<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; privacy</title>
	<atom:link href="https://torrentfreak.com/tag/privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 13:11:30 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>BTindex Exposes IP-Addresses of BitTorrent Users</title>
		<link>https://torrentfreak.com/btindex-exposes-ip-addresses-of-bittorrent-users-140807/</link>
		<comments>https://torrentfreak.com/btindex-exposes-ip-addresses-of-bittorrent-users-140807/#comments</comments>
		<pubDate>Thu, 07 Aug 2014 20:46:50 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[btindex]]></category>
		<category><![CDATA[ip address]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[vpn]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=92278</guid>
		<description><![CDATA[The newly launched torrent search engine BTindex crawls BitTorrent's DHT network for new files. It's a handy service, but one that comes with a controversial twist. In addition to listing hundreds of thousands of magnet links, it also exposes the IP-addresses of BitTorrent users to the rest of the world.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/spy.jpg"><img src="http://torrentfreak.com/images/spy.jpg" alt="spy" width="200" height="177" class="alignright size-full wp-image-39770"></a>Unless BitTorrent users are taking steps to hide their identities through the use of a <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">VPN, proxy</a>, or seedbox, their downloading habits are available for almost anyone to snoop on.</p>
<p>By design the BitTorrent protocol shares the location of any user in the swarm. After all, without knowing where to send the data nothing can be shared to begin with.</p>
<p>Despite this fairly common knowledge, even some experienced BitTorrent users can be shocked to learn that someone has been monitoring their activities, let alone that their sharing activity is being made public for the rest of the world to see.</p>
<p>Like it or not, this is exactly what the newly launched torrent search engine <a href="http://btindex.org/">BTindex</a> is doing. </p>
<p>Unlike most popular torrent sites BTindex adds new content by crawling BitTorrent&#8217;s DHT network. This is already quite unique as most other sites get their content from user uploads or other sites. However, the most controversial part without doubt is that the IP-addresses of BitTorrent users are being shared as well.</p>
<p>People who download a file from The Pirate Bay or any other torrent site expose their IP-addresses via the DHT network. BTindex records this information alongside the torrent metadata. The number of peers are displayed in the search results and for each file a selection of IP-addresses is made available to the public.</p>
<p>The image below shows a selection of peers who shared a pirated copy of the movie &#8220;Transcendence,&#8221; this week&#8217;s most downloaded film.</p>
<p><center><strong>Some IP-addresses sharing &#8220;Transcendence.&#8221;</strong><br></br></center><center><a href="http://torrentfreak.com/images/btindexips.png"><img src="http://torrentfreak.com/images/btindexips.png" alt="btindexips" width="630" height="500" class="alignright size-full wp-image-92284"></a></center></p>
<p>Perhaps even more worrying to some, the site also gives an overview of all recorded downloads per IP-address. While the database is not exhaustive there is plenty of dirt to be found on heavy BitTorrent users who have DHT enabled in their clients. </p>
<p>Below is an example of the files that were shared <a href="http://btindex.org/peer/198.23.71.70">via the IP-address</a> of a popular VPN provider. </p>
<p><center><strong>Files shared by the IP-address of a popular VPN provider</strong><br></br></center><center><a href="http://torrentfreak.com/images/btindexvpnips.png"><img src="http://torrentfreak.com/images/btindexvpnips.png" alt="btindexvpnips" width="671" height="513" class="alignright size-full wp-image-92285"></a></center></p>
<p>Since all data is collected through the <a href="https://torrentfreak.com/bittorrents-future-dht-pex-and-magnet-links-explained-091120/">DHT network</a> people can avoid being tracked by disabling this feature in their BitTorrent clients. Unfortunately, that only gives a false sense of security as there are plenty of other monitoring firms who track people by gathering IP-addresses directly from the trackers. </p>
<p>The idea to index and expose IP-addresses of public BitTorrent users is not entirely new. In 2011 <a href="http://torrentfreak.com/i-know-what-you-downloaded-on-bittorrent-111210/">YouHaveDownloaded</a> did something similar. This site generated considerable interest but was shut down a few months after its launch. </p>
<p>If anything, these sites should act as a wake up call to people who regularly share files via BitTorrent without countermeasures. Depending on the type of files being shared, a mention on BTindex is probably the least of their worries.  </p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/btindex-exposes-ip-addresses-of-bittorrent-users-140807/feed/</wfw:commentRss>
		<slash:comments>104</slash:comments>
		</item>
		<item>
		<title>Piracy &#8216;Whistleblower&#8217; to Remain Anonymous, Court Rules</title>
		<link>https://torrentfreak.com/piracy-whistleblower-to-remain-anonymous-court-rules-140518/</link>
		<comments>https://torrentfreak.com/piracy-whistleblower-to-remain-anonymous-court-rules-140518/#comments</comments>
		<pubDate>Sun, 18 May 2014 11:24:32 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=88223</guid>
		<description><![CDATA[A person who claimed that the operators of Grooveshark were engaged in systematic copyright infringement will keep his anonymity, a court has ruled. The allegations, which were made in the comments section of an online news article, prompted Grooveshark's parent company to unmask their author. They have now failed in that mission.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>In 2010, Universal Music Group (UMG) sued Grooveshark owners Escape Media in the Supreme Court of the State of New York, claiming that the company infringed their copyrights by storing and subsequently distributing tracks to which UMG holds the copyrights.</p>
<p>In 2011, news site Digital Music News (DMN) published an article which contained claims from a member of a rock band that Grooveshark had illegally hosted the band’s music and refused to take it down when notified. The article attracted around 100 comments from DMN readers, one of whom claimed to be an employee of Escape Media.</p>
