Torrentfreak

Total Page:16

File Type:pdf, Size:1020Kb

Torrentfreak TorrentFreak • Home • About • Archives • Categories ○ Anti-Piracy ○ Bittorrent Software ○ Breaking News ○ Copyright Issues ○ Legal Issues ○ Opinion ○ Pirate Talk ○ Politics and Ideology ○ Torrent Sites ○ Tutorial & How To • News Bits • Contact The place where breaking news, BitTorrent and copyright collide • Subscribe via RSS • Subscribe via Email • Tip Us Off! Top of Form Search TorrentFreak Search Bottom of Form BitTorrent: Bypass any Firewall or Throttling ISP with SSH • Ernesto • 14/10/2007 • 190 • bittorrent , firewall, ssh, ssh-tunnel, throttling • Print • On some networks it’s impossible to use BitTorrent. For example, if you’re at work, school, or connected to Comcast or a public hotspot. But there’s an easy solution to overcome this problem. By using a secure connection (SSH), you can bypass almost every firewall or traffic shaping application. Here’s a relatively simple 3-step guide that will show you how to set it up. I wouldn’t recommend BitTorrent over SSH as a permanent solution since it will cripple the servers of the SSH providers. If you’re looking for a long term solution check out a VPN service such as BTGuard. 1. Get an SSH account. You need an SSH account in order to get this working. You can try one of these free shell providers from this list. 2. Download, Install and Configure Putty Download Putty, store it somewhere on your computer and run it. In the session screen enter the host name, the port number (22), and tick the connection type box (SSH). Next, go to SSH –> Tunnels, enter a source port and tick the dynamic box. I’m using port 23456, but you are free to choose any post you like as long as it’s available. When you’re done, it might be a good idea to save the session so you don’t have to enter the info next time you run Putty. If you’re ready, hit the “open” button in the session screen. Acommand- line interface will pop-up so enter your username and password that you received from your shell-provider, and you’re done. 3. Configure your BitTorrent client. The last step is to configure your BitTorrent client. I will show you how it’s done in uTorrent and Azureus but other BitTorrent clients use a similar setup. uTorrent: go to Options > Preferences > Connection. Enter your port number (I use 23456), socks 4 or 5 as type, and localhost in the proxy field. Azureus: go to Tools > Options > Connection > Proxy Options. Tick the “Enable proxying of tracker communications” and “I have a SOCKS proxy” box. Next, enter your port number in the port field (I use 23456) and localhost in the host field. When you’re done, restart your BitTorrent client and you’re ready to go. BitTorrent over SSH tends to be a bit slower than your normal connection, but it’s a great solution when BitTorrent connections are blocked or throttled. For those on a Mac OSX, please check out this great tutorial (which in part inspired this article) for more details. It includes instructions on how to do this on a Mac, using Azureus. Related Posts • Bell Opens Video Download Store, but Continues to Throttle BitTorrent • Test: Does Your ISP Slow Down BitTorrent Traffic? • BitTorrent Throttling ISPs Exposed by Azureus • Help Azureus to Fight BitTorrent Throttling ISPs • Decluttering The Tubes, Solutions to the BitTorrent “Problem”? Share Post 2,766diggsdigg Share27 190 Comments Toggle Comments • #1 Ezekiel Crowe says: on: Oct 14 at 22:32 Continuing proof that however many millions are spent on techniques to throttle the p2p community, the tried and true combination of human ingenuity and too much spare time can overcome anything. • #2 Yatti says: on: Oct 14 at 22:58 Ill try it soon. • #3 davdavon says: on: Oct 14 at 23:31 My ISP throttles BitTorrent but this didn’t help… • # 4 Ernesto says: on: Oct 14 at 23:49 [quote comment="187302"]My ISP throttles BitTorrent but this didn’t help…[/quote] Which ISP are you on? • #5 Brian says: on: Oct 15 at 00:00 My university blocks common torrent ports and most arbitrary ports are firewalled or show up as “NAT OK?” in Azureus. Would this solve the problem? • #6 Ranger Bob says: on: Oct 15 at 00:00 YOU ROCK DUDE! I can now reach Demonoid.com again from Canada! • #7 Seanie says: on: Oct 15 at 00:14 http://www.digg.com/software/BitTorrent_Bypass_any_Firewall_or_Throttling_ISP_wit h_SSH • # 8 Ernesto says: on: Oct 15 at 00:23 [quote comment="187309"]My university blocks common torrent ports and most arbitrary ports are firewalled or show up as “NAT OK?” in Azureus. Would this solve the problem?