<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Copyright Trolls Get Bad-Tempered Cross-Examination Over File-Sharing Evidence</title>
	<atom:link href="https://torrentfreak.com/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 20:08:22 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: I'm watching you</title>
		<link>/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/#comment-1106018</link>
		<dc:creator><![CDATA[I'm watching you]]></dc:creator>
		<pubDate>Sat, 13 Jul 2013 19:45:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=72701#comment-1106018</guid>
		<description><![CDATA[Barry Logan and his snake of a lawyer James Zibarras got owned in court by David Fewer... absolutely owned.

Logan can&#039;t even disclose what contract he has with Voltage or how Canipre is going to get paid, so I&#039;ll fill in the blanks:

Logan is a troll, first and foremost. He&#039;s learned that if you troll enough on the internet, info is worth $$$. He&#039;s trolled and then approached companies like Voltage to offer to get them some extra $$$ just from collecting IP addresses. He figures 1 out of every 10 people who are identified will be scared sh*tless enough to settle out of court, lest they be exposed as thieves or even have their dirty secrets exposed to others (like downloading porn movies etc.) They collect 1000 names, 100 people settle for $5000, that&#039;s half a million earned without even going to court. Logan gets his cut and slithers off to another client for a potential payday.

Trolls are the epitome of how capitalism truly is an evil beast. In previous years, they&#039;d call this extortion or blackmail, nowadays it&#039;s &quot;forensic crime&quot; or &quot;Intellectual Property theft&quot;, the wording is irrelevant.

Give a person the motive to make money and some computer skills and they will run with it, just like Logan has. Except, Logan is an even dirtier rat than he appears. He searches out companies with false and inaccurate info, hoping someone will buy the snake oil he&#039;s selling, including the courts.

Barry, go crawl back under the rock you where you were both conceived and hatched, it&#039;s the best place for you. Nice digs for your headquarters too. What&#039;s the matter, couldn&#039;t find any empty space over a pizza place or 7-11 or where they all rented out?]]></description>
		<content:encoded><![CDATA[<p>Barry Logan and his snake of a lawyer James Zibarras got owned in court by David Fewer&#8230; absolutely owned.</p>
<p>Logan can&#8217;t even disclose what contract he has with Voltage or how Canipre is going to get paid, so I&#8217;ll fill in the blanks:</p>
<p>Logan is a troll, first and foremost. He&#8217;s learned that if you troll enough on the internet, info is worth $$$. He&#8217;s trolled and then approached companies like Voltage to offer to get them some extra $$$ just from collecting IP addresses. He figures 1 out of every 10 people who are identified will be scared sh*tless enough to settle out of court, lest they be exposed as thieves or even have their dirty secrets exposed to others (like downloading porn movies etc.) They collect 1000 names, 100 people settle for $5000, that&#8217;s half a million earned without even going to court. Logan gets his cut and slithers off to another client for a potential payday.</p>
<p>Trolls are the epitome of how capitalism truly is an evil beast. In previous years, they&#8217;d call this extortion or blackmail, nowadays it&#8217;s &#8220;forensic crime&#8221; or &#8220;Intellectual Property theft&#8221;, the wording is irrelevant.</p>
<p>Give a person the motive to make money and some computer skills and they will run with it, just like Logan has. Except, Logan is an even dirtier rat than he appears. He searches out companies with false and inaccurate info, hoping someone will buy the snake oil he&#8217;s selling, including the courts.</p>
<p>Barry, go crawl back under the rock you where you were both conceived and hatched, it&#8217;s the best place for you. Nice digs for your headquarters too. What&#8217;s the matter, couldn&#8217;t find any empty space over a pizza place or 7-11 or where they all rented out?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: fengban346</title>
		<link>/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/#comment-1103199</link>
		<dc:creator><![CDATA[fengban346]]></dc:creator>
		<pubDate>Mon, 08 Jul 2013 02:09:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=72701#comment-1103199</guid>
		<description><![CDATA[tinyurl.com/l3cselt.]]></description>
		<content:encoded><![CDATA[<p>tinyurl.com/l3cselt.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: hammer85</title>
		<link>/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/#comment-1098196</link>
		<dc:creator><![CDATA[hammer85]]></dc:creator>
		<pubDate>Thu, 27 Jun 2013 06:37:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=72701#comment-1098196</guid>
		<description><![CDATA[SOB! Zibarras]]></description>
		<content:encoded><![CDATA[<p>SOB! Zibarras</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Copyright Trolls Get Bad-Tempered Cross-Examination Over File-Sharing Evidence &#187; Geeks Cafe</title>
		<link>/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/#comment-1098080</link>
		<dc:creator><![CDATA[Copyright Trolls Get Bad-Tempered Cross-Examination Over File-Sharing Evidence &#187; Geeks Cafe]]></dc:creator>
		<pubDate>Thu, 27 Jun 2013 02:30:47 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=72701#comment-1098080</guid>
		<description><![CDATA[[...] Source: Copyright Trolls G&amp;#1077t T&amp;#1077rr&amp;#1110b&amp;#406&amp;#1077-Tempered Cross-Examination Over File-Sharing P... [...]]]></description>
		<content:encoded><![CDATA[<p>[...] Source: Copyright Trolls G&amp;#1077t T&amp;#1077rr&amp;#1110b&amp;#406&amp;#1077-Tempered Cross-Examination Over File-Sharing P&#8230; [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: anon</title>
		<link>/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/#comment-1098070</link>
		<dc:creator><![CDATA[anon]]></dc:creator>
		<pubDate>Thu, 27 Jun 2013 02:12:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=72701#comment-1098070</guid>
		<description><![CDATA[This type of exchange is very typical during discovery.  Usually what follows is the examining party then brings a motion to compel answers. Then its argued in front of a judge as to why so and so question needs to be answered.  An order is issued which makes answers (any the judge feels is important enough) mandatory. These are generally sent to the other party as an answers to undertakings. As long as CIPPIC can provide compelling reasons as to why answers are necessary, they&#039;ll get their answers.]]></description>
		<content:encoded><![CDATA[<p>This type of exchange is very typical during discovery.  Usually what follows is the examining party then brings a motion to compel answers. Then its argued in front of a judge as to why so and so question needs to be answered.  An order is issued which makes answers (any the judge feels is important enough) mandatory. These are generally sent to the other party as an answers to undertakings. As long as CIPPIC can provide compelling reasons as to why answers are necessary, they&#8217;ll get their answers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Hoare</title>
		<link>/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/#comment-1097539</link>
		<dc:creator><![CDATA[Hoare]]></dc:creator>
		<pubDate>Wed, 26 Jun 2013 03:56:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=72701#comment-1097539</guid>
		<description><![CDATA[I don&#039;y recall any mention of &quot;blocks&quot; when reading up on bittorrent. What are these &quot;blocks&quot; you refer to?]]></description>
		<content:encoded><![CDATA[<p>I don&#8217;y recall any mention of &#8220;blocks&#8221; when reading up on bittorrent. What are these &#8220;blocks&#8221; you refer to?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ben Jones</title>
		<link>/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/#comment-1097511</link>
		<dc:creator><![CDATA[Ben Jones]]></dc:creator>
		<pubDate>Wed, 26 Jun 2013 01:34:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=72701#comment-1097511</guid>
		<description><![CDATA[K`Tetch does know all about bobmail, more than anyone else here in fact.
He&#039;s the guy responsible for the comments, and its moderation (as well as being our researcher).
90% of the comments on this site, he reads.


