within minutes,&#8221; he told us.</p>
<p>Having heard from a few people who were interested in helping out with the development side &#8211; &#8220;night_stalker_z&#8221; who&#8217;d earlier started trying to hack the PG2 code into shape, &#8220;DarC&#8221; / &#8220;DisCoStu&#8221; who wanted to help out with fixing up the installer, XhmikosR who rewrote the installer, and some testers, things moved forward.</p>
<p>After facing troubles due to the lack of a &#8220;signed driver&#8221; for 64-bit versions of Vista (which resulted in Mark having to set up a registered company before they were allowed to buy a $230 code-signing certificate), a couple of blogs wrote articles on PeerBlock which attracted some much-needed publicity to the project. This resulted in 10,000 downloads in just one weekend.</p>
<p>&#8220;We&#8217;re still getting donations from people and we now have enough to pay for next year&#8217;s annual code-signing certificate, and we&#8217;re saving up to be able to rent our own VPS with full root access etc, upon which we&#8217;ll be able to build a &#8216;real&#8217; online-update system, a custom web-app to tie our forums/issue-tracker/website all together, and some other neat things,&#8221; Mark explains.</p>
<p>The first stable release of PeerBlock came out on September 27th, and as of November 5th had clocked up an impressive 100,000 downloads. The site now receives up to 7,000 visitors each day.</p>
<p>Aside from fixing one or two bugs, the team has lots of new features planned for PeerBlock. Anyone that has tried to surf the web with a blocklist in place will know how painful that can be, so PeerBlock will have some new features which allow the &#8220;whitelisting&#8221; of certain apps, such as a browser, the creation of a proxy server to let users configure PeerBlock to listen on certain ports, possibly an integral &#8220;AdMuncher&#8221; style ad-blocking feature on a per URL basis (as opposed to just an IP-address), and an encrypted chat feature.</p>
<p>TorrentFreak asked Mark why users should choose PeerBlock over the competition. </p>
<p>&#8220;Well, first off we need to ask &#8216;Who IS the competition?&#8217;  The only ones I&#8217;m really aware of are: Protowall by the folks over at Bluetack which is closed-source and I don&#8217;t believe was ever updated for Vista, and Outpost Firewall, which is closed-source and basically just a hack add-on to a more professional firewall product,&#8221; he responded, while noting that uTorrent&#8217;s built-in IP-filtering feature only handles one manually-updated list.</p>
<p>&#8220;We protect your entire machine, and give you the option to try out any P2P app you want &#8211; this freedom of choice is a very important thing, I think.  And since it does everything automatically, including list-updates, it&#8217;s one less thing to think about,&#8221; he added.</p>
<p>Another important question relates to the blocklists that have to be used in conjunction with PeerBlock in order for it to block anything. </p>
<p>He told TorrentFreak that he&#8217;s a big fan of <a href="http://www.iblocklist.com/">iblocklist</a>, who serve up a staggering 10TB of blocklists every month for free. The site doesn&#8217;t create the lists, but does offer those from Bluetack, including the Level1 list (renamed to &#8216;P2P&#8217; in PG2/PeerBlock, which contains both Gov and Anti-P2P IP-addresses) and others.</p>
<p>Mark admits that even in a best case scenario, the available blocklists aren&#8217;t 100% effective. That said, there have been studies which show that using blocklists along with software such as PeerBlock can help speed up downloads, but no-one knows how many of the potential &#8220;bad IPs&#8221; are covered by currently available blocklists.</p>
<p>P2P aside, Mark says there has been feedback to suggest that PeerBlock discovered a Conficker infection on a user&#8217;s machine that their anti-virus programs missed, and can also stop ads appearing in browsers that lack in-built blocking.</p>
<p>One other exciting thing for the future of PeerBlock is porting it to the Mac. Mark says they&#8217;re saving all the donations for additional development and this is the most-requested request right now.</p>
<p>Users of PeerBlock are encouraged to give as much feedback as possible to Mark&#8217;s team, via their <a href="http://forums.peerblock.com/">forums</a>, IRC (#peerblock on freenode.net) or <a href="http://tinymailto.com/peerblock">email</a>.</p>
