IIPA Reports Bittorrent Sites and Cyberlockers to US Government

Total Page:16

File Type:pdf, Size:1020Kb

IIPA Reports Bittorrent Sites and Cyberlockers to US Government engimax, February 14, 2012 IIPA Reports BitTorrent Sites and Cyberlockers To US Government The IIPA, which counts major entertainment groups such as the MPAA and RIAA among its members, has listed many BitTorrent and cyberlocker services in its latest submission to the USTR. Hong Kong based Megaupload neighbor Filesonic is listed as an “infringing distribution hub” while Pirate Bay, isoHunt, Demonoid and others get notable mentions. The International Intellectual Property Alliance (IIPA) has just published its written submission to the Office of the U.S. Trade Representative listing countries that it believes should be identified in the annual Special 301, the report that details the “adequacy and effectiveness of U.S. trading partners’ protection of intellectual property rights.” The IIPA, which counts the Association of American Publishers, BSA, ESA, Independent Film & Television Alliance, MPAA, National Music Publishers’ Association, and the RIAA among its members, has listed its grievances against a whole host of countries. Unsurprisingly, especially given its members’ focus, the main complaints concern movie, music, video game and software piracy. The complaints about infringement in the digital realm are numerous. From the Priority Watch List, the file-sharing focus falls on Canada, China, Russia and Ukraine. Canada According to the IIPA, Canada is “a haven where technologically sophisticated international piracy organizations can operate with virtual impunity in the online marketplace.” This is due, says the group, due to Canada’s reputation for having “weak, ineffective or non-existent” laws to outlaw infringement. The IIPA notes correctly that Canada plays host to large numbers of BitTorrent sites including perhaps its most famous, isoHunt. The group says that the site has “operated with impunity” for more than 8 years despite being the subject of an injunction issued by a U.S. court. Of course, by definition the U.S. is outside Canadian jurisdiction 1 From torrentfreak.com/iipa-reports-bittorrent-sites-and-cyberlockers-to-us-120214/ 14 February 2012 Other major torrent sites mentioned as having “Canadian connections” include KickAssTorrents and Torrentz.eu. It’s also noted that many French language torrent sites are operated from Quebec. File-sharing related actions IIPA recommends Canada takes in 2012 Establish clear liability and effective remedies against those who operate illicit file-sharing services, or whose actions are otherwise directed to promoting infringement. Enact strong legal incentives for Internet Service Providers to cooperate with copyright owners in combating online piracy, including by limiting the scope of liability safe harbors in accordance with international best practices. China The IIPA lists the main sources of online piracy as music portal sites, P2P services, deep-linking services (aka search engines), forums/blogs and cyberlockers. File-sharing client Xunlei and other services offered by its operators are mentioned several times. Generally the situation in China has improved over the last 12 months with the IIPA noting that major P2P sites have “cleaned up” their pirated content. Illicit streaming services are described as problematic, as is the increase in consumption of illicit content via cellphones. File-sharing related actions IIPA recommends China takes in 2012 The requests are many, but notably include increasing criminal prosecutions for services such as Xunlei and ‘deep-linking’ search engine operators such as Sohu/Sogou. The IIPA is also calling for China to allow foreign rights holder associations to conduct local anti-piracy investigations, and to lower the threshold for infringement to be considered criminal, to include non-profit copying. Russia The IIPA singles out two BitTorrent trackers as especially problematic – RUTracker.org (the renamed torrent.ru) and GameTorrent, a tracker alleged owned by a Russia national but hosted in Estonia. According to the submission, Russia is home to the “world’s two most prolific criminal release groups” who camcord movies in local theaters and upload them to the Internet. The unnamed groups are said to have been responsible for 77 “exceptional quality” camcorded movies in 2011. A streaming video links site listed as offering such movies is the popular Video2k.tv On the free music front, Russia’s Facebook equivalent, vKontakte, is singled out for criticism, despite apparently responding correctly to takedown demands. “While vKontakte will generally takedown specific content when notified, that is an inappropriate enforcement mechanism for a problem of vKontakte’s own making,” the submission states. 