How he hasn&#039;t gone mad I&#039;ll never know.....]]></description>
		<content:encoded><![CDATA[<p>K`Tetch does know all about bobmail, more than anyone else here in fact.<br />
He&#8217;s the guy responsible for the comments, and its moderation (as well as being our researcher).<br />
90% of the comments on this site, he reads.</p>
<p>How he hasn&#8217;t gone mad I&#8217;ll never know&#8230;..</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ardvaark</title>
		<link>/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/#comment-1097498</link>
		<dc:creator><![CDATA[Ardvaark]]></dc:creator>
		<pubDate>Wed, 26 Jun 2013 00:48:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=72701#comment-1097498</guid>
		<description><![CDATA[&lt;blockquote&gt;Considering people like &quot;uraphake&quot;  post under a dozen or more names,&lt;/blockquote&gt;

Oh here comes the suppositions and suspicions... how very credible.

&lt;blockquote&gt;  Heck,I have posted as Mary.  Does that make your argument any better or worse?&lt;/blockquote&gt;

Thanks for admitting to astroturfing. Not that you fooled anyone with Alec, fake mary, fake uraphake and fake Traveller.

&lt;blockquote&gt;All I can say is I am not Fetty.  Too bad you guys are busy chasing 
jackalopes instead of worrying about your failing empire of piracy.&lt;/blockquote&gt;

Chasing jackalopes like when you claim every one and their mother is Typhoid Mary?

Also, Failing empire of piracy? Have you been checking any recent news lately???

&lt;blockquote&gt;I didn&#039;t know you had to quote the article to make a point.  Can you show me where you quote the article in your current post?&lt;/blockquote&gt;

Brilliant how you even fail to understand something so simple.

