Online Content Study: Changes in the Distribution, Discovery and Consumption of Lawful and Unauthorised Online Content MC 359 (Lot 3 Label 9 and Label 13)
Total Page:16
File Type:pdf, Size:1020Kb
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content MC 359 (Lot 3 Label 9 and Label 13) Appendix For OFCOM 50090 – November 2015 IDATE Project Manager Vincent BONNEAU +33 (0)4 67 14 44 53 [email protected] " About IDATE and DigiWorld Institute Founded in 1977, IDATE has gained a reputation as a leader in tracking telecom, Internet and media markets, thanks to the skills of its teams of specialized analysts. Now, with the support of more than 40 member companies – which include many of the digital economy’s most influential players – the newly rebranded DigiWorld Institute has entered into a new stage of its development, structured around three main areas of activity: • IDATE Research, an offer of market intelligence publications • IDATE Consulting, time-tested analysis • DigiWorld Institute, a think tank on the digital economy. Copyright IDATE 2015, CS 94167, 34092 Montpellier Cedex 5, France All rights reserved. None of the contents of this publication may be reproduced, stored in a retrieval system or transmitted in any form, including electronically, without the prior written permission of IDATE. IDATE, DigiWorld, DigiWorld Institute and DigiWorld Yearbook are the international registered trademarks of IDATE. Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix Contents 1. Regulations against piracy ............................................................................................... 5 1.1. Example of policies in various countries ....................................................................................................... 5 1.2. Graduated responses schemes ....................................................................................................................... 5 2. Content delivery techniques ............................................................................................. 6 2.1. P2P solutions .................................................................................................................................................... 6 2.2. Facebook strengthening anti-piracy after complaints from rights holders ............................................... 11 2.3. Popcorn Time .................................................................................................................................................. 12 2.4. Periscope ......................................................................................................................................................... 12 2.5. UltraViolet ........................................................................................................................................................ 14 2.6. Licensed Digital Rights Cloud ....................................................................................................................... 18 2.7. Digital copy ..................................................................................................................................................... 20 2.8. Procedure to set up private game servers ................................................................................................... 21 3. Benchmark of lawful offerings ....................................................................................... 22 3.1. Content catalogue ........................................................................................................................................... 22 3.2. Technical limits ............................................................................................................................................... 30 3.3. Reasons for infringing .................................................................................................................................... 36 4. Unauthorised content techniques .................................................................................. 37 4.1. Detection solution providers ......................................................................................................................... 37 4.2. Case of wrong detections .............................................................................................................................. 38 4.3. List of major privacy techniques ................................................................................................................... 42 4.4. Blocking by legitimate services..................................................................................................................... 45 4.5. Freenet & F2F .................................................................................................................................................. 46 4.6. BGP blocking .................................................................................................................................................. 47 4.7. DPI techniques ................................................................................................................................................ 48 4.8. Hybrid blocking ............................................................................................................................................... 50 5. Estimates and forecasts of lawful and unauthorised content ...................................... 52 5.1. Main objectives ............................................................................................................................................... 52 5.2. First module: breakdown of files consumed per category of content ....................................................... 53 5.3. Breakdown of time spent per device ............................................................................................................. 54 5.4. Dataset ............................................................................................................................................................. 56 www.idate.org © IDATE 2015 3 Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix Tables & Figures Table 1: Main characteristics of antipiracy policies in Common Law and Civil Law countries ................................. 5 Table 2: Examples of graduated response implemented by selected countries ...................................................... 5 Table 3: Delivery modes and limitations for the different solutions ........................................................................ 35 Table 4: Storage options for the different solutions ................................................................................................ 35 Table 5: Assessment of the different detection solutions ....................................................................................... 37 Table 6: Analysis of cases ending up in detection errors ....................................................................................... 42 Table 7: Main add-on privacy techniques are the following: .................................................................................. 42 Table 8: Main “new” piracy systems include the following ..................................................................................... 44 Table 9: Categories of content and scope of products and services covered ........................................................ 52 st Table 10: Sources, 1 module ................................................................................................................................. 53 nd Table 11: Sources, 2 module ................................................................................................................................ 54 st Table 12: Results of the 1 module: Volumes of content legally and illegally consumed par category of content ... 56 st Table 13: Results of the 1 module: Volumes of content consumed through illegal distribution channels .............. 57 nd Table 14: Results of the 2 module: Volumes of content consumed per device ..................................................... 57 Figure 1: Publishing the file with BitTorrent ............................................................................................................... 8 Figure 2: Receiving the file with BitTorrent ............................................................................................................... 8 Figure 3: Receiving the file after the source has left the swarm ................................................................................ 9 Figure 4: Integration of DHT, PEX and Magnet Links on a P2P and trackerless network ....................................... 10 Figure 5: Operating principles of Content ID ........................................................................................................... 12 rd Figure 6: Screenshot of a Periscope stream, from a TV set (Mayweather-Pacquiao fight, 3 May 2015) .............. 13 Figure 7: UltraViolet offering ................................................................................................................................... 15 Figure 8: UltraViolet satisfaction ............................................................................................................................. 15 Figure 9: Upgrade of the DRL account by the user for digital content purchase ..................................................... 16 Figure 10: Disc to digital process .............................................................................................................................