P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 24-06-20, 06:15 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default Peer-To-Peer News - The Week In Review - June 27th, ’20

Since 2002































June 27th, 2020




‘Largest Distributed Peer-To-Peer Grid’ On The Planet Laying Foundation For A Decentralized Internet
John Koetsier

A project to decentralize the internet that you’ve never heard of has more capacity than all other blockchain projects put together: 5-10X more, according to its founder.

The project is called ThreeFold, and it’s not your typical blockchain startup.

Just one reason? They don’t talk much.

That seems almost heretical for blockchain projects, which typically talk more than they code, but this isn’t your typical pump-and-dump crypto play. Instead, it’s a long-term project to rewire the internet in the image of its first incarnation: decentralized, unowned, accessible, free.

“We have 18,000 CPU cores and 90 million gigabytes, which is a lot of capacity,” founder Kristof de Spiegeleer told me recently on the TechFirst podcast. “It’s probably between five and ten times more than all of the capacity of all the blockchain projects together.”

Before you get too excited about those numbers, which are impressive, six years ago Amazon had 1.4 million servers. Five years ago, every single day, Amazon added the capacity of a $7 billion corporation. Safe to say the giants like Amazon and Google have many hundreds of times more capacity, which de Spiegeleer knows very well.

Still, the journey of a thousand miles starts with a single step, right?

“Less than 20 companies actually own more than 80% of the internet capacity, which is the storage and the compute,” de Spiegeleer told me. “It really needs to be something like electricity. It needs to be everywhere and everyone needs to have access to it. It needs to be cost effective, it needs to be reliable, it needs to be independent.”

Here’s a simple example.

You use the internet to send a message on a messaging service to a family member across town. As you click Send, the message will most likely travel across your continent and perhaps across an ocean, hit a number of companies’ servers along the way, then ping back, likely on a different route, hitting multiple other companies’ servers as well before arriving at a relatively local switch, ISP, wires, WiFi, and then making it down to your mom’s phone.

That’s a journey of a few city blocks that can easily turn into a global circumnavigation.

And while “I love you mom” might not be relevant to national security, unless it’s encrypted — and even if it is, in some cases — it’s readable all the way.

The alternative? In a mesh distributed internet, your message to mom might make a couple of hops over local computers, maybe a local ISP, and ping right down to her having traveled not much more than the straight-line distance between you and your favorite parent.

“It’s a movement,” de Spiegeleer says about ThreeFold. “It’s where we invite a lot of people to ... basically help us to build a new internet. Now it sounds a little bit weird building a new internet. We’re not trying to replace the cables ... what we need help with is that we get more compute and storage capacity close to us.”

That would be a fundamentally different kind of internet: one we all collectively own rather than just one we all just use.

It requires a lot of different technology for backups and storage, for which ThreeFold is building a variety of related technologies: peer-to-peer technology to create the grid in the first place; storage, compute, and network technologies to enable distributed applications; and a self-healing layer bridging people and applications.

Oh, and yes. There is a blockchain component: smart contracts for utilizing the grid and keeping a record of activities.

“Farmers” (read: all of us) provide capacity and get micropayments for usage.

So instead of a Bitcoin scenario where some of the fastest computers in the world waste country-scale amounts of electricity doing arcane math to create an imaginary currency with dubious value (apologies, are my biases showing?) you have people providing actual tangible services for others in exchange for some degree of cryptocurrency reward. Which, in my (very) humble opinion, offers a lot more social utility.

It’s a big vision.

A very big vision.

When I asked what de Spiegeleer thought about his chances of actually pulling it off — blockchain projects have a very dismal record of success, or lack thereof — he seemed almost offended.

“We’re doing it ... it’s only now that we start talking, you know, but I’m literally working on this all my life,” he told me. “And actually when the Corona thing started, it was really this moment for me, like, okay, now is the time. Now is the time that we have to go out and start talking about this and show people that actually it exists, because it’s not a dream of something in the future.”

ThreeFold and partners have invested more than $40 million in make it happen, de Spiegeleer says, and there are more than 30 partners working on the project or onboarding shortly.

“So it’s happening,” he says.
https://www.forbes.com/sites/johnkoe.../#73025726798f





Elon Musk Invites Users to Test Starlink Space Internet

The SpaceX CEO now has 500 satellites orbiting earth, and is primed for internet broadband trials this summer.
Adriana Hamacher

Elon Musk's SpaceX is aiming to start a commercial serice in 2021.

In brief

• SpaceX has announced that its looking for beta-testers for its Starlink satellite constellation.
• The startup has launched 500 satellites into earth's orbit this year, with the aim of providing Internet coverage to most of the world by 2021.
• It plans to begin trial of the space-based Internet broadband platform this summer.

