<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; anti-p2p</title>
	<atom:link href="https://torrentfreak.com/tag/anti-p2p/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 09:27:11 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>How Any BitTorrent User Can Collect Lawsuit Evidence</title>
		<link>https://torrentfreak.com/how-any-bittorrent-user-can-collect-lawsuit-evidence-100903/</link>
		<comments>https://torrentfreak.com/how-any-bittorrent-user-can-collect-lawsuit-evidence-100903/#comments</comments>
		<pubDate>Fri, 03 Sep 2010 21:05:40 +0000</pubDate>
		<dc:creator><![CDATA[Ben Jones]]></dc:creator>
				<category><![CDATA[Tutorial & How To]]></category>
		<category><![CDATA[anti-p2p]]></category>
		<category><![CDATA[evidence]]></category>
		<category><![CDATA[lawsuits]]></category>
		<category><![CDATA[video]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=26439</guid>
		<description><![CDATA[The RIAA may have given up on lawsuits targeting P2P users, but other companies have stepped into their shoes. There are many ways to detect P2P users and collect evidence of their behaviors for use in lawsuits. The simplest way needs nothing more than a BitTorrent client.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>We&#8217;ve covered some of the more exotic ways people can be tracked or monitored in the past (including some that don&#8217;t work) but the lawsuits, abandoned by the record industry as bad for business, have been adopted by a group of lawyers who don&#8217;t let a little <a href="http://torrentfreak.com/u-s-copyright-group-steal-competitors-website-100730/">hypocrisy</a> stand in their way.</p>
<p>There&#8217;s a lot of misinformation about which companies and agencies can do what, and how they do it. People claim industry groups or random companies can search and send out letters at random, whereas the reality is the investigator must be authorized or they could be deemed guilty of copyright infringement themselves.</p>
<p>There&#8217;s also a lot of confusion about exactly how evidence is collected, with people sometimes believing that it can only be collected from corporate networks, or that private trackers are safe because investigators can&#8217;t share and so would be banned for their ratio. Much of this is untrue and these beliefs can make it easier to collect evidence.</p>
<p>The easiest way of all is to simply collect information from trackers. It&#8217;s an easy and quick way to do it, although as was <a href="http://torrentfreak.com/study-reveals-reckless-anti-piracy-antics-080605/">revealed</a> 2 years ago, it&#8217;s often quite inaccurate.</p>
<p>The next simplest way, which provides lots of data, is just to join a swarm and monitor. Some people believe that clients doing this will stand out, as modified clients will behave differently. The reality is that clients don&#8217;t have to be monitored at all.</p>
<p>Researcher Andrew Norton <a href="http://ktetch.blogspot.com/2010/08/how-anti-p2p-lawsuit-evidence-is.html" target="_blank">produced</a> this video explaining how a vanilla µTorrent client can be used to identify and log peers without any modification or abnormal behavior.</p>
<p style="text-align: center;"><object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" width="500" height="306" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><param name="src" value="http://www.youtube.com/v/KRMsoeofGcI?fs=1&amp;hl=en_US&amp;color1=0xcc2550&amp;color2=0xe87a9f"><param name="allowfullscreen" value="true"><embed type="application/x-shockwave-flash" width="500" height="306" src="http://www.youtube.com/v/KRMsoeofGcI?fs=1&amp;hl=en_US&amp;color1=0xcc2550&amp;color2=0xe87a9f" allowscriptaccess="always" allowfullscreen="true"></embed></object></p>
<p>The raw data shown in the video &#8211; all that&#8217;s needed for a lawsuit or allegation under most <a href="http://torrentfreak.com/tag/3-strikes/">3-strikes</a> laws &#8211; is nothing more than basic communication data. However, it&#8217;s critical to note that this data, while it is evidence of activity, is NOT evidence of infringement in many cases.</p>
<p>We can&#8217;t testify that this is the method used by any company – they&#8217;re notoriously tight-lipped about their methods – but it&#8217;s quite possible that it&#8217;s being used and sold on as a very high priced service to customers. Selling simple and not always accurate or effective methods for thousands of dollars a week was <a href="http://torrentfreak.com/mediadefender-decoy-effectiveness-on-bittorrent-sites-070922/">revealed</a> to be a key method of MediaDefender. Anyone reading this and intending to hire such companies would be advised to ask for a demonstration of their detection system first-hand.</p>
