Filesharing Und Abmahnwesen

Total Page:16

File Type:pdf, Size:1020Kb

Filesharing Und Abmahnwesen Filesharing und Abmahnwesen Inaugural-Dissertation zur Erlangung der Doktorwürde der Hohen Juristischen Fakultät der Ludwig-Maximilians-Universität zu München vorgelegt von Lars-Oliver Eggersdorfer 2021 Referentin: Prof. Dr. Dr. h.c. Annette Kur Korreferent: Prof. Dr. Matthias Leistner Tag der mündlichen Prüfung: 26. Oktober 2020 Vorwort Die vorliegende Arbeit wurde von November 2016 bis Juli 2019 am Max- Planck-Institut für Innovation und Wettbewerb angefertigt. Die rechtlichen und tatsächlichen Entwicklungen bis einschließlich März 2021 wurden be- rücksichtigt. Ein eigenständig entwickeltes Thema eines extern Promovierenden stellt für eine Betreuerin stets ein großes Wagnis dar. Besonderer Dank gilt daher mei- ner Doktormutter Frau Professorin Annette Kur, die sich hierauf eingelassen hat und mir mit Ratschlägen und weiterführenden Hinweisen zur Seite stand. Herrn Professor Matthias Leistner danke ich für die Anfertigung des Zweit- gutachtens sowie die darin enthaltenen Impulse für die Veröfentlichung, Herrn Professor Ansgar Ohly für die Abnahme der mündlichen Prüfung. Weiterhin bedanke ich mich bei Herrn Professor Clement Petersen und Herrn Rechtsanwalt Pauli Sortti für die Erläuterungen zur Rechtslage in Dänemark bzw. Finnland. Caterina Schürch verdanke ich den letzten Schlif bei der Setzung der Arbeit in Latex. Meiner Frau Cora Stuhrmann für alles zu danken, würde den Rahmen des Vorworts sprengen. Ich beschränke mich daher auf Ihren Beitrag zur formalen Fertigstellung und Einreichung. Ihr und unserer Tochter Mathilda ist die vorliegende Arbeit gewidmet. Lars Eggersdorfer München, den 30. Juni 2021 Inhaltsübersicht § 1 Technische Vorfragen . 13 § 2 Die Behandlung des flesharing in der Praxis der Rechtspre- chung und der Gesetzgebung . 101 § 3 Das sogennante Abmahnwesen . 171 § 4 Dogmatische Bewertung der gegenwärtigen Rechtslage . 257 § 5 Möglichkeiten de lege lata und Alternativen de lege ferenda . 443 Inhaltsverzeichnis Inhaltsübersicht ............................V Abkürzungsverzeichnis ........................ 1 Einleitung ................................ 7 Überblick und Gang der Darstellung . 11 § 1 Technische Vorfragen ..................... 13 I. Zum Begrif flesharing ................... 13 1. Einleitung . 13 2. Erste Eingrenzung auf das Internet als Übermitt- lungsmedium . 13 3. Zweite Eingrenzung auf die unmittelbare Datei- übermittlung von Endnutzer zu Endnutzer . 15 a) Die Strukturierung der Internetprotokolle . 15 aa) Die Netzzugangsschicht . 15 bb) Die Internetzwerkschicht . 18 cc) Die Transportschicht . 19 dd) Die Anwendungsschicht . 21 b) Dateiübertragung auf Ebene der Anwendungsschicht 22 4. Dritte und letzte Eingrenzung auf das peer-to-peer flesharing ........................ 24 5. Abschließende Defnition des Begrifs flesharing . 26 6. Zu den verschiedenen Begrifichkeiten . 