<p>PeerBlock can be downloaded <a href="http://www.peerblock.com/releases">here</a>.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/peerblock-file-sharing-safety-tool-clocks-100000-downloads-091111/feed/</wfw:commentRss>
		<slash:comments>106</slash:comments>
		</item>
		<item>
		<title>Understanding Anti-Piracy Enforcement</title>
		<link>http://torrentfreak.com/understanding-copyright-enforcement-080514/</link>
		<comments>http://torrentfreak.com/understanding-copyright-enforcement-080514/#comments</comments>
		<pubDate>Wed, 14 May 2008 17:58:36 +0000</pubDate>
		<dc:creator><![CDATA[Ben Jones]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[Tutorial & How To]]></category>
		<category><![CDATA[antip2p]]></category>
		<category><![CDATA[antipiracy]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[mpaa]]></category>
		<category><![CDATA[peerguardian]]></category>
		<category><![CDATA[RIAA]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=2722</guid>
		<description><![CDATA[There is a great deal of confusion on the net, as to just how people get warning letters and notices from ISPs and copyright holders. In an attempt to clear the murk, we've produced this guide to help clarify what actions are taken, by whom, and how to respond to it.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Above all else, right at the start, I will reiterate one thing -<strong><span style="color: #ff0000;"> I AM NOT A LAWYER</span></strong>. None of what is said is legal advice, nor should it be used as any basis for defense. If you feel the need for legal advice, then get competent legal advice. This is a point most strongly emphasized by the Jammie <a href="http://torrentfreak.com/thomas-seeks-new-lawyer-010108/" target="_self">Thomas</a> trial, where she had legal advice, but it was NOT competent in the subject. Finally, for the most part, this will be referring to US laws, as that&#8217;s where the majority of lawsuits occur.</p>
<p>The first thing to remember is, there is nothing on the net that you know of, that anti-piracy organizations don&#8217;t. No protocol, or secret piece of software, that you know of but which shouldn&#8217;t be talked about <em>&#8216;in case they get to hear of it&#8217;</em>. They employ people who do nothing all day but surf and chat. They act just like you or me &#8211; there&#8217;s no reason for them to behave in any other way. So, one of the first things to remember is, there&#8217;s no such thing as security by obscurity in P2P. If you can find it, what&#8217;s stopping someone in the pay of an anti-piracy organization from finding it too? That&#8217;s just common sense. Of course, as in the old saying &#8211; poachers make the best gamekeepers &#8211; quite often the people doing the investigations are not newcomers to p2p, but have been doing it for years themselves. In that respect, over most users, they have the advantage in experience.</p>
<p>The one thing most people seem to fail to understand, is that there are no magic solutions. At the end of the day, you have to get data back to your IP. In order to do that, at some point, your IP has to be known. While this can be obfuscated to the point at which it&#8217;s extremely impractical to trace, it is at the expense of bandwidth. This is why torrenting over Tor is a no-no. You could use a VPN service, but they also know your home IP, and also generally billing details for the account. In that way, they&#8217;ve not only associated it with a name, as they would with a home IP, but also your financial information, which would be a great way to prove you personally were behind it.</p>
<p>There are some common misunderstandings about anti-piracy activities that seem to be pervasive. So let&#8217;s address them.</p>
<ol>
<li>There have been very few actual legal cases, as yet, that have involved torrents.</li>
<li>The majority of copyright cases are CIVIL, not criminal</li>
<li>What most people think of as being the law, often isn&#8217;t.</li>
<li>The RIAA and the MPAA never get involved in anti piracy evidence collection directly.</li>
<li>Most of the time, people are going from what someone they have met on a forum had read in an IRC channel.</li>
</ol>
<p></br></p>
<h4>1) &#8211; There have been very few actual legal cases, as yet, that have involved torrents.</h4>
