Zachary Elinson CS 3111 Spring 2020 Table of Contents

Total Page:16

File Type:pdf, Size:1020Kb

Zachary Elinson CS 3111 Spring 2020 Table of Contents Zachary Elinson CS 3111 Spring 2020 Table of Contents Technical Ethical Theories Background History Aftermath P2P Sharing Foundation Reservella Rule Utilitarianism Torrents Purpose Persistence Act Utilitarianism BitTorrent Projects The Hydra Bay Magnet Links Trial The Future Domain Names Convictions Peer-to-Peer Sharing “Pure” Peer-to-Peer Network ❑ Decentralized ❑ Reliable ❑ Unsafe ❑ No structure Peer-to-Peer Sharing “Hybrid” Peer-to-Peer Network ❑ Centralized ❑No redundancy ❑ Vulnerable ❑ Protects users Torrent Overview Torrent File ❑ Metadata ❑ No content ❑ Values hashed ❑ Needs tracker Torrent Overview Tracker ❑ Server ❑ Manages connections ❑ Groups users, ‘swarm’ ❑ The ‘middleman’ BitTorrent Protocol Software ❑ Calculates ID ❑ Locates data ❑ Sorts data Terminology ❑ “Peer” ❑ “Seeder” ❑ “Leecher” Magnet Links ❑ Unique value ❑ Tracker unnecessary ❑ Impossible to stop ❑ Extremely small size ❑ 1,643,194 links ≈ 90 mb Example: magnet:?xt=urn:btih:6bd956b1844ee643f51856d636eda1cbbe9a9fcc&dn=The.Big.Bang.Theory.S03E08.The.Adhesive.Duck.Deficiency.HDTV.Xvi Domain Names ❑ Address alias ❑ Suffix = location, purpose ❑ Approved by ICANN ❑ thepiratebay.se, thepiratebay.org Foundation of the Pirate Bay 2001 : Rasmus Fleischer, Piratbyrån 2003 : Peter Sunde, Gottfrid Svartholm, Fredrik Neij 2004 : 1 million users 60,000 torrents 2006 : 2.5 million users Purpose of The Pirate Bay Associated Projects PeRiQuito - ISP ❑ Neij, Svartholm ❑ Hosts WikiLeaks “…firm believers in freedom of speech, commerce, and the right to privacy and anonymity…” - PRQ Associated Projects PirateBrowser Mozilla Firefox + Vidalia ❑ Released August 10th, 2013 ❑ Plugins, add-ons, proxy settings ❑ Bypass blocks Associated Projects Playble – Music Store ❑ April 30th, 2007 ❑ “pay what you can afford” ❑ Nonprofit ❑ Payout by downloads ❑ Rejected by labels Humble Bundle Digital Game Store ❑ November 24th, 2010 ❑ “pay what you want” ❑ Revenue divided ❑ 12 million unique customers ❑ $174 million donated to charity 2006 Raid ❑ March : 2.5 million users ❑ MPAA demands action ❑ March 31st : TPB goes offline. ❑ April 3rd : TPB online. ❑ May : 12 million users ❑ Alexa ranked 73rd 2008 Trial ❑Sunde, Neij, Svartholm, Lundström charged ❑“promoting other people’s infringements of copyright laws” ❑17 plaintiffs ❑$15 million USD in damages ❑Half of charges dropped “The case against The Pirate Bay was not the fight against illegal downloading of their works but a 2008 Trial fight to preserve the monopoly on the distribution means” – European Digital Rights Verdict: Guilty ❑ $3.6 million, 1 year prison ❑ Prison 4-10 months by appeal ❑ $6.5 million by appeal ❑ 2nd appeal denied ❑ TPB still active “A person who is holding someone’s coat while they assault someone else is complicit in the crime.” – Prosecutor Hakan Roswall Västervik Prison, 2014 Reservella, Ltd. ❑Founders sold TPB, 2006 ❑Seychelles-based shadow firm ❑Nonprofit ❑No paper trail ❑No employees The Hydra Bay ❑2014 raid ❑Two weeks offline ❑TPB source on GitHub ❑397 clones of TPB < 1 week ❑70 domain names The Future of The Pirate Bay ❑Piracy decline, 2014 ❑Abundant subscriptions, 2019 ❑80% streaming-related ❑Exclusive content ❑“Monopolistic distribution” The Future of The Pirate Bay The Future