26 II. Unterschiede zwischen verschiedenen flesharing-Systemen 26 1. Einleitung . 26 2. Unterschiede bei der Verbindungsherstellung . 28 VIII Inhaltsverzeichnis 3. Unterschiede bei der Dateiübertragung . 28 4. Beispiele für flesharing-Systeme . 29 a) Napster . 29 b) Gnutella . 30 c) FastTrack . 31 d) eDonkey . 33 e) Kad . 35 f) Zusammenfassung . 36 5. Besonderheiten des BitTorrent-Systems . 38 a) Modi der Verbindungsherstellung . 39 aa) .torrent-Dateien und Tracker . 39 bb) DHT . 40 cc) magnet links ................... 41 dd) PEX . 42 ee) Zusammenfassung . 42 b) Modus der Dateiübertragung . 43 c) Private Börsen . 46 6. Zusammenfassung . 49 III. Anwendungsfelder des flesharing . 49 IV. Die Ermittlung von Teilnehmern in einem flesharing- System . 51 1. Einleitung . 51 2. Die IP-Adresse . 52 a) IPv4 . 52 b) IPv6 . 53 c) Zusammenfassung . 55 3. Arten des Betriebs eines WLAN . 55 4. Die Ermittlung der IP-Adresse in einem flesharing- System . 57 5. Der Rückschluss aus der IP-Adresse auf den Inhaber eines Internetanschlusses . 58 a) IPv4 . 58 b) IPv6 . 59 c) Reseller . 59 d) Carrier-grade NAT . 60 6. Anonyme und anonymisierende Dienste . 61 Inhaltsverzeichnis IX a) Anonyme Dienste . 61 b) Anonymisierende Dienste . 61 aa) VPN . 62 bb) seedbox ...................... 62 cc) Tor-Netzwerk . 63 dd) IP-Blocker . 63 7. Fehler und Defzite bei der Ermittlung . 64 a) Annahme der Zuverlässigkeit der Ermittlung . 64 b) Annahme der aktiven Ermittlung . 66 c) Technischer Beweiswert der Ermittlung . 67 aa) Schwierigkeiten der Rekonstruierbarkeit ei- ner flesharing-Aktivität . 67 bb) Wechsel bzw. Neuvergabe der IP-Adresse . 68 cc) Missbräuchliche Verwendung der IP-Adresse . 68 dd) Fehlende Informationen in den Ermittlungs- ergebnissen . 69 ee) Zusammenfassung . 70 V. Überwachung und Prävention von flesharing-Nutzung . 71 1. Übersicht . 71 a) Überwachung . 71 b) Prävention . 71 aa) IP-Sperren . 72 bb) Port-Sperren . 73 cc) DNS-Sperren . 76 dd) URL-Sperren . 80 ee) Trafc-Drosselung/Datenmengenbegrenzung . 82 2. Möglichkeiten des Anschlussinhabers . 84 a) Möglichkeiten der Überwachung . 84 b) Möglichkeiten der Prävention . 85 3. Möglichkeiten des ISP . 87 4. Möglichkeiten anderer Akteure . 87 a) ICANN und RIRs . 87 b) Alternative DNS-Resolver . 88 c) Registries, Registrare und subsidiäre Nameserver . 88 d) .onion-Domains und Tor-Proxies . 91 e) Suchmaschinen und sonstige Suchhilfen . 92 X Inhaltsverzeichnis f) Hostserver . 93 g) Umgehungshilfen bei DNS-Sperren und Dekon- nektierungen von Domains . 94 h) TLS-Zertifzierungsstellen . 94 i) Routerseitige blacklists . 95 j) Protokoll-Ebene und Client-Ebene . 96 k) Peer-Ebene . 98 l) Zahlungsdienste und Werbetreibende . 99 5. Zusammenfassung . 99 § 2 Die Behandlung des flesharing in der Praxis der Rechtsprechung und der Gesetzgebung . 101 I. Einleitung . 101 II. Die Entwicklung von 2000 bis 2008 . 103 III. Das Gesetz zur Verbesserung der Durchsetzung von Rechten des geistigen Eigentums . 