Peer-To-Peer Technologies

Total Page:16

File Type:pdf, Size:1020Kb

Peer-To-Peer Technologies 3/27/2012 Peer-to-Peer Technology Priscilla Grantham, Esq. Sr. Research Counsel National Center for Justice and the Rule of Law Copyright © 2012 National Center for Justice and the Rule of Law NCJRL. org ICAC Webinar series 1 WEBINAR TIPS: 1. To reduce background noise, please: • Power off cell phones • Turn down (or mute) computer speakers if accessing webcast through telephone 2. The presenter is utilizing VoIP (Voice Over Internet Protocol) technology to deliver the audio portion of the webinar. In the event the audio malfunctions, please stand by; the presenter will quickly re‐join the webinar via telephone and continue the presentation. 3. Attendees will be muted during webinar in an effort to reduce background noise. 4. If you want to ask a question, type it in the chat box in the control pane on the right side of your screen, and then click the “send” button. 5. Questions are typically addressed at the end of the presentation. 6. Please include your email and phone number with question. If presenter does not have time to answer your question during the webcast, he/she will contact you following the webcast. Type Question WEBINAR in this Box NCJRL. org 1 3/27/2012 Topics: • P2P networks & P2P clients • P2P computing v. client‐server models • Advantages of using P2P networks • Potential risks associated with P2P • Architecture of P2P networks • Centralized v. decentralized P2P networks • Evolution of P2P networks • BitTorrent P2P protocol and its components • Anonymous and Private P2P networks 4 P2P Technology: • Efficient, robust means to distribute a wide range of content including software, games, books, movies, music, etc. • Wikipedia complied a CD with over 2,000 articles specifically for schools and children – made it available for download on P2P network. • Researchers share data and computer code. • Used by NASA to distribute satellite imagery. 5 Peer-to-Peer Networks Network consisting of thousands of computers connected to each other • Main feature: No central server • Main use: Acquiring files • Examples: BitTorrent, Gnutella 6 2 3/27/2012 P2P: Networks v. Clients P2P Networks: P2P Clients: Napster Shareza BitTorrent Gnutella BearShare eDonkey eMule Gnutella2 (G2) Warez BitTorrent Frostwire 7 Traditional File Transfer Methods: • Referred to as client‐server file transfer. • Transfer handled by a protocol such as FTP (file transfer protocol) or HTTP (HyperText transfer protocol). • Desired file located via web browser; • File is downloaded from a single source, the file server, by the destination computer, the client. 8 I open web page, click Web browser software on my link to download file computer tells a central computer that holds the Web page & file I want to transfer copy of the file to my computer. Transfer speed depends on factors such as: protocol used (FTP, HTTP), amount of traffic on server, # of computers trying to download same file. If file is large and popular, demands on server will be great and download will be slow. Server could crash. 9 3 3/27/2012 Benefits of P2P: • Client machines are peers and communicate directly with one another. • Users of P2P tend to be contributors and consumer. • P2P approximates original conception of Internet as network of connections among individuals & organizations that give and take info. • P2P networks tend to be faster and more reliable –no reliance on central server to deliver content. 10 Downsides of P2P: • P2P networks have been used to transmit viruses, malware, mislabeled/corrupted files. • Those who inadvertently placed sensitive materials in network‐shared directories have been victims of identity theft. • Music and media files easily distributed in violation of copyright laws. 11 Test Your Knowledge: The software that enables one to share files over a P2P network is called a: A. P2P client B. Swarm C. Server D. Peer There are many clients available online that can be downloaded free of charge. Some examples are BearShare, Frostwire, Shareza, Limewire (defunct)… 12 4 3/27/2012 The Evolution of P2P Networks: It all started with Napster… “Central Server Model” • Start Napster software on my computer –now my computer can make files available to other Napster users. • My computer connects to Napster’s central servers. • My computer tells the Server which files are available on my machine. • Napster central servers contain complete list of every song, for example, available on every hard disk connected to Napster at that time. 13 Downloading a Song Via Napster: • I type in my query: “Roxanne” by the Police • Napster’s central servers list all the computers storing that song • I choose a version of the song from the list • My computer connects to the user’s computer that has the song, and downloads “Roxanne” directly from that computer. 14 Napster ordered to shut down due to copyright violations… No central database = No Napster 15 5 3/27/2012 Enter Gnutella: • 1st decentralized P2P network • No central database that knew all files available on Gnutella network • Unlike Napster, many different client programs available to access Gnutella network. 