<p>Cases involving torrents are rare, as yet. This will probably change over the next few years. Despite the protocol having been around since 2002, it wasn&#8217;t until around 2004 that it started to gain widespread acceptance. Since then there have been a few cases, such as the DVDr-core, and the Elitetorrents enforcement activities, but they are in the main, the exception rather than the rule.</p>
<p>The <a href="http://torrentfreak.com/torrentspy-slapped-110-million-080507/">Torrentspy judgment</a>, handed down this past week, is also now heading for appeal, which could significantly change things, or could have it all stay the same. It&#8217;s too early to tell at present. Likewise, the <a href="http://torrentfreak.com/isohunt-mpaa-bittorrent-080504/">ISOhunt case</a> hasn&#8217;t even gone that far. Despite there being in excess of 100+ torrent sites active now, and a similar number at least having been opened and closed for various reasons over the past 5 years, that only one has got to an initial judgment says something.</p>
<p>Torrents are a difficult subject to litigate &#8211; the ISOhunt case is evidence of that. Unlike most other methods, which rely on a few centralized servers to index and sort, torrents rely on trackers, and on DHT. File names can be used to find torrent files, but owning a torrent file is not actionable. They are metadata (data about data) files and are not covered under the same copyright as the original source, any more than a film review belongs to the movie studio. The error checking aspect has a legitimate use as well, as it could be argued (how successfully I don&#8217;t know) that the torrent file is being used to <a href="  [15:03.12] Ernesto: http://tech.slashdot.org/tech/08/05/04/2230252.shtml" target="_blank">error check</a> existing data legitimately acquired.</p>
<p>Most recently, cases centering around BitTorrent sites have focused more on vicarious infringement, as in the Pirate Bay and oink cases. Basically, this means that the defendant had the right and ability to control the infringer&#8217;s acts, by being able to add or delete torrents, and that the defendant gets a direct financial benefit from these acts of infringement. Hence the claims of &#8216;paying for membership&#8217; given to the police for the OiNK raids, and the focus on advertising in the Pirate bay trial. However, this can be a tricky subject for other companies too &#8211; including ISPs and technology companies like Sony, where they have to be certain to not fall foul of the ability+control aspect. This is why bandwidth-choked ISPs are firmly opposed to be involved in any sort of P2P-policing.</p>
<h4>2) &#8211; The majority of copyright cases are CIVIL, not criminal</h4>
<p>Now, civil cases are unlike criminal ones in that there is no &#8216;innocent until proven guilty&#8217;. There are just two groups of litigants. Whoever has the most proof (or preponderance of evidence) is the winner. So, where in a criminal trial, they must prove beyond all reasonable doubt that you did commit the acts, in a civil case, they only have to prove you did it better than you can prove you didn&#8217;t. Of course, I refer you to the caveat at the beginning, and note that many countries have differing requirements of proof for a civil case.</p>
<p>Another major factor that sets &#8216;criminal acts&#8217; from those that are &#8216;civilly actionable&#8217; is that whilst the former is always against the law, and doing that act means you&#8217;ve broken the law. If you punch someone, that&#8217;s always assault (with a few exceptions). Running a BitTorrent client, or participating in a BitTorrent swarm is not against any law. The contents of it might however be civilly actionable. If the copyright owners decide to sue, they can, but if they don&#8217;t, as the law goes, there&#8217;s no complaint to be answered.</p>
<h4>3) &#8211; What most people think of as being the law, often isn&#8217;t.</h4>
<p>This is especially common. When we broke the story on <a href="http://torrentfreak.com/anti-piracy-gang-launches-their-own-video-download-site-to-trap-people/">Mivii</a> last year, a large number cried &#8220;entrapment&#8221;. There was a similar response the other day, to our <a href="http://torrentfreak.com/ifpi-advises-kids-to-use-limewire-and-kazaa/">story</a> about the IFPI and limewire. Many people also believe that if a media enforcer is on a torrent, they can&#8217;t share data, else they&#8217;re complicit in the copyright infringement and are giving you some sort of permission to distribute yourselves. This could not be further from the truth.</p>