107 1. Der zivilrechtliche Auskunftsanspruch . 107 a) Die Enforcement-Richtlinie . 107 b) Die Umsetzung der EnforcementRL in § 101 Ur- hG n.F. 109 c) Zum Erfordernis eines „gewerblichen Ausmaßes“ . 111 d) Die Auskunft in Reseller-Konstellationen . 113 e) Die Sicherung des Auskunftsanspruchs . 114 f) Die Sicherung des Auskunftsanspruchs bei CG- NAT und dem IPv6-Standard . 118 g) Kosten der Sicherung des Auskunftsanspruches und des Auskunftsverfahrens . 119 2. Begrenzung der Abmahngebühren . 121 3. Dreifache Schadensberechnung . 122 4. Zusammenfassung . 122 IV. BGH - „Sommer unseres Lebens“, „Morpheus“, „BearShare“ 123 1. „Sommer unseres Lebens“ . 123 2. „Morpheus“ . 125 3. „BearShare“ . 127 V. Das Gesetz gegen unseriöse Geschäftspraktiken . 128 VI. BGH - Tauschbörse I - III . 130 Inhaltsverzeichnis XI 1. „Tauschbörse I“ . 130 2. „Tauschbörse II“ . 134 3. „Tauschbörse III“ . 135 VII. Sechsmal BGH . 137 1. Tauschbörse IV - VII . 138 2. „Tauschbörse VIII / Every time we touch“ . 139 3. „Tauschbörse IX / Silver Linings Playbook“ . 140 VIII. Zweites Gesetz zur Änderung des Telemediengesetzes . 141 IX. EuGH - „McFadden“ . 144 X. Drittes Gesetz zur Änderung des Telemediengesetzes . 147 XI. Weitere Rechtsprechung des BGH . 149 1. „Afterlife“ und das Vorlageverfahren „Bastei Lübbe“ . 149 2. „WLAN-Schlüssel“ . 152 3. „Loud“ . 154 4. „Ego-Shooter-Spiel“ . 156 5. „Konferenz der Tiere“ . 157 6. „Dead Island“ . 160 7. „Riptide“ . 161 8. „Saints Row“ und I ZB 38/20 . 162 XII. Zusammenfassung und Ausblick . 164 1. Zusammenfassung . 164 2. Ausblick . 166 § 3 Das sogennante Abmahnwesen . 171 I. Einleitung . 171 II. Empirie zum Umfang von flesharing . 173 1. BitTorrent-Datenverkehr . 173 2. BitTorrent-Nutzer . 174 3. Urheberrechtsverletzende Nutzung von BitTorrent . 175 4. Ergebnis . 176 5. Vergleich mit Streaming und Sharehosting . 176 III. „Piraterie“ als Politikum . 176 IV. Das Vorgehen gegen Endnutzer im Konzert der Urhe- berrechtsdurchsetzung im Internet . 180 1. Einleitung . 180 2. Zum Vorgehen gegen Endnutzer von Streaming-Diensten 184 XII Inhaltsverzeichnis 3. Zum Vorgehen gegen Endnutzer von Sharehosting- Diensten . 185 4. Ergebnis . 187 V. Empirie zum Vorgehen gegen flesharing-Endnutzer . 187 1. Einleitung . 187 2. Zur Menge an Abmahnungen . 187 3. Zu den von Abmahnungen Betrofenen . 190 4. Zu den typischen Streitgegenständen der Abmahnungen 191 5. Zu den abmahnenden Kanzleien . 192 6. Zum typischen Inhalt von Abmahnungen . 192 7. Zur Menge an gerichtlichen Verfahren . 195 VI. Hintergründe zum Vorgehen gegen flesharing-Endnutzer 196 VII. Rechtliche Säulen des Vorgehens gegen flesharing- Endnutzer . 201 VIII. Rechtspolitische Kritikpunkte am Vorgehen gegen fles- haring-Endnutzer . 202 IX. Rechtfertigung des Vorgehens gegen flesharing-Endnutzer? 207 1. Ökonomische Folgen des flesharing . 208 2. Auswirkungen des Vorgehens gegen flesharing- Endnutzer . 213 3. Ergebnis . ..