16 Downloading a File Via Gnutella P2P Network: • Run Gnutella‐compatible file sharing software on computer. • Send out request for desired file. • Software sends query to computers connected to Internet that are running the same software. • Software finds a computer with the file I want on its hard drive, download begins. 17 • Gnutella had problems with spamming bots and lost popularity. • FrostWire: leading file‐sharing application on Gnutella network after Limewire was shut down. • FrostWire left Gnutella last year and focused on BitTorrent • Some clients still available for the Gnutella network (Phex) but today, most clients operate on BitTorrent platform 18 6 3/27/2012 BitTorrent Protocol: • Enables fast downloading of large files using minimum Internet bandwidth. • Offloads some of the file tracking work to a centralized server (called a Tracker). • Uses “tit‐for‐tat” principle: in order to receive files, you must give them. 19 BitTorrent – Basic Terms: • Tracker –a server that assists in communication among peers. BitTorrent client software communicates with the tracker to locate the Swarm. • Swarm – All of the computers that contain all or part of the file being sought. • Seed –the computers in the swarm that contain the entire file being sought. • Leechers – commonly refers to people who disconnect after receiving entire file so others cannot obtain file from them. 20 BitTorrent v. Gnutella: • With BitTorrent, pieces of desired file are gathered from multiple computers and downloaded simultaneously. • Once a computer begins downloading a file, other computers seeking same file can begin downloading from it. 21 7 3/27/2012 Downoading a File Via BitTorrent: 22 BitTorrent Explained: http://video 23 Test Your Knowledge: Which P2P network is an example of a Centralized server model? A. Gnutella B. Napster C. BitTorrent D. GigaTribe Napster featured a centralized server that kept a list of every song available on every hard disk connected to it at that time. 24 8 3/27/2012 Downloading Via BitTorrent: • Download (free) BitTorrent client: BitTorrent, uTorrent… • Find a torrent file to download. Enter term “.torrent” using Internet search engine to find sites offering BitTorrent files • The Pirate Bay • Torlock • isoHunt • TorrentSpy • Mininova • Jamendo 25 26 • Swedish website • Bittorrent tracker –none of the copyright‐ protected files users swap ever sit on the site's own servers. • Allows users to search for and download torrents, small files containing metadata necessary to download data from other users. • Torrents organized into categories: “Audio”, “Video”, “Applications”, “Games”, and “Porn” 27 9 3/27/2012 I’ve got a torrent file of Countdown’s album “Break Rise Blowing” from the website Jamendo. Website Torrent 28 • Now I save torrent file to my hard drive, • Open torrent file in my BitTorrent client program, and • Start downloading. 29 30 10 3/27/2012 Test Your Knowledge: The role of the Tracker in the BitTorrent network is to maintain an index of all files available for trading. A. True B. False The Tracker communicates with the BitTorrent client (software) in order to locate the swarm (all of the computers that contain all or part of the file being sought.) 31 Anonymous P2P: • Nodes or participants are anonymous or pseudonymous. • Special routing overlay networks hide physical location of each node from other participants. • “Anonymous P2P”‐ network nodes carry no identifiers. • “Pseudonymous P2P” –instead of being identified by their IP addresses, nodes are identified by pseudonyms such as cryptographic keys. • Difficult, if not impossible to determine whether a node that sends a message originated the message or is simply forwarding it. 32 Motivation for Anonymity: • Material or its distribution is illegal or incriminating • Material is legal but socially deplored, embarrassing, or problematic for the individual • Fera od retribution (against whistleblowers or activists who don’t believe in restrictions on information • Censorship at local, organizational or national level • Personal privacy preferences such as preventing tracking or datamining activities 33 11 3/27/2012 Genesis of Anonymous P2P: U.S. Navy funded the original onion routing research that led to the development of the Tor network, which was later funded by Electronic Frontier Foundation and is now developed by the non‐profit organization The Tor Project, Inc. 34 Arguments Against Anonymous P2P: May protect illegal activities
Recommended publications
  • Anonsocialmix: Anonymous P2P File Sharing Over Social Networks
