<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: I-Blocklist Down Due to DDoS Attack</title>
	<atom:link href="https://torrentfreak.com/i-blocklist-down-due-to-ddos-attack-110302/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com/i-blocklist-down-due-to-ddos-attack-110302/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 21:09:27 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: Anonymous</title>
		<link>/i-blocklist-down-due-to-ddos-attack-110302/#comment-775263</link>
		<dc:creator><![CDATA[Anonymous]]></dc:creator>
		<pubDate>Mon, 14 Mar 2011 04:58:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=32290#comment-775263</guid>
		<description><![CDATA[That was just one example, there are other methods. i&#039;m sure you can figure them out yourself too. And if you can, so can they.

The end of the day though, there has been zero proof that a blocklist works. Every study that has investigated it has said the same things. The exception is one study that is often pointed to by the pro-blocklist crowd. Unfortunately the study states in it&#039;s assumptions that the lists are 100% accurate, and effectively boils down to saying &#039;blocklist programs block the IP&#039;s they&#039;re told to block&#039; - a stunning revelation....

In my experaince (and I&#039;ve been studying blocklists like iBlocklist&#039;s for several years) they are trivial to bypass, and are filled with mostly fakes, and scattergunned companies, added for the sake of adding. Utorrent.com has been added twice, first for &#039;working with antip2p retspan&#039; (where Ludde, in a separate deal, sold a dll to a company that was once owned by another company that tried a touch of antip2p work 3 years earlier. SERIOUSLY. Then, it was later added again, for &quot;working with the MPAA&quot; - it was when it opened it&#039;s store over licensed copies, because, you know selling something means &#039;actively working for&#039; in their lexicon. &quot;Their&quot; being bluetack, the major list provider iblocklist reccomends. In fact, check the forums on there, and see how many get notices despite running the lists. i&#039;d say do the same on the bluetack forums, but they delete those posts - in their world, letters don&#039;t happen if you run their lists....]]></description>
		<content:encoded><![CDATA[<p>That was just one example, there are other methods. i&#8217;m sure you can figure them out yourself too. And if you can, so can they.</p>
<p>The end of the day though, there has been zero proof that a blocklist works. Every study that has investigated it has said the same things. The exception is one study that is often pointed to by the pro-blocklist crowd. Unfortunately the study states in it&#8217;s assumptions that the lists are 100% accurate, and effectively boils down to saying &#8216;blocklist programs block the IP&#8217;s they&#8217;re told to block&#8217; &#8211; a stunning revelation&#8230;.</p>
<p>In my experaince (and I&#8217;ve been studying blocklists like iBlocklist&#8217;s for several years) they are trivial to bypass, and are filled with mostly fakes, and scattergunned companies, added for the sake of adding. Utorrent.com has been added twice, first for &#8216;working with antip2p retspan&#8217; (where Ludde, in a separate deal, sold a dll to a company that was once owned by another company that tried a touch of antip2p work 3 years earlier. SERIOUSLY. Then, it was later added again, for &#8220;working with the MPAA&#8221; &#8211; it was when it opened it&#8217;s store over licensed copies, because, you know selling something means &#8216;actively working for&#8217; in their lexicon. &#8220;Their&#8221; being bluetack, the major list provider iblocklist reccomends. In fact, check the forums on there, and see how many get notices despite running the lists. i&#8217;d say do the same on the bluetack forums, but they delete those posts &#8211; in their world, letters don&#8217;t happen if you run their lists&#8230;.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: SyberCorp</title>
		<link>/i-blocklist-down-due-to-ddos-attack-110302/#comment-774721</link>
		<dc:creator><![CDATA[SyberCorp]]></dc:creator>
		<pubDate>Fri, 11 Mar 2011 12:28:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=32290#comment-774721</guid>
		<description><![CDATA[I see what you&#039;re saying about connecting to an IP from 2 separate connections so that you can verify if one is being actively blocked.  However, being blocked on one IP and not on another doesn&#039;t mean that a person is using a blocklist (or that they intend on avoiding detection).  It could just mean that their router/firewall is configured to deny ping requests from the WAN side unless first initiated from the LAN side (almost any router has this setting - it&#039;s usually not enabled by default).  The Cisco routers/firewalls that I configure on the network for the place I work is, as it should be, based on access lists and SNAT / DNAT (Static NAT / Dynamic NAT) rules to only allow traffic from specific subnets or hosts while remaining &quot;invisible&quot; to anyone that is not explicitly allowed by those rules.