<p>The commenter, who posted under the name &#8220;Visitor&#8221;, claimed that he had regularly received “direct orders from the top” at Escape to upload music to Grooveshark&#8217;s servers. Worse still, &#8220;Visitor&#8221; claimed that the company would not fully remove infringing content, even if artists or music labels complained.</p>
<p>These allegations were viewed as problematic by Escape since in order for a service provider to gain immunity under the Digital Millennium Copyright Act (DMCA), it must remove copyrighted material once it becomes aware that an infringement has taken place.</p>
<p>So, in an effort to unmask this supposed employee of theirs, in January 2012 Escape served a subpoena on Digital Music News in order to obtain &#8220;Visitor&#8217;s&#8221; identity. After DMN refused to comply, in March 2012 Escape petitioned the Los Angeles Superior Court for enforcement. DMN was subsequently ordered to comply but promptly filed an appeal.</p>
<p>DMN argued that unmasking &#8220;Visitor&#8221; would not lead to the discovery of evidence admissible in UMG&#8217;s New York lawsuit against Escape (identifying information about &#8220;Visitor&#8221; had all been deleted) and that enforcement of the subpoena would infringe on the First Amendment rights of both DMN and &#8220;Visitor&#8221;.</p>
<p>Ultimately the court decided that since Escape had presented a prima facie case that &#8220;Visitor&#8217;s&#8221; comments were libelous, no First Amendment protection was available. DMN was ordered to comply with the subpoena and provide a copy of its server to Escape. DMN copied the servers but lodged an appeal in attempt to avoid handing them over.</p>
<p>This week the Court of Appeal of the State of California handed down its decision and it&#8217;s bad news for Escape.</p>
<p>Escape had argued that proving &#8220;Visitor&#8217;s&#8221; comments to be false would help them show that the company did not supervise direct infringement of UMG&#8217;s copyrights. The Court rejected Escape&#8217;s basis for needing access to &#8220;Visitor&#8217;s&#8221; identity stating that this &#8220;out-of-court quarrel is of no consequence to the determination of UMG’s lawsuit.&#8221;</p>
<p>Escape enjoyed no success on the privacy front either.</p>
<p>&#8220;Even if Visitor’s identifying information was reasonably calculated to lead to<br>
admissible evidence, his or her right to privacy under the California Constitution would outweigh Escape’s need for the information,&#8221; the Court said.</p>
<p>&#8220;That interest begins with Visitor’s need for a venue from which to be heard without fear of interference or suppression. Visitor’s anonymity also frees him or her from fear of retaliation, an even more compelling interest if Visitor truly is an Escape employee, as represented, because exposure could endanger not only his or her privacy but also livelihood.&#8221;</p>
<p>The Court concluded with a summary of its opinion as to the value of &#8220;Visitor&#8217;s&#8221; comments.</p>
<p>&#8220;Visitor has done nothing more than provide commentary about an ongoing public dispute in a forum that could hardly be more obscure — the busy online comments section of a digital trade newspaper,&#8221; the Court wrote.</p>
<p>&#8220;Such commentary has become ubiquitous on the Internet and is widely perceived to carry no indicium of reliability and little weight. We will not lightly lend the subpoena power of the courts to prove, in essence, that Someone Is Wrong On The Internet.&#8221;</p>
<p>With that the Court of Appeal ordered the trial court to vacate its order enforcing the subpoena and thereby protecting &#8220;Visitor&#8217;s&#8221; privacy.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/piracy-whistleblower-to-remain-anonymous-court-rules-140518/feed/</wfw:commentRss>
		<slash:comments>39</slash:comments>
		</item>
		<item>
		<title>Encrypted Internet Traffic Surges in a Year, Research Shows</title>
		<link>https://torrentfreak.com/encrypted-internet-traffic-surges-140514/</link>
		<comments>https://torrentfreak.com/encrypted-internet-traffic-surges-140514/#comments</comments>
		<pubDate>Wed, 14 May 2014 14:37:36 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[sandvine]]></category>
		<category><![CDATA[vpn]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=88053</guid>
		<description><![CDATA[Encrypted Internet traffic is surging worldwide according to data published by Canadian broadband management company Sandvine. After the Snowden revelations the bandwidth consumed by encrypted traffic doubled in North America, and in Europe and Latin America the share of encrypted traffic quadrupled.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/boxed.jpg"><img src="http://torrentfreak.com/images/boxed.jpg" alt="boxed" width="222" height="178" class="alignright size-full wp-image-36576"></a>Over the years we have been following various reports on Internet traffic changes, mostly focusing on file-sharing traffic. </p>
<p>A new report <a href="https://www.sandvine.com/trends/global-internet-phenomena/">published by Sandvine</a> this morning sheds light on the most recent developments. As in previous years, the trend is one of BitTorrent losing its share of peak Internet traffic in the U.S. while continuing to grow in Europe. </p>
<p>However, there is a far more interesting trend hidden in the report, something which the traffic management company itself appears to have missed entirely. Comparing this year&#8217;s data to that of <a href="http://torrentfreak.com/bittorrent-accounts-for-35-of-all-upload-traffic-vpns-are-booming-130518/">last year</a> reveals that encrypted Internet traffic is booming.</p>
<p>The change is most pronounced in Europe where the percentage of encrypted Internet traffic during peak hours quadrupled from a measly 1.47% to 6.10% in a year. Since overall Internet traffic increased as well, the increase is even greater for the absolute bandwidth that&#8217;s consumed.</p>
<p><center><strong>Top 10 Peak Period Applications (Europe, Fixed Access)</strong></center><center><a href="http://torrentfreak.com/images/sandvine20141e.png"><img src="http://torrentfreak.com/images/sandvine20141e.png" alt="sandvine20141e" width="577" height="326" class="alignnone size-full wp-image-88055"></a></center></p>
<p>In North America the percentage of encrypted Internet traffic during peak hours increased as well, from 2.29% early last year to 3.80% this year. </p>
<p>Keeping in mind that absolute Internet traffic increases between 20% and 40% each year the bandwidth consumed by encrypted traffic doubled in this period.</p>
