<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: IP Addresses Don&#8217;t Positively Identify Infringers, Anti-Piracy Lawfirm Says</title>
	<atom:link href="https://torrentfreak.com/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 17:19:45 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: IP Addresses Don’t Positively Identify Infringers, Anti-Piracy Lawfirm Says &#187; Geeks Cafe</title>
		<link>/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/#comment-1092654</link>
		<dc:creator><![CDATA[IP Addresses Don’t Positively Identify Infringers, Anti-Piracy Lawfirm Says &#187; Geeks Cafe]]></dc:creator>
		<pubDate>Sat, 15 Jun 2013 12:33:28 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=70970#comment-1092654</guid>
		<description><![CDATA[[...] Source: IP Addresses Don&#8217;t Positively Identify Infringers, Anti-Piracy Lawfirm S&amp;#1072&amp;#1091&amp;#1109 [...]]]></description>
		<content:encoded><![CDATA[<p>[...] Source: IP Addresses Don&#8217;t Positively Identify Infringers, Anti-Piracy Lawfirm S&amp;#1072&amp;#1091&amp;#1109 [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: JX</title>
		<link>/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/#comment-1084698</link>
		<dc:creator><![CDATA[JX]]></dc:creator>
		<pubDate>Sun, 02 Jun 2013 07:42:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=70970#comment-1084698</guid>
		<description><![CDATA[Alec, when I was young all my music was pirated because I couldn&#039;t afford to buy any. When I got a job i began the process of buying the real thing to replace the pirated music that I still wanted to listen to (my tastes having changed). If I hadn&#039;t pirated music I probably wouldn&#039;t have developed the interest in it that I have, particularly certain non-mainstream bands, and bought the stuff I have now bought.


 Currently I am torrenting some Anime series that I CANNOT BUY. At least I can buy a crappy US import, regionalised and NTSC, but I cannot watch that because it is regionalised. Also, as well as being bloody stupid, regionalisation is theft. If I move to another country in the future i&#039;m going to have to rip and re-encode all my legally bought DVDs and no doubt your crappy industry will tell me that&#039;s piracy.]]></description>
		<content:encoded><![CDATA[<p>Alec, when I was young all my music was pirated because I couldn&#8217;t afford to buy any. When I got a job i began the process of buying the real thing to replace the pirated music that I still wanted to listen to (my tastes having changed). If I hadn&#8217;t pirated music I probably wouldn&#8217;t have developed the interest in it that I have, particularly certain non-mainstream bands, and bought the stuff I have now bought.</p>
<p> Currently I am torrenting some Anime series that I CANNOT BUY. At least I can buy a crappy US import, regionalised and NTSC, but I cannot watch that because it is regionalised. Also, as well as being bloody stupid, regionalisation is theft. If I move to another country in the future i&#8217;m going to have to rip and re-encode all my legally bought DVDs and no doubt your crappy industry will tell me that&#8217;s piracy.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Hardcore_Gamer1</title>
		<link>/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/#comment-1083156</link>
		<dc:creator><![CDATA[Hardcore_Gamer1]]></dc:creator>
		<pubDate>Thu, 30 May 2013 17:02:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=70970#comment-1083156</guid>
		<description><![CDATA[Prosecuting someone by ip address would be like prosecuting a murderer without tying him to the weapon or the scene. An analogy of this false logic would go like this; a family of 4 uses the same knife many times a day to prepare meals. The house also has a lot of guests that come over and cook who have touched the knife over the years. One day a neighbour is killed with said kitchen knife. There are no witnesses or fingerprints at the scene of the crime. The police contact the local Wal-Mart and demand they hand over all transactions from their customers without a warrant. The police use this info to find the person who bought the knife. They show up at the families house and ask who was the last person to touch the knife. Apparently the 6 year old daughter made a peanut butter and jam sandwich the morning of the killing. Clearly by police &#039;logic&#039; the daughter must by a ruthless slayer of human life. The police get frustrated by their &#039;findings&#039; as they can&#039;t prosecute a child, so instead they demand that the parents pay a special &#039;Parental Neglect Fee&#039;. They claim that all their &#039;hard work&#039; gathering the evidence was costly and that the family of the dead neighbour is suffering financially and deserve compensation. Outraged at the stupidity of the police the parents fight back. Unfortunately, the judge has been paid off by lobbyists and orders the family pay $300 000 to make it all go away. The family then spends the rest of their life in poverty while the family of the dead neighbour whose names were used by police to gain sympathy get none of said money. Meanwhile the police buy a new drone to spy on its citizens with their new influx of cash. That is what copyright logic looks like when applied to a murder case.]]></description>
		<content:encoded><![CDATA[<p>Prosecuting someone by ip address would be like prosecuting a murderer without tying him to the weapon or the scene. An analogy of this false logic would go like this; a family of 4 uses the same knife many times a day to prepare meals. The house also has a lot of guests that come over and cook who have touched the knife over the years. One day a neighbour is killed with said kitchen knife. There are no witnesses or fingerprints at the scene of the crime. The police contact the local Wal-Mart and demand they hand over all transactions from their customers without a warrant. The police use this info to find the person who bought the knife. They show up at the families house and ask who was the last person to touch the knife. Apparently the 6 year old daughter made a peanut butter and jam sandwich the morning of the killing. Clearly by police &#8216;logic&#8217; the daughter must by a ruthless slayer of human life. The police get frustrated by their &#8216;findings&#8217; as they can&#8217;t prosecute a child, so instead they demand that the parents pay a special &#8216;Parental Neglect Fee&#8217;. They claim that all their &#8216;hard work&#8217; gathering the evidence was costly and that the family of the dead neighbour is suffering financially and deserve compensation. Outraged at the stupidity of the police the parents fight back. Unfortunately, the judge has been paid off by lobbyists and orders the family pay $300 000 to make it all go away. The family then spends the rest of their life in poverty while the family of the dead neighbour whose names were used by police to gain sympathy get none of said money. Meanwhile the police buy a new drone to spy on its citizens with their new influx of cash. That is what copyright logic looks like when applied to a murder case.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: JG</title>
		<link>/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/#comment-1082535</link>
		<dc:creator><![CDATA[JG]]></dc:creator>
		<pubDate>Wed, 29 May 2013 22:24:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=70970#comment-1082535</guid>
		<description><![CDATA[We seem to be arguing different points.  You seem to be more focused on the proportionality of law enforcement&#039;s response.  To that, yes I agree there are crimes more important than IP theft.  I wouldn&#039;t want a murder to go free just because someone downloaded Avatar 2 without paying.  (*though note, most police departments generally have officers who specialize in certain crimes...  So a homicide detective wouldn&#039;t be investigating an IP theft case).  And I agree Law Enforcement shouldn&#039;t exhaust all of their resources on a single case (especially something like IP theft).