Elon Musk’s company SpaceX is inviting people to beta-test its Starlink satellites—a mega-constellation promising access to the Internet from virtually anywhere on earth.

The $36 billion company now has over 500 satellites in orbit. Last week it announced that trials of its space-based Internet platform could start within weeks.

An invitation to sign up for Starlink updates was published on the startup’s website. Users sign up with an email address and zip code, and are told Starlink will begin beta-testing this summer in the Northern hemisphere. The company promises to notify everyone with the right zip code if trials are going on in their area.

Seattle and Germany, are thought to be in the running for the first batch of trials, according to past tweets from Musk.

SpaceX satellites have the bold aim of bridging the digital divide. Half the world—predominantly poor and rural communities—still has no Internet access, or suffers from poor connectivity and prohibitively expensive services.

Starlink is set for a commercial launch in North America later this year. Musk’s ultimate aim is a mesh of thousands of satellites, providing Internet services almost anywhere in the world by 2021.

Starlink’s initial aim is to serve areas with poor internet connection, but Musk plans to provide low-cost internet services in urban areas, too. The satellite-based platform promises speeds of one gigabit per second, at a latency of around 30 milliseconds—that’s enough for fast-response video gaming, at a competitive level, according to Musk. For comparison, the average broadband speed in the UK is 64 megabits per second.

But these ambitious plans have drawn fire from stargazers. They complain that light pollution is a feature of the mega-constellations, because of the bright trails they leave across the night sky. SpaceX has promised to fit ‘sunshades’ to the satellites to help solve this problem.

Various competitors are also planning and launching so-called Low-Earth-Orbit constellations—including OneWeb, Amazon, Facebook, Space Norway, and Telesat. Musk has even offered to launch his competitors’ satellites into space, for a fee of course.
https://decrypt.co/33080/elon-musk-i...space-internet





The House Has a Universal Fiber Broadband Plan We Should Get Behind
Ernesto Falcon

America is behind on its transition to a 21st-century, fiber-connected Internet with no plan for how to fix the problem. Until today. For the first time, legislation led by Majority Whip James Clyburn would begin a national transition of everyone’s Internet connection into multi-gigabit capable fiber optics has been introduced and is likely heading towards a vote on the House floor as part of the overall COVID-19 recovery effort. After that its future remains in the hands of the Senate.

The Accessible, Affordable Internet for All Act (H.R. 7302) would create an $80 billion fiber infrastructure program run by a new Office of Internet Connectivity and Growth that would coordinate all federal infrastructure efforts with state governments. Such an ambitious program would have the United States match China’s efforts to build universal fiber with the U.S. completing its transition just a few short years after China. Without this law, the transition would take decades. This would ensure that the multi-gigabit innovations in applications and services can be created in the United States and also used by all Americans. A universal fiber program would also allow next-generation Wi-Fi and 5G to have national coverage as well as any future iterations of wireless technology. But perhaps most importantly of all, the issue of the digital divide would be solved in its entirety and properly relegated to the history books.

Key Provisions of the Legislation Explained

Fiber is a future-proofed infrastructure that is vastly superior to the current copper and cable networks available to most people. EFF’s technical analysis shows that it will continue to leapfrog past cable, wireless, and other transmission mediums. Because it can be useful for decades, sustaining older slower networks with government funds will actually cost more in the long term. While the core of the legislation is a massive fiber infrastructure program, there are several provisions worth highlighting as they all play an integral part of achieving universal, competitive, affordable broadband networks.

The bill emphasizes open-access fiber networks that would replicate the success in Utah, where people are getting a dozen options for low priced gigabit and ten-gigabit services, including in rural markets. Building these types of networks would shatter the nearly 15-year decline into the giant monopolies or duopolies that most Americans experience when trying to get high-speed Internet access. Instead, you could get Internet access from small businesses, non-profits, and even your local schools and libraries.

The bill will also free up local governments to pursue community broadband. The removal of state laws advocated by the major national ISPs that ban local communities from building their own broadband access network is long overdue. The public sector has long ago proven essential to the effort to build universal fiber as rural cooperatives, small cities, and townships are building fiber networks in areas long ago skipped by the private sector.

While it seems small, the bill fixes a long-standing problem of Internet access in the United States by updating what we mean by broadband. Today’s federal definition of broadband was established in 2015 and stands at 25 megabits per second download and 3 megabits per second upload. This 25/3 standard makes it appear as if there are more broadband options than there truly are, hiding the monopoly. And it is a standard that can’t handle what we actually need in the 21st Century—the ability to work and study at home, for example. To fix this, the bill would establish that communities lacking 25/25 broadband are “unserved” and establish a minimum standard of 100/100 megabits per second for federally funded projects. These higher metrics are what make this a fiber infrastructure bill as older legacy networks such as DSL cannot effectively deliver these speeds.