[/quote] It should, let us know if it works! • #9 bernie says: on: Oct 15 at 00:38 any thoughts on os X? I might add ever thought I port port forward on the WAP I can never go green with Azureus, any thoughts? • #10 Ranger Bob says: on: Oct 15 at 00:39 Seani… erm SSH. “Secure Shell or SSH is a network protocol that allows data to be exchanged over a secure channel between two computers. Encryption provides confidentiality and integrity of data. SSH usespublic-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.” http://en.wikipedia.org/wiki/Secure_Shell • #11 Scott says: on: Oct 15 at 01:21 I’m at university in London and they have the most stringent network policies I’ve ever come across. I had to check the box “Use proxy server for peer-to-peer connections” to get it to work. This does mean all the traffic is going the proxy though which makes it a lot slower. Oh well, I can finally download my shows from America again. • #12 h33t says: on: Oct 15 at 01:42 silenceisdefeat.org probably did not design their service for bittorrent according to their site they have a server colocated on 10Mbps (i assume uncapped). how far does 10Mbps get you as a bittorrent proxy? oops • #13 k3lvin.key.as says: on: Oct 15 at 03:24 I hate torrent download. I like rapidshare, megaupload … So I create a site give to all mems around the world can use Premium Account(s): It’s Free ! http://k3lvinmitnick.blogspot.com • #14 Poxek says: on: Oct 15 at 04:34 Incredible! My (sucky) college normally blocks all torrent activity, and now I can get torrents to work! Granted, only 10kB/s, but that’s better than 0 by far! • #15 Hacker says: on: Oct 15 at 04:51 Confirmed, working ;-) This also works great as a browser proxy ;) • #16 dtstuff9 says: on: Oct 15 at 04:54 VPNs are so much better and easier and free! • #17 freako says: on: Oct 15 at 05:31 VPN free? which ones? most of them are free but give a bandwidth limit. :S • #18 inaequitas says: on: Oct 15 at 05:57 Tunneling things over SSH is a good idea in many situations to increase your level of security. Browsing, grabbing e-mail when on unsecured wifi etc. However, some ISPs block and/or throttle all encrypted traffic [known to me is Rogers in Canada]; while this was aimed at slowing down people using torrent encryption, it has negatively affected SSH usage in some places. So YMMV. • #19 Monkey says: on: Oct 15 at 06:14 I understand that secure shell is encrypted and everything but would this increase my security downloading torrents on a college campus? I have gotten a few cease and desist letters from the DMCA dept at my college because they some how tracked me but with this and peer guardian what is my level of safety? • #20 alexa says: on: Oct 15 at 06:16 I’ve had good experiences with vpntunnel (www.vpntunnel.co.uk). They charge $20 a month but I get 16Mbit/sec seeding and downloading!! • #21 Ajay says: on: Oct 15 at 08:44 I use http://www.your-freedom.net/ it works with openvpn • #22 Ink says: on: Oct 15 at 08:52 Most free shell providers have severely limited bandwidth and hardware specs. If a bunch of ppl start using those free services to tunnel their traffic through them they’ll sooner or later disable tunneling altogether. And keep in mind that even though the ssh provider isn’t able to read your incoming connections the outgoing onces are not encrypted and clearly readable. So if I was one of those free providers I’d start throttling bw and/or connections… which is pretty easy on *nix there are even ap2p kernel patches. • #23 Mr. Nutty says: on: Oct 15 at 09:03 Sounds dandy till traffic blocking and shaping occurs with SHH connections. • #24 Ink says: on: Oct 15 at 09:12 I don’t think they can do that Nutty (or at least they shouldn’t) most businesses even small onces encrypt all their traffic (http, ftp, tunneled db connection and all that). And all this traffic is indistinguishable from tunneled ssh traffic. In fact most of that is based on open-ssh. That would even slow down websites when you order from amazon. • #25 ChrisCocker says: on: Oct 15 at 09:28 Damn you for abusing a nice shell provider for p2p. That’s about as “good” as using TOR für torrenting. >:( • #26 Josh says: on: Oct 15 at 09:35 Read the silenceisdefeat TOS they sure wouldn’t like filesharers: http://silenceisdefeat.org/tos • #27 Anonymous says: on: Oct 15 at 10:56 Hey dumbasses: “Participating in activities including but not limited to spamming, port flooding, network scanning, distributing copyrighted works or using SD systems for any other type of illegal activity is strictly prohibited.” “Violators of any of the terms expressed above will have their account immediately terminated from SD, and in the event that illegal activities have occured, law enforcement authorities will be contacted and provided with any information felt to be useful in a thorough and complete investigation.” So no, do NOT abuse free unix shells to tunnel P2P.