Recommended publications
  • The Magnificent Seven
    The Magnificent Seven A closer look at functional attributes of blockchain platforms The Magnificent Seven1 Following a whitepaper published in late 2008, the Bitcoin system came into being in 2009, and the underlying technology became what we refer to as Blockchain today. 1 The top seven cryptocurrencies covered a good variety of attributes that are essential to gain a more thorough understanding of the potentials offered by this new technology. The Magnificent Seven 1 Since then, a variety of different cryptocurrency platforms have been created, and based on data from CoinMarketCap (https://coinmarketcap.com/), as of 27 March 2021, there were 8,964 crypto tokens in existence, with a total Market Cap of over USD$1.6 Trillion. The top seven cryptocurrencies made up around 80% of the global market capitalisation: Market Cap Token Symbol (billion USD) % Bitcoin BTC 1,026.8 59.23 Ethereum ETH 0,196.2 11.32 Cardano ADA 0,040.2 02.32 Binance Coin BNB 0,039.1 02.25 Tether USDT 0,038.5 02.22 Polkadot DOT 0,030.4 01.75 XRP XRP 0,025.8 01.49 80.58 Rest of 8,957 tokens 19.42 Bitcoin alone represents nearly 60% of the total cryptocurrency value, with Ethereum being the second highest by value. However, these cryptocurrencies are not in fact the same: value aside, they differ in some interesting ways, which in turn affect their “function” and value proposition. Asset Smart Token Year Type Minable Consensus2 Limit Backed Contract BTC 2009 Native Yes POW No 21m ETH 2012 ERC-20 Yes / No3 POW | POS No Y none ADA 2017 Native No POS No Y 45bn BNB 2017 ERC-20 No Tendermint No 100m Multiple Forms: USDT-Omni, USDT 2014 USDT-TRON, No NA USD none USDT-ERC20 and USDT-EOS DOT 2017 Native NPOS No Y none Ripple XRP 2012 Native No Transaction No 100bn Protocol Source: https://icorating.com/ and https://coincodex.com/ 2 In simple terms, consensus mechanism is a means of authenticating and validating transactions on a Blockchain (or distributed ledger) without having to trust or rely on a central authority.
    [Show full text]
  • Vysoké Učení Technické V Brně Detekcia Seedboxov V Sieti Bittorrent
    VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ FACULTY OF INFORMATION TECHNOLOGY ÚSTAV INFORMAČNÍCH SYSTÉMŮ DEPARTMENT OF INFORMATION SYSTEMS DETEKCIA SEEDBOXOV V SIETI BITTORRENT DETECTION OF SEEDBOXES INBITTORRENT NETWORK BAKALÁŘSKÁ PRÁCE BACHELOR’S THESIS AUTOR PRÁCE MARTIN GRNÁČ AUTHOR VEDOUCÍ PRÁCE Ing. LIBOR POLČÁK, Ph.D. SUPERVISOR BRNO 2018 Abstrakt Bakalárska práca sa venuje problematike sledovania a detekcie seedboxov v sieti BitTorrent za pomoci technológie netflow. V teoretickej časti je predstavená a popísaná architektúra P2P, základy a kľúčové pojmy architektúry BitTorrent a teoretická definícia seedboxu. Taktiež sú tu rozobrané metódy pomocou ktorých sa dá detekovať sieťová komunikácia a ďalej je uvedená analýza seedboxov v sieti a hľadanie ich charakteristík. Na základe týchto znalostí a sledovaní je navrhnutá sada nástrojov, ktoré napomáhajú ich detekcií. V praktickej časti je predstavená implementácia týchto nástrojov a výsledky ich testovania. Abstract Bachelor’s thesis is focused on issues with monitoring and detection of seedboxes in Bit- Torrent network with help of netflow technology. In the theoretical part of this thesis is introduced and described P2P architecture, basics and key terms of BitTorrent architec- ture and theoretical definition of seedbox. There are also described specific methods which can be used for detection of network communication and next there is described process of seedbox analysis in network and process of finding its characteristics. On base of this kno- wledge and observations is designed a set of tools,which help with detection of seedboxes. In the practical part of this work is presented implementation of these tools and results of testing these tools. Kľúčové slová BitTorrent, seedbox, detekcia, netflow, analýza, sieťová prevádzka, P2P, netflow Keywords BitTorrent, seedbox, detection, netflow, analysis, network traffic, P2P, netflow Citácia GRNÁČ, Martin.