<p>First of all, entrapment relates only to criminal cases, in the main, and for that matter, only occurs in a specific set of circumstances. If a law enforcement officer (as in someone with the actual power to arrest you) asks or incites you to commit a crime that you wouldn&#8217;t otherwise have done, that&#8217;s entrapment. However, if you&#8217;re not a law enforcement agency, then it can&#8217;t be entrapment, pure and simple. </p>
<p>The implicit permission argument is similarly flawed. Whilst the enforcement agent (&#8216;snooper&#8217;) might have permission to distribute, by distributing in part of a bit-torrent swarm, it&#8217;s hard to argue that he&#8217;s similarly giving you permission to distribute. Try telling the judge &#8220;he did, so I thought I could&#8221; and you&#8217;ll not get a very positive reaction &#8211; mainly because he can point to his &#8216;distribution agreement&#8217; from the owner of the copyright, and you can&#8217;t. If you want an example, look at alcohol. In most countries, alcohol can only be sold by persons licensed to sell it. If you try and sell it, without a license, you can face penalties under the law. Saying &#8216;I&#8217;m selling it because he&#8217;s selling it&#8217; won&#8217;t work there, and it&#8217;s the same case for copyright and distribution.</p>
<h4>4) &#8211; The RIAA and the MPAA never get involved in anti-piracy evidence collection directly.</h4>
<p>Finally, lets just clear something up we all know at the back of our minds, but forget in the heat of an impassioned board post, or IRC comment. The RIAA and MPAA do not directly get involved with the details of &#8216;evidence gathering&#8217; in these cases. The MPA and IFPI are lobby mouthpieces, not enforcement agencies. Their existence is not to investigate, or to sue. They exist to <span style="text-decoration: line-through;">bribe</span>lobby politicians, to issue press releases, and &#8216;studies&#8217;, to hide conflicts between the major studios, and to discourage independent works. Member companies put money into these organizations, in exchange for getting their ideas across to those that make the law, to conduct studies to back up the wants and desires of the members, and to be a face to be interviewed by the media.</p>
<p>The enforcement activities are carried out by companies that exist for this purpose. In effect, they are digital private investigators (although most don&#8217;t seem to have bothered applying for the<a href="http://arstechnica.com/news.ars/post/20080409-defendants-riaas-private-eyes-are-watching-usillegally.html" target="_blank"> licenses</a>) and like the old fashioned gumshoe, they work for whoever pays them. Some activities of the investigator might be illegal, but that&#8217;s nothing new from private investigators. Companies like Safenet, and BayTSP aren&#8217;t in it for an ideological reason, it&#8217;s just a business. As such they work like any other business, with long hours, and trying new things to get clients and please them. </p>
<p>Think you&#8217;ve tried hard to get onto that private tracker? Imagine the guy that got onto it, AND got paid to do so, sitting in a nice air conditioned office. I&#8217;m certain there are people who&#8217;s only task is to gain memberships to private trackers. To collect evidence, build up contacts, and invites. How do I know this? Well, it&#8217;s what I would do, if I were running such a company, and it&#8217;s fairly obvious, especially given the evidence of the <a href="http://en.wikipedia.org/wiki/EliteTorrents" target="_blank">EliteTorrents bust</a> back in 2005. Sites know this as well, which is why most private trackers heavily discourage trading invites, and why the rule is that you only invite those you &#8220;know&#8221;.</p>
<p>The lack of knowledge most people have about these subjects, especially in relation to the law, is mind boggling. Also, whilst the power to change laws seems to be solidly with the cartels, the position now is better than it was just three or four years ago. If you want to help improve it, join your <a href="http://www.pp-international.net" target="_blank">local Pirate Party</a>, the <a href="http://eff.org" target="_blank">EFF</a>, or similar organizations and help them out. It might not be easy, but nothing worthwhile ever was.</p>