<p><center><strong>Top 10 Peak Period Applications (North America, Fixed Access)</strong></center><center><a href="http://torrentfreak.com/images/sandvine20141.png"><img src="http://torrentfreak.com/images/sandvine20141.png" alt="sandvine20141" width="580" height="321" class="alignnone size-full wp-image-88054"></a></center></p>
<p>The increase in encrypted traffic is a global phenomenon. In Latin America the share of bandwidth consumed by SSL shot up from 1.80% to 10.37% in a year. Also, a similar pattern emerges on mobile networks, where encrypted traffic is also booming. </p>
<p>The changes in encrypted traffic can be directly linked to the surveillance revelations of Edward Snowden. As a result, the number of users of <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">VPN services</a> and other anonymizers <a href="https://torrentfreak.com/nsa-spying-and-anti-piracy-laws-boost-demand-for-vpns-130824/">increased sharply</a>. In addition, Google and other web services turned on <a href="http://searchengineland.com/post-prism-google-secure-searches-172487">SSL by default</a>.</p>
<p>In previous years we revealed a similar trend among BitTorrent users, who increasingly searched for options to hide their download footprints in response to anti-piracy measures. A survey among Pirate Bay users, for example, <a href="https://torrentfreak.com/the-pirate-bay-users-long-for-anonymity-111021/">revealed</a> that 70% utilize a VPN or proxy, or are interested in doing so in the future.</p>
<p>It will be interesting to see how these trends develop in the years to come. In any case, it&#8217;s clear that Internet services and their users are becoming more aware of their privacy online, which is generally a good development.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/encrypted-internet-traffic-surges-140514/feed/</wfw:commentRss>
		<slash:comments>39</slash:comments>
		</item>
		<item>
		<title>European ISPs Can Stop Logging User Data, Court Rules</title>
		<link>https://torrentfreak.com/eu-court-overturns-data-retention-directive-140408/</link>
		<comments>https://torrentfreak.com/eu-court-overturns-data-retention-directive-140408/#comments</comments>
		<pubDate>Tue, 08 Apr 2014 14:23:37 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[eu]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=86498</guid>
		<description><![CDATA[The European Court of Justice has overturned Europe's data retention directive, arguing that it's disproportionate and a violation of people's privacy. The decision has far-reaching consequences for the collection of data from European internet users, including their IP-addresses.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/europe-flag.png"><img src="http://torrentfreak.com/images/europe-flag.png" alt="europe-flag" width="222" height="146" class="alignright size-full wp-image-79290"></a>In a landmark ruling, the European Court of Justice has declared Europe&#8217;s Data Retention directive to be a violation of Internet users&#8217; privacy.</p>
<p>Under the Directive Internet providers and other telecom companies were required to log and store vast amounts of information, including who their subscribers communicate with, and what IP-addresses they use. </p>
<p>The local authorities could then use this information to fight serious crimes, but it was also been frequently used by third parties, in online piracy cases for example.</p>
<p>Today the Court ruled that the data collection requirements are <a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054en.pdf">disproportionate</a>. In a case started by <a href="http://www.digitalrights.ie/">Digital Rights Ireland</a> the Court effectively annulled the directive, and it&#8217;s now up to the individual member states to change local laws accordingly.</p>
<p>“The Court is of the opinion that, by adopting the Data Retention Directive, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality,” the Court states.</p>
<p>&#8220;By requiring the retention of those data and by allowing the competent national authorities to access those data, the directive interferes in a particularly serious manner with the fundamental rights to respect for private life and to the protection of personal data,&#8221; it adds.</p>
<p>The judgement has far-reaching implications for large telecom companies, but also for smaller businesses including many <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">VPN providers</a>. With the new ruling these companies are no longer required to log extensive amount of user data as was required under the EU Directive.</p>
<p>While many ISPs are waiting to see what local Governments decide, the Swedish provider Bahnhof immediately announced that it would wipe all subscriber data it stored. </p>
<p>&#8220;Bahnhof stops all data storage with immediate effect. In addition, we will delete the information that was already saved,&#8221; Bahnhof CEO <a href="https://www.idg.se/2.1085/1.555779">Jon Karlung says</a>.</p>
<p>There&#8217;s also resistance against the Court decision. The Dutch Minister of Justice Fred Teeven, <a href="http://www.nu.nl/tech/3746863/teeven-wil-telefoon--en-internetgegevens-blijven-opslaan.html">for example</a>, wants local ISPs to continue storing user data for law enforcement purposes.  </p>
<p>The European Court of Justice judgement is a clear victory for privacy activists, but mostly for the public who will regain some of their online privacy. While the ruling specified that some data retention may be needed, broad and mandatory retention laws and NSA-style data dragnets are no longer the standard.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/eu-court-overturns-data-retention-directive-140408/feed/</wfw:commentRss>
		<slash:comments>58</slash:comments>
		</item>
		<item>
		<title>Privacy Disaster: Type IP Address, Get Internet User&#8217;s Phone Number</title>
		<link>https://torrentfreak.com/privacy-disaster-type-ip-address-get-internet-users-phone-number-140307/</link>
		<comments>https://torrentfreak.com/privacy-disaster-type-ip-address-get-internet-users-phone-number-140307/#comments</comments>
		<pubDate>Fri, 07 Mar 2014 18:20:47 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=84941</guid>
		<description><![CDATA[While an Internet user's IP address is often visible, significant effort is required to convert that into a real-life identity. So imagine what would happen if you could type the IP address of an Internet user into a web browser and receive his phone number in return. Unbelievably, that happened this week.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="/images/spy.jpg"><img src="http://torrentfreak.com/images/spy.jpg" alt="spy" width="200" height="177" class="alignright size-full wp-image-39770"></a>Websites can&#8217;t function without them and a user must be allocated one before he or she can begin using the Internet. Without doubt, IP addresses one of the most important elements underpinning today&#8217;s online experience.</p>