Recommended publications
  • Malware Extorts Cash from Bittorrent Users | Torrentfreak
    Malware Extorts Cash From BitTorrent Users | TorrentFreak http://torrentfreak.com/malware-extort-cash-from-bittorrent-use... TorrentFreak Home Contact About Archives Forum Malware Extorts Cash From BitTorrent Users Written by enigmax on April 11, 2010 A new type of malware is riding the wave of file-sharing pre-settlement letters by infecting BitTorrent users’ machines and then demanding payments in order to make imaginary lawsuits go away. ICPP Foundation try to give the impression they are RIAA and MPAA affiliated but the whole thing is a scam to extort cash and obtain credit card details. ICCP Foundation claims to be an international company operating out of Switzerland. They say they are “committed to promoting the cultural and economic benefits of copyright” while assisting their partners to fight “copyright theft around the world”. In fact what they really do is operate a scam to extort money from BitTorrent users. Right at this moment we are unsure of the exact route of infection, but somehow malware (probably in either fake file or attached virus form) is displaying a “copyright violation alert” on the victim’s screen, locking it, and redirecting users to the ICPP site where they are told they have been caught infringing copyright. There they are warned their offenses could result in 5 years in prison and a $250,000 fine and are given the option to take the (fake) case to court. They are also offered a chance to make the whole thing go away for the payment of a ‘fine’ of around $400. Victims are also prompted to give their name, address and full credit card details – it is unclear how this information is further abused but it doesn’t look good.
    [Show full text]
  • You Are Not Welcome Among Us: Pirates and the State
    International Journal of Communication 9(2015), 890–908 1932–8036/20150005 You Are Not Welcome Among Us: Pirates and the State JESSICA L. BEYER University of Washington, USA FENWICK MCKELVEY1 Concordia University, Canada In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks Introduction Digital piracy is most frequently framed as a challenge to property rights or as theft. This framing is not incorrect, but it overemphasizes intellectual property regimes and, in doing so, underemphasizes the broader political challenge posed by digital pirates. In fact, digital pirates and broader “hacker culture” are part of a political challenge to the state, as well as a challenge to property rights regimes. This challenge is articulated in terms of contributory culture, in contrast to the commodification and enclosures of capitalist culture; as nonhierarchical, in contrast to the strict hierarchies of the modern state; and as faith in the potential of a seemingly uncontrollable communication technology that makes all of this possible, in contrast to a fear of the potential chaos that unsurveilled spaces can bring.
    [Show full text]
  • Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver
    2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver ∗ † ‡ ∗ Florian Adamsky , Syed Ali Khayam , Rudolf Jäger , Muttukrishnan Rajarajan ∗ City University London, United Kingdom Email: {Florian.Adamsky.1, R.Muttukrishnan}@city.ac.uk † National University of Sciences and Technology, Pakistan Email: [email protected] ‡ Technische Hochschule Mittelhessen University of Applied Sciences, Germany Email: [email protected] Abstract—BitTorrent is the most widely used Peer- This approach is inflexible and often leaves big head to-Peer (P2P) protocol and it comprises the largest room which is unused. A better approach is to use share of traffic in Europe. To make BitTorrent more a separate transport protocol for background traffic Internet Service Provider (ISP) friendly, BitTorrent Inc. like TCP-LP [1] or TCP-Nice [2]. These protocols can invented the Micro Transport Protocol (uTP). It is based detect foreground traffic and automatically reduce their on UDP with a novel congestion control called Low Extra Delay Background Transport (LEDBAT). This sending rate. With uTP using LEDBAT there is a new protocol assumes that the receiver always gives correct kid on the block. feedback, since otherwise this deteriorates throughput or In December 2008, BitTorrent announced in the yields to corrupted data. We show through experimental developer forum that μTorrent will switch the data investigation that a misbehaving uTP receiver, which transfer from TCP to UDP [3]. Shortly after that is not interested in data integrity, can increase the announcement, panic started spreading all over the bandwidth of the sender by up to five times.