Furthermore, it makes Internet access a right during COVID-19. Key provisions of the recently-passed-by-the-House HEROES Act ensure that if you lose Internet access due to COVID-19, the government would make sure you retain access are in the bill. Given that broadband access is an essential service now more than ever, this type of emergency connectivity assistance is important during the pandemic.

A Plan Is Finally Here, but Congress Must Be Forced to Act

The big ISPs, which fail to deliver universal access but enjoy comfortable monopolies and charge you prices at 200% to 300% above competitive rates, will resist this effort. Even when it is profitable to deliver fiber, the national ISPs have chosen not to do it in exchange for short-term profits. A massive infrastructure program, the kind that helped countries like South Korea become global leaders in broadband, aren’t just desperately needed in the United States, it is a requirement. No other country on planet Earth has made progress in delivering universal fiber without an infrastructure policy of this type.

So it is on each of us to commit to contacting our Member of the House and two Senators to demand they vote for universal fiber legislation as envisioned by the Accessible, Affordable Internet for All Act. Ending the digital divide for everyone without exception should be the key piece of the economic recovery effort of Congress. The hardships and pain so many people are facing across the country due to the failures of our past telecom policies to guarantee equality in access should be the reason we pass a law to solve those problems.
https://www.eff.org/deeplinks/2020/0...broadband-plan





Samsung Blu-ray Players Reportedly have Stopped Working but it’s Not Clear Why

Users are reporting the devices are stuck in an endless boot loop
Kim Lyons

Samsung Blu-ray players appear to be malfunctioning for hundreds of users, and no one is sure what the issue is, ZDNet reported. Some users report their Blu-ray players get stuck in an endless reboot loop when they’re switched on, others reported hearing a buzzing noise as if the device is trying to read a disk, but in many cases there’s no disk in the machine.

Some machines are shutting down soon after turning on, and still other users report their devices have become unresponsive to commands and pressing buttons. The issues don’t appear to be confined to one particular model.

On Samsung’s community support message board, some users posited the problems started with a firmware update, but ZDNet says this doesn’t appear to be the case, suggesting the likely culprit was an expired SSL certificate the Blu-ray players used to connect to Samsung’s servers.

Samsung did not immediately respond to a request for comment Saturday. Customer service representatives replying to the message board posters are telling people the company is investigating.
https://www.theverge.com/2020/6/20/2...s-ssl-firmware





Western Digital's 18TB Hard Drive Breaks Cover With $648 Price Tag

Hoard to your heart's desire.
Zhiye Liu

The WD Gold 18TB (WD181KRYZ) is one of the biggest hard drives on the market right now. Although the hard drive has yet to be spotted on U.S. soil, it's already listed at an overseas retailer, along with the 16TB (WD161KRYZ) variant.

The WD Gold 18TB belongs to Western Digital's Gold family. It comes in the 3.5-inch presentation just like your conventional SATA III hard drive. However, the WD Gold 18TB is specifically designed to operate 24/7 under the most demanding and gruesome conditions.

Unlike other WD drives that have gained a bad reputation for utilizing shingled magnetic recording (SMR) technology, the Gold drives leverage conventional magnetic recording (CMR). Therefore, you won't have to worry about the performance hit that's associated with SMR drives under continuous workloads.

Western Digital Gold Specifications

Model Number
Capacity Data Transfer Rate Cache

WD181KRYZ
18TB ? ?
WD161KRYZ
16TB ? ?
WD141KRYZ
14TB 267 MBps 512MB
WD121KRYZ
12TB 255 MBps 256MB
WD102KRYZ
10TB 262 MBps 256MB
WD8004FRYZ
8TB 255 MBps 256MB
WD6003FRYZ
6TB 255 MBps 256MB
WD4003FRYZ
4TB 255 MBps 256MB
WD2005FBYZ
2TB 200 MBps 128MB
WD1005FBYZ
1TB 184 MBps 128MB

Similar to the other Gold variants, the WD Gold 18TB is a 7,200 RPM hard drive. However, the drive's exact specifications are unknown. Western Digital hasn't updated its product page to reflect the 18TB and 16TB models.

For reference, the WD Gold 14TB, which is currently the largest drive on the list, comes equipped with a 512MB cache and flaunts a data transfer rate up to 267 MBps. We expect the higher capacity models to match -- if not surpass -- the 14TB drive's numbers here.