of The Pirate Bay ❑DRM “stops” copying ❑License, not owned ❑“Locked in” to company ❑Remove DRM, reduce piracy ❑38% of music pirates pay ❑34.7% “region locked” ❑80% of files legal Rule: If I can share information for free using The Pirate Bay, then I should. Rule Utilitarianism Benefits: ❑ Sum of knowledge increases Sharing Free ❑ Accessibility Information ❑ Derivative work ❑ Expose corruption ❑ Innovation ❑ Collaboration Judgement: Moral Drawbacks: ❑ Less/no business profit ❑ Fake information Rule ❑ Illegal information Utilitarianism Scenario: Allow the The Pirate Bay to exist. Act Utilitarianism Service One-time Cost ($) Annual Cost ($) Apple TV 5 60 Shudder 6 72 Disney Plus 7 84 ❑ Average person has 3 Hulu 8 96 subscriptions Let The Pirate CrunchyRoll 8 96 Netflix 9 108 ❑ ≈ $37 / month Bay Exist? Starz 9 108 ❑ CBS All Access 10 120 47% “need” multiple subscriptions Showtime 11 132 Youtube Premium 12 144 ❑ 57% - “shows disappear HBO Now 15 180 after subscribing” Sling TV 30 360 Playstation Vue 40 480 ❑ Estimated 20% share accounts YoutubeTV 50 600 Hulu TV 55 660 ❑ 18% of 1500 admitted AT&T Now 65 780 “piracy at least once” Digital Purchase 5-20 Act Digital Rental 6 Theater Ticket 9.16 Utilitarianism United States Movie & Television Revenue: Let The Pirate 2017 : $87.36 billion 2018 : $97 billion Bay Exist? 2019 : $101 billion United States Media & Entertainment Revenue: 2019 : $717 billion Judgement: 2023 : >$825 billion Moral Estimated global lost revenue 2017 : $31.8 billion 2019 : $29.2 billion Act Utilitarianism Slide 1: “The Pirate Bay.” Wikipedia, Wikimedia Foundation, 27 Apr. 2020, http://en.wikipedia.org/wiki/The_Pirate_Bay. Slide 3: Zhang, Lily. “The Network You Forgot You Had.” The Muse, The Muse, 15 Oct. 2019, www.themuse.com/advice/the-network-you-forgot-you-had. Slide 4: https://www.researchgate.net/profile/Changhoon_Lee3/publication/259635464/figure/fig1/AS:297232688533507@1447877203422/Structure-of-a-BitTorrent-network-for-data-sharing-with- peers-on-the-network-who-receive.png Slide 5: Torrent File Editor 0.3.17.” Chocolatey, http://chocolatey.org/packages/torrent-file-editor. Slide 6: “Why are the authorities only after The Pirate Bay when there are also others, like Kickass?” Quora, 13 December 2014, https://www.quora.com/Why-are-the-authorities-only-after-The-Pirate- Bay-when-there-are-also-others-like-Kickass Slide 7: Sharma, Anchit, et al. “10 Best Free Torrent Clients for Windows and MAC ~2020.” TechWorm, 4 Feb. 2020, www.techworm.net/2018/10/torrent-downloader-10-best-torrent-clients-for- windows-2018.html. Slide 8: btarunr Feb 29th, 2012 09:19 Discuss (18 Comments). “Pirate Bay Gets Rid of Torrents, Serves Magnet Links.” TechPowerUp, 29 Feb. 2012, www.techpowerup.com/161466/pirate-bay-gets-rid- of-torrents-serves-magnet-links. Slide 9: Didactico. “Tipos De Dominios Geográficos, De País o Territoriales.” Internet Didáctica - Programas, APP, Formación y Cursos Online, 20 Nov. 2018, www.internet-didactica.es/dominios- geograficos/. Slide 10: Mejia, Paula. “Ahoy, the Pirate Bay Has Returned.” Newsweek, Newsweek, 15 Mar. 2016, www.newsweek.com/ahoy-pirate-bay-has-returned-303551. Slide 11: O'Brien, Chris. “One Of The Pirate Bay's Founders Has Been Released From Prison After Almost 6 Months.” Business Insider, Business Insider, 10 Nov. 2014, www.businessinsider.com/pirate- bay-founder-peter-sunde-released-prison-2014-11. Slide 