<p>While website IP addresses are necessarily public information, IP addresses of individual users are by their very nature a lot more sensitive. Rather than identifying a web server designed to attract traffic, IP addresses operated by regular Internet users are often considered personal information.</p>
<p>Of course, it&#8217;s fairly common knowledge that the IP addresses of file-sharers become publicly visible when they enter BitTorrent swarms for example, but matching those IP addresses to real-life identities is a complex process wrapped up in privacy laws designed to protect the consumer. During the past week, however, it became evident that users of a Scandinavian ISP could be traced back to their real-life identities simply by using their IP address.</p>
<p>Discovered by Norwegian site <a href="http://www.dinside.no">Dinside</a>, this privacy disaster stems from the software installed on routers supplied by local ISP NextGenTel. By simply entering the IP address of another NextGenTel user into a standard web browser, users were presented with a webpage containing router status information. The page also revealed the telephone number of the user behind the entered IP address.</p>
<p>Armed with a telephone number and a directory site such as <a href="http://1881.no">1881.no</a>, all it took was a few clicks to find out the name and address of the person behind not only the telephone number, but also the original IP address.</p>
<p>After being alerted to the issue NextGenTel took action to fix the security hole by updating the relevant software, but the episode is a shining example of how years of care over personal information can be undone in an instant.</p>
<p>One of Norway&#8217;s biggest privacy cases in recent times involved a BitTorrent user who allegedly leaked a hit local movie to The Pirate Bay. Law firm Simonsen had the IP address of the leaker but desperately needed to convert that into a real-life identity in order to pursue legal action. That case went <a href="http://torrentfreak.com/after-epic-battle-anti-piracy-lawyers-finally-get-their-man-100806/">all the way to the Supreme Court</a> when the ISP behind that IP address refused to hand over its customer&#8217;s private details.</p>
<p>Needless to say, that lengthy process would have been endlessly easier if that customer had been a NextGenTel customer. Simonsen could&#8217;ve accessed the Internet via NextGenTel, entered the IP address into their web browser, and used the telephone number to reach their target there and then &#8211; or called round for a visit, whichever was easier.</p>
<p>In a comment to Dinside, NextGenTel CTO Jørn E. Hodne said his company were taking the matter seriously and were attempting to put things right by fixing software and reporting themselves to the country&#8217;s Data Inspectorate.</p>
<p>&#8220;We&#8217;ve started the [software] update and even reported the matter to the Inspectorate,&#8221; Hodne <a href="http://www.dinside.no/927491/nextgentel-avslorte-ip-adressers-eiere">said</a>. &#8220;The world we live in is very complex, but this is our responsibility.&#8221;</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/privacy-disaster-type-ip-address-get-internet-users-phone-number-140307/feed/</wfw:commentRss>
		<slash:comments>22</slash:comments>
		</item>
		<item>
		<title>BitTorrent Launches &#8216;NSA-proof&#8217; Serverless Messenger App</title>
		<link>https://torrentfreak.com/bittorrent-launches-nsa-proof-messenger-app-130930/</link>
		<comments>https://torrentfreak.com/bittorrent-launches-nsa-proof-messenger-app-130930/#comments</comments>
		<pubDate>Mon, 30 Sep 2013 19:40:41 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[BitTorrent Inc]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=77416</guid>
		<description><![CDATA[BitTorrent Inc., the company behind the popular file-sharing clients uTorrent and BitTorrent, announced a new project to the world today. Branded "BitTorrent Chat," the new application allows people to chat safely and securely without having to rely on any central servers, making it nearly impossible for these conversions to be tapped. The project is currently in private Alpha stage and BitTorrent is inviting the public to give it a try. <p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/bittorrent-chat.png"><img src="http://torrentfreak.com/images/bittorrent-chat.png" alt="bittorrent-chat" width="207" height="90" class="alignright size-full wp-image-77418"></a>Over the past months the revelations of Edward Snowden have dominated the news.</p>
<p>Internet privacy suddenly became a mainstream topic and all the negative news has increased the demand for encrypted and secure communications. </p>
<p>Responding to this, several developers quickly jumped in with new tools to prevent the public from having their conversations spied on or their data breached. Pirate Bay founder Peter Sunde announced a new <a href="https://heml.is/">encrypted messaging service</a> for example, and Kim Dotcom&#8217;s Mega has <a href="http://torrentfreak.com/dotcoms-mega-debuts-spy-proof-messaging-this-summer-email-follows-130711/">similar plans</a>. </p>
<p>Today BitTorrent Inc. announced a new project that will also increase people&#8217;s security. The San Francisco-based company just launched <a href="http://labs.bittorrent.com/experiments/bittorrent-chat.html">BitTorrent Chat</a>, a secure messenger app that allows people to communicate without storing the conversations on any central servers. </p>
<p>The new tool is based on BitTorrent technology and is offered free of charge to help people regain complete control over their own data. </p>
<p>&#8220;This year alone, more than 6 million people have been impacted by data breaches. The right to own your own conversations online: it’s not a given. It should be,&#8221; the company says. </p>
<p>&#8220;So over at Labs, we’re working on something that could solve for conversation security. BitTorrent Chat applies distributed technology to the idea of IM. Our goal is to ensure that your messages stay yours: private, secure, and free.&#8221;</p>
<p><center><a href="http://torrentfreak.com/images/bt-chat1.jpg"><img src="http://torrentfreak.com/images/bt-chat1.jpg" alt="bt-chat" width="590" height="310" class="alignnone size-full wp-image-77423"></a></center></p>
<p>While BitTorrent Chat doesn&#8217;t store any conversations on a third-party server, it does need a central location to get the conversation going. To speak in BitTorrent terms, people have to connect to a tracker to know where the message should be sent. </p>