    AnonSocialMix: Anonymous P2P File Sharing Over Social Networks Student Name: Rajdeep Mukherjee IIIT-D-MTech-CS-GEN-MT15051 July, 2017 Indraprastha Institute of Information Technology New Delhi Thesis Committee Dr. Sambuddho Chakravarty, IIIT Delhi (Advisor) Dr. Tanmoy Chakraborty, IIIT Delhi (Internal Examiner) Dr. Vinay Joseph Ribeiro, IIT Delhi (External Examiner) Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, in Information Security Category ©2017 IIIT-D MTech-CS-GEN-17-MT15051 All rights reserved Certificate This is to certify that the thesis titled “AnonSocialMix: Anonymous P2P File Sharing Over Social Networks" submitted by Rajdeep Mukherjee for the partial fulfillment of the requirements for the degree of Master of Technology in Computer Science & Engineering is a record of the bonafide work carried out by him under my guidance and supervision in the Security and Privacy group at Indraprastha Institute of Information Technology, Delhi. This work has not been submitted anywhere else for the reward of any other degree. Dr.Sambuddho Chakravarty Indraprastha Institute of Information Technology, New Delhi 2 Abstract Peer-to-peer (P2P) file sharing accounts for one of the major sources of the Internet traffic. As privacy and anonymity issues continue to grow due to constant censorship and network surveil- lance, more and more Internet users are getting attracted towards the facilities for anonymous communication. Extensive research has been conducted over the years towards the design and development of several anonymous P2P file sharing protocols and systems. Size of the Anonymity Set plays a crucial role in determining the degree of anonymity being provided by such networks.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • Mercy College Student Handbook Each Year and on the College’S Intranet
    STUDENT HANDBOOK 2020-2021 w w TABLE OF CONTENTS MERCY COLLEGE Soliciting or Commercial Activity .................................... 22 A Message from the President .......................................... 2 Mercy College Policies .................................................... 22 History ............................................................................... 3 Code of Student Conduct ............................................... 23 Objectives .......................................................................... 3 Code of Conduct for Residential Life Students ............... 25 Accreditations.................................................................... 4 Residential Area Guest Policy ......................................... 27 Disclaimer .......................................................................... 4 Quiet Hours Policy .......................................................... 28 General Standards of Conduct .......................................... 5 Inspections ...................................................................... 28 Notice of Non-Discrimination ............................................ 5 Fire Safety ....................................................................... 28 Sanctions for Code of Conduct Violations ...................... 29 ACADEMIC SUPPORT AND OTHER COLLEGE SERVICES Student Judicial Process ................................................. 31 Academic Advising ............................................................. 6 Division of Student Affairs ................................................
    [Show full text]
  • Internet Evidence Finder Report
    Patrick Leahy Center for Digital Investigation (LCDI) Internet Evidence Finder Report Written and Researched by Nick Murray 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu July 2013 IEF Report 6/28/2013 Page 1 of 33 Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents Introduction ............................................................................................................................................................. 5 Prior Work: .......................................................................................................................................................... 7 Purpose and Scope: ............................................................................................................................................
    [Show full text]
  • Frequently Asked Questions
    Copyright & File-Sharing FREQUENTLY ASKED QUESTIONS WHAT IS COPYRIGHT? BUT I BOUGHT IT. WHY CAN’T I SHARE IT? WHAT CAN I DO TO AVOID COPYRIGHT Copyright refers to the legal rights creators have There is a difference between using and distributing INFRINGEMENT? over the use, distribution, and reproduction of copyrighted materials. Purchasing songs, movies, or Download content from legitimate sources and do original work (music, movies, software, etc.). software from legitimate sources does not give you the not share copyrighted materials online. Uninstall Copyright infringement is the unlawful use of any right to share these materials over the Internet or make P2P applications (e.g., Popcorn Time, BitTorrent, material protected under copyright law. Common copies for others. When you purchase a Peer-to-Peer Vuze), which may be sharing your files without violations include downloading ‘pirated’ copies of (P2P) program (e.g., Frostwire, BitTorrent, Vuze), you your knowledge. Do not share your NetID and copyrighted materials or sharing files not intended only buy the software, not any files you download or password with anyone. Keep your computer for you to distribute. share using this software. up-to-date with the latest security patches and anti-virus software. HOW DO I KNOW IT’S COPYRIGHTED? DOES UMASS IT MONITOR MY INTERNET Assume all materials are copyright-protected CONNECTION? HOW CAN I LEGALLY DOWNLOAD CONTENT? unless you created them or you have received the No. We do not monitor the contents of your computer Services like Amazon, iTunes, and eMusic offer author’s explicit permission to distribute them. All or issue copyright complaints.