12: Dannen, Chris. “Pirate Bay Not Dead After All.” Fast Company, Fast Company, 30 July 2012, www.fastcompany.com/1340752/pirate-bay-not-dead-after-all. Slide 13: Musicandcopyright. “Is the BBC Report on the Effectiveness of the Pirate Bay Block Missing the Point?” Music & Copyright's Blog, 18 July 2012, http://musicandcopyright.wordpress.com/2012/07/17/is-the-bbc-report-on-the-effectiveness-of-the-pirate-bay-block-missing-the-point/. Slide 14: Torres, Ida. “Amazon, Pandora Testing out Pricing of Music Streaming Services .” Android Community, Android Community, 13 Sept. 2016, http://androidcommunity.com/amazon-pandora- testing-out-pricing-of-music-streaming-services-20160913/. Slide 15: Kolar, Bradley. “PSA: Humble Bundle.” The Fanfare, http://bpsfanfare.com/9032/showcase/psa-humble-bundle/#. https://support.humblebundle.com/hc/en-us/article_attachments/218159567/Screen_Shot_2016-11-30_at_9.30.29_AM.png Slide 16: “10 Years Ago Hollywood Awoke The Pirate Bay 'Beast'” TorrentFreak, 9 Jan. 2017, http://torrentfreak.com/10-years-ago-hollywood-awoke-the-pirate-bay-beast-160531/. Slide 17: The Guardian, Guardian News and Media, www.theguardian.com/technology/piracy/2009/jun/30/all. Slide 18: https://media-exp1.licdn.com/dms/image/C4D1BAQHJ--pgMS_J1Q/company-background_10000/0?e=2159024400&v=beta&t=ypd1IjUkyisdXJW-RoW76eGBuSXqIFE7BbgN8WBTgUE Slide 19: Larsson, Daniel Goldberg and Linus. “Pirate Bay Co-Founder Peter Sunde: 'In Prison, You Become Brain-Dead'.” The Guardian, Guardian News and Media, 5 Nov. 2014, www.theguardian.com/technology/2014/nov/05/sp-pirate-bay-cofounder-peter-sunde-in-prison. Slide 20: Stenovec, Timothy. “Details on the Royal Couple's Honeymoon Destination.” HuffPost, HuffPost, 7 Dec. 2017, www.huffpost.com/entry/seychelles-map-population_n_860481. Slide 21: “The Pirate Bay Aims High with Bizarre Flying Server Scheme.” Geek.com, 20 Mar. 2012, www.geek.com/chips/the-pirate-bay-aims-high-with-bizarre-flying-server-scheme-1476755/. Slide 22: Weissman, Cale Guthrie. “The Pirate Bay's New Logo Sends a Loud Message to the Authorities Trying to Shut It Down.” Business Insider, Business Insider, 19 May 2015, www.businessinsider.com/the-pirate-bay-has-a-new-logo-with-a-clear-message-2015-5. Slide 23: “The Streaming Services Are Getting Out of Hand.” Grit Daily News, 22 Jan. 2020, http://gritdaily.com/the-streaming-services-are-getting-out-of-hand/. Slide 24: Feldman, Brian. “Piracy Is Back.” Intelligencer, Intelligencer, 26 June 2019, http://nymag.com/intelligencer/2019/06/piracy-is-back.html. Slide 25: “r/BulletBarry - Keurig Coffee DRM.” Reddit, www.reddit.com/r/BulletBarry/comments/796vzx/keurig_coffee_drm/. Krzywinski, Martin. “DRM Revolution 01.” Flickr, Yahoo!, 24 Mar. 2007, www.flickr.com/photos/fullaperture/432100462. Slide 26: “Intellectual Free Property Speech to Copyright Laws Are Anti-Free Speech: Meme on ME.ME.” Me.me, http://me.me/i/intellectual-free-property-speech-to-copyright-laws-are-anti-free- speech-10086710. Slide 28: Kim, Eddie. “After 15 Years, the Pirate Bay Still Can't Be Killed.” MEL Magazine, 23 Mar. 2020, http://melmagazine.com/en-us/story/after-15-years-the-pirate-bay-still-cant-be-killed. Slide 31: “’TPB AFK’ – Simon Klose's Documentary about The Pirate Bay out Now.” Grundversorgung 2.0, http://digitale-grundversorgung.de/blog/2013/02/21/tpb-afk-simon-kloses-documentary-about- the-pirate-bay-out-now/..