You don&#039;t have to quote the article to prove a point. You failed to prove your point when you didn&#039;t even notice it contradicted the company&#039;s claims on the article itself.

&lt;blockquote&gt;Your question of &quot;proper fingerprinting&quot; is moot.&lt;/blockquote&gt;

It is what makes or breaks the whole credibility of the system. It&#039;s far from moot, is the single most crucial aspect of the system.

&lt;blockquote&gt;Connect to  a swarm. Download the full file once.  Request random blocks from other users in the swarm.&lt;/blockquote&gt;

Are you aware how torrents work? You don&#039;t download anything after you&#039;ve finished downloading the movie and they &lt;b&gt;claimed&lt;/b&gt; they don&#039;t download more than 16kb of data. There isn&#039;t a full download to begin with.

I described to you how the process works and you managed to, for the second time, ignore what is stated in the article.

&lt;blockquote&gt;Compare them to the ones you have.  If they are PERFECT matches (in the blocks) then you have someone sharing the same file.&lt;/blockquote&gt;

Which is false.

First I never claimed the match could be anything other than perfect. It would be even more catastrophically bad if it was.

Secondly what I claimed is that matching two blocks of data and assuming the whole file is infringing is flawed since it can very easily lead to false positives.

Your inability to comprehend explanations ins simple English is terrifying.

&lt;blockquote&gt;Remember, you aren&#039;t looking at random blocks and seeking a match, you 
just download the full file from the same swarm, and now you are reconfirming that each has the same parts on offer.&lt;/blockquote&gt;

Remember that they &lt;b&gt;don&#039;t download any file&lt;/b&gt;. They claimed so. So they can only compare packets with something the copyright owner gave them, which will lead to the shared files being different from the original most of the time, which even further makes the process more prone to false positives. 

They can&#039;t use the file in the swarm either or they&#039;d be operating a honeypot.
Finally, since the original and the shared file can&#039;t be assumed to be the same file (because they don&#039;t download it) they cannot compare identical positions so, to the very least, the received block has to be compared to the whole &quot;blueprint&quot;, so it isn&#039;t random indeed, it&#039;s an iterative search. It&#039;s just as bad if not worse. 

Finally, for the last time, they &lt;b&gt;don&#039;t download the full file&lt;/b&gt;. They claim that the most they get off of a swarm is 16kb.
This alone makes your whole argument nothing more than a baseless assumption]]></description>
		<content:encoded><![CDATA[<blockquote><p>Considering people like &#8220;uraphake&#8221;  post under a dozen or more names,</p></blockquote>
<p>Oh here comes the suppositions and suspicions&#8230; how very credible.</p>
<blockquote><p>  Heck,I have posted as Mary.  Does that make your argument any better or worse?</p></blockquote>
<p>Thanks for admitting to astroturfing. Not that you fooled anyone with Alec, fake mary, fake uraphake and fake Traveller.</p>
<blockquote><p>All I can say is I am not Fetty.  Too bad you guys are busy chasing<br />
jackalopes instead of worrying about your failing empire of piracy.</p></blockquote>
<p>Chasing jackalopes like when you claim every one and their mother is Typhoid Mary?</p>
<p>Also, Failing empire of piracy? Have you been checking any recent news lately???</p>
<blockquote><p>I didn&#8217;t know you had to quote the article to make a point.  Can you show me where you quote the article in your current post?</p></blockquote>
<p>Brilliant how you even fail to understand something so simple.</p>
<p>You don&#8217;t have to quote the article to prove a point. You failed to prove your point when you didn&#8217;t even notice it contradicted the company&#8217;s claims on the article itself.</p>
<blockquote><p>Your question of &#8220;proper fingerprinting&#8221; is moot.</p></blockquote>
<p>It is what makes or breaks the whole credibility of the system. It&#8217;s far from moot, is the single most crucial aspect of the system.</p>
<blockquote><p>Connect to  a swarm. Download the full file once.  Request random blocks from other users in the swarm.</p></blockquote>
<p>Are you aware how torrents work? You don&#8217;t download anything after you&#8217;ve finished downloading the movie and they <b>claimed</b> they don&#8217;t download more than 16kb of data. There isn&#8217;t a full download to begin with.</p>
<p>I described to you how the process works and you managed to, for the second time, ignore what is stated in the article.</p>
<blockquote><p>Compare them to the ones you have.  If they are PERFECT matches (in the blocks) then you have someone sharing the same file.</p></blockquote>
<p>Which is false.</p>
<p>First I never claimed the match could be anything other than perfect. It would be even more catastrophically bad if it was.</p>
<p>Secondly what I claimed is that matching two blocks of data and assuming the whole file is infringing is flawed since it can very easily lead to false positives.</p>
<p>Your inability to comprehend explanations ins simple English is terrifying.</p>
<blockquote><p>Remember, you aren&#8217;t looking at random blocks and seeking a match, you<br />
just download the full file from the same swarm, and now you are reconfirming that each has the same parts on offer.</p></blockquote>
<p>Remember that they <b>don&#8217;t download any file</b>. They claimed so. So they can only compare packets with something the copyright owner gave them, which will lead to the shared files being different from the original most of the time, which even further makes the process more prone to false positives. </p>
<p>They can&#8217;t use the file in the swarm either or they&#8217;d be operating a honeypot.<br />
Finally, since the original and the shared file can&#8217;t be assumed to be the same file (because they don&#8217;t download it) they cannot compare identical positions so, to the very least, the received block has to be compared to the whole &#8220;blueprint&#8221;, so it isn&#8217;t random indeed, it&#8217;s an iterative search. It&#8217;s just as bad if not worse. </p>
<p>Finally, for the last time, they <b>don&#8217;t download the full file</b>. They claim that the most they get off of a swarm is 16kb.<br />
This alone makes your whole argument nothing more than a baseless assumption</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: bobmail</title>
		<link>/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/#comment-1097495</link>
		<dc:creator><![CDATA[bobmail]]></dc:creator>
		<pubDate>Wed, 26 Jun 2013 00:26:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=72701#comment-1097495</guid>
		<description><![CDATA[I personally don&#039;t believe your adhoms or the 20 fake names you use to post them.