    [Show full text]
  • Cryptocurrency: the Economics of Money and Selected Policy Issues
    Cryptocurrency: The Economics of Money and Selected Policy Issues Updated April 9, 2020 Congressional Research Service https://crsreports.congress.gov R45427 SUMMARY R45427 Cryptocurrency: The Economics of Money and April 9, 2020 Selected Policy Issues David W. Perkins Cryptocurrencies are digital money in electronic payment systems that generally do not require Specialist in government backing or the involvement of an intermediary, such as a bank. Instead, users of the Macroeconomic Policy system validate payments using certain protocols. Since the 2008 invention of the first cryptocurrency, Bitcoin, cryptocurrencies have proliferated. In recent years, they experienced a rapid increase and subsequent decrease in value. One estimate found that, as of March 2020, there were more than 5,100 different cryptocurrencies worth about $231 billion. Given this rapid growth and volatility, cryptocurrencies have drawn the attention of the public and policymakers. A particularly notable feature of cryptocurrencies is their potential to act as an alternative form of money. Historically, money has either had intrinsic value or derived value from government decree. Using money electronically generally has involved using the private ledgers and systems of at least one trusted intermediary. Cryptocurrencies, by contrast, generally employ user agreement, a network of users, and cryptographic protocols to achieve valid transfers of value. Cryptocurrency users typically use a pseudonymous address to identify each other and a passcode or private key to make changes to a public ledger in order to transfer value between accounts. Other computers in the network validate these transfers. Through this use of blockchain technology, cryptocurrency systems protect their public ledgers of accounts against manipulation, so that users can only send cryptocurrency to which they have access, thus allowing users to make valid transfers without a centralized, trusted intermediary.
    [Show full text]
  • The Pirate Bay Liability
    THE PIRATE BAY LIABILITY University of Oslo Faculty of Law Candidate name: Angela Sobolciakova Supervisor: Jon Bing Deadline for submission: 12/01/2011 Number of words: 16,613 10.12.2011 Abstract The thesis discuses about peer-to-peer technology and easy availability of an Internet access which are prerequisites to a rapid growth of sharing data online. File sharing activities are managing without the copyright holder‟s permission and so there is a great opportunity of infringing exclusive rights. The popular pee-to-peer website which is enabling immediate file sharing is for example www.thepiratebay.org – the object of this thesis. The copyright law is obviously breaching by end users who are committing these acts. However, on the following pages we are dealing with the third party liability – liability of online intermediaries for unlawful acts committed by their users. A file sharing through the pee-to-peer networks brings benefits for the Internet users. They need no special knowledge in order to learn how to use the technology. The service of www.thepiratebay.org website is offering simultaneously users an access to a broad spectrum of legal content and a copyright protected works. The service is mainly free of charge and the users can find a data they are interested in quickly and in a users‟ friendly format. The aim of the thesis is to compare the actual jurisprudential status of liability of intermediary information society service providers for the file sharing activities on www.thepiratebay.org. 2 Acknowledgement I would like to thank Professor Jon Bing, I am grateful to him for supervising the thesis.