Recommended publications
  • Sistemas Distribuidos
    + Sistemas P2P Debate Rodrigo Santamaría + 2 Introducción Los sistemas P2P tienen una historia cruzada en la que se mezcla Informática Derecho Economía Política … Filosofía? + 3 P2P y Derecho Aspectos relevantes Primera generación P2P -> Juicio a Napster (1999) Culpable de ‘colaboración ilegal en la distribución de material con derechos de copia’ ‘La copia de productos comprados legalmente es ilegal si se realiza en masa/con ánimo de lucro’ Segunda generación P2P -> Juicio a Pirate Bay (2008) Culpable de ‘colaboración legal en la distribución de material con derechos de copia’ Casos tangenciales -> Megaupload (2012) Procesos legislativos -> Ley Sinde, ACTA, SOPA, PIPA + 4 P2P y Derecho Actualidad legal Directiva europea sobre derechos de copia1 – Art 15, “impuesto por enlace”: se impone un impuesto a los enlaces a contenidos con derecho de copia2 ● Antecedentes: tasa Google en España – Art 17, “filtro de subida” o “prohibición de memes”: se obliga a los servidores de implementar filtros para detectar infracciones del derecho de copia3, 4 Licencias con libertad de copia (copyleft): – Creative Commons, GPL 3.05 1 https://en.wikipedia.org/wiki/Directive_on_Copyright_in_the_Digital_Single_Market 3 Carta abierta a Axel Voss sobre el art. 15 (inicialmente 11): http://vis.usal.es/rodrigo/documentos/sisdis/seminarios/openLetterArt11.pdf 2 Opinión de Jaime Altozano (Youtuber) https://www.youtube.com/watch?v=ilEsBgbm7Fo 3 Carta abierta de Berners Lee et al. sobre el art. 17 (inicialmente 13): http://vis.usal.es/rodrigo/documentos/sisdis/seminarios/openLetterArt13.pdf 5 Declaración de Richard Stallman sobre GPL3.0 https://www.gnu.org/licenses/rms-why-gplv3.html + 5 P2P y Derecho Preguntas ¿Debe primar el derecho de copia/propiedad intelectual o el derecho de información/expresión? ¿Qué efectos tiene sobre ambos derechos la directiva sobre copyright de la UE (esp.
    [Show full text]
  • Privacy Resources 2018
    Privacy Resources 2018 By Marcus P. Zillman, M.S., A.M.H.A. Executive Director – Virtual Private Library [email protected] Privacy Resources 2018 is a comprehensive listing of privacy resources currently available on the Internet. These include associations, indexes, search engines as well as individual websites and sources that supply the latest technology and information about privacy and how it relates to you and the Internet. The below list of sources is taken from my Subject Tracer™ Information Blog titled Privacy Resources and is constantly updated with Subject Tracer™ bots from the following URL: http://www.PrivacyResources.info/ These resources and sources will help you to discover the many pathways available to you through the Internet to find the latest privacy sources and sites. Figure 1: Privacy Resources 2018 Subject Tracer™ Information Blog 1 [Updated: April 1, 2018] Privacy Resources 2018 White Paper Link Compilation http://www.PrivacyResources.info/ [email protected] Voice: 800-858-1462 © 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018 Marcus P. Zillman, M.S., A.M.H.A. Privacy Resources 2018: 10 Best Security and Privacy Apps for Smartphones and Tablets http://drippler.com/drip/10-best-security-privacy-apps-smartphones-tablets 10 Minute Mail http://10minutemail.com/10MinuteMail/index.html 10 Privacy Gadgets To Help You Keep a Secret http://www.popsci.com/keep-your-secrets-a-secret 10 Reasons to Use a VPN for Private Web Browsing http://netforbeginners.about.com/od/readerpicks/tp/Reasons-to-Use-a-VPN-Service.htm
    [Show full text]
  • UC Riverside UC Riverside Electronic Theses and Dissertations
    UC Riverside UC Riverside Electronic Theses and Dissertations Title Sonic Retro-Futures: Musical Nostalgia as Revolution in Post-1960s American Literature, Film and Technoculture Permalink https://escholarship.org/uc/item/65f2825x Author Young, Mark Thomas Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA RIVERSIDE Sonic Retro-Futures: Musical Nostalgia as Revolution in Post-1960s American Literature, Film and Technoculture A Dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in English by Mark Thomas Young June 2015 Dissertation Committee: Dr. Sherryl Vint, Chairperson Dr. Steven Gould Axelrod Dr. Tom Lutz Copyright by Mark Thomas Young 2015 The Dissertation of Mark Thomas Young is approved: Committee Chairperson University of California, Riverside ACKNOWLEDGEMENTS As there are many midwives to an “individual” success, I’d like to thank the various mentors, colleagues, organizations, friends, and family members who have supported me through the stages of conception, drafting, revision, and completion of this project. Perhaps the most important influences on my early thinking about this topic came from Paweł Frelik and Larry McCaffery, with whom I shared a rousing desert hike in the foothills of Borrego Springs. After an evening of food, drink, and lively exchange, I had the long-overdue epiphany to channel my training in musical performance more directly into my academic pursuits. The early support, friendship, and collegiality of these two had a tremendously positive effect on the arc of my scholarship; knowing they believed in the project helped me pencil its first sketchy contours—and ultimately see it through to the end.