Now, it might make someone more curious about a connection but that does not (in any way, shape or form) give cause for circumstantial evidence as corporate networks are configured to be like this on purpose for security concern reasons.]]></description>
		<content:encoded><![CDATA[<p>I see what you&#8217;re saying about connecting to an IP from 2 separate connections so that you can verify if one is being actively blocked.  However, being blocked on one IP and not on another doesn&#8217;t mean that a person is using a blocklist (or that they intend on avoiding detection).  It could just mean that their router/firewall is configured to deny ping requests from the WAN side unless first initiated from the LAN side (almost any router has this setting &#8211; it&#8217;s usually not enabled by default).  The Cisco routers/firewalls that I configure on the network for the place I work is, as it should be, based on access lists and SNAT / DNAT (Static NAT / Dynamic NAT) rules to only allow traffic from specific subnets or hosts while remaining &#8220;invisible&#8221; to anyone that is not explicitly allowed by those rules.</p>
<p>Now, it might make someone more curious about a connection but that does not (in any way, shape or form) give cause for circumstantial evidence as corporate networks are configured to be like this on purpose for security concern reasons.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anonymous</title>
		<link>/i-blocklist-down-due-to-ddos-attack-110302/#comment-774643</link>
		<dc:creator><![CDATA[Anonymous]]></dc:creator>
		<pubDate>Fri, 11 Mar 2011 05:16:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=32290#comment-774643</guid>
		<description><![CDATA[That&#039;s easy. Use two systems in tandem. On e on the blocklist, one not. If you can&#039;t connect at all via the blocklisted one, but can on the non-blocklisted one, odds are they&#039;re running a blocklist. If they&#039;re running one, that&#039;s definite &#039;cricumstantial evidence&#039; that makes you a greater &#039;person of interest&#039; which means an easier case since the blocklists show intent.]]></description>
		<content:encoded><![CDATA[<p>That&#8217;s easy. Use two systems in tandem. On e on the blocklist, one not. If you can&#8217;t connect at all via the blocklisted one, but can on the non-blocklisted one, odds are they&#8217;re running a blocklist. If they&#8217;re running one, that&#8217;s definite &#8216;cricumstantial evidence&#8217; that makes you a greater &#8216;person of interest&#8217; which means an easier case since the blocklists show intent.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Beast76</title>
		<link>/i-blocklist-down-due-to-ddos-attack-110302/#comment-773954</link>
		<dc:creator><![CDATA[Beast76]]></dc:creator>
		<pubDate>Tue, 08 Mar 2011 18:15:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=32290#comment-773954</guid>
		<description><![CDATA[Its down again....]]></description>
		<content:encoded><![CDATA[<p>Its down again&#8230;.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Beast76</title>
		<link>/i-blocklist-down-due-to-ddos-attack-110302/#comment-773955</link>
		<dc:creator><![CDATA[Beast76]]></dc:creator>
		<pubDate>Tue, 08 Mar 2011 18:15:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=32290#comment-773955</guid>
		<description><![CDATA[Its down again....]]></description>
		<content:encoded><![CDATA[<p>Its down again&#8230;.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: SyberCorp</title>
		<link>/i-blocklist-down-due-to-ddos-attack-110302/#comment-773797</link>
		<dc:creator><![CDATA[SyberCorp]]></dc:creator>
		<pubDate>Mon, 07 Mar 2011 21:07:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=32290#comment-773797</guid>
		<description><![CDATA[Just to play &quot;devil&#039;s advocate&quot;, how would having/using a blocklist &quot;draw it to you&quot;?  The blocklist is blocking from the IPs it&#039;s being told to block, so anyone using those IPs won&#039;t be able to establish a connection using (at least) IPv4.  Not sure if the blocklists can/will work for IPv6 (yet).  But, regardless, if the connection is being blocked how would that draw any attention from those looking for copyright violations (&quot;anti-p2p&quot; organizations)?  They won&#039;t see any connection occurring to become curious about.  If they&#039;re running a packet monitor (i.e. Wireshark) they&#039;ll just see a SYN without an ACK and just pass right by it not being any the wiser.  Now, if they connect using an IP that isn&#039;t in the blocklist they will see the traffic as they would normally see it in an unblocked/unfiltered scenario, but that&#039;s not the fault of the blocklist since it doesn&#039;t have any reason to block the connection.]]></description>
		<content:encoded><![CDATA[<p>Just to play &#8220;devil&#8217;s advocate&#8221;, how would having/using a blocklist &#8220;draw it to you&#8221;?  The blocklist is blocking from the IPs it&#8217;s being told to block, so anyone using those IPs won&#8217;t be able to establish a connection using (at least) IPv4.  Not sure if the blocklists can/will work for IPv6 (yet).  But, regardless, if the connection is being blocked how would that draw any attention from those looking for copyright violations (&#8220;anti-p2p&#8221; organizations)?  They won&#8217;t see any connection occurring to become curious about.  If they&#8217;re running a packet monitor (i.e. Wireshark) they&#8217;ll just see a SYN without an ACK and just pass right by it not being any the wiser.  Now, if they connect using an IP that isn&#8217;t in the blocklist they will see the traffic as they would normally see it in an unblocked/unfiltered scenario, but that&#8217;s not the fault of the blocklist since it doesn&#8217;t have any reason to block the connection.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: pjcnet</title>
		<link>/i-blocklist-down-due-to-ddos-attack-110302/#comment-773217</link>
		<dc:creator><![CDATA[pjcnet]]></dc:creator>
		<pubDate>Sat, 05 Mar 2011 15:34:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=32290#comment-773217</guid>
		<description><![CDATA[It&#039;s very good news to see that Iblocklist.com is now back on-line after this awful attack. When the system was down it brought it to my attention how much I use and need the service so I recently looked into donating. I was delighted to see an extra anti-infringement list along with couple more useful lists that are exclusively available to people who donate. Don&#039;t worry, people still get the same existing lists for free as always and they continue to be updated very regularly to provide a good level of protection so donating certainly isn&#039;t mandatory, but the extra lists provide even more protection Etc. It only costs $11 (USA), £8 (UK) or 8 Euro for 12 months subscription (even less for 6 months) which is extremely good value for money to say the least for even better protection.