SPAN, a retailer in the U.K., sells the WD Gold 18TB and 16TB for $648 and $578 excluding VAT (value-added tax), respectively. This comes down to $0.036 per gigabyte on both models. The drives should be fairly cheaper in the U.S., since hardware is generally more expensive in Europe. For comparison, SPAN listed the WD Gold 14TB for $503, when the same drive only costs $449.95 in the U.S. That's a 11.78% price difference.

If we apply the same difference to the listed WD Gold 18TB and 16TB drivers, they could end up costing around $580 and $517, respectively, once they hit the shelves in the U.S. As it is the norm with WD Gold drives, Western Digital backs them up with a limited five-year warranty.
https://www.tomshardware.com/news/we...r648-price-tag





Universal Music and USC Annenberg Expand Partnership to Address Diversity

It has become abundantly clear over the past few years — not to mention the past few decades — that African-Americans and other people of color are not adequately represented in decision-making roles in the music business. In an effort to address the renewed and persistent calls for equity across industries, the University of Southern California’s Annenberg Inclusion Initiative and Universal Music Group are extending their partnership to explore ways to create change in the music industry.

According to the announcement, over the next several months, the partnership will conduct new research – examining major and independent music companies, labels and publishers, digital platforms, radio and live concert companies as well as artists’ teams, focusing on managers, agents, attorneys and publicists – to determine the extent to which men and women of color are excluded from music’s leadership ranks. With this information in hand, Annenberg will issue a report, establishing goals and providing recommendations on how the music industry can address these disparities.

“There are currently gaps in access and opportunity for people of color, especially Black executives, in the music business” said Dr. Carmen Lee, an affiliated faculty member with the Annenberg Inclusion Initiative and the lead researcher for the work. “Beyond placing a spotlight on these discrepancies, we must illuminate how the lack of people of color in key roles thwarts inclusion throughout the industry. I am eager to lead the charge, flanked by the Annenberg Inclusion Initiative, and in partnership with Universal Music Group, a company with a proven track record for change.”

Earlier this month, UMG established a Task Force for Meaningful Change intended to work as a force for inclusion and social justice by amplifying and expanding UMG’s current programs, devising new initiatives and supporting marginalized communities in the ongoing fight for equality, justice and inclusion. Its work is divided into six areas, including: Aid/Charitable Giving; Global; Internal/Institutional Change; Legislative/Public Policy; Partners; and Programming/Curation. Staffed by a group of professionals from across UMG, it is co-chaired by Jeff Harleston (UMG’s Executive VP, General Counsel, and Def Jam’s Interim Chairman and CEO) and Ethiopia Habtemariam (Motown Records’ President & EVP, Capitol Music Group).

Harleston and Habtemariam said, “We look forward to our continued work with the Annenberg Inclusion Initiative as we work to advance diversity and inclusion in all corners of the music business. We are committed not only to improving UMG’s performance, but also to fostering real and sustainable change across the entire music ecosystem. We know that music can do better and believe that, informed by research and data, change can be most meaningful and constructive.”

The project represents a second phase in the partnership between Universal Music Group and the Annenberg Inclusion Initiative. In 2017, the two groups announced a collaboration to support inclusion in music, in which the two explored questions related to the participation of women and women of color specifically in the business. Jody Gerson, Chairman and CEO of Universal Music Publishing Group was named to the Initiative’s Advisory Board.

In addition to research, the two organizations have worked together over the last two years to support the efforts of She Is The Music, a non-profit organization founded by Alicia Keys, Gerson, Ann Mincieli, and Samantha Kirby Yoh to increase the number of women working in music across a variety of positions. In January 2020, Annenberg Inclusion Initiative Founder Dr. Stacy L. Smith was named to the founding leadership board of the organization.
https://variety.com/2020/biz/news/un...ty-1234690677/





Almost 17,000 Protesters Had No Idea A Tech Company Was Tracing Their Location

Data company Mobilewalla used cellphone information to estimate the demographics of protesters. Sen. Elizabeth Warren says it’s “shady” and concerning.
Caroline Haskins

On the weekend of May 29, thousands of people marched, sang, grieved, and chanted, demanding an end to police brutality and the defunding of police departments in the aftermath of the police killings of George Floyd and Breonna Taylor. They marched en masse in cities like Minneapolis, New York, Los Angeles, and Atlanta, empowered by their number and the assumed anonymity of the crowd. And they did so completely unaware that a tech company was using location data harvested from their cellphones to predict their race, age, and gender and where they lived.