    [Show full text]
  • Illegal File Sharing Notice Notice Is Sent to All Enrolled Students Via Email
    Illegal File Sharing Notice Notice is sent to all enrolled students via email. Sample notification: Do YOU know the risks of illegal file sharing? The Recording Industry Association of America, the Motion Picture Association of America, the TV networks like NBC and ABC and other copyright holders will find you and sue you for illegal file sharing! It has happened to students here on campus, so don’t think that this won’t happen to you! Are YOU ready to pay $3,000 to $5,000 for illegally file sharing music, movies, software, etc.? Copyright law allows a copyright holder to sue someone who violates their rights for up to $150,000 per song, movie or TV episode. Students who have been fined at UWSP settled out of court for between $3,000 and $5,000. No one has that kind of cash just sitting around, so how can you avoid these fines? 1. Do NOT use peer‐to‐peer (P2P) file sharing programs like LimeWire, FrostWire, BitTorrent, Ares or Bearshare. 2. Educate yourself about illegal downloading and file sharing at: http://library.uwsp.edu/guides/Copyright/filesharing.htm 3. Use legal music, video and TV sites listed on this web site: http://www.educause.edu/Resources/Browse/LegalDownloading/33381 Here is what happens if YOU get caught for illegal file sharing on the UWSP campus: If you are a student caught while using our Residential Network, the campus wireless network or the campus wired network such as in a computer lab, you will lose your ability to use the Internet on campus for 7 days for a first offense.
    [Show full text]
  • Social Network Based Anonymous Communication in Tor Peng Zhou, Xiapu Luo, Ang Chen, and Rocky K
    1 STor: Social Network based Anonymous Communication in Tor Peng Zhou, Xiapu Luo, Ang Chen, and Rocky K. C. Chang Department of Computing, The Hong Kong Polytechnic University, Hunghom, Hong Kong cspzhouroc,csxluo,csachen,csrchang @comp.polyu.edu.hk f g Abstract—Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus making them susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based trust model to help anonymity networks circumvent malicious routers and obtain secure anonymity. In particular, we design an input independent fuzzy model to determine trust relationships between friends based on qualitative and quantitative social attributes, both of which can be readily obtained from existing social networks. Moreover, we design an algorithm for propagating trust over an anonymity network. We integrate these two elements in STor, a novel social network based Tor. We have implemented STor by modifying the Tor’s source code and conducted experiments on PlanetLab to evaluate the effectiveness of STor. Both simulation and PlanetLab experiment results have demonstrated that STor can achieve secure anonymity by establishing trust-based circuits in a distributed way. Although the design of STor is based on Tor network, the social network based trust model can be adopted by other anonymity networks. Index Terms—Social Network, Anonymous Communication, Tor, Fuzzy Model F 1 INTRODUCTION alone can be easily bypassed by an attacker.
    [Show full text]
  • Stellar Bitraser File Eraser(2 MB, PDF)
    BITRASER FILE ERASER Wipe Files Beyond Recovery Secure File Erasure Software For Safeguarding Privacy BitRaser File Eraser DIY software for permanent wiping of sensitive files, web browsing history, app & system traces, & deleted files from laptop, desktops, and external storage media. Wipe sensitive files across devices. Ensure data safety! BitRaser File Eraser is a simple & powerful software for safeguarding data through secure wiping of sensitive files on Windows systems. The tool is ideal for anyone who uses a computer and wants to secure themselves from data breach or leakage threats. Erase files & folders Wipe identity Erase web browsing from Windows PC and documents, tax records, history from Chrome, external storage, etc. photos & videos, etc. Mozilla, Safari, etc. Available for: Know more © Copyright Stellar Information Technology Pvt. Ltd. All Trademarks Acknowledged. www.stellarinfo.com BITRASER FILE ERASER WIPES ALL TYPES OF SENSITIVE FILES ERASES ALL DEVICES & DRIVES Erases photos, videos, tax records, social security Wipes Windows PC, USB flash drives, external number, credit card statement, personal health HDD, SD Card & even files stored on servers. records, official documents and more. CLEARS WEB BROWSING HISTORY REMOVES APPLICATION TRACES TRACES Erases browsing history, cookies, temporary files, Removes activity logs, preferences, etc. generated favorites, etc. Supports Chrome, Mozilla, Safari, IE, with use of News apps, Instant Messengers, Email Microsoft Edge, Opera, & SeaMonkey. apps, Peer to Peer apps, & more. ERASES THE DELETED FILES SCHEDULES THE ERASURE TASKS Wipes the deleted files from system by erasing the Allows to preset & run wiping tasks based on time, day unused space freed up after deletion. Secures & frequency. You can choose specific files for wiping against retrieval of sensitive deleted files.