But for this thread, I DO NOT CARE HOW LAW ENFORCEMENT HANDLE IT....  They could send every single FBI, NSA, CIA, NCIS, DHS, ICE, CBP agent Texas Ranger, US Marshal, and police officer in the country to each and every house suspected of IP theft or they could just say &quot;eh, we&#039;ll get to it when there&#039;s nothing else to do&quot;....  I DON&#039;T CARE....

What I&#039;m arguing is a step before....  Back when the right-holders are standing before the judge saying &quot;hey can you tell the ISPs to tell us who these IP addresses belong to?&quot;

While I agree just because Mr. Smith&#039;s name is on the AOL account doesn&#039;t mean Mr. Smith is the one who shared the file.  It could have been Mrs. Smith, or their kids, a neighbor, some random walking down the street etc...

My issue is why this fact should cause the judge to basically throw out the case.  They have an IP address that they can link to copyright theft.  They know someone using that account shared something they don&#039;t have the legal right to share.  Just because it doesn&#039;t have to be Mr. Smith who shared the file doesn&#039;t mean the case should just be dropped.

I don&#039;t have any empirical numbers to back this up, but anecdotally, I would assume there is pretty good odds that the person who used the account to infringe would be someone in the house the account is associated with, since they likely have full access to the wifi network.  Next likely, I would assume, would be neighbors within wifi range who would have enough time to crack the key and spend the time downloading the file.  Hence, I said, knowing the actual address you&#039;ve limited the primary possible infringers down to 9 households.  While it could also be any random person on the street, it would take some time to crack the password &amp; actually download the file...  In doing so, the person would probably be noticed...  