Just over two weeks later, that company, Mobilewalla, released a report titled "George Floyd Protester Demographics: Insights Across 4 Major US Cities." In 60 pie charts, the document details what percentage of protesters the company believes were male or female, young adult (18–34); middle-aged 35º54, or older (55+); and "African-American," "Caucasian/Others," "Hispanic," or “Asian-American.”

"African American males made up the majority of protesters in the four observed cities vs. females,” Mobilewalla claimed. “Men vs. women in Atlanta (61% vs. 39%), in Los Angeles (65% vs. 35%), in Minneapolis (54% vs. 46%) and in New York (59% vs. 41%)." The company analyzed data from 16,902 devices at protests — including exactly 8,152 devices in New York, 4,527 in Los Angeles, 2,357 in Minneapolis, and 1,866 in Atlanta.

Sen. Elizabeth Warren told BuzzFeed News that Mobilewalla’s report was alarming, and an example of the consequences of the lack of regulation on data brokers in the US.

“This report shows that an enormous number of Americans – probably without even knowing it – are handing over their full location history to shady location data brokers with zero restrictions on what companies can do with it,” Warren said. “In an end-run around the Constitution's limits on government surveillance, these companies can even sell this data to the government, which can use it for law and immigration enforcement. That's why I've opened an investigation into the government contracts held by location data brokers, and I’ll keep pushing for answers.”

It’s unclear how accurate Mobilewalla’s analysis actually is. But Mobilewalla's report is another revelation from a wild west of obscure companies with untold amounts of sensitive information about individuals — including where they go and what their political allegiances may be. There are no federal laws in place to prevent this information from being abused.

Mobilewalla CEO Anindya Datta told BuzzFeed News that the data analysis that made the George Floyd Protester Demographics possible wasn’t a new kind of project. “The underlying data, the underlying observations that came into the report, is something that we collect and produce on a regular basis,” he said

Datta said Mobilewalla didn’t prepare the report for law enforcement or a public agency, but rather to satisfy its own employees' curiosity about what its vast trove of unregulated data could reveal about the demonstrators. Datta told BuzzFeed News that the company doesn’t plan to include information about whether a person attended a protest to its clients, or to law enforcement agencies.

“It’s hard to tell you a specific reason as to why we did this,” Datta said. “But over time, a bunch of us in the company were watching with curiosity and some degree of alarm as to what’s going on.” He defined those sources of alarm as what he called "antisocial behavior," including vandalism, looting, and actions like "breaking the glass of an Apple store.” He added that they were attempting to test if protests were being driven by outside agitators.

Datta said that he and a few Mobilewalla employees chose locations where they expected protests would occur — including the George Floyd memorial site in Minneapolis, and Gracie Mansion in New York — and analyzed data from mobile devices in those areas collected between May 29 and May 31.

Jacinta González, a senior campaign organizer at Latinx advocacy group Mijente, told BuzzFeed News that by monitoring protesters, Mobilewalla could undermine freedom of assembly.

“It is really just fundamentally terrifying to understand the way that companies can access such vast amounts of data to process for their own gain — without folks understanding even that they have consented to their information being taken, much less used in this way,” González said.

“It’s important to understand that once technology hits the market, it's actually very hard to limit who has access to it — whether it is police, or whether it is other actors that want to harm communities,” González added. “Once this stuff is out there, we just have no way of understanding how it’s being used. Often we don’t even know that it’s out there to begin with.”

Mobilewalla does not collect the data itself, but rather buys it from a variety of sources, including advertisers, data brokers, and internet service providers. Once it has it, the company uses artificial intelligence to turn a stew of location data, device IDs, and browser histories to predict a person's demographics — including race, age, gender, zip code, or personal interests. Mobilewalla sells aggregated versions of that stuff back to advertisers. On its website, Mobilewalla says that it works with companies across a variety of industries — like retail, dining, telecom, banking, consulting, health, and on-demand services (like ride-hailing).

It’s unclear how accurate this report actually is. Datta told BuzzFeed News that his company, on average, has access to location data for 30% to 60% of people in any given location in the United States. Mobilewalla said in a YouTube video that it collects an average of 25 billion “signals” (or pieces of information, like GPS coordinates) every day. Every week, these signals pour in from an average of 1.6 billion devices. Datta said that about 300 million of these devices are in the US. (This doesn’t mean that Mobilewalla collected data on 300 million people, because one person might have more than one device that Mobilewalla is tracking.)

Saira Hussain, a staff attorney for the Electronic Frontier Foundation, told BuzzFeed News that Mobilewalla’s report was not surprising, but very troubling.

“If [this data] ends up in hands of the government, or if protesters are concerned that it could end up in the hands of the government, that may suppress speech, it may deter people from going to protests,” Hussain said.