2 From torrentfreak.com/iipa-reports-bittorrent-sites-and-cyberlockers-to-us-120214/ 14 February 2012 Sites that charge a nominal amount for music, such as the numerous AllofMP3-type clones, are described as an “important source of piracy” which have grown to more than 30 in number since that site’s demise. File-sharing related actions IIPA recommends Russia takes in 2012 As with China, the requests are numerous but focus on the takedown of unlicensed music streaming services and social networks (i.e vKontakte), MP3 download sites, BitTorrent trackers, and action against site operators even if their servers are outside Russian jurisdiction. IIPA also calls for changes in the law to force greater cooperation from ISPs against infringement. Ukraine Unsurprisingly, Demonoid.me is the focus of the IIPA’s anti-BitTorrent sentiments in Ukraine with claims that the site offers 75,000 movies and 47,000 TV shows for free. Cyberlocker EX.ua, which was raided in January but is now back online, leads the IIPA’s file-hosting complaints. File-sharing related actions IIPA recommends Ukraine takes in 2012 IIPA wants Demonoid and pay-MP3 sites such as MP3Fiesta taken down by the police. Under current Ukraine law, ISPs are not responsible for the actions of their users, a situation that causes rightsholders problems say the group. From the Watch List, the file-sharing focus falls on Italy, Spain and Switzerland. Italy The IIPA reports progress in Italy in recent years, citing the court-ordered ISP blockades of The Pirate Bay and the recently and voluntarily shuttered BTjunkie. Several other file-sharing sites have also been closed but IIPA says that further takedowns are being hindered by authorities not taking infringement seriously enough. The Peppermint Jam case, which resulted in Italy’s Data Protection Authority ruling that monitoring P2P users and collecting their IP addresses is illegal, also causes problems for rightsholders. File-sharing related actions IIPA recommends Italy takes in 2012 Take additional criminal actions against P2P services that meet the criteria for injunctions and liability established in the Pirate Bay decision and order ISPs to block access to those services. Eliminate legal obstacles for rights holders to gather IP address evidence against file-sharers. Spain According to the IIPA, 55% of Spain’s online music piracy takes place via P2P networks such as BitTorrent, eMule and Ares, 34% via hosted websites and 11% via streaming services. 3 From torrentfreak.com/iipa-reports-bittorrent-sites-and-cyberlockers-to-us-120214/ 14 February 2012 The ESA claim that there are around 30 major Spanish websites offering links to illicit copies of video games and bemoans the lack of support from local ISPs in tackling the problem. Nevertheless, since P2P linking sites have been ruled legal in Spain many times before, up to now there has been very little they can do. File-sharing related actions IIPA recommends Spain takes in 2012 IIPA says that P2P really took off in 2007. It’s probably not a coincidence that in 2006 a circular from the Attorney General proclaimed the decriminalization of P2P downloads. No surprise then that IIPA wants this announcement “corrected”. The group also wants the ability for rightsholders to bring civil and criminal actions against infringers by allowing them to obtain identifying information, and the law modified so that so that rights holder-submitted notices of infringement are capable of imparting ISPs with effective knowledge that infringement is occurring through its service without a court order. Switzerland The IIPA criticism of this land-locked country begins with a long-time enemy, the Razorback2 eD2K (eDonkey) indexing system which was subjected to huge raids in 2006 but later recovered. Swiss-based file-hosting giant RapidShare gets a brief mention as host of infringing content, but avoids the aggressive criticism of the past. The main problem for the IIPA appears to concern current law. “Since Switzerland’s copyright law contains a private copy exception with no expressly stated legal source requirement, downloading and streaming from servers operated by pirates outside Swizterland are being portrayed as legal in Switzerland by the press and anti-copyright activists, as long as there is no uploading,” the IIPA states in its report. The IIPA also bemoans the fact that Swiss law allows DRM circumvention