The reason I brought the bomb threat scenario up was in reference to you claiming there was no evidence.  In my hypothetical scenario, all the police have to go on is a phone number in the call ID log.  The same arguments could be made about the phone number.  Just because they have a specific phone number doesn&#039;t mean the person whose name is on the account is the one who called.  Anyone in the house could have picked up a phone &amp; it would show on the logs as the same number.And as long as they&#039;re in range, a cordless handset could theoretically be synced to the base station...  Maybe not as easily as cracking a wifi password, but it is possible...

Yet, if an officer showed up to a judge and said &quot;We have a phone number, we need to find out who made the call&quot; I doubt the judge would have any issue forcing Ma Bell to hand over Mr. Smith&#039;s name.... Even though he&#039;s just as unlikely to be the person who called as he is to be the person who downloaded the file...  Yet, in order to gain more evidence and figure out who exactly made the call, I doubt a judge would ever say no to converting a phone number to account information (name/address/etc)...



So what makes a phone number more credit worthy than an IP address?  Why do we say &quot;Sorry you don&#039;t have enough&quot; for the IP address but without a second thought the judge would OK the phone number???


That is what I&#039;m questioning....  Not, as you seem to focus on, the amount of involvement law enforcement places once they know who to investigate....]]></description>
		<content:encoded><![CDATA[<p>We seem to be arguing different points.  You seem to be more focused on the proportionality of law enforcement&#8217;s response.  To that, yes I agree there are crimes more important than IP theft.  I wouldn&#8217;t want a murder to go free just because someone downloaded Avatar 2 without paying.  (*though note, most police departments generally have officers who specialize in certain crimes&#8230;  So a homicide detective wouldn&#8217;t be investigating an IP theft case).  And I agree Law Enforcement shouldn&#8217;t exhaust all of their resources on a single case (especially something like IP theft).</p>
<p>But for this thread, I DO NOT CARE HOW LAW ENFORCEMENT HANDLE IT&#8230;.  They could send every single FBI, NSA, CIA, NCIS, DHS, ICE, CBP agent Texas Ranger, US Marshal, and police officer in the country to each and every house suspected of IP theft or they could just say &#8220;eh, we&#8217;ll get to it when there&#8217;s nothing else to do&#8221;&#8230;.  I DON&#8217;T CARE&#8230;.</p>
<p>What I&#8217;m arguing is a step before&#8230;.  Back when the right-holders are standing before the judge saying &#8220;hey can you tell the ISPs to tell us who these IP addresses belong to?&#8221;</p>
<p>While I agree just because Mr. Smith&#8217;s name is on the AOL account doesn&#8217;t mean Mr. Smith is the one who shared the file.  It could have been Mrs. Smith, or their kids, a neighbor, some random walking down the street etc&#8230;</p>
<p>My issue is why this fact should cause the judge to basically throw out the case.  They have an IP address that they can link to copyright theft.  They know someone using that account shared something they don&#8217;t have the legal right to share.  Just because it doesn&#8217;t have to be Mr. Smith who shared the file doesn&#8217;t mean the case should just be dropped.</p>
<p>I don&#8217;t have any empirical numbers to back this up, but anecdotally, I would assume there is pretty good odds that the person who used the account to infringe would be someone in the house the account is associated with, since they likely have full access to the wifi network.  Next likely, I would assume, would be neighbors within wifi range who would have enough time to crack the key and spend the time downloading the file.  Hence, I said, knowing the actual address you&#8217;ve limited the primary possible infringers down to 9 households.  While it could also be any random person on the street, it would take some time to crack the password &amp; actually download the file&#8230;  In doing so, the person would probably be noticed&#8230;  </p>
<p>The reason I brought the bomb threat scenario up was in reference to you claiming there was no evidence.  In my hypothetical scenario, all the police have to go on is a phone number in the call ID log.  The same arguments could be made about the phone number.  Just because they have a specific phone number doesn&#8217;t mean the person whose name is on the account is the one who called.  Anyone in the house could have picked up a phone &amp; it would show on the logs as the same number.And as long as they&#8217;re in range, a cordless handset could theoretically be synced to the base station&#8230;  Maybe not as easily as cracking a wifi password, but it is possible&#8230;</p>
<p>Yet, if an officer showed up to a judge and said &#8220;We have a phone number, we need to find out who made the call&#8221; I doubt the judge would have any issue forcing Ma Bell to hand over Mr. Smith&#8217;s name&#8230;. Even though he&#8217;s just as unlikely to be the person who called as he is to be the person who downloaded the file&#8230;  Yet, in order to gain more evidence and figure out who exactly made the call, I doubt a judge would ever say no to converting a phone number to account information (name/address/etc)&#8230;</p>
<p>So what makes a phone number more credit worthy than an IP address?  Why do we say &#8220;Sorry you don&#8217;t have enough&#8221; for the IP address but without a second thought the judge would OK the phone number???</p>
<p>That is what I&#8217;m questioning&#8230;.  Not, as you seem to focus on, the amount of involvement law enforcement places once they know who to investigate&#8230;.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Lowestofthekeys</title>
		<link>/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/#comment-1081953</link>
		<dc:creator><![CDATA[Lowestofthekeys]]></dc:creator>
		<pubDate>Tue, 28 May 2013 17:29:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=70970#comment-1081953</guid>
		<description><![CDATA[Are you trying to insinuate that piracy is bringing about the loss of civil liberties?