Mobilewalla's privacy policy says that people have the right to opt out of certain uses of their personal information. But it also says, "Even if you opt out, we, our Clients and third parties may still collect and use information regarding your activities on the Services, Properties, websites and/or applications and/or information from advertisements for other legal purposes as described herein."

There is currently no federal law that regulates how companies like Mobilewalla — which buy and sell people’s data on the internet — can use people’s information. Hussain noted that information about data-sharing can be buried in the Terms of Service, there isn’t meaningful consent built into most privacy policies.

“Given how many different industries that this company works within for targeted advertising, it seems that you probably wouldn’t know, once the information in the company’s hands, exactly what they’re gonna be using it for,” Hussain said. “And who would know that they’d be using it to track demographics of people at protests?”
https://www.buzzfeednews.com/article...company-spying





Encrypted Phone Network Says It's Shutting Down After Police Hack

Encrochat's customers include hitmen and drug gangs across Europe.
Joseph Cox

Someone in control of an email address long associated with Encrochat, a company that sells custom encrypted phones often used by organized criminals, tells Motherboard the company is shutting down after a law enforcement hacking operation against its customers.

The news comes as law enforcement agencies have arrested multiple criminal users of Encrochat across Europe in what appears to be a large scale, coordinated operation against the phone network and its users.

"We have been forced to make the difficult decision to shut down our service and our business permanently," the person wrote in an email to Motherboard. "This [sic] following several attacks carried out by a foreign organization that seems to originate in the UK." The email address has been linked to Encrochat for years, but Motherboard could not confirm the identity of the person currently using the account.

Motherboard also separately obtained screenshots of text messages sent over the past week of alleged Encrochat users discussing a wave of arrests associated with the Encrochat takeover.

Do you know anything else about Encrochat? We'd love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, OTR chat on jfcox@jabber.ccc.de, or email joseph.cox@vice.com.

Encrochat is part of the encrypted phone industry, which sells devices pre-loaded with private messaging apps, sometimes have the GPS or camera functionality physically removed, and can be remotely wiped by the user. The phones can typically only communicate with other devices sold by the same company, and often cost thousands of dollars per year to buy. Some companies in this space especially cater to criminal customers, and law enforcement agencies have increasingly targeted the industry. Encrochat's users included a British hitman who assassinated another crime figure, and drug gangs in England and Ireland.

Last week, Encrochat users received a text message warning that law enforcement had taken over part of the company's infrastructure and launched a hacking attack against devices. In the days since, local outlet The Irish News reported court cases based on evidence obtained from hacked Encrochat devices, and a spike of arrests after the Encrochat compromise. Tabloid paper Sunday World cited European sources saying that Europol, Europe's law enforcement agency, and other organizations had breached the Encrochat network.

In the wake of that takeover, the person in control of the Encrochat email address told Motherboard, "We fully understand the inconvenience and frustration this decision has caused our customers. Our main priority has always been our customers integrity and security, and when we no longer can guarantee that, we have no other choice than to shut down the service even if it destroys our business."

The person added that in May, they received a number of tech support issues around Encrochat phones not wiping correctly. In June, they found one of Encrochat's "X2" devices with this issue and "discovered malware installed on the device." The malware was designed to conceal itself from detection, disable the phone's factory reset, record the screen lock password, and clone application data, the person added.

The person said they pushed out an update to the X2 models. But almost immediately after that patch, they noticed another attack, and sent the text message to users warning them, including advising customers to dispose of their Encrochat devices.

Europol previously told Motherboard it would not comment around "ongoing operations." The UK's National Crime Agency has repeatedly not responded to requests for comment.

"Encros finished," a source in the encrypted phone industry previously told Motherboard, referring to Encrochat.
https://www.vice.com/en_us/article/5...ncrypted-phone





Journalist’s Phone Hacked by New ‘Invisible’ Technique: All he had to do was Visit One Website. Any Website.
Marco Chown Oved

The white iPhone with chipped paint that Moroccan journalist Omar Radi used to stay in contact with his sources also allowed his government to spy on him.

They could read every email, text and website visited; listen to every phone call and watch every video conference; download calendar entries, monitor GPS coordinates, and even turn on the camera and microphone to see and hear where the phone was at any moment.

Yet Radi was trained in encryption and cyber security. He hadn’t clicked on any suspicious links and didn’t have any missed calls on WhatsApp — both well-documented ways a cell phone can be hacked.

Instead, a report published Monday by Amnesty International shows Radi was targeted by a new and frighteningly stealthy technique. All he had to do was visit one website. Any website.