which taken together with the private copying exception “would allow individuals to circumvent access or copy control measures in order to copy from illegal sources and share with friends.” File-sharing related actions IIPA recommends Switzerland takes in 2012 The 2010 ‘Logistep ruling‘ meant that collecting IP addresses in Switzerland with the aim of later filing a lawsuit was confirmed to be illegal and that IP addresses are personal data. IIPA would like the Data Protection Act changed to allow pursuit of infringers. From the Special Mention List, the file-sharing focus falls on Hong Kong, former home of the now-defunct MegaUpload. Hong Kong Surprisingly, Megaupload isn’t mentioned at all in the IIPA submission, not even as a copyright enforcement “success story”. The same cannot be said about Filesonic, one of the world’s leading cyberlocker services. 4 From torrentfreak.com/iipa-reports-bittorrent-sites-and-cyberlockers-to-us-120214/ 14 February 2012 Filesonic is among the top 10 file-sharing sites on the Internet, with a quarter billion page views a month. It disabled all 3rd party sharing in the wake of the Megaupload shutdown and actively blocks Hong Kong IP address.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • How Can I Download a Torrent
    how can i download a torrent How To Download Torrent Files From Torrent Sites? Lately, if you have been hanging out with tech-savvy people, then you are bound to hear terms like BitTorrent , Torrenting Websites , and Torrent Clients . The primary reason behind the drastic increment in the popularity of Torrent files is that these files can be used to download Movies , Music , Books , Games , and Software for free. As you might have guessed by the title, this article is dedicated to new torrent users, and it will guide them to download their first torrent file. On the other hand, If you are a veteran reader of Techworm, then this guide won’t reveal any new information for you. However, you can contribute to the community by leaving a comment. What Is A Torrents? In simple terminology, Torrent is a file that stores metadata, and programs like uTorrent can use this meta info to download all sorts of content. A torrent file generally comes with the extension .torrent , and it’s hardly a few KB in size. In many instances, Torrent and BitTorrent are used synonymously. However, they are not the same. In reality, BitTorrent is a peer to peer (P2P) file-sharing protocol that relies on a swarm-like approach for sharing files. A seeder in torrent terminology is a person who is sharing the file; the more seeds, the more potential locations to download the file. While a person who is downloading the seeded file is a leech , if the number of leeches exceeds the number of seeds, it will make the file download slower, as more people are accessing the data at the same time.
    [Show full text]
  • Malware Extorts Cash from Bittorrent Users | Torrentfreak
    Malware Extorts Cash From BitTorrent Users | TorrentFreak http://torrentfreak.com/malware-extort-cash-from-bittorrent-use... TorrentFreak Home Contact About Archives Forum Malware Extorts Cash From BitTorrent Users Written by enigmax on April 11, 2010 A new type of malware is riding the wave of file-sharing pre-settlement letters by infecting BitTorrent users’ machines and then demanding payments in order to make imaginary lawsuits go away. ICPP Foundation try to give the impression they are RIAA and MPAA affiliated but the whole thing is a scam to extort cash and obtain credit card details. ICCP Foundation claims to be an international company operating out of Switzerland. They say they are “committed to promoting the cultural and economic benefits of copyright” while assisting their partners to fight “copyright theft around the world”. In fact what they really do is operate a scam to extort money from BitTorrent users. Right at this moment we are unsure of the exact route of infection, but somehow malware (probably in either fake file or attached virus form) is displaying a “copyright violation alert” on the victim’s screen, locking it, and redirecting users to the ICPP site where they are told they have been caught infringing copyright. There they are warned their offenses could result in 5 years in prison and a $250,000 fine and are given the option to take the (fake) case to court. They are also offered a chance to make the whole thing go away for the payment of a ‘fine’ of around $400. Victims are also prompted to give their name, address and full credit card details – it is unclear how this information is further abused but it doesn’t look good.