<h4>5) &#8211; Most of the time, people are going from what someone they have met on a forum had read in an IRC channel.</h4>
<p>Unlike most, I actually used to work in copyright enforcement &#8211; those of you that have read my <a href="http://torrentfreak.com/author/bjones/">bio</a> will know that. Of course, this was around 10 years ago, when Napster was just becoming popular, and I dealt with physical copyright infringement (people selling CDs). However, I do have a grasp of the law, and personal experience in making and pursuing a copyright case. So, as you can see, this isn&#8217;t someone repeating urban myths, or something read in an IRC channel. It&#8217;s based on fact, and experience, which isn&#8217;t that common in this area.</p>
<h2>What to do about it?</h2>
<p>To be frank, there is no way to stop the logging bots that harvest peer info from torrents. They don&#8217;t give themselves away, because they don&#8217;t have to act any differently than normal clients. With a WebUI, or even a VNC set up, it can easily be controlled from the office, and provides much greater anonymity. After all, the bandwidth and reliability of a co-located server isn&#8217;t required.</p>
<p>It is also probably wise to avoid anything considered high profile, initially, and if you&#8217;re in the US, avoid any films that hit the net before the cinema. It is also safer, in the long run, to avoid private sites which deal in what could be called &#8216;mainstream&#8217;  material, better known as &#8216;<a href="http://en.wikipedia.org/wiki/The_Scene" target="_blank">scene</a> releases&#8217;. This is stuff that is most likely to be tracked, and private sites, whilst fast, have the great disadvantage of being part of a very small subgroup. Put another way, you could be one of up to 20 million that use the PirateBay, or you are one of 40,000 that use SceneTorrents. And unlike the PirateBay, a private site has your activities stored (in some form anyway, to generate the ratio) as well as an identifier &#8211; the email address you used. Remember, it was the similarity between an email address login, and a kazaa login that was the &#8216;pivotal&#8217; evidence in the Thomas case, and removed doubt about the identity. If the site displays user names on the torrent though, you might as well never contest any case that you are hit with. Being able to track user names as well as IPs in a torrent means they&#8217;re likely to get repeat hits on you, even when you switch IPs. You might be able to convince a court that once was a mistake in their evidence gathering, but if they have you on multiple occasions, with different IPs each time, that argument is out the window.</p>
<p>Some suggest using blocklists, but since there is no way to identify an IP logging you, and no way to tell what IP it&#8217;s logging from, they really don&#8217;t keep you &#8220;safe&#8221;. Additionally, the most popular list provider, Bluetack, has added such a large number of IPs to their anti-piracy list  (something like 700,000,000) that you are only eliminating legitimate peers slowing you down, and increasing the chance of being logged. Besides that, the people who do the logging are very aware of these blocklists, use proxies, and change IPs all the time. Additionally, the criteria for adding may not quite be at the &#8220;a guy that works there&#8217;s sister&#8217;s neighbor gets her hair done at the same place as the nephew of a guy whose company works for the company that delivers the water for the MPAA&#8217;s water coolers&#8221; &#8211; but it&#8217;s getting close (see <a href="http://www.bluetack.co.uk/forums/index.php?s=&amp;showtopic=18340&amp;view=findpost&amp;p=85738" target="_blank">here</a> and <a href="http://www.bluetack.co.uk/forums/index.php?s=&amp;showtopic=18609&amp;view=findpost&amp;p=86892" target="_blank">here</a>) as well as blaming hosting companies for the actions of their customers (<a href="http://www.bluetack.co.uk/forums/index.php?s=&amp;showtopic=18140&amp;view=findpost&amp;p=85112" target="_blank">example</a>). The sad thing is, people run this, see all the blocks that come up, marked as being antip2p, and think &#8220;look at all those being blocked, now I&#8217;m safe&#8221; when the reality is, a group of people has claimed this, and how much do you trust the list makers. however, the final word on this comes from Phrosty, one of the coders of <a href="http://phoenixlabs.org/" target="_blank">Peerguardian</a>, who told one of our researchers &#8220;PG might help it might not. we think it does, but make no guarantees. make your own choice&#8221;.</p>