<p>TorrentFreak asked for further details on what central servers are involved in bootstrapping the conversations and what encryption the new tool uses,  but the company could not immediately provide further details on these issues.</p>
<p>The new messenger app is not the only &#8216;breach safe&#8217; tool the company is currently working on. Earlier this year BitTorrent launched its <a href="http://torrentfreak.com/bittorrent-starts-cloud-supported-file-sharing-service-without-limits-130215/">Sync application</a> which provides a secure alternative to centralized cloud backup solutions such as Dropbox and Google drive. </p>
<p>Those who want to give BitTorrent&#8217;s Chat application a try can head over to BitTorrent Labs to <a href="http://labs.bittorrent.com/experiments/bittorrent-chat.html">sign up for the private Alpha</a>.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/bittorrent-launches-nsa-proof-messenger-app-130930/feed/</wfw:commentRss>
		<slash:comments>103</slash:comments>
		</item>
		<item>
		<title>Private Torrent Sites Run Their Own Mini-PRISM to Share Data on Users</title>
		<link>https://torrentfreak.com/private-torrent-sites-run-their-own-mini-prism-to-share-data-on-users-130908/</link>
		<comments>https://torrentfreak.com/private-torrent-sites-run-their-own-mini-prism-to-share-data-on-users-130908/#comments</comments>
		<pubDate>Sun, 08 Sep 2013 10:59:34 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[Torrent Sites]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=76282</guid>
		<description><![CDATA[Last month TorrentFreak took a look at the information being held on users by the operators of private BitTorrent trackers. We questioned whether it was time to take another look at the way that data is being handled in order to better protect site members. In our second article on the issue we look not only at the data stored by individual trackers, but also claims that the information is being shared with dozens of other sites.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/cameraspy.jpg"><img src="http://torrentfreak.com/images/cameraspy.jpg" alt="cameraspy" width="170" height="164" class="alignright size-full wp-image-49625"></a>When it comes to keeping their privacy, many file-sharers like to think of themselves as a secretive bunch.</p>
<p>The ever popular VPN is showing no signs of decline and as time goes on the interest in joining private torrent communities grows.</p>
<p>Last month we <a href="http://torrentfreak.com/downloading-the-databases-that-store-everything-you-do-130811/">took a look</a> at the large amounts of data being stored by private torrent sites on their users, alongside the question of whether that information could be better handled in future.</p>
<p>That article prompted an individual, &#8216;X&#8217;, to contact us with information on what is perhaps the private tracker scene&#8217;s dirtiest and relatively open secret.</p>
<p>For those unaware, &#8216;X&#8217; was talking about the phenomenon whereby losing an account or misbehaving on one torrent site can affect a user&#8217;s status on another. It&#8217;s been going on for some time now but it&#8217;s definitely worth mentioning in light of current concerns over data privacy.</p>
<p>X asked to keep him anonymous, and for good reason. He is the former sysop, admin and coder of at least two well known private torrent sites and the founder of another. He asked us simply &#8211; what do we know about how much information is being passed between torrent sites?</p>
<p>&#8220;I could take a username/email address/IP address and get information about any matching users on 30+ different sites. Some of it was automatic, some of it was request ticket based,&#8221; X explained.</p>
<p>So what kind of information is being shared? According to X, a staggering amount.</p>
<p>&#8220;Once a user was banned on one of the member private trackers, every IP they ever used for the site, RSS feed/API, and announces (even transversing HTTP proxies if they didn&#8217;t properly hide their origin IP), their email address, and their username was used to build a profile of them by combining shared data between the collective sites,&#8221; he revealed.</p>
<p>X told us that the databases are so rich in information that it&#8217;s possible to build detailed profiles of users, some of which are associated with more than a thousand IP addresses including access dates and times, plus a hundred usernames/email addresses and details of their supposed misbehavings.</p>
<p>&#8220;Everything from being a dick, being/acting suspicious, cheating/trading, letting someone else use their account, to staff running off with donation money could get a user on this database,&#8221; X said.</p>
<p>So how does this PRISM-like system work? According to X, it&#8217;s professionally constructed.</p>
<p>&#8220;All of these user profiles were accessible by all member sites via API, and quite a few sites kept their own copy of the database, pulling down information updates at regular intervals, and sending profile updates/creations on matching or requested information,&#8221; he revealed.</p>
<p>The security implications of holding local copies of full databases are a serious concern.</p>
<p>&#8220;If any of these sites got raided or hacked, data about users who never even used the site would be in the hands of the invader.&#8221;</p>
<p>We&#8217;ve discussed the reasons why these kinds of systems are in place in previous articles. Private sites have an &#8216;<a href="http://torrentfreak.com/why-private-torrent-sites-have-strict-copyright-enforcement-rules-130511/">economy</a>&#8216; to preserve and need to be able to keep tabs on damaging users in order to keep their sites healthy.</p>
<p>Of course, this is the kind of reasoning also employed by the NSA when it tries to justify spying on everyone. Are these excuses acceptable or not? Does the end justify the means?</p>
<p>&#8220;The NSA leaks have shed a new light on what I regularly did at my post [X says he wrote some of the code allowing the sites to communicate], and while I can&#8217;t deny the good it did in keeping [our site] from falling to shit, the way the information is handled and the secrecy behind this are things that need to be exposed and reworked,&#8221; X concludes</p>
<p>It is unlikely that the participating trackers will give up their intelligence systems just like that since the information they provide is a crucial part of keeping their sites healthy. But equally, these kinds of databases could become hugely problematic should they fall into the wrong hands.</p>