    [Show full text]
  • Malware Extorts Cash from Bittorrent Users | Torrentfreak
    Malware Extorts Cash From BitTorrent Users | TorrentFreak http://torrentfreak.com/malware-extort-cash-from-bittorrent-use... TorrentFreak Home Contact About Archives Forum Malware Extorts Cash From BitTorrent Users Written by enigmax on April 11, 2010 A new type of malware is riding the wave of file-sharing pre-settlement letters by infecting BitTorrent users’ machines and then demanding payments in order to make imaginary lawsuits go away. ICPP Foundation try to give the impression they are RIAA and MPAA affiliated but the whole thing is a scam to extort cash and obtain credit card details. ICCP Foundation claims to be an international company operating out of Switzerland. They say they are “committed to promoting the cultural and economic benefits of copyright” while assisting their partners to fight “copyright theft around the world”. In fact what they really do is operate a scam to extort money from BitTorrent users. Right at this moment we are unsure of the exact route of infection, but somehow malware (probably in either fake file or attached virus form) is displaying a “copyright violation alert” on the victim’s screen, locking it, and redirecting users to the ICPP site where they are told they have been caught infringing copyright. There they are warned their offenses could result in 5 years in prison and a $250,000 fine and are given the option to take the (fake) case to court. They are also offered a chance to make the whole thing go away for the payment of a ‘fine’ of around $400. Victims are also prompted to give their name, address and full credit card details – it is unclear how this information is further abused but it doesn’t look good.
    [Show full text]
  • Swedish Film New Docs #3 2012
    Swedish Film NEW DOCS FALL 2012 / WINTER 2013 After You The Clip Colombianos Dare Remember Days of Maremma Everyone Is Older Than I Am Fanny, Alexander & I For You Naked Give Us the Money Le manque The Man Behind the Throne Martha & Niki No Burqas Behind Bars Palme The Sarnos She Male Snails She’s Staging It Sing, Sing Louder Storm In the Andes The Stripper TPB AFK Tzvetanka The Weather War The Wild Ones Welcome to the world of Swedish docs! This year has been a real success, starting at the Sundance Film Festival where Big Boys Gone Bananas!* by Fredrik Gertten and Searching for Sugar Man by Malik Bendjelloul competed and Sugar Man got both the Audience Award and the Jury Special Prize. These two titles are now up for the Oscar nomination run. Domestically we’ve had the best year in the cinemas for Swedish docs since 1979. Titles like Palme by Kristina Lindström and Maud Nycander with an audience over 150.000, and still growing, Searching for Sugar Man, For You Naked by Sara Broos and She Male Snails by Ester Martin Bergsmark have all attracted large audiences. The film critics are also overwhelmed; of all Swedish films that premiered during 2012 so far, five docs are at the top! And more is to come, you now hold in your hands the new issue of Swedish Film with 24 new feature documentaries, ready to hit international festivals and markets such as DOK Leipzig, CPH:DOX and IDFA. Please visit our website www.sfi.se for updated information on Swedish features, documentaries and shorts.