    [Show full text]
  • Digital Fountain Erasure-Recovery in Bittorrent
    UNIVERSITÀ DEGLI STUDI DI BERGAMO Facoltà di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S – Sistemi Informatici Digital Fountain Erasure Recovery in BitTorrent: integration and security issues Relatore: Chiar.mo Prof. Stefano Paraboschi Correlatore: Chiar.mo Prof. Andrea Lorenzo Vitali Tesi di Laurea Specialistica Michele BOLOGNA Matricola n. 56108 ANNO ACCADEMICO 2007 / 2008 This thesis has been written, typeset and prepared using LATEX 2". Printed on December 5, 2008. Alla mia famiglia “Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to,” said the Cat. “I don’t much care where —” said Alice. “Then it doesn’t matter which way you go,” said the Cat. “— so long as I get somewhere,” Alice added as an explanation. “Oh, you’re sure to do that,” said the Cat, “if you only walk enough.” Lewis Carroll Alice in Wonderland Acknowledgments (in Italian) Ci sono molte persone che mi hanno aiutato durante lo svolgimento di questo lavoro. Il primo ringraziamento va ai proff. Stefano Paraboschi e Andrea Vitali per la disponibilità, la competenza, i consigli, la pazienza e l’aiuto tecnico che mi hanno saputo dare. Grazie di avermi dato la maggior parte delle idee che sono poi confluite nella mia tesi. Un sentito ringraziamento anche a Andrea Rota e Ruben Villa per l’aiuto e i chiarimenti che mi hanno gentilmente fornito. Vorrei ringraziare STMicroelectronics, ed in particolare il gruppo Advanced System Technology, per avermi offerto le infrastrutture, gli spa- zi e tutto il necessario per svolgere al meglio il mio periodo di tirocinio.
    [Show full text]
  • Piratez Are Just Disgruntled Consumers Reach Global Theaters That They Overlap the Domestic USA Blu-Ray Release
    Moviegoers - or perhaps more accurately, lovers of cinema - are frustrated. Their frustrations begin with the discrepancies in film release strategies and timing. For example, audiences that saw Quentin Tarantino’s1 2 Django Unchained in the United States enjoyed its opening on Christmas day 2012; however, in Europe and other markets, viewers could not pay to see the movie until after the 17th of January 2013. Three weeks may not seem like a lot, but some movies can take months to reach an international audience. Some take so long to Piratez Are Just Disgruntled Consumers reach global theaters that they overlap the domestic USA Blu-Ray release. This delay can seem like an eternity for ultiscreen is at the top of the entertainment a desperate fan. This frustrated enthusiasm, combined industry’s agenda for delivering digital video. This with a lack of timely availability, leads to the feeling of M is discussed in the context of four main screens: being treated as a second class citizen - and may lead TVs, PCs, tablets and mobile phones. The premise being the over-anxious fan to engage in piracy. that multiscreen enables portability, usability and flexibility for consumers. But, there is a fifth screen which There has been some evolution in this practice, with is often overlooked – the cornerstone of the certain films being released simultaneously to a domestic and global audience. For example, Avatar3 was released entertainment industry - cinema. This digital video th th ecosystem is not complete without including cinema, and in theaters on the 10 and 17 of December in most it certainly should be part of the multiscreen discussion.
    [Show full text]
  • From Sony to SOPA: the Technology-Content Divide
    From Sony to SOPA: The Technology-Content Divide The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem, From Sony to SOPA: The Technology-Content Divide, Harvard Law School Case Studies (2013). Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:11029496 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP http://casestudies.law.harvard.edu By John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem February 23, 2013 From Sony to SOPA: The Technology-Content Divide Background Note Copyright © 2013 Harvard University. No part of this publication may be reproduced, stored in a retrieval system, used in a spreadsheet, or transmitted in any form or by any means – electronic, mechanical, photocopying, recording, or otherwise – without permission. "There was a time when lawyers were on one side or the other of the technology content divide. Now, the issues are increasingly less black-and-white and more shades of gray. You have competing issues for which good lawyers provide insights on either side." — Laurence Pulgram, partner, Fenwick & Westi Since the invention of the printing press, there has been tension between copyright holders, who seek control over and monetary gain from their creations, and technology builders, who want to invent without worrying how others might use that invention to infringe copyrights.