<p>What happens next is up to the sites running the operation but coordinating change and introducing a better system could prove almost impossible.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/private-torrent-sites-run-their-own-mini-prism-to-share-data-on-users-130908/feed/</wfw:commentRss>
		<slash:comments>161</slash:comments>
		</item>
		<item>
		<title>Downloading: The Databases that Store Everything You Do</title>
		<link>https://torrentfreak.com/downloading-the-databases-that-store-everything-you-do-130811/</link>
		<comments>https://torrentfreak.com/downloading-the-databases-that-store-everything-you-do-130811/#comments</comments>
		<pubDate>Sun, 11 Aug 2013 18:56:21 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=75245</guid>
		<description><![CDATA[At the same time that VPNs and other kinds of encryption are becoming some of web security's hottest topics, when it comes to file-sharing user data there is an elephant in the room. Many BitTorrent trackers, which pride themselves on having some of the best security around, are collecting and storing vast quantities of sensitive user data and almost none of it is encrypted. Is the time right for sites to take a fresh look at the way they handle data retention?<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Which companies have access to my web browsing habits? Will the government peek at my emails? Who&#8217;s using the data mined from my Facebook activity and what will they end up doing with it in future? Are there really people out there who can monitor my every online move? </p>
<p>Until recently these were the kinds of issues pondered by those with an interest in Internet security and the very paranoid. In the post Edward Snowden world, these are things that are starting to matter to everyone.</p>
<p>Security is a pretty big issue among file-sharers for a number of reasons. Obviously there are many who would like to keep their activities private, but it&#8217;s common for file-sharers to be tech-savvy users who are generally more aware of online privacy issues.</p>
<h2>Public v Private</h2>
<p><a href="http://torrentfreak.com/images/private.jpg"><img src="http://torrentfreak.com/images/private.jpg" alt="private" width="180" height="120" class="alignright size-full wp-image-75301"></a>By now, those using public BitTorrent sites should be well aware that their activities are, to put it bluntly, extremely public. At any time spies of all kinds can jump into a torrent swarm and start gathering data. The most important pieces of data &#8211; times and IP addresses &#8211; can be scooped up in an instant and are often enough for trolls to start filing lawsuits.</p>
<p>Private torrent sites, on the other hand, offer a walled garden environment. They are often very hard to gain access to which means that generally speaking there are less spies and fewer chances of being monitored or busted &#8211; or so the anecdotes go. Truth is no one is sure how many undesirables may exist on these sites but it&#8217;s likely that very few sites will have a completely clean bill of health.</p>
<p>The public vs private security debate has been done to death over the years but what is not often discussed is how sites &#8211; private ones in particular &#8211; handle the data entrusted to them by their users.</p>
<p>When someone signs up to a site via invite they hand over both their email and IP addresses. Immediate checks are made &#8211; has this email or IP address been used on this site before? If so, in many cases the chances of getting account are already reduced to near zero. If there&#8217;s no match, the user making the application is in &#8211; congratulations.</p>
<p>This is where the fun starts and something less entertaining kicks in behind the scenes. You can buy a <a href="http://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/">zero-logging VPN</a> incredibly simply these days but the same cannot be said about private torrent sites. At every opportunity they log just about everything they can.</p>
<h2>Private site logging</h2>
<p><a href="http://torrentfreak.com/images/data.jpg"><img src="http://torrentfreak.com/images/data.jpg" alt="data" width="180" height="120" class="alignright size-full wp-image-75303"></a>Obviously, a certain level logging is required for people to merely have an account. As a matter of course sites log their sign up date along with users&#8217; email addresses, passwords and everything said in their forums. No surprises so far really. </p>
<p>However, sites also log every single torrent downloaded and every IP address used to do so. They log how much data was downloaded and how much was uploaded. Not only that, sites know which other users the downloads came from and to which users the uploads were sent and in what quantity.</p>
<p>Once this information is logged (often against hundreds of torrents per user), sites know all there is to know about their users, real-life identities aside. And the worrying thing is that in many cases the information is never deleted, even when users have left the site. So why is that the case?</p>
<p>The answer is simple &#8211; it&#8217;s all about keeping the site and its file-sharing ecosystem functioning in an optimal fashion.</p>
<p>Sites rely on users playing fair, such as sharing content in a way determined by the sites rules. When this breaks down so does the site, so site logs are used to weed out the bad players. These include those who damage the ecosystem by not doing their part or &#8211; heaven forbid &#8211; those evil users who try to cheat the ratio system.</p>
<p>Once these users are found (which is only possible by keeping detailed logs on the activities of all users) they are kicked out. However, their accounts are not usually deleted because they carry useful information which will be used to ensure that the same user doesn&#8217;t try to get back on the site in future. To combat these users many sites also ban the use of VPNs, which means that not even good users can enjoy the security they offer.</p>
<h2>Logs can be used to keep the enemy out</h2>
<p>Site logs are also used to hunt down the private tracker&#8217;s worst enemies &#8211; anti-piracy companies and those users who make a business out of buying and selling site invites. These two groups can be closely related, since when an invite seller offers his product in public, it&#8217;s possible that spies can pick them up for a few dollars and gain access to an otherwise private site in a matter of minutes.</p>
<p>So, as we can see, site logs are there to protect the health of the tracker. However, it would be an absolute nightmate if they fell into the wrong hands. While that doesn&#8217;t happen often, it does happen.</p>