    [Show full text]
  • IIT Bombay X - Fdp101x Foundation Program in ICT for Education Course Journal
    IIT Bombay X - FDP101x Foundation Program in ICT for Education Course Journal Prepared by S. Suneel Kumar Associate Professor, VJIT College of Engineer, Hyderabad, Telangana. Page 0 INDEX o INTRODUCTION TO FDP o WEEK-1: MOVING FROM PHYSICAL TO ONLINE CLASSROOMS o WEEK-2: WEB PRESENCE FOR TEACHERS o WEEK-3: LEARNING MANAGEMENT SYTEMS & FLIPPED CLASSROOM ACTIVITY, VISUAL PRESENTATION SKILLS o WEEK-4: CREATING YOUR OWN VIDEO RESOURCES o WEEK-5: PUTTING IT ALL TOGETHER o CONCUSION S. Suneel kumar Page 1 INTRODUCTION Teaching is a continual process to share the information to students or mentors through various processes like traditional teaching method using blackboard & chalk. As technology developed this type of traditional teaching may not reaching to brains of students. Now technical aspects of teaching required for students. For this teacher and students both should be technically skilled to teach and learn. This FDP on “Foundation program in ICT for Education” helpful for teacher to implement the Hybrid Technology in teaching. This course contents helpful in learning aspects related to basic computer applications utilization in preparation of contents, visual presentation skills, data storage and implementation through wordpress, course contents by using moodle and drupal, screen cast recording of video and creative contents preparation. This course helps in preparation of video to implementation of course for hybrid teaching process. S. Suneel kumar Page 2 1) INTRODUCTION TO FDP 1. Introduction by Prof. Deepak Phatak, the Principal Investigator of T10KT project at IIT bombay. 2. Introduction focused on reasons for technology education from conventional or tradition education as information provider to become learning facilitators.
    [Show full text]
  • Custostech Economic White Paper
    The Economics of Digital Piracy and CustosTech tech WP 01/2014 June 2014 Executive Summary Custos Media Technologies (CustosTech) provides a novel approach to fighting digital piracy. While the technology itself is cutting edge, the true innovation of the technology is a behavioural one: the incentive structure of the pirating community is warped, leading to a discontinuation of piracy. To understand the innovation, this white paper sets out to explain !the piracy ecosystem within which the technology will be effective. ! The consumer and producer welfare functions are considered from a theoretical point of view. These functions explain the incentive of consumers to choose to pirate movies: consumers who expect a larger net-gain to their utility from piracy will opt to do so. This net gain is determined by the relative valuations of legal to illegal copies, and the relative cost of use. Staying with theoretical considerations, the options facing producers to limit !piracy are investigated: pricing, protection, and value-adding. ! This theoretical framework is then used to understand the incentive structures governing the players in the ecosystem: hosts, uploaders and downloaders. Hosts are found to be almost exclusively profit-motivated, with uploaders motivated by profit or altruism. Downloaders are split into four categories, depending on their main motivation or justification for pirating. An analysis of incumbent anti-piracy technologies shows that these technologies are almost all ineffective, sometimes even acting to increase the !preference for piracy.! With this background, the need for a new solution becomes all too apparent. The CustosTech technology is considered within the piracy framework, and the technological and economic effects explained.
    [Show full text]
  • Antifragile White Paper Draft 3.Pages
    Piracy as an Antifragile System tech WP 01/2015 July 2015 Executive Summary Attacks on the piracy economy have thus far been unsuccessful. The piracy community has not only shown resilience to these attacks, but has also become more sophisticated and resilient as a result of them. Systems that show this characteristic response to ex- ternal stressors are defined as antifragile. Traditional centralized attacks are not only ineffective against such systems, but are counter-productive. These systems are not impervious to attacks, however. Decentralized attacks that warp the connections between nodes destroy the system from within. Some system-based attacks on piracy have been attempted, but lacked the technology required to be effec- tive. A new technology, CustosTech, built on the Bitcoin blockchain, attacks the system by turning pirates against each other. The technology enables and incentivizes anyone in the world to anonymously act as an informant, disclosing the identity of the first in- fringer – the pirate uploader. This internal decentralized attack breaks the incentive structures governing the uploader-downloader relationship, and thus provides a sus- tainable deterrent to piracy. Table of Contents Introduction to Antifragility 1 Features of Antifragile Systems 1 Piracy as an Antifragile System 2 Sophisticated Pirates 3 Popcorn Time 5 Attacking 5 Antifragile Systems 5 Attacking Piracy 5 Current Approaches 6 New Tools 6 How it Works 7 Conclusion 7 White paper 01/2015 Introduction to Antifragility Antifragility refers to a system that becomes bet- ter, or stronger, in response to shocks or attacks. Nassim Taleb developed the term1 to explain sys- tems that were not only resilient, but also thrived under stress.