I strongly recommend more people donate to Iblocklist.com to help keep this excellent service on-line for the foreseeable future as keeping a popular website such as this on-line while keeping all the lists up to date certainly costs a lot of time of money.]]></description>
		<content:encoded><![CDATA[<p>It&#8217;s very good news to see that Iblocklist.com is now back on-line after this awful attack. When the system was down it brought it to my attention how much I use and need the service so I recently looked into donating. I was delighted to see an extra anti-infringement list along with couple more useful lists that are exclusively available to people who donate. Don&#8217;t worry, people still get the same existing lists for free as always and they continue to be updated very regularly to provide a good level of protection so donating certainly isn&#8217;t mandatory, but the extra lists provide even more protection Etc. It only costs $11 (USA), £8 (UK) or 8 Euro for 12 months subscription (even less for 6 months) which is extremely good value for money to say the least for even better protection.</p>
<p>I strongly recommend more people donate to Iblocklist.com to help keep this excellent service on-line for the foreseeable future as keeping a popular website such as this on-line while keeping all the lists up to date certainly costs a lot of time of money.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anonymous</title>
		<link>/i-blocklist-down-due-to-ddos-attack-110302/#comment-773118</link>
		<dc:creator><![CDATA[Anonymous]]></dc:creator>
		<pubDate>Sat, 05 Mar 2011 06:06:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=32290#comment-773118</guid>
		<description><![CDATA[That&#039;s called a logical fallacy. &quot;Getting caught&quot; is about as common as being struck by lightning.

I bought a very nice umbrella 4 years ago, and in the time I&#039;ve owned it, I&#039;ve not been struck by lightning. By your logic, that umbrella has been protecting me from lightning strikes. 

Of course, an umbrella would actually draw lightning TO me, rather than away, should a storm be near, and it&#039;s that bit that&#039;s the point. If there&#039;s no storm, no electrical potential, then there&#039;s not going to be a strike no matter what you do or don&#039;t do. That&#039;s what you have experienced the last 4 years. If a logging bot is around though (on the same torrent as you), your blocklist will draw it to you, as an umbrella will draw a lightning bolt to it&#039;s holder.]]></description>
		<content:encoded><![CDATA[<p>That&#8217;s called a logical fallacy. &#8220;Getting caught&#8221; is about as common as being struck by lightning.</p>
<p>I bought a very nice umbrella 4 years ago, and in the time I&#8217;ve owned it, I&#8217;ve not been struck by lightning. By your logic, that umbrella has been protecting me from lightning strikes. </p>
<p>Of course, an umbrella would actually draw lightning TO me, rather than away, should a storm be near, and it&#8217;s that bit that&#8217;s the point. If there&#8217;s no storm, no electrical potential, then there&#8217;s not going to be a strike no matter what you do or don&#8217;t do. That&#8217;s what you have experienced the last 4 years. If a logging bot is around though (on the same torrent as you), your blocklist will draw it to you, as an umbrella will draw a lightning bolt to it&#8217;s holder.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anonymous</title>
		<link>/i-blocklist-down-due-to-ddos-attack-110302/#comment-773115</link>
		<dc:creator><![CDATA[Anonymous]]></dc:creator>
		<pubDate>Sat, 05 Mar 2011 06:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=32290#comment-773115</guid>
		<description><![CDATA[I&#039;d hardly say &#039;one time&#039;. I&#039;m still here, just working more behind the scenes at present.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;d hardly say &#8216;one time&#8217;. I&#8217;m still here, just working more behind the scenes at present.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Oh, Oh…BREIN Boss Says He Will Go After Anonymous</title>
		<link>/i-blocklist-down-due-to-ddos-attack-110302/#comment-773087</link>
		<dc:creator><![CDATA[Oh, Oh…BREIN Boss Says He Will Go After Anonymous]]></dc:creator>
		<pubDate>Sat, 05 Mar 2011 02:01:22 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=32290#comment-773087</guid>
		<description><![CDATA[[...] I-Blocklist Down Due to DDoS Attack [...]]]></description>
		<content:encoded><![CDATA[<p>[...] I-Blocklist Down Due to DDoS Attack [...]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