<p>Just this week the UFC <a href="http://www.reviewjournal.com/sports/mma-ufc/ufc-cracks-down-website-it-says-illegally-streamed-fight-shows">announced</a> that it had targeted a site called BestFreeUFC and as a result has obtained the site&#8217;s database which includes email addresses, IP addresses, user names and chatlogs of individuals who have illegally accessed UFC events. UFC owners Zuffa say they will now go after the infringers.</p>
<h2>The future &#8211; encryption?</h2>
<p><a href="http://torrentfreak.com/images/encryption.jpg"><img src="http://torrentfreak.com/images/encryption.jpg" alt="encryption" width="180" height="135" class="alignright size-full wp-image-75305"></a>So what can be done to increase site security? TorrentFreak spoke with a couple of admins who informed us that while they would prefer not to carry logs, they are essential for maintaining a healthy tracker and keeping undesirables out. Passwords on Gazelle trackers are encrypted, which is welcome, but currently no other data is encrypted as standard.</p>
<p>One admin told us he would like to add full encryption but from a technical perspective it would seriously complicate matters. Furthermore, much more grunt in both the software and hardware departments would be required, along with a fresh view of the entire situation.</p>
<p>So while email providers start <a href="http://www.theverge.com/2013/8/9/4605290/deutsche-telekom-email-made-in-germany-initiative">adding encryption</a> as standard and companies like Dotcom&#8217;s Mega have security built in from the ground up, the question now is whether private torrent sites will maintain their positions or continue as normal.</p>
<p>This might just be another case of citizens having to sacrifice some of their privacy in order to obtain a valuable service, or perhaps in the overall scheme of things, security is tight enough already&#8230;..</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/downloading-the-databases-that-store-everything-you-do-130811/feed/</wfw:commentRss>
		<slash:comments>72</slash:comments>
		</item>
		<item>
		<title>Pirate Bay Founder to Launch NSA-proof Messenger App</title>
		<link>https://torrentfreak.com/pirate-bay-founder-announces-encrypted-nsa-proof-communication-apps-130710/</link>
		<comments>https://torrentfreak.com/pirate-bay-founder-announces-encrypted-nsa-proof-communication-apps-130710/#comments</comments>
		<pubDate>Wed, 10 Jul 2013 12:01:07 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[PRISM]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=73508</guid>
		<description><![CDATA[Pirate Bay founder Peter Sunde is working on a new messaging platform that will be impossible to spy on, even by the people who operate the network.  Using end-to-end encryption in combination with a user-friendly interface, Heml.is hopes to cater to the demands of millions of privacy-concerned Internet users. "In this day and age we can't do without encryption," Sunde tells TorrentFreak.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/cameraspy.jpg" alt="cameraspy" width="170" height="164" class="alignright size-full wp-image-49625">Over the past month the PRISM scandal has dominated the news, with many people calling for stronger privacy protections as a result. </p>
<p>While it may not come as a complete surprise that nearly all communication on the Internet is monitored and stored, the revelations have brought talks about encrypted communication to the mainstream. </p>
<p>One new startup that hopes to lead the way in the next generation of encrypted communication tools comes from Pirate Bay founder Peter Sunde. The former Pirate Bay spokesman is no newcomer when it comes to encrypting traffic as he is also connected to the <a href="http://torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/">privacy-focused VPN service iPredator</a>. However, with his latest project he hopes to take things to the next level.</p>
<p>Sunde and two friends are currently working hard on <a href="https://heml.is/">Heml.is</a> (&#8220;secret&#8221; in Swedish), a spy-proof messaging App for both iOS and Android. Aside from its pretty looks, all messages will be encrypted so no one except the sender and recipient will be able to read their contents. </p>
<p>TorrentFreak caught up with Sunde who told us that a secure and private messaging system is needed for people to talk freely. </p>
<p>&#8220;People act differently if they think someone is listening in to their conversation. That&#8217;s what Stasi taught us for instance. It&#8217;s one of many reasons why privacy is so vital,&#8221; Sunde says.</p>
<p>While encrypted messaging is not a new phenomenon, Heml.is hopes to beat the competition by building apps that look pretty, but perhaps more importantly are completely open about the people running them. </p>
<p>&#8220;The big difference with heml.is compared to other solutions is that we&#8217;re not just focusing on tech. So many people talk about open source, floss and so on, but that&#8217;s only a small part. There are more important questions,&#8221; Sunde tells us. </p>
<p>&#8220;Who runs the infrastructure? How do you know the intentions of those people? Which jurisdiction has which rules? &#8220;We know these things just as well as the technology. Today&#8217;s internet is more and more politicized so it needs to be dealt with that way as well.&#8221;</p>
<p><center><br>
<h5>Heml.is</h5>
<p><iframe width="560" height="315" src="//www.youtube.com/embed/oPeujbY3feM?rel=0" frameborder="0" allowfullscreen></iframe></center></p>
<p>Helm.is is currently working on messenger apps for the iOS and Android platforms and is raising money to complete the development. In the future the startup is looking to expand to other platforms as well as other forms of communication.</p>
<p>&#8220;In today&#8217;s day and age we can&#8217;t do without encryption. We need to have it for all sorts of communication, something we from The Pirate Bay have said for almost a decade now,&#8221; Sunde tells us.</p>
<p>&#8220;But it&#8217;s not just encryption, it&#8217;s everything surrounding it. The cloud services are the big problem. Doesn&#8217;t matter if you communicate encrypted, if the end result is stored with a master-key or otherwise accessible by an unwanted party,&#8221; he adds.</p>
<p>Sunde is best known for his role as Pirate Bay founder, and notes that aside from messaging Heml.is may also add file-sharing capabilities in the future.  </p>
<p>&#8220;We&#8217;re of course looking at possibilities of doing any type of communication private,&#8221; Sunde says.</p>