    [Show full text]
  • Comment Submitted by Ben Jones, Torrentfreak
    Comments submitted to FTC DRM Town Hall – Comment, Project No. P094502 February 2009 Page 1/5 TorrentFreak.com DRM Town Hall – Comment, Project No. P094502 Summary The intent of Digital Rights Management (or DRM) is for the originator of the work, to attempt to control the ways in which the work can be used, after sale or license. Most often, these take the form of copy restrictions, but can include restrictions in other ways. Ultimately, DRM is an all-or-none measure, that seeks to control, without reference to context. A backup copy is allowed in many jurisdictions, while copying for the purposes of copyright infringement is not. However, both will be restricted by DRM. Many audio disc copy protection systems (which are DRM) utilise bad sectors to cause faults when copying is attempted, but which can also regular playback in some devices. Other methods might include using computer autoplay systems to install software to prevent copying, but which can leave systems vulnerable to malicious code. It is thus gratifying that the Federal Trade Commission sees fit to consider the impact on consumers of DRM, and we welcome the opportunity to highlight, for the commission, our experiences of DRM, and it's impact on consumers. We have split this response by category of media, to reflect the differing methods and approaches used in each sector of industry. Films Standard DVDs contain two forms of DRM; region coding, and Content Scrambling System (CSS). The former is used to limit the geographical regions where such discs can be played, the latter attempts to prevent copying.
    [Show full text]
  • Master's Thesis
    MASTER'S THESIS Analysis of UDP-based Reliable Transport using Network Emulation Andreas Vernersson 2015 Master of Science in Engineering Technology Computer Science and Engineering Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Abstract The TCP protocol is the foundation of the Internet of yesterday and today. In most cases it simply works and is both robust and versatile. However, in recent years there has been a renewed interest in building new reliable transport protocols based on UDP to handle certain problems and situations better, such as head-of-line blocking and IP address changes. The first part of the thesis starts with a study of a few existing reliable UDP-based transport protocols, SCTP which can also be used natively on IP, QUIC and uTP, to see what they can offer and how they work, in terms of features and underlying mechanisms. The second part consists of performance and congestion tests of QUIC and uTP imple- mentations. The emulation framework Mininet was used to perform these tests using controllable network properties. While easy to get started with, a number of issues were found in Mininet that had to be resolved to improve the accuracy of emulation. The tests of QUIC have shown performance improvements since a similar test in 2013 by Connectify, while new tests have identified specific areas that might require further analysis such as QUIC’s fairness to TCP and performance impact of delay jitter. The tests of two different uTP implementations have shown that they are very similar, but also a few differences such as slow-start growth and back-off handling.
    [Show full text]
  • Case 1:14-Cv-00810-LY Document 116 Filed 03/05/21 Page 1 of 15
    Case 1:14-cv-00810-LY Document 116 Filed 03/05/21 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS AUSTIN DIVISION VIA VADIS, LLC and § § AC TECHNOLOGIES, S.A., § § Case No. 1:14-cv-810-LY Plaintiffs, § § v. § JURY TRIAL DEMAND § BLIZZARD § ENTERTAINMENT, INC, § § Defendant. SECOND AMENDED COMPLAINT FOR PATENT INFRINGEMENT Plaintiffs Via Vadis (“Via Vadis”) and AC Technologies, S.A. (“AC Tech,” collectively, “Plaintiffs”), by and through their attorneys, respectfully file this Second Amended Complaint for patent infringement against Blizzard Entertainment, Inc. (“Blizzard”) and in support thereof state: I. INTRODUCTION 1. This is a claim for patent infringement arising under the patent laws of the United States, Title 35 of the United States Code. Plaintiff AC Tech is the owner and Plaintiff Via Vadis is the exclusive U.S. licensee, respectively, of the Asserted Patent (defined below), which relate to an improved data access and management system. In particular, systems operating pursuant to the Asserted Patent store data in a redundant manner in multiple data storage devices depending on pre-specified parameters of the measured data transmission between those data storage devices and computer units. These computer units further access one or more of these data storage devices to access and use such data as a function of those determined pre-specified parameters. Further, the data storage devices process the stored data independently from any access or direction of the computer units. These computer units shift redundantly stored data. In this manner, data can be 1 Case 1:14-cv-00810-LY Document 116 Filed 03/05/21 Page 2 of 15 processed in a decentralized manner whereby increased data integrity and an increased fault tolerance, as well as relief of individual system components, is achieved.