    [Show full text]
  • Seedboxes Cc Forum
    Seedboxes Cc Forum It's simple to get started with, and incredibly functional. Never had problems using. cc Mobile Apps for ios and android user. cc German- English Dictionary: Translation for Sumpf. Ellenkező esetben a webhely funkcionalitása korlátozott. Ask questions regarding our services or generic seedbox related tasks. Gradstein & Celis, M. 2021, 19:09 Replies: 3 [Wait for Plugin Update] Pornhub plugin - only HLS - duplicate problem. Seedbucket was developed in-house by Seedboxes. eu e as velocidades de UP e DOWN são muitos boas mas a limitação de tráfego complica. OB Config for seedboxes. Seedbox & Hosting. A lot slower to post updates though. 2011-05-18: Added a link to a post on HP’s support forum where the post helped a bit. A good starting place for additional information about Rapidleech is the Wiki and the official forum. cc, byte-sized-hosting. ---Description---Tellytorrent is an Indian private tracker for Indian movies & series with a collection of BD50, 4kUHD, DVD9, NetFlix DL & Amazon DL- Source. cc often offers special discounts – called “promo codes” on its website. We have not put down all the specifications but you can read more about them in this post. The Raspberry Pi 4 dropped and it's a major update for the flagship single-board computer. On September 2, 2009, isoHunt announced the launch of a spinoff site, hexagon. 53GHz HyperThreading),. cc - Quality and affordable seedbox with premium bandwidth Seedboxes. Sdedi propose des solutions Seedbox uniques et innovantes : un espace disque illimité, un réseau de 10 Gigas, une app seedbox mobile et plus encore, à partir de 2,99 euros.
    [Show full text]
  • The Copyright Alert System: a Potential Unfair Burden on Small Business Owners, 23 J
    Journal of Law and Policy Volume 23 | Issue 1 Article 8 2014 The opC yright Alert System: A Potential Unfair Burden On Small Business Owners Rachel Schneidman Follow this and additional works at: https://brooklynworks.brooklaw.edu/jlp Recommended Citation Rachel Schneidman, The Copyright Alert System: A Potential Unfair Burden On Small Business Owners, 23 J. L. & Pol'y (2014). Available at: https://brooklynworks.brooklaw.edu/jlp/vol23/iss1/8 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Journal of Law and Policy by an authorized editor of BrooklynWorks. THE COPYRIGHT ALERT SYSTEM: A POTENTIAL UNFAIR BURDEN ON SMALL BUSINESS OWNERS Rachel A. Schneidman* The Copyright Alert System (CAS) confers on Internet Service Pro- vider’s (ISPs) the power to use “mitigating measures” against alleged copyright infringers in order to discourage piracy. This power is a result of a voluntary agreement between the ISPs, the Motion Picture Associa- tion of America, and the Recording Industry Association of America. Alt- hough the effectiveness of the CAS and the privacy concerns it raises have been analyzed in academic literature, the possible encumbrance of the CAS on small business owners has not been sufficiently considered. This Note argues that while the CAS may be a valuable tool in im- peding online piracy, it has the potential to unfairly burden small busi- ness owners. Specifically, this Note asserts that the CAS’s scope should be expanded to include all broadband users, including residential and business users of every size.
    [Show full text]
  • A Cryptocurrency Spectrum Short Analysis
    Journal of Risk and Financial Management Review A Cryptocurrency Spectrum Short Analysis 1 2 3 Mircea Constantin S, cheau , Simona Liliana Crăciunescu , Iulia Brici and Monica Violeta Achim 3,* 1 Faculty of Automation, Computers and Electronics, University of Craiova, 200585 Craiova, Romania; [email protected] 2 Simona Liliana Crăciunescu, The Bucharest University of Economic Studies, 010374 Bucharest, Romania; [email protected] 3 Faculty of Economics and Business Administration, Babes, -Bolyai University, 400591 Cluj-Napoca, Romania; [email protected] * Correspondence: [email protected] Received: 30 June 2020; Accepted: 11 August 2020; Published: 17 August 2020 Abstract: Technological development brings about economic changes that affect most citizens, both in developed and undeveloped countries. The implementation of blockchain technologies that bring cryptocurrencies into the economy and everyday life also induce risks. Authorities are continuously concerned about ensuring balance, which is, among other things, a prudent attitude. Achieving this goal sometimes requires the development of standards and regulations applicable at the national or global level. This paper attempts to dive deeper into the worldwide operations, related to cryptocurrencies, as part of a general phenomenon, and also expose some of the intersections with cybercrime. Without impeding creativity, implementing suggested proposals must comply with the rules in effect and provide sufficient flexibility for adapting and integrating them. Different segments need to align or reposition, as alteration is only allowed in a positive way. Adopting cryptocurrency decisions should be unitary, based on standard policies. Keywords: cryptocurrencies; fraud; algorithms; correlations; impact; risks; regulation; blockchain 1. Introduction In the area of influence of computer science, the terms undergo rapid mutations, both in sense and interpretability.