<p>Probably the most important thing you can do is know your rights, and know the truth. Use some common sense, and if in doubt, imagine yourself as an antip2p guy, and think of what you might do in their place. Unless it&#8217;s illegal, they&#8217;re probably doing it already (and maybe some of the illegal stuff too). The lack of knowledge, however, is to their advantage and not yours.</p>
<h5>DISCLAIMER &#8211; We at TorrentFreak would like to remind you that we neither support or condone copyright infringement or theft, and that all infomation is for news reporting purposes only</h5>
<div class="alert">Tip: Want to download <a href="http://torrentfreak.com/download-torrents-anonymously-with-torrentprivacy-080812/">Torrents anonymously</a>? Try <a href="http://torrentfreak.com/download-torrents-anonymously-with-torrentprivacy-080812/">TorrentPrivacy</a>, the only way to download torrents securely.</div>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/understanding-copyright-enforcement-080514/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
		</item>
		<item>
		<title>Anti-Virus Company Says PeerGuardian is Malware</title>
		<link>http://torrentfreak.com/peerguardian-malware-080224/</link>
		<comments>http://torrentfreak.com/peerguardian-malware-080224/#comments</comments>
		<pubDate>Sun, 24 Feb 2008 12:09:14 +0000</pubDate>
		<dc:creator><![CDATA[Ben Jones]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[blocklist]]></category>
		<category><![CDATA[bluetack]]></category>
		<category><![CDATA[eset]]></category>
		<category><![CDATA[nod32]]></category>
		<category><![CDATA[peerguardian]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/</guid>
		<description><![CDATA[Over the past week, some servers used for updating the anti-virus software NOD32 were labeled as anti-p2p by a popular list maker for PeerGuardian. In response, NOD32's company, ESET, has categorised PG2 as malware in some of its latest updates.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>It started off with <a HREF="http://www.bluetack.co.uk" TARGET="_blank">Bluetack</a> adding some IP addresses to its &#8220;Level 1 blocklist&#8221; that belonged to <a TARGET="_blank" HREF="http://www.eset.com">ESET</a> (NOD32) update servers. &#8220;Level 1&#8243; is the term that Bluetack use for their lists containing (<a HREF="http://www.bluetack.co.uk/forums/index.php?showtopic=17329&amp;pid=82226&amp;mode=threaded&amp;show=&amp;st=?entry82226#" TARGET="_blank">according</a> to site admin &#8216;monk&#8217;):</p>
<blockquote>
<ul>
<li>Companies (Or organizations. I won&#8217;t repeat orgs. over and over) who are clearly involved with trying to stop filesharing.</li>
<li>Companies which anti-p2p activity has been seen from.</li>
<li>Companies that produce or have a stong financial interest in copyrighted material.</li>
<li>Government ranges or companies that have a strong financial interest in doing work for governments.</li>
<li>Legal industry ranges.</li>
<li>IPs or ranges of ISPs from which anti-p2p activity has been observed.</li>
</ul>
</blockquote>
<p>The IP addresses added were 89.202.149.32 to 89.202.149.63, 89.202.157.88 to 89.202.157.95 and 89.202.157.128 to 89.202.157.159, according to<a HREF="http://www.wilderssecurity.com/showpost.php?p=1187227&amp;postcount=1" TARGET="_blank"> this</a> forum post on the NOD32 support forum. These blocked IP ranges contain many of the servers used to provide anti-virus signatures for NOD32. These were added to the blocklist for alleged anti-p2p activities. However, what kind of anti-p2p activity was taking place is unclear. </p>
<p>Bluetack administrator &#8216;m00re&#8217; told TorrentFreak that the IPs were added because &#8220;someone noticed them on a torrent&#8221;. &#8216;m0nk&#8217;, another administrator later told TorrentFreak that he noticed an IP belonging to ESET on a private tracker&#8217;s movie torrent that he was on. &#8220;It was only 1 IP, but since they&#8217;re a commercial software company with a strong financial interest in copyrighted material, they go on level 1 regardless&#8221;.</p>