    [Show full text]
  • You Are Not Welcome Among Us: Pirates and the State
    International Journal of Communication 9(2015), 890–908 1932–8036/20150005 You Are Not Welcome Among Us: Pirates and the State JESSICA L. BEYER University of Washington, USA FENWICK MCKELVEY1 Concordia University, Canada In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks Introduction Digital piracy is most frequently framed as a challenge to property rights or as theft. This framing is not incorrect, but it overemphasizes intellectual property regimes and, in doing so, underemphasizes the broader political challenge posed by digital pirates. In fact, digital pirates and broader “hacker culture” are part of a political challenge to the state, as well as a challenge to property rights regimes. This challenge is articulated in terms of contributory culture, in contrast to the commodification and enclosures of capitalist culture; as nonhierarchical, in contrast to the strict hierarchies of the modern state; and as faith in the potential of a seemingly uncontrollable communication technology that makes all of this possible, in contrast to a fear of the potential chaos that unsurveilled spaces can bring.
    [Show full text]
  • Torrent Download Audio Tv Torrent Downloads Proxy – Best Torrent Downloads Unblocked Alternative | Mirror Sites
    torrent download audio tv Torrent Downloads Proxy – Best Torrent Downloads Unblocked Alternative | Mirror Sites. We all know that the torrent sites banned over the last few days and users are facing problems like browser bans, ISP bans across the country. At present, the site is banned in the UK, India and so many countries because of court orders. Luckily, Torrent downloads professional staff and different torrent lovers are offering Torrent downloads proxy and mirror sites for us with newest proxies. These websites will have the same records, appearance, and functions just like the original one. Torrent Downloads: Torrent Downloads is one of the popular torrent sites which come in the list of top 10. This site is providing you the latest TV shows, Movies, Music, Games, Software, Anime, Books and so on for many years. The content of this site is very unique where you will get the latest movies, software within a few minutes. That’s why many of the users are still visit this site on a daily basis to download for free of cost. Torrent Downloads Proxy and Mirrors list: These Torrent Downloads Proxy/Mirror sites are used in such countries where it is not banned yet. So, If you couldn’t get right of entry to Torrent Downloads, with the assist of Torrent Downloads proxy/mirror websites , you’ll usually be able to get right of entry to your favorite torrent website, Torrent Downloads. Your Internet Service Provider and Government can track your browsing Activity! So, hide your IP Address with a VPN! Torrent Downloads Proxy/Mirror Sites: https://freeproxy.io/ https://sitenable.top/ https://sitenable.ch/ https://filesdownloader.com/ https://sitenable.pw/ https://sitenable.co/ https://torrentdownloads.unblockall.org/ https://torrentdownloads.unblocker.cc/ https://torrentdownloads.unblocker.win/ https://torrentdownloads.immunicity.cab/ How to Download Torrent Downloads Movies securely? Using torrents is illegal in some countries.
    [Show full text]
  • United States Court of Appeals for the Ninth Circuit
    Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 1 of 114 Docket No. 10-55946 In the United States Court of Appeals for the Ninth Circuit COLUMBIA PICTURES INDUSTRIES, INC., DISNEY ENTERPRISES, INC., PARAMOUNT PICTURES CORPORATION, TRISTAR PICTURES, INC., TWENTIETH CENTURY FOX FILM CORPORATION, UNIVERSAL CITY STUDIOS LLLP, UNIVERSAL CITY STUDIOS PRODUCTIONS, LLLP and WARNER BROS. ENTERTAINMENT, INC., Plaintiffs-Appellees, v. GARY FUNG and ISOHUNT WEB TECHNOLOGIES, INC., Defendants-Appellants. _______________________________________ Appeal from a Decision of the United States District Court for the Central District of California, No. 06-CV-05578 · Honorable Stephen V. Wilson PETITION FOR PANEL REHEARING AND REHEARING EN BANC BY APPELLANTS GARY FUNG AND ISOHUNT WEB TECHNOLOGIES, INC. IRA P. ROTHKEN, ESQ. ROBERT L. KOVSKY, ESQ. JARED R. SMITH, ESQ. ROTHKEN LAW FIRM 3 Hamilton Landing, Suite 280 Novato, California 94949 (415) 924-4250 Telephone (415) 924-2905 Facsimile Attorneys for Appellants, Gary Fung and isoHunt Web Technologies, Inc. COUNSEL PRESS · (800) 3-APPEAL PRINTED ON RECYCLED PAPER Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 2 of 114 TABLE OF CONTENTS page Index of Authorities ..….....….....….....….....….....….....….....….....…....…... ii I. The Panel Decision Applies Erroneous Legal Standards to Find ..…... 1 Fung Liable on Disputed Facts and to Deny Him a Trial by Jury II. The Panel Decision and the District Court Opinion Combine to ……... 5 Punish Speech that Should Be Protected by the First Amendment III. The Panel Decision Expands the Grokster Rule in Multiple Ways ….. 7 that Threaten the Future of Technological Innovation A. The “Technological Background” set forth in the Panel ……….