Forensic evidence gathered by Amnesty International on Radi’s phone shows that it was infected by “network injection,” a fully automated method where an attacker intercepts a cellular signal when it makes a request to visit a website. In milliseconds, the web browser is diverted to a malicious site and spyware code is downloaded that allows remote access to everything on the phone. The browser then redirects to the intended website and the user is none the wiser.

While Amnesty could not definitively state that the Moroccan authorities were behind the attack, the group was able to use forensic evidence to conclude this was very likely the case.

The episode reveals not that authoritarian governments are actively listening to the calls, monitoring the web traffic and reading the emails of journalists and human rights activists — but that they can do so undetected.

“I kind of suspected (I was hacked),” said Radi on an encrypted video chat from Rabat. “The Moroccan authorities are buying every possible and imaginable surveillance and espionage product. They want to know everything.”

Radi is an investigative journalist who co-founded the local news site Le Desk, a partner with the Star in the International Consortium of Investigative Journalists. He specializes in the connections between politicians and business people as well as social movements and human rights. In other words, he’s a thorn in the government’s side and a prime target for surveillance, hacking and harassment.

In 2017, he was arrested while reporting on a security crackdown in the Rif region, and again this past December after one of his tweets described a local judge as an “executioner.”

“I was prosecuted for contempt of court, but that’s just the official charge. In fact, I was punished for my entire body of work. They pile things up and then they look for a pretext to arrest,” he told Forbidden Stories, an investigative journalism group that coordinated this report with the Star and 14 other outlets.

Radi spent a week in pretrial detention, was later convicted to four months and is currently out pending appeal.
Moroccan journalist Omar Radi was arrested in 2017 while reporting on a security crackdown in the Rif region, and again in December 2019 after a tweet in which he described a local judge as an “executioner.”

Shortly after his release, he was approached by Amnesty International, which asked to look at his phone. The spyware they found — commonly known as “Pegasus” — can be traced back to the Israeli cyber surveillance company, NSO Group.

NSO Group, which was valued at $1 billion USD last year, sells surveillance software to governments and law enforcement agencies intended to combat terrorism. Over the last several years, however, reports from around the world have implicated NSO Group’s spyware in the targeting of journalists and human rights activists.

Radi is the third prominent Moroccan human rights figure to have been targeted using the NSO group’s network injection spyware. Last October, Amnesty International documented the cases of activist Maati Monjib and human rights lawyer Abdessadak El Bouchattaoui. A recent report by The Citizen Lab at the University of Toronto’s Munk School identified 13 journalists, including a reporter for the New York Times, targeted by Pegasus software employed by the Mexican and Saudi Arabian governments.

But what makes Radi’s case unique is that he was infected last September, only three days after the Israeli company issued a policy that vowed the company would cut off clients if they were found to misuse the surveillance technology to target journalists and human rights activists.

“We fully understand the potential for our products to be misused by our customers, thereby resulting in adverse human rights impacts. Therefore, as responsible corporate citizens, we have committed ourselves to high ethical business standards, seeking to ensure that only vetted and legitimate government agencies will use our products and that we take all reasonable steps to prevent and mitigate the risks of adverse impact on human rights from their misuse,” the policy states.

“We include obligations to respect and protect human rights in our contractual agreements with our business partners and customers...We have an escalating set of remedies culminating in the termination of use of our products after a substantiated case of severe misuse, material breach of commitments or a refusal to co-operate in an investigation.”

Contacted for this story, NSO said due to client confidentiality it could not confirm if the Moroccan government was using its software.

In response to questions about what actions it took after learning that Monjib and El Bouchattaoui were targeted, NSO said it followed the steps outlined in its Human Rights Policy, which it described in a letter sent this month to UN Special Rapporteur On the Promotion and Protection of the Right to Freedom of Opinion and Expression David Kaye.

“In recent instances in which NSO has received concerns or complaints regarding alleged misuse, it has immediately stopped the customer’s use of the system,” it stated in the UN letter.

“NSO has reinstated the system only after gaining comfort that the system was not misused.”

Amnesty’s new report notes that the NSO server used to hack Monjib and El Bouchattaoui was shut down shortly after the previous report was made public. Shortly afterward, a new server that operated in the same manner was set up and used to hack Radi’s phone, the report said.

The NSO group said it was “deeply troubled by the allegations” in the new report.

“We are reviewing the information therein and will initiate an investigation if warranted,” the company said.

Bill Marczak, a research fellow at The Citizen Lab, says NSO has promoted its Human Rights Policy as groundbreaking but hasn’t backed it up with examples of cracking down on misuse of its spyware.

“There hasn’t been a whole lot of public evidence that NSO’s Human Rights Policy has helped human rights at all,” he said. “We’re still waiting for that evidence.”