<p>However, ESET didn&#8217;t take too kindly to this disruption of its business. A representative from ESET tried to contact Bluetack, to see about the removal from the list. He later <a TARGET="_blank" HREF="http://www.wilderssecurity.com/showpost.php?p=1187767&amp;postcount=14">posted</a> a screenshot of the discussion to the ESET support forum.</p>
<p>This was the <a HREF="http://neuron2neuron.blogspot.com/2006/03/pg2-blocks-utorrentcom.html#IRC" TARGET="_blank">same</a> kind of attitude experienced by Ludvig Strigeus almost exactly two years ago, after <a TARGET="_blank" HREF="http://www.utorrent.com">utorrent.com</a> was added to the Bluetack lists. Similarly by the <a HREF="http://opentracker.blog.h3q.com/?p=29" TARGET="_blank">Opentracker</a> people, and the German<a HREF="http://www.p2p-blog.com/?itemid=373" TARGET="_blank"> Chaos Computer Club</a>.</p>
<p>Based on the feedback from Bluetack, ESET added PeerGuardian to their anti-virus updates. Two signatures called Win32/PeerGuardian were added in <a TARGET="_blank" HREF="http://www.eset.com/support/updates.php?pageno=2">update</a> number 2894 on the 21st of Feb, with another 5 added in update number 2895 the following day. These updates identify the PeerGuardian application as malware, and offer the user the ability to deal with the &#8216;infection&#8217;. Those that do, have been unable to use PeerGuardian afterwards.</p>
<p>Phoenixlabs, which makes PeerGuardian, put out <a HREF="http://phoenixlabs.org/2008/02/21/peerguardian-now-with-viruses/" TARGET="_blank">this</a> statement in response. Their representatives would  not  comment further on the subject, referring only to the statement. Bluetack, on the other hand, have been very vocal about it. &#8216;m00re&#8217; <a HREF="http://www.bluetack.co.uk/forums/index.php?showtopic=18392&amp;st=0&amp;p=85919&amp;#">said</a> &#8220;whomever the person/persons are that made the flawed decision to maliciously target a non threatening application like PG2 is clearly a moron.&#8221; whilst &#8216;firstaid&#8217; <a HREF="http://www.bluetack.co.uk/forums/index.php?showtopic=18392&amp;st=0&amp;p=85919&amp;#" TARGET="_blank">suggested</a> that &#8220;people call them and have them stop having their product remove PG2 from their systems.&#8221;</p>
<p>ESET <a HREF="http://www.wilderssecurity.com/showpost.php?p=1188549&amp;postcount=43" TARGET="_blank">defended</a> the addition, &#8220;By blocking update and threatsense servers detection of PeerGuardian as potentially unwanted application is fully justified as it could disrupt normal operation of NOD32 and or ESS.&#8221;</p>
<p>However, ESET has now changed it&#8217;s mind, <a HREF="http://www.wilderssecurity.com/showpost.php?p=1188596&amp;postcount=50" TARGET="_blank">saying</a> &#8220;We have reconsidered detection of PeerGuardian and it will be removed in the upcoming update. However, we will actively continue protecting our users from blacklists that contain the IP addresses (ranges) of our update servers and thus preventing our paying or trial users receiving updates and keeping their computers protected.&#8221;</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/peerguardian-malware-080224/feed/</wfw:commentRss>
		<slash:comments>211</slash:comments>
		</item>
		<item>
		<title>MPAA Fake IP Ranges</title>
		<link>http://torrentfreak.com/mpaa-fake-ip-ranges/</link>
		<comments>http://torrentfreak.com/mpaa-fake-ip-ranges/#comments</comments>
		<pubDate>Thu, 12 Jan 2006 11:42:42 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[DRM and Other Evil]]></category>
		<category><![CDATA[Tutorial & How To]]></category>
		<category><![CDATA[blocklist]]></category>
		<category><![CDATA[ip]]></category>
		<category><![CDATA[mpaa]]></category>
		<category><![CDATA[peerguardian]]></category>
		<category><![CDATA[tracker]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/mpaa-fake-ip-ranges/</guid>
		<description><![CDATA[MPAA Tracker:66.172.60.1-66.172.60.255
MPAA Tracker:66.177.58.1-66.177.58.255
MPAA Tracker:66.180.205.1-66.180.205.255
MPAA Tracker:209.204.61.1-209.204.61.255
MPAA Tracker:216.151.155.1-216.151.155.255<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/mpaa-fake-ip-ranges/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