    [Show full text]
  • Piratebrowser Artifacts
    PirateBrowser Artifacts Written by Chris Antonovich Researched by Olivia Hatalsky 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu Published Date Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents Introduction ............................................................................................................................................................................. 2 Background: ........................................................................................................................................................................ 2 Purpose and Scope: ............................................................................................................................................................
    [Show full text]
  • Notes the Fate of Bittorrent John Does
    Ren_18 (S. Alessi) (Do Not Delete) 5/24/2013 4:36 PM Notes The Fate of BitTorrent John Does: A Civil Procedure Analysis of Copyright Litigation Patience Ren* Copyright owners can trace online violations to an infringer’s Internet protocol address but cannot identify her unless they obtain court approval to serve a subpoena on an Internet service provider. As the most popular peer-to-peer file-sharing protocol today, BitTorrent requires users to share files with each other in a conspiracy-like fashion. By arguing that this feature imparts a “same transaction” character to BitTorrent infringement activities, a copyright owner can seek to join multitudes of Internet protocol addresses as John Doe defendants in an application for early discovery. Courts are divided as to whether early discovery should be granted where tens, hundreds, or sometimes thousands of Internet protocol addresses are joined together in one case. Many in the Internet user community fault copyright owners for using the courts as a mere instrument to seek identification information en masse as part of a coercive practice to induce monetary settlements. This Note examines how case law relating to early discovery and civil procedure joinder rules applies to multiple defendants allegedly participating in a “same transaction” that occurs solely within the inner workings of a file-sharing protocol. Even if BitTorrent usage legally supports joinder, this Note highlights the difficult balance between the right to enforce a copyright and the rights of Internet users to be free from litigation threats. Without a legislative response that is resilient in the face of an ever-changing technology, copyright infringement problems will continue to inundate our courts.
    [Show full text]
  • Pirate Bay Download Torrent File No Magnet Pirate Bay Download Torrent File No Magnet
    pirate bay download torrent file no magnet Pirate bay download torrent file no magnet. Last Updated: 22 May, 2021, EST. Benefits and Disadvantages of Pirate Bay. For those who love to use Pirate Bay, the filesharing website is a modern-day, digital Robinhood. Pirate Bay is a network of users who provide and benefit from the free exchange of information, media, and digital goods. Therefore, the site bypasses the money-hungry hierarchy of otherwise powerful media companies and distributors. However, to those who are against it, Pirate Bay is infamous, and with infamy, there comes a certain degree of risk. Here are the benefits and disadvantages of Pirate Bay: Access a growing collection of magnet links on Pirate Bay website. Don’t miss out! Benefits of Pirate Bay. Free: One of the most noticeable benefits of Pirate Bay is that the content is free. Content can be downloaded and used at your leisure without even having to provide a credit card number. (Who doesn’t like free, right?) No Restrictions: Click to bypass restrictions on thepiratebay.app. New content available. Another benefit of Pirate Bay is that the information downloaded does not have restrictions or other restraints imposed by the corporation profiting from it. For instance, there are no commercials, ads, or other industrial add-ons that prevent you from just enjoying the downloaded media. Disadvantages of Pirate Bay. Legality: Pirate Bay as a filesharing service is legal. However, downloading much of what is available, copyrighted material, precisely, is illegal. Using Pirate Bay and downloading the newest movie or game is Piracy, which is an offense.