Perhaps you should just fuck off and stop being a child, and stop wasting people&#039;s time here by creating fake drama.


Honestly, grow up.  You are wasting everyone&#039;s time here with all your nonsense posts.]]></description>
		<content:encoded><![CDATA[<p>I personally don&#8217;t believe your adhoms or the 20 fake names you use to post them.</p>
<p>Perhaps you should just fuck off and stop being a child, and stop wasting people&#8217;s time here by creating fake drama.</p>
<p>Honestly, grow up.  You are wasting everyone&#8217;s time here with all your nonsense posts.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: bobmail</title>
		<link>/copyright-trolls-get-bad-tempered-cross-examination-over-file-sharing-evidence-130625/#comment-1097490</link>
		<dc:creator><![CDATA[bobmail]]></dc:creator>
		<pubDate>Wed, 26 Jun 2013 00:18:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=72701#comment-1097490</guid>
		<description><![CDATA[&lt;b&gt;Except she was here bashing on alec as well.&lt;/b&gt;

Considering people like &quot;uraphake&quot;  post under a dozen or more names, and how various people here routinely post under various names (including some who have posted under my name) - it&#039;s pretty hard to say.   Heck,I have posted as Mary.  Does that make your argument any better or worse?

All I can say is I am not Fetty.  Too bad you guys are busy chasing jackalopes instead of worrying about your failing empire of piracy.

&lt;b&gt;Claiming knowledge and then failing to even quote the article. Brilliant.&lt;/b&gt;

I didn&#039;t know you had to quote the article to make a point.  Can you show me where you quote the article in your current post?



Your question of &quot;proper fingerprinting&quot; is moot.  Connect to  a swarm. Download the full file once.  Request random blocks from other users in the swarm.  Compare them to the ones you have.  If they are PERFECT matches (in the blocks) then you have someone sharing the same file.  Remember, you aren&#039;t looking at random blocks and seeking a match, you just download the full file from the same swarm, and now you are reconfirming that each has the same parts on offer.]]></description>
		<content:encoded><![CDATA[<p><b>Except she was here bashing on alec as well.</b></p>
<p>Considering people like &#8220;uraphake&#8221;  post under a dozen or more names, and how various people here routinely post under various names (including some who have posted under my name) &#8211; it&#8217;s pretty hard to say.   Heck,I have posted as Mary.  Does that make your argument any better or worse?</p>
<p>All I can say is I am not Fetty.  Too bad you guys are busy chasing jackalopes instead of worrying about your failing empire of piracy.</p>
<p><b>Claiming knowledge and then failing to even quote the article. Brilliant.</b></p>
<p>I didn&#8217;t know you had to quote the article to make a point.  Can you show me where you quote the article in your current post?</p>
<p>Your question of &#8220;proper fingerprinting&#8221; is moot.  Connect to  a swarm. Download the full file once.  Request random blocks from other users in the swarm.  Compare them to the ones you have.  If they are PERFECT matches (in the blocks) then you have someone sharing the same file.  Remember, you aren&#8217;t looking at random blocks and seeking a match, you just download the full file from the same swarm, and now you are reconfirming that each has the same parts on offer.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