    [Show full text]
  • FAQ's on the Center for Copyright Information and Copyright Alert
    FAQ’s on The Center for Copyright Information And Copyright Alert System 1. How significant is online content theft? • Content theft is estimated to cost the U.S. economy $58 billion, 373,000 American jobs and $16 billion in lost employee earnings every year, and to cost federal, state and local governments $2.6 billion each year in lost tax revenue. However, data suggests1 that most users (up to 70%) would stop content theft once alerted that it is occurring, that it is illegal and that there are consequences associated with continuing to engage in it. A new educational center and system of alerts – similar to credit card fraud alerts – will help address this problem. The alerts will let subscribers know when their accounts have been identified for possible content theft, advise subscribers of the serious consequences associated with it, and encourage them to stop it from occurring again. 2. What is the Center for Copyright Information? • The Center for Copyright Information (“CCI”) will focus on educating subscribers about the importance of copyright protection and lawful ways to obtain movies and music online. The Center will also help to develop and confirm “best-practices” for a new system of progressive Copyright Alerts, similar to credit card fraud alerts, which will alert subscribers when potential content theft is identified on their Internet accounts. The Center is being established jointly by the film, music, and television industries in partnership with Internet Service Providers (ISPs) and will benefit from guidance by consumer advocates and technical experts serving on its advisory committee or providing other expert services.
    [Show full text]
  • Characterizing Peer-Level Performance of Bittorrent
    Characterizing Peer-level Performance of BitTorrent DRP Report Amir H. Rasti ABSTRACT 1. INTRODUCTION BitTorrent is one of the most popular Peer-to-Peer During the past few years, peer-to-peer appli- (P2P) content distribution applications over the cations have become very popular on the In- Internet that significantly contributes in network ternet. BitTorrent in one of the most popu- traffic. lar peer-to-peer applications providing scalable peer-to-peer content distribution over the In- In BitTorrent, a file is divided into segments ternet. Some recent studies [8] have shown that and participating peers contribute their outgoing BitTorrent is accountable for approximately bandwidth by providing their available segments 35% of the Internet traffic. BitTorrent is a to other peers while obtaining their missing peers scalable peer-to-peer content distribution sys- from others. Characterization of BitTorrent is use- tem that enables one-to-many distribution of ful in determining its performance bottlenecks as large files without requiring a large access link well as its impact on the network. bandwidth at the source. Similar to other peer- In this study, we try to address the following two to-peer systems, it uses resources of participat- key questions through measurement: (i) What are ing peers to increase the capacity of the system. the main factors that affect observed performance The main shared resource in BitTorrent is the by individual peers in BitTorrent?, and (ii) What up-link bandwidth of individual peers. The file are the contributions of these factors on the per- being distributed is divided into a large number formance of individual peers? To address these of segments.