That&#039;s kind of a short-sighted view, whether or not you believe it, especially if you consider that   the push for laws which violate people&#039;s right are done by groups and individuals who cater to the wealthy.]]></description>
		<content:encoded><![CDATA[<p>Are you trying to insinuate that piracy is bringing about the loss of civil liberties?</p>
<p>That&#8217;s kind of a short-sighted view, whether or not you believe it, especially if you consider that   the push for laws which violate people&#8217;s right are done by groups and individuals who cater to the wealthy.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Scary_Devil_Monastery</title>
		<link>/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/#comment-1081790</link>
		<dc:creator><![CDATA[Scary_Devil_Monastery]]></dc:creator>
		<pubDate>Tue, 28 May 2013 08:52:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=70970#comment-1081790</guid>
		<description><![CDATA[&lt;i&gt;&quot;By finding the physical address, your pretty much limiting the number of suspects down to 9 households.&quot;&lt;/i&gt;


Not as long as wardriving is a juve sport.


See, since cracking a wifi wide open is child&#039;s play, and a pirate usually tries to take SOME precautions, having evidence of an ip-adress downloading german goat porn is actually far more likely to be an indicator that the local punk has a beef with the grouchy guy living down the block.


That&#039;s not enough to order a search-and-seizure which amounts to turning every piece of a person&#039;s private life into an official investigation.


And yet nothing else than such a detailed search-and-seizure will provide actual proof of innocence or guilt.


There are TWO good reasons as to why search-and-seizure is not a proportional response.


1) See above. In essence it means the entire paradigm of presumed innocence is overturned in practice. For something not even as severe as jaywalking.


2) Do you know the actual cost to society of having a team of police officers raiding a household, confiscating the hardware, and having a forensic examination performed on it? Those officers, while trying to investigate a hundred million filesharers, are NOT investigating a few thousand murders instead. And the actual cost in tax payer money easily hits a thousand times or more of the expected &quot;recovery&quot; or &quot;prevented harm&quot;.


In short, a response such as you envision is not proportional and turns the act of copying a file into a &quot;crime&quot; suddenly being higher prioritized than murder and conspiracy to commit terrorism.
And yet no measure short of this will suffice, &lt;b&gt;if any form of burden of proof is to be expected in a courtroom later on.&lt;/b&gt;



See the problem?

&lt;i&gt;&quot;Granted a bomb threat is slightly more severe than IP theft, but still...&quot;&lt;/i&gt;

Ok...you are comparing risk of loss of life with filesharing...that in itself is not good.

Better comparison: Someone calls the police and screams &quot;COME QUICK, SOMEONE is SPRAYPAINTING GRAFFITI ON A SHOP WINDOW&quot;.