    [Show full text]
  • Problems with Bittorrent Litigation in the United States: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System
    Washington University Global Studies Law Review Volume 13 Issue 1 2014 Problems with BitTorrent Litigation in the United states: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System Violeta Solonova Foreman Washington University in St. Louis, School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_globalstudies Part of the Comparative and Foreign Law Commons, and the Intellectual Property Law Commons Recommended Citation Violeta Solonova Foreman, Problems with BitTorrent Litigation in the United states: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System, 13 WASH. U. GLOBAL STUD. L. REV. 127 (2014), https://openscholarship.wustl.edu/law_globalstudies/vol13/iss1/8 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Global Studies Law Review by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. PROBLEMS WITH BITTORRENT LITIGATION IN THE UNITED STATES: PERSONAL JURISDICTION, JOINDER, EVIDENTIARY ISSUES, AND WHY THE DUTCH HAVE A BETTER SYSTEM INTRODUCTION In 2011, 23.76% of global internet traffic involved downloading or uploading pirated content, with BitTorrent accounting for an estimated 17.9% of all internet traffic.1 In the United States alone, 17.53% of internet traffic consists of illegal downloading.2 Despite many crackdowns, illegal downloading websites continue to thrive,3 and their users include some of their most avid opponents.4 Initially the Recording Industry Association of America (the “RIAA”) took it upon itself to prosecute individuals who 1.
    [Show full text]
  • MPAA: Megaupload Shutdown Was Massive Success
    MPAA: Megaupload Shutdown Was Massive Success Ernesto December 5, 2012 In a filing to the Office of the US Trade Representative the major movie studios describe how successful the shutdown of Megaupload has been. According to the MPAA the file-hosting industry was massively disrupted, with carry-over effects to linking and BitTorrent sites. Nonetheless, the movie group says the work is not done yet and lists The Pirate Bay, Extratorrent, isoHunt, Kat.ph and several other file-hosting and linking sites as remaining threats. Responding to a request from the Office of the US Trade Representative (USTR), the MPAA has submitted a new list of “notorious markets” they believe promote illegal distribution of movies and TV-shows. The document dates back to September but unlike previous years it hasn’t been published in public by the MPAA. TorrentFreak managed to obtain a copy nonetheless, and there are a few things worth highlighting. As one of the main instigators of the Megaupload investigation the MPAA tells the U.S. Government that as a direct result of the takedowns many other “rogue” sites were rendered useless. “This year’s seizures of Megaupload.com and Megavideo.com by the Department of Justice illustrate the extent and impact that hosting hubs have on the online landscape,” MPAA’s Michael O’Leary writes. “When these two websites were taken down, many linking websites, custom search engines, and custom streaming scripts that relied on the sites for content became inoperable. Some websites were abandoned by their operators, others lost traffic, while still others shifted their business model.” More indirectly, the Megaupload shutdown also impacted other file-hosting businesses and their customers.
    [Show full text]
  • A Torrent of Copyright Infringement? Liability for Bittorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law
    A Torrent of Copyright Infringement? Liability for BitTorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law Allen Mendelsohn Faculty of Law McGill University Montreal August 2010 A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Master of Laws (LL.M.) © Allen Mendelsohn 2010 ABSTRACT [Le résumé français suit l'anglais.] BitTorrent has become the primary means to share large files (movies, television shows, and music) over the internet. Canadian copyright law and jurisprudence have not kept pace with technology, and as a result there is no definitive pronouncement on the liability for copyright infringement of BitTorrent file- sharers, i.e. users, and file-sharing facilitators, i.e. Internet Service Providers (ISPs) and torrent search engines. Extrapolating from existing law and Canadian and foreign jurisprudence, I conclude that: (i) BitTorrent file-sharers are liable although there may be situations where fair dealing could apply; (ii) it may be possible to show ISPs are liable based on certain findings of fact; and (iii) torrent search engines should not be liable for infringement. There have been three successive attempts to reform copyright law that have addressed internet issues generally and file-sharing in particular. Under the most recent attempt, Bill C-32, file-sharers would be liable under the new ―making available‖ right, and file- sharing facilitators could be liable under the new ―enabling‖ concept of secondary infringement introduced with the bill. RÉSUMÉ BitTorrent est devenu le principal moyen de partager des fichiers volumineux (films, émissions de télévision et musique) sur Internet.
    [Show full text]