<p>People who are interested can help out by <a href="https://heml.is/">funding the project</a> in return for unlock codes. No release date has yet been promised &#8211; Sunde says that they&#8217;re not going to release anything until they&#8217;re completely happy with it. </p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/pirate-bay-founder-announces-encrypted-nsa-proof-communication-apps-130710/feed/</wfw:commentRss>
		<slash:comments>195</slash:comments>
		</item>
		<item>
		<title>Former U.S. Prosecutor Sues Obama and NSA over PRISM Scandal</title>
		<link>https://torrentfreak.com/former-u-s-prosecutor-sues-obama-and-nsa-over-prism-scandal-130610/</link>
		<comments>https://torrentfreak.com/former-u-s-prosecutor-sues-obama-and-nsa-over-prism-scandal-130610/#comments</comments>
		<pubDate>Mon, 10 Jun 2013 11:00:47 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[PRISM]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=71732</guid>
		<description><![CDATA[Former US prosecutor Larry Klayman and the parents of the killed Navy Seal Team VI member Michael Strange have filed a lawsuit against President Obama, the NSA and several other players connected to the PRISM scandal. Through the class action lawsuit they demand compensation for severe privacy abuses as well as violations of several other constitutional rights.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/prism.png" alt="prism" width="175" height="142" class="alignright size-full wp-image-71733">Over the past days the PRISM scandal has dominated the news. The Guardian&#8217;s Glenn Greenwald <a href="http://www.guardian.co.uk/world/nsa">pushed out leak after leak</a>, revealing how millions of people around the world are being monitored by U.S. intelligence agencies. </p>
<p>The revelations turned online privacy into a worldwide mainstream discussion. Privacy activists shouted &#8220;we told you so,&#8221; Orwell quotes were rife, Kim Dotcom warmed up the public for his PRISM-proof email serviceand these was even some discussion over the <a href="http://gawker.com/the-nsa-sent-a-takedown-notice-over-my-custom-prism-log-512085836">stolen PRISM logo</a> </p>
<p>Following the leaks the NSA and the US Government have been heavily criticized for their disregard of people&#8217;s privacy, and perhaps not totally unexpectedly this weekend the first legal action was filed. </p>
<p>TorrentFreak just obtained a copy of <a href="http://torrentfreak.com/images/PRISM-class.pdf">a complaint</a> submitted at a federal court in Columbia, targeting President Obama, the NSA, Eric Holder and Verizon who all played a role in the mass surveillance scheme. </p>
<p>The class action lawsuit was filed by Larry Klayman, a former US prosecutor under the Reagan administration, together with the parents of the killed Navy SEAL Team VI member Michael Strange.</p>
<p>The plaintiffs accuse the PRISM participants of violating their constitutional rights, reasonable expectation of privacy, free speech and association, right to be free of unreasonable searches and seizures, among other illegal and criminal acts. Both Klayman and the Navy Seal parents demand compensation for the damage they suffered.</p>
<p>&#8220;This case challenges the legality of Defendants’ participation and conduct in a secret and illegal government scheme to intercept and analyze vast quantities of domestic telephonic communications,&#8221; the complaint reads.</p>
<p>While there are plenty of angles to pick, the class action centers around the classified order from the secretive Foreign Intelligence Surveillance Court ordering Verizon to hand over all call details and metadata between the United States and abroad, without any oversight.  </p>
<p>&#8220;This would give the NSA over one hundred millions phone records on a daily basis. The information would also include a list of all the people that Verizon customers call and who called them; how long they spoke; and perhaps, where they were on a given day.&#8221;</p>
<p>&#8220;Further, there is nothing in the order requiring the government to destroy the records after a certain amount of time nor is there any provisions limiting who can see and hear the data,&#8221; the complaint states. </p>
<p>The complaint goes on to state that those responsible for the PRISM scandal have done very little to explain what it entails. Instead, there are now calls to go after the whistleblower, <a href="http://www.guardian.co.uk/world/2013/jun/09/nsa-secret-surveillance-lawmakers-live">Edward Snowden</a>, to stop further leaks.</p>
<p>&#8220;To date, Defendants have not issued substantive and meaningful explanations to the American people describing what has occurred. To the contrary, criminal charges are reportedly being pursued by Defendants Obama, Holder, the DOJ, and the NSA against the leakers of this plot against American citizens in a further effort suppress, obstruct justice, and to keep Defendants’ illegal actions as secret as possible.&#8221;</p>
<p>Former US prosecutor Larry Klayman is a <a href="http://en.wikipedia.org/wiki/Larry_Klayman">known critic of the Obama administration</a> and believes that his private communications were tapped under the PRISM program. Charles and Mary Ann Strange, the parents of the killed Navy Seal Team VI member Michael Strange, allege the same as they have also <a href="http://www.thegatewaypundit.com/2013/05/father-of-navy-seal-speaks-out-about-suing-obama-and-biden-for-insane-policy-that-killed-his-son-video/">challenged the Obama administration</a>.</p>
<p>&#8220;[...] particularly since these Plaintiffs have been vocal about their criticism of President Obama as commander-in-chief, his administration, and the U.S. military regarding the circumstances surrounding the shoot down of their son’s helicopter in Afghanistan, which resulted in the death of their son and other Navy Seal Team VI members and special operation forces.&#8221; </p>
<p>The complaint demands relief for violations of the defendants&#8217; rights under the First, Fourth, and Fifth Amendments to the U.S. Constitution. In addition it lists violations of privacy, including intrusion upon seclusion, freedom of expression and association, due process, and other illegal acts. </p>
<p>Thus far, authorities and the technology companies involved in the surveillance scandal have refuted most accusations, claiming that they are operating within the boundaries of the law. Time will tell whether the present lawsuit will arrive at another conclusion. </p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/former-u-s-prosecutor-sues-obama-and-nsa-over-prism-scandal-130610/feed/</wfw:commentRss>
		<slash:comments>234</slash:comments>
		</item>
	</channel>
</rss>