    [Show full text]
  • A Study of Peer-To-Peer Systems
    A Study of Peer-to-Peer Systems JIA, Lu A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Philosophy in Information Engineering The Chinese University of Hong Kong August 2009 Abstract of thesis entitled: A Study of Peer-to-Peer Systems Submitted by JIA, Lu for the degree of Master of Philosophy at The Chinese University of Hong Kong in June 2009 Peer-to-peer (P2P) systems have evolved rapidly and become immensely popular in Internet. Users in P2P systems can share resources with each other and in this way the server loading is reduced. P2P systems' good performance and scalability attract a lot of interest in the research community as well as in industry. Yet, P2P systems are very complicated systems. Building a P2P system requires carefully and repeatedly thinking and ex- amining architectural design issues. Instead of setting foot in all aspects of designing a P2P system, this thesis focuses on two things: analyzing reliability and performance of different tracker designs and studying a large-scale P2P file sharing system, Xun- lei. The "tracker" of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server tracker, to DHT- based (distributed hash table) serverless systems. In the first part of this thesis, we classify the different tracker designs, dis- cuss the different considerations for these designs, and provide simple models to evaluate the reliability of these designs. Xunlei is a new proprietary P2P file sharing protocol that has become very popular in China.
    [Show full text]
  • Press Release: the Battle of Protocols
    Press Release: The Battle of Protocols Omenics cryptocurrency data analytics startup have teamed up with Bitassist, a Cryptoasset research firm, to ​ release a comprehensive report on the performance of popular blockchain protocols Ethereum, Tron, EOS and Tezos. A full version of the Battle of the Protocols PDF Report can be downloaded here: https://omenics.com/blog/the-battle-of-protocols-a-competitive-analysis-on-ethereum-eos-tron-and-tezos And an online PDF is available here: https://view.publitas.com/bitassist/the-battle-of-the-blockchain-protocols/ ​ Summary 1. A brief overview of the report 2. An analysis of the key findings In this report, Bitassist and Omenics collate and contrast key metrics for leading protocols to provide meaningful insights into the current state of competition. The metrics used in this report include the number of transactions per Second (TPS), the decentralization of governance, the number and distribution of nodes, various measures of on-chain activity or economic output and the community sentiment around the platform. As leading protocols compete for the top spot, developers, DApp users and investors eagerly observe the state of competition. This report leverages key blockchain metrics to highlight the respective strengths and weaknesses among Ethereum, EOS, Tron and Tezos. Omenics: Pierre-Alexandre Picard+33643035796, COO [email protected] Bitassist: James Bennett, CEO [email protected]. Key Takeaways from the Report Below are some of the key insights offered by the report indicating the overall performance of blockchain protocols. ● Transactions Per Second (TPS): This is one of the most important performance metrics to gauge the ​ relative strength of the blockchain protocol.
    [Show full text]
  • Time Warner Copyright Infringement Notice
    Time Warner Copyright Infringement Notice Deviate and unreproached Brandy herries her blungers catechize damn or smuggled misguidedly, is Cyril silver-tongued? Sander is flatwise pustulant after exhilarant Tann scruples his chondriosome tabularly. Tyrone is anamnestically hypersthenic after morphological Isidore spook his quarreller longways. Time Life and fear Time Life logo are registered trademarks of Time Warner Inc. Nobody gets sued for illegally downloading movies right. The ISP refused to forward Rightscorp's notices of infringement to Cox customers. Learn more than courts should never even democracy itself and time warner may appropriately be the burden of. To prove copyright infringement the plaintiff must show 1 that the defendant. The aisle led if the creation of the mile for Copyright Information CCI. Notice-takedown-putback procedures related to alleged copyright infringement. Now either have adults who see infringement as medicine business model. Warner Music Group WMG Comments Submitted in number to US. Imperial residential accounts, copyright infringement notices to challenge jurisdiction determinative in their copyrights are infringed, evaluated the evolution or conflicting lines or the blocking. Copyright Alert System CAS was whether voluntary industry effort will educate and penalize internet. A recent DMCA copyright complaint to Google filed on behalf of Warner Bros by. Verizon says customers who such a fifth violation notice damage have. This includes companies like Time Warner Cable Comcast Xfinity AT T. Warner Bros Fan Creators and Infringement Claims The main Side. Help but was smoke a copyright infringement notice from ISP. Will the cost Industry both To Win Its Copyright Battle. This notice states that the copyright owner believes that arrive are hosting and.
    [Show full text]