Would you consider it reasonable to send out a dozen FBI agents and three squads of cops to cordon off the area, no questions asked?]]></description>
		<content:encoded><![CDATA[<p><i>&#8220;By finding the physical address, your pretty much limiting the number of suspects down to 9 households.&#8221;</i></p>
<p>Not as long as wardriving is a juve sport.</p>
<p>See, since cracking a wifi wide open is child&#8217;s play, and a pirate usually tries to take SOME precautions, having evidence of an ip-adress downloading german goat porn is actually far more likely to be an indicator that the local punk has a beef with the grouchy guy living down the block.</p>
<p>That&#8217;s not enough to order a search-and-seizure which amounts to turning every piece of a person&#8217;s private life into an official investigation.</p>
<p>And yet nothing else than such a detailed search-and-seizure will provide actual proof of innocence or guilt.</p>
<p>There are TWO good reasons as to why search-and-seizure is not a proportional response.</p>
<p>1) See above. In essence it means the entire paradigm of presumed innocence is overturned in practice. For something not even as severe as jaywalking.</p>
<p>2) Do you know the actual cost to society of having a team of police officers raiding a household, confiscating the hardware, and having a forensic examination performed on it? Those officers, while trying to investigate a hundred million filesharers, are NOT investigating a few thousand murders instead. And the actual cost in tax payer money easily hits a thousand times or more of the expected &#8220;recovery&#8221; or &#8220;prevented harm&#8221;.</p>
<p>In short, a response such as you envision is not proportional and turns the act of copying a file into a &#8220;crime&#8221; suddenly being higher prioritized than murder and conspiracy to commit terrorism.<br />
And yet no measure short of this will suffice, <b>if any form of burden of proof is to be expected in a courtroom later on.</b></p>
<p>See the problem?</p>
<p><i>&#8220;Granted a bomb threat is slightly more severe than IP theft, but still&#8230;&#8221;</i></p>
<p>Ok&#8230;you are comparing risk of loss of life with filesharing&#8230;that in itself is not good.</p>
<p>Better comparison: Someone calls the police and screams &#8220;COME QUICK, SOMEONE is SPRAYPAINTING GRAFFITI ON A SHOP WINDOW&#8221;.</p>
<p>Would you consider it reasonable to send out a dozen FBI agents and three squads of cops to cordon off the area, no questions asked?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: JG</title>
		<link>/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/#comment-1081620</link>
		<dc:creator><![CDATA[JG]]></dc:creator>
		<pubDate>Mon, 27 May 2013 20:30:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=70970#comment-1081620</guid>
		<description><![CDATA[how do you get that there is no evidence whatsoever?  There might not be any evidence that the account-holder him/her-self is directly responsible, but there is evidence that someone using the account is likely to be responsible.  And while I don&#039;t know the exact figures, I&#039;d imagine more likely than not the responsible one is someone who lives in the house.  If not, then most likely either a guest of someone who does, or a neighbor within wifi range.  I just don&#039;t see why the investigation has to stop dead because &quot;the account holder might not be your guy&quot;...  Why can&#039;t they investigate further (maybe not to the severity they search every file on every computer as I suggested in my first post, just happened to be the first thing to pop in my head)?  By finding the physical address, your pretty much limiting the number of suspects down to 9 households.  That&#039;s a lot closer to finding the suspect than just knowing it&#039;s an America Online owned IP address...  Especially since AOL operates nationally...  


Imagine instead, someone calls in a bomb threat.  The police/FBI come to investigate...  They check the caller ID logs &amp; see the call came in from 555-5555.  Should the phone company be compelled to identify the account?  After all, just because my name is associated with the account doesn&#039;t mean I am the one who called the threat in.  Anyone in the house who has a phone could have made the call &amp; it&#039;d show up with the same number.  It could even be a neighbor or some random bloke passing by my house with a cordless phone they somehow synced to the base-station in my house....  I&#039;d assume in this case, the judge would sign off &amp; have law enforcement questioning everyone in the house by end of day.  


