|
Peer to Peer The 3rd millenium technology! |
|
Thread Tools | Search this Thread | Display Modes |
29-06-02, 08:22 PM | #2 |
my name is Ranking Fullstop
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
|
This strategy is doomed from the start...if you did happen to d/l a spoof, you'd delete it - end of story.
Last edited by theknife : 29-06-02 at 08:36 PM. |
29-06-02, 08:25 PM | #3 |
yea, it's me.
Join Date: Jan 2002
Location: usa
Posts: 2,093
|
Hmmmm
Spoofing........sorta has a ring of familiarity to it, doesn't it?
you Hillary & Co. |
30-06-02, 04:10 AM | #4 |
- a rascal -
Join Date: Mar 2002
Location: for security reasons, never the same as the President's
Posts: 759
|
as usual, they're fixated on suppressing the symptoms (people downloading free music off the Net) rather than the disease (record companies overcharging, and overcharging for an outdated delivery system at that).
__________________
Your prompt response is requested. Respectfully, Mark Weaver, Director of Enforcement MediaForce, Inc. (212) 925-9997 |
30-06-02, 08:30 AM | #5 | ||
just one of the gang...
Join Date: May 2001
Posts: 1,777
|
Quote:
from article Quote:
the hunt is on!!! to them to u, knife
__________________
"rock on, all" |
||
30-06-02, 09:05 AM | #6 |
my name is Ranking Fullstop
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
|
in the article, they used Sheryl Crow's Soak Up The Sun as an example - so I figured I'd download it just to see how hard it was....
...and I got 5 good copies in about 5 minutes. But it's interesting how they would have to execute this strategy...set up multiple user accounts on the P2P networks, with multiple libraries, with hard drives full of spoofs. The article reads like this stuff gets into the P2P networks and runs wild, but I don't see it happening like that. I would think, in most cases, the spoof would get no further than the first time it is d/l'd by any given user. I think I'll join you in that beer, Nanook |
30-06-02, 11:57 PM | #7 | |
Just another cat on the FastTrack...
Join Date: Jan 2002
Location: Hamilton
Posts: 727
|
Quote:
|
|
01-07-02, 12:10 AM | #8 |
Senior Napsterite
Join Date: Jun 2000
Posts: 1,691
|
I already ended up with a spoofed file. Right before audioglaxy stopped sharing I wasn trying to get No Doubt's Hella Good, well the first one I got was a 4 minute long continuous loop of the chorus. I found the real song when my searching came up with "real version - No Doubt - Hella Good"
It still is dumb to try and spoof the song though. |
01-07-02, 12:18 AM | #9 |
Registered User
Join Date: Apr 2001
Location: Vancouver, Canada
Posts: 454
|
This is bad news for the more open networks as it suggests the labels will also employ other more effective technological measures to deter pirates.
One things I've being worried about for a few months now is the potential for injecting garbage data into a multi-source download. Someone, either a concern rightsholder or a malicious user, could make a client that claims to be a source for a file, then sends out random data. The result would be an mp3 with noise and seek errors. I haven't been able to think of a good way to protect against this. |
01-07-02, 03:07 AM | #10 | |
Madame Comrade
Join Date: May 2000
Location: Area 25
Posts: 5,587
|
Quote:
The above measures still leave the problem of 'original fakes' - deceptively named junk files fed into the network. Open networks without verifiable peer identities and trust relationships will remain vulnerable to bad original data even if the problem can be partially adressed by publishing hash numbers for good rips. - tg |
|
01-07-02, 04:14 AM | #11 |
Join Date: Mar 2000
Posts: 2,160
|
|
01-07-02, 04:26 AM | #12 |
- a rascal -
Join Date: Mar 2002
Location: for security reasons, never the same as the President's
Posts: 759
|
re hashing and avoiding duds/spoofs/garbage
is anyone here participating in Bitzi? It seems to be a client/protocol-independent hashing system, with submissions of verified files by users. Not sure how it works really.
__________________
Your prompt response is requested. Respectfully, Mark Weaver, Director of Enforcement MediaForce, Inc. (212) 925-9997 |
01-07-02, 02:35 PM | #13 | |
Registered User
Join Date: Apr 2001
Location: Vancouver, Canada
Posts: 454
|
Quote:
|
|
01-07-02, 02:52 PM | #14 |
Registered User
Join Date: Apr 2001
Location: Vancouver, Canada
Posts: 454
|
Never mind, I started doing the math and it's not as bad as I thought.
Say you have an X byte file. If you download in 10,000 byte (hundreth of a megabyte) chunks from each source, then there will be X/10,000 chunks to verify. Assuming a 32 bit = 4 byte hash for each chunk, that's X/100,000*4 bytes worth of hash information. So, hash information will make up only X/10,000*4/X=.04% of the total download, which is a trivial amount, even if it has to be retrieved for each source. |
01-07-02, 03:18 PM | #15 |
Who's really in control here? Help me...
Join Date: Jan 2002
Posts: 222
|
Creating fakes for music files is kind of a wasted effort in my opinion. For the most part mp3's download relatively fast. It can be a pain for 56k users, but they are still relatively fast compared to movies and software. Also since broadband users can download mp3's quickly, they can easily figure out which ones are real and which are fake, which in turn tells others which ones are fake and which ones are real by simply sharing it. The mp3 files that are shared by many users tend to be correct. If not with that many sources it takes me about a minute or less to download and see if it's real or not.
|
01-07-02, 03:28 PM | #16 | |
Napsterite
Join Date: Apr 2002
Posts: 138
|
Quote:
|
|
01-07-02, 03:58 PM | #17 |
Oddball
Join Date: Feb 2002
Location: Pond
Posts: 140
|
I don't see what the problem is.
The article mentions billboard pop, so they're trying to stop people getting the same stuff they're labelling as 'tasteful' while stuffing it down the average consumer's throat till it's coming out of his ears. |
01-07-02, 05:10 PM | #18 | |
Madame Comrade
Join Date: May 2000
Location: Area 25
Posts: 5,587
|
Quote:
Your calculation demonstrates how just a small stream of extra hash information can give us safe multisourced downloads from partially completed files. That is just about as good as it can get at the file transfer level and makes possible fast cascade-like distribution of huge files. It is enough that there is a single source with the complete original file to calculate the hash numbers for all data chunks included. With that information available the potential downloaders can start searching for the content itself and - as soon as some content becomes available - form a cascade of simultaneously downloading and uploading nodes. In case of large files the hash numbers themselves could be packed into separate, sharable metaobjects verified by their own hash numbers. For example a 650 MB movie would produce 65.000 10 kB data chunks and with 4 byte hash size this would be approximately 65.000 x 4 = 260 kB of hash data - enough to justify a separate, multisourcable object. eDonkey must use some sort of chunk hashing mechanism and I also remember reading recently about a Gnutella client experimenting with similar technology. - tg |
|
Thread Tools | Search this Thread |
Display Modes | |
|
|