<p>It should, however, come as yet another wakeup call to those using blocklist-based software. Without any way to identify a client using this method, there&#8217;s no way to add its IP to the list. In fact, the public availability of block-list contents means it&#8217;s extremely easy to avoid being on them. </p>
<p>On the other hand VPNs, proxies and seedboxes will provide some <a href="http://torrentfreak.com/5-ways-to-download-torrents-anonymously-100819/">protection</a>, but the only real solution is to press for the peer-review of anti-P2P companies and their <a href="http://torrentfreak.com/anti-piracy-measures-dont-work-report-shows-090129/">methods</a>, but that doesn&#8217;t look like it will come any time soon.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/how-any-bittorrent-user-can-collect-lawsuit-evidence-100903/feed/</wfw:commentRss>
		<slash:comments>56</slash:comments>
		</item>
		<item>
		<title>Anti-Piracy Company Wants to Sell Patents to Protect P2P</title>
		<link>https://torrentfreak.com/anti-piracy-company-wants-to-sell-patents-to-protect-p2p-070927/</link>
		<comments>https://torrentfreak.com/anti-piracy-company-wants-to-sell-patents-to-protect-p2p-070927/#comments</comments>
		<pubDate>Thu, 27 Sep 2007 11:24:55 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[DRM and Other Evil]]></category>
		<category><![CDATA[anti-p2p]]></category>
		<category><![CDATA[corrupt]]></category>
		<category><![CDATA[hash]]></category>
		<category><![CDATA[patent]]></category>
		<category><![CDATA[viralg]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/anti-piracy-company-wants-to-sell-patents-to-protect-p2p-070927/</guid>
		<description><![CDATA[Recently we reported that anti-piracy company Viralg is selling the patents to its technology on eBay for $1,000,000. Most people didn't think it was value for money but Viralg have been in touch and they have a new idea - selling the patents to P2P'ers to help prevent some future anti-P2P technology.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com//images/viralg.jpg" alt="Viralg" align="right"><br>
When we <a href="http://torrentfreak.com/anti-piracy-technology-for-sale-on-ebay-for-1m-070925/">reported</a> on the sale of Viralg&#8217;s anti-p2p patents, not many people got excited by the offer.</p>
<p>However, after we published the article, Viralg responded to an email we sent earlier. It appears that they believe that the value of the sale doesn&#8217;t necessarily lie in the technology. </p>
<p>This section from the eBay auction gives a clue:</p>
<blockquote><p>3. If your business is involved in developing and/or selling a P2P program, you can make it better and avoid any problems that this technology can give to your network.</p></blockquote>
<p>A brief email from Viralg suggests that they feel that a &#8216;p2p related community&#8217; might want to buy the patents &#8211; but why would p2p&#8217;ers want them? </p>
<p>Here are some details from the Canadian <a href="http://patents1.ic.gc.ca/details?patent_number=2540738">patent</a>:</p>
<blockquote><p>1. A method for limiting the use of unauthorized digital content in a content-sharing network in which digital content is distributed as files, wherein each file comprises content information and is associated with characteristic information and verification information, the method comprising:</p>
<p>(a) determining a first file whose content information is copyrighted;</p>
<p>(b) repeatedly distributing a second file in the content-sharing network, wherein the second file is associated with characteristic information and verification information that match the characteristic information and verification information, respectively, of said first file, and wherein the second file comprises content information that does not match the content information of the first file.</p></blockquote>
<p>It seems that Viralg feel that their patent gives them the monopoly on a particular type of file corruption and that if these patents were bought by a pro-p2p outfit, they could get legal protection if anyone ever tried to use this technique against them.</p>
<p>Viralg told us: &#8220;Let say at some P2P related community buy those patent applications&#8230; after that no body can&#8217;t mess with hash codes&#8230;&#8221;</p>
<p>Maybe one million p2p&#8217;ers will put $1 each for these papers?</p>
<p>Ok, maybe not.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/anti-piracy-company-wants-to-sell-patents-to-protect-p2p-070927/feed/</wfw:commentRss>
		<slash:comments>45</slash:comments>
		</item>
	</channel>
</rss>