    [Show full text]
  • UK Blocking-2015-12-07-Brd
    THE EFFECT OF PIRACY WEBSITE BLOCKING ON CONSUMER BEHAVIOR Brett Danaher‡ [email protected] Michael D. Smith† [email protected] Rahul Telang† [email protected] This Version: November 2015 Acknowledgements: This research was conducted as part of Carnegie Mellon University’s Initiative for Digital Entertainment Analytics (IDEA), which receives unrestricted (gift) funding from the Motion Picture Association of America. Danaher acknowledges support from an NBER Economics of Digitization research grant. This research was conducted independently without any oversight or editorial control. The authors presented this paper at the December 2014 Workshop on Information Systems and Economics and to seminar participants at the University of Arizona’s Eller School of Management and thank participants for their helpful feedback. All findings and errors are entirely our own. ‡ Department of Economics, Wellesley College, Wellesley, MA, 02481 † School of Information Systems and Management, Heinz College, Carnegie Mellon University, Pitts- burgh, PA, 15213. THE EFFECT OF PIRACY WEBSITE BLOCKING ON CONSUMER BEHAVIOR ABSTRACT Understanding the relationship between copyright policy and consumer behavior is an in- creasingly important topic for participants in digital media markets. In this paper we seek to study how consumer behavior changes when Internet Service Providers are required to block access to major piracy websites. We do this in the context of two court-ordered events affecting consumers in the UK: The blocking order directed at The Pirate Bay in May 2012, and blocking orders directed at 19 major piracy sites in October and November 2013. Our results show that blocking The Pirate Bay only caused a small reduction in total pira- cy — instead, consumers seemed to turn to other piracy sites or Virtual Private Networks that allowed them to circumvent the block.
    [Show full text]
  • You Are Not Welcome Among Us: Pirates and the State
    International Journal of Communication 9(2015), 890–908 1932–8036/20150005 You Are Not Welcome Among Us: Pirates and the State JESSICA L. BEYER University of Washington, USA FENWICK MCKELVEY1 Concordia University, Canada In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks Introduction Digital piracy is most frequently framed as a challenge to property rights or as theft. This framing is not incorrect, but it overemphasizes intellectual property regimes and, in doing so, underemphasizes the broader political challenge posed by digital pirates. In fact, digital pirates and broader “hacker culture” are part of a political challenge to the state, as well as a challenge to property rights regimes. This challenge is articulated in terms of contributory culture, in contrast to the commodification and enclosures of capitalist culture; as nonhierarchical, in contrast to the strict hierarchies of the modern state; and as faith in the potential of a seemingly uncontrollable communication technology that makes all of this possible, in contrast to a fear of the potential chaos that unsurveilled spaces can bring.
    [Show full text]
  • Download Torrent File Href=Magnet Download Torrent File"" Href=""Magnet: Last Active: Oct 26, 2014 Threads: 13 Posts: 20
    download torrent file href=magnet Download torrent file"" href=""magnet: Last Active: Oct 26, 2014 Threads: 13 Posts: 20. Last Active: Jun 05, 2017 Threads: 308 Posts: 515. i've read from the old suprbay about magnet links being set as default, and torrent links only be used for torrents below 10 peers. Last Active: Oct 02, 2019 Threads: 48 Posts: 2,385. Last Active: Jul 10, 2020 Threads: 0 Posts: 3. Last Active: Jul 12, 2018 Threads: 54 Posts: 2,462. Torrent links haven't appeared on the site since it returned 18 months ago. They never will again. The Download link is advertising, deliberately deceptive advertising at that, fuck knows what clicking it will result in but I wouldn't expect it to be anything good. Download torrent file"" href=""magnet: Last Active: Sep 11, 2020 Threads: 242 Posts: 604. credits to my friend suzitastik With the widespread use of magnet links on various sites, many people with seedboxes ask how to get the .torrent file from the Magnet Link to add to rutorrent. Firstly find the torrent you want. Right click on the red Magnet Link icon. Copy Link Address. Go to rutorrent client, click ADD torrent. This will open up a box. Choose Add Torrent URL > paste URL. The .torrent should now be successfully added to rtorrent. All Done ! I hope this helps some people. Please add anything to improve this process. Given a .torrent file how do I generate a magnet link in python? [closed] I need a way to convert .torrents into magnet links.
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]