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Torrentfreak
    TorrentFreak • Home • About • Archives • Categories ○ Anti-Piracy ○ Bittorrent Software ○ Breaking News ○ Copyright Issues ○ Legal Issues ○ Opinion ○ Pirate Talk ○ Politics and Ideology ○ Torrent Sites ○ Tutorial & How To • News Bits • Contact The place where breaking news, BitTorrent and copyright collide • Subscribe via RSS • Subscribe via Email • Tip Us Off! Top of Form Search TorrentFreak Search Bottom of Form BitTorrent: Bypass any Firewall or Throttling ISP with SSH • Ernesto • 14/10/2007 • 190 • bittorrent , firewall, ssh, ssh-tunnel, throttling • Print • On some networks it’s impossible to use BitTorrent. For example, if you’re at work, school, or connected to Comcast or a public hotspot. But there’s an easy solution to overcome this problem. By using a secure connection (SSH), you can bypass almost every firewall or traffic shaping application. Here’s a relatively simple 3-step guide that will show you how to set it up. I wouldn’t recommend BitTorrent over SSH as a permanent solution since it will cripple the servers of the SSH providers. If you’re looking for a long term solution check out a VPN service such as BTGuard. 1. Get an SSH account. You need an SSH account in order to get this working. You can try one of these free shell providers from this list. 2. Download, Install and Configure Putty Download Putty, store it somewhere on your computer and run it. In the session screen enter the host name, the port number (22), and tick the connection type box (SSH). Next, go to SSH –> Tunnels, enter a source port and tick the dynamic box.
    [Show full text]
  • Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver
    2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver ∗ † ‡ ∗ Florian Adamsky , Syed Ali Khayam , Rudolf Jäger , Muttukrishnan Rajarajan ∗ City University London, United Kingdom Email: {Florian.Adamsky.1, R.Muttukrishnan}@city.ac.uk † National University of Sciences and Technology, Pakistan Email: [email protected] ‡ Technische Hochschule Mittelhessen University of Applied Sciences, Germany Email: [email protected] Abstract—BitTorrent is the most widely used Peer- This approach is inflexible and often leaves big head to-Peer (P2P) protocol and it comprises the largest room which is unused. A better approach is to use share of traffic in Europe. To make BitTorrent more a separate transport protocol for background traffic Internet Service Provider (ISP) friendly, BitTorrent Inc. like TCP-LP [1] or TCP-Nice [2]. These protocols can invented the Micro Transport Protocol (uTP). It is based detect foreground traffic and automatically reduce their on UDP with a novel congestion control called Low Extra Delay Background Transport (LEDBAT). This sending rate. With uTP using LEDBAT there is a new protocol assumes that the receiver always gives correct kid on the block. feedback, since otherwise this deteriorates throughput or In December 2008, BitTorrent announced in the yields to corrupted data. We show through experimental developer forum that μTorrent will switch the data investigation that a misbehaving uTP receiver, which transfer from TCP to UDP [3]. Shortly after that is not interested in data integrity, can increase the announcement, panic started spreading all over the bandwidth of the sender by up to five times.
    [Show full text]