Granted a bomb threat is slightly more severe than IP theft, but still...  similar evidence links the culprit to my house...  In once case you say &quot;you call that evidence&quot; in the other I doubt you&#039;d have any issue with police detaining all of us until they figure out who made the call...]]></description>
		<content:encoded><![CDATA[<p>how do you get that there is no evidence whatsoever?  There might not be any evidence that the account-holder him/her-self is directly responsible, but there is evidence that someone using the account is likely to be responsible.  And while I don&#8217;t know the exact figures, I&#8217;d imagine more likely than not the responsible one is someone who lives in the house.  If not, then most likely either a guest of someone who does, or a neighbor within wifi range.  I just don&#8217;t see why the investigation has to stop dead because &#8220;the account holder might not be your guy&#8221;&#8230;  Why can&#8217;t they investigate further (maybe not to the severity they search every file on every computer as I suggested in my first post, just happened to be the first thing to pop in my head)?  By finding the physical address, your pretty much limiting the number of suspects down to 9 households.  That&#8217;s a lot closer to finding the suspect than just knowing it&#8217;s an America Online owned IP address&#8230;  Especially since AOL operates nationally&#8230;  </p>
<p>Imagine instead, someone calls in a bomb threat.  The police/FBI come to investigate&#8230;  They check the caller ID logs &amp; see the call came in from 555-5555.  Should the phone company be compelled to identify the account?  After all, just because my name is associated with the account doesn&#8217;t mean I am the one who called the threat in.  Anyone in the house who has a phone could have made the call &amp; it&#8217;d show up with the same number.  It could even be a neighbor or some random bloke passing by my house with a cordless phone they somehow synced to the base-station in my house&#8230;.  I&#8217;d assume in this case, the judge would sign off &amp; have law enforcement questioning everyone in the house by end of day.  </p>
<p>Granted a bomb threat is slightly more severe than IP theft, but still&#8230;  similar evidence links the culprit to my house&#8230;  In once case you say &#8220;you call that evidence&#8221; in the other I doubt you&#8217;d have any issue with police detaining all of us until they figure out who made the call&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: guest</title>
		<link>/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/#comment-1081315</link>
		<dc:creator><![CDATA[guest]]></dc:creator>
		<pubDate>Mon, 27 May 2013 11:17:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=70970#comment-1081315</guid>
		<description><![CDATA[Oh, right. So, you lied in court. Well done you.]]></description>
		<content:encoded><![CDATA[<p>Oh, right. So, you lied in court. Well done you.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Scary_Devil_Monastery</title>
		<link>/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/#comment-1081300</link>
		<dc:creator><![CDATA[Scary_Devil_Monastery]]></dc:creator>
		<pubDate>Mon, 27 May 2013 10:25:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=70970#comment-1081300</guid>
		<description><![CDATA[&lt;i&gt;&quot;I would assume, possibly, a judge might grant law enforcement a search warrant enabling officers to check files on any and all computers (&amp; other storage and media devices) on the premises and any cloud storage accounts owned by individuals residing there.&quot;&lt;/i&gt;


In the US that would be taking tipp-ex to the entire 4th amendment. You realize that would mean a search-and-seizure would be served on the basis of no evidence whatsoever, with more damning impact than if the subject had been suspected of large-scale drug trading or conspiracy to commit murder.


&lt;b&gt;For &quot;evidence&quot; with less value than a crayon drawing made by a five-year old of the &quot;suspect&quot; &lt;i&gt;making a copy of a media file?&lt;/i&gt;&lt;/b&gt;


I don&#039;t think so, no.]]></description>
		<content:encoded><![CDATA[<p><i>&#8220;I would assume, possibly, a judge might grant law enforcement a search warrant enabling officers to check files on any and all computers (&amp; other storage and media devices) on the premises and any cloud storage accounts owned by individuals residing there.&#8221;</i></p>
<p>In the US that would be taking tipp-ex to the entire 4th amendment. You realize that would mean a search-and-seizure would be served on the basis of no evidence whatsoever, with more damning impact than if the subject had been suspected of large-scale drug trading or conspiracy to commit murder.</p>
<p><b>For &#8220;evidence&#8221; with less value than a crayon drawing made by a five-year old of the &#8220;suspect&#8221; <i>making a copy of a media file?</i></b></p>
<p>I don&#8217;t think so, no.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Scary_Devil_Monastery</title>
		<link>/ip-addresses-dont-positively-identify-infringers-anti-piracy-lawfirm-says-130524/#comment-1081299</link>
		<dc:creator><![CDATA[Scary_Devil_Monastery]]></dc:creator>
		<pubDate>Mon, 27 May 2013 10:21:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=70970#comment-1081299</guid>
		<description><![CDATA[&lt;b&gt;Someone&lt;/b&gt; has to be responsible, in your own words. And that someone, by your own arguments, will likely be innocent.

So according to your own arguments, it&#039;s quite OK if an innocent gets hurt. It&#039;s no longer an argument you can credibly make.]]></description>
		<content:encoded><![CDATA[<p><b>Someone</b> has to be responsible, in your own words. And that someone, by your own arguments, will likely be innocent.</p>
<p>So according to your own arguments, it&#8217;s quite OK if an innocent gets hurt. It&#8217;s no longer an argument you can credibly make.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