    [Show full text]
  • Technology Stack for Decentralized Mobile Services
    Technology Stack for Decentralized Mobile Services Matouš Skála Technology Stack for Decentralized Mobile Services by Matouš Skála to obtain the degree of Master of Science at the Delft University of Technology, to be defended publicly on Monday August 31, 2020 at 3:00 PM. Student number: 4893964 Project duration: November 15, 2019 – August 31, 2020 Thesis committee: Dr.ir. J.A. Pouwelse, TU Delft, supervisor Dr. J.S. Rellermeyer, TU Delft Dr. N. Yorke-Smith, TU Delft An electronic version of this thesis is available at http://repository.tudelft.nl/. Preface When I was choosing my thesis topic, I originally came up with an idea of designing a decen- tralized social network. After realizing how ambitious that goal was, I later decided to focus on more fundamental issues first and create a library that would allow for building any de- centralized applications, running purely on an overlay network consisting of smartphones. Rather than reinventing the wheel, I took inspiration from an existing networking library de- veloped at TU Delft over the last decade and created its wire-compatible implementation in Kotlin. Interestingly, in the end, I have even implemented a trivial social network to demon- strate the usage of the library, returning back to the original idea. I would like to thank my supervisor Johan Pouwelse for an endless stream of fresh ideas and valuable feedback, and to PhD students of the Delft Blockchain Lab for numerous coffee meetings and for serving me as a walking documentation of the existing codebase. Matouš Skála Prague,
    [Show full text]
  • Censorship-Resistant Collaboration with a Hybrid DTN/P2P Network
    Censorship-resistant Collaboration with a Hybrid DTN/P2P Network Masterarbeit von Philipp Hagemeister aus Braunschweig vorgelegt am Lehrstuhl fur¨ Rechnernetze und Kommunikationssysteme Prof. Dr. Martin Mauve Heinrich-Heine-Universitat¨ Dusseldorf¨ Marz¨ 2012 Acknowledgments My thanks go to Marc Fontaine for asking stupid questions that turned out to be quite clever, and for pointing out that correctness is essential both in the real and the physical world. I also thank Paul Baade for demanding impossible features which turned out to be the last piece in the puzzle. Julius Rommler¨ has notified me of orthographical, typographical, and (inadvertently) semantical er- rors. And told me to use fewer big words. Thanks! I wish to thank Denis Lutke-Wiesmann¨ for proofreading the thesis, and the footnotes. Sven Hager found lots of overly short, overly long, and overly wrong statements. Thanks! Thanks to Prof. Martin Mauve for coming up with the idea, shielding us from bureaucracy, asking for explanation and rationale at every step, and finding all the errors nobody else found. iii Contents List of Figures viii 1 Motivation 1 1.1 Distribution of Speech . .2 1.2 Threat Model . .2 1.2.1 Nontechnical Attacks . .2 1.2.2 Internet Access . .3 1.2.3 Control over the User’s Computer . .4 1.2.4 Total Shutoff . .4 1.2.5 Physical Attacks . .5 1.2.6 IP Blocking . .5 1.2.7 DNS censorship . .6 1.2.8 Deep Packet Inspection . .6 1.2.9 Active Attacks . .8 1.2.10 Conclusions . .9 1.3 Decentralization . 10 1.4 Collaboration . 10 1.5 Structure of this Thesis .
    [Show full text]
  • What You Need to Know About Copyright Infringement October 2, 2018 Dear Student, the Higher Education Opportunity Act of 2008 Re
    What You Need to Know About Copyright Infringement October 2, 2018 Dear Student, The Higher Education Opportunity Act of 2008 requires all colleges and universities to inform students of the possible consequences of copyright infringement as outlined by the Digital Millennium Copyright Act (DMCA). How the DMCA Affects Wake Forest University The Digital Millennium Copyright Act protects the rights of owners of copyrighted digital material. By providing students online access to the Wake Forest University’s computing network(s), including Internet access, the University is considered an Internet Service Provider (ISP). The DMCA requires an ISP to expeditiously respond to complaints it receives of copyright infringements over its networks. Potential Legal Penalties for Federal Copyright Law Violations Violation of the DMCA can result in severe civil or criminal penalties. University action taken to stop copyright violation, including disciplinary measures, does not protect the individual infringer from civil or criminal prosecution from the copyright owner or the authorities. Illegal Music Downloading Complaints Filed by Entertainment Entities Most copyright infringement cases reported to Wake Forest Information Systems are associated with illegal music downloading. Other common types of copyright infringement cases at Wake Forest involve the illegal downloading or sharing of movies, videos, and software including gaming software. Risks Associated with Illegal File Sharing Using peer-to-peer file sharing programs that share copyrighted material such as music, movies and software put you at risk of obtaining viruses, spyware or other malicious software that can corrupt your computer and damage your data. Peer-to-peer file sharing programs include Popcorn View, Popcorn Time, Vuze, uTorrent, BitTorrent, LimeWire, BitComet, and FrostWire.
    [Show full text]