|
Peer to Peer The 3rd millenium technology! |
|
Thread Tools | Search this Thread | Display Modes |
|
12-01-05, 02:33 AM | #1 |
Madame Comrade
Join Date: May 2000
Location: Area 25
Posts: 5,587
|
Risks increase for first copy uploaders on BT & ed2k
mi2n:
BayTSP Launches New Service That Identifies First Uploads To EDonkey, Bit Torrent P2P File-Sharing Networks BayTSP, a leading provider of online intellectual property monitoring and compliance systems, announced FirstSource, an automated system that identifies the first users to upload copyright- or trademark-protected content to the eDonkey and Bit Torrent peer-to-peer (P2P) networks. Identifying the first individuals who upload illegal content allows companies to track all subsequent users who download and share a particular file. Initial tests of the FirstSource service indicate that several thousand copies of a movie available for download on the eDonkey and Bit Torrent networks can be traced back to the initial uploaded file. "Pirated copies of movies and software typically appear online within hours of release," said Mark Ishikawa, CEO of BayTSP. "Identifying and taking action against the first uploaders can greatly slow the distribution of illegally-obtained intellectual property and might make users think twice before doing it." EDonkey and Bit Torrent are two of the most popular file sharing networks and use a technique called swarming that allows users to download slices of a file - like a pirated movie or software application - from multiple other users simultaneously. As users download a file, they also share the portions they've already received. FirstSource monitors for the first uploads of a client's intellectual property to the eDonkey and Bit Torrent networks. When the system spots a file name matching the client's content, it initiates a download to confirm that the file is what it appears to be. Once the content is validated, the system captures the IP (Internet Protocol) address and identifying information of other users downloading and sharing the pirated material. The system also logs which portions of the file that each user shares. This data is stored in an infringement database as evidence in the event the client decides to pursue litigation against the file sharers. Clients can monitor the system via a Web-based interface and have the option of automatically or manually issuing Digital Millennium Copyright Act-compliant take down notices, even while the downloads are still in progress. |
12-01-05, 05:17 AM | #2 |
Thanks for being with arse
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
|
bad news...thats really going to throw a spanner in the works..
|
12-01-05, 05:10 PM | #3 |
my name is Ranking Fullstop
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
|
it's only going to work on copies of releases that are registered to specific individuals or organizations, right? so while it might slow the initial upload of a new release to the Internet, it's not going to mean much once the movie goes to dvd. in addition, how long before someone figures out how to strip the FirstSource encryption? as we all know, in the arms race of DRM, for every measure, there's usually a countermeasure - and there's folks out there who live for this kind of challenge
|
12-01-05, 05:23 PM | #4 | |
Madame Comrade
Join Date: May 2000
Location: Area 25
Posts: 5,587
|
Quote:
- tg |
|
13-01-05, 05:20 AM | #5 | |
my name is Ranking Fullstop
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
|
Quote:
|
|
13-01-05, 08:17 AM | #6 | |
Madame Comrade
Join Date: May 2000
Location: Area 25
Posts: 5,587
|
Quote:
With a fully recorded distribution history the bad guys can then file a John Doe case against the original source, to force the ISP to reveal who had the IP number at the given time etc. - tg |
|
Thread Tools | Search this Thread |
Display Modes | |
|
|