Amnesty International found files and altered code on Radi’s phone that indicate he was hacked several times over the course of 2019 and most recently on January 29, 2020.

“I started to think: what could I have said on the phone that was sensitive? Do I have sources that might be in trouble if the people listening to me find out who I’m talking to?” Radi asked.

This month, an article on the Moroccan news website Chouftv reported that Radi was part of a group of journalists organizing a support campaign for an imprisoned colleague. Radi says the article contained details taken from conversations he had on the encrypted apps Signal and WhatsApp, and he suspects government intelligence officers leaked the information gleaned from his phone.

“It’s a way of saying: ‘You are being watched,’ ” he said.

Radi’s sources have grown more reluctant to talk as it has become evident that journalists’ phones are being tapped.

“I think the monitoring tool is working really well right now,” he said.

The cell phone used by Moroccan journalist Omar Radi that was infected by Israeli spyware via remote "network injection" which gave the attacker full access to everything - emails, texts, even the GPS and camera and microphone.

Unlike previous hacking methods, network injection leaves virtually no trace, according to the Amnesty Report. There is no email with a malicious link. No missed call on WhatsApp. The malicious code even wipes crash logs, making it impossible to determine exactly what weaknesses were exploited to take over the phone, said Claudio Guarnieri, head of Amnesty International’s Security Lab, in an interview.

“The attackers took measures to eliminate traces that would reveal the vulnerability that they were using, which is useful to prevent (it) from being found and fixed,” he said.

Guarnieri said it is reasonable to conclude that the Moroccan government is behind the attack.

“The NSO, by their own admission, only sell to law enforcement and governments,” he said. “That coupled with the context...who would be interested in going after these individuals?” he said.

“And then, the way the network injection attacks are being conducted. They require some level of access to either the person itself — the ability to be in proximity in the case where the network injection is performed using tactical equipment. Think of (an ISMI catcher, also known as a Stingray) placed in a van that is parked in front of a house — or having access to the mobile operators themselves,” said Guarnieri.

Stingrays mimic cell phone towers and any phone within a certain distance will connect to the device automatically. This will give the operator technical data about the phones, which can then be used to identify an individual’s cell phone number and figure out who they are talking to.

Amnesty International says that it cannot be sure a Stingray was used to hack Radi’s phone, but the only other way the group says the spyware could have been remotely injected was with access to the mobile network infrastructure, something only the phone company would have (and the Moroccan government could commandeer).

Either way, the attacker identifies the phone being targeted and waits for that phone to connect to a website over the cellular data network. The website must use “clear text” which means the URL starts with “http” not “https.” When the phone makes a request to visit a clear text site, the attacker intercepts the demand and redirects the phone to another website, where the Pegasus spyware is downloaded before the phone proceeds to the requested website.

“Amnesty asked me if there were URL redirects, if there were URLs that changed quickly and that’s when it rang a bell. I realized that indeed, this had happened. But I didn’t realize at the time that it was really an injection,” said Radi. “On the phone, there are a lot of things that can trigger a URL change or that kind of thing, so I didn’t think that was it at first.”

Normal people are unlikely to be targeted by NSO spyware, said The Citizen Lab’s Marczak, because it’s so expensive that states only use it to target a small number of people.

“It’s a niche tool that is used on people who the government is interested in,” he said, adding that the more people are hacked, the greater the chance that the phone’s weakness will be found and fixed.

“Then NSO’s product is useless,” he said.

“The average user does not really need to worry,” he said. “But certainly journalists, dissidents, civil society organizations and lawyers, these are targets that typically repressive governments that buy the spyware are interested in.”

Amnesty has advised Radi on what to do to avoid surveillance, including making sure everything on his phone is updated to the latest version and using a Virtual Private Network (VPN), but Radi says it’s a battle you can never win.

“We change phones. We try to protect ourselves. It’s David vs. Goliath. They still have a way of knowing what’s going on in our phones, in our computers. The goal is not to protect ourselves 100 per cent but to avoid it, to make it difficult for them, and to learn certain reflexes.”

He has started using friends’ phones and swapping SIM cards to change his number frequently. Amnesty says there is some evidence that turning off your phone and restarting it could sever the connection with the attacker.

Even if he’s able to protect his sources, Radi fears the surveillance will be used to develop a smear campaign against him.

“That’s how they operate. It’s destroying people’s image, digging up things about them and making them public,” he said.

Radi recounts the recent episode of journalist Hajar Raissouni, who was arrested on her way out of a gynecologist’s office with her fiancé. Along with the doctor, they were imprisoned for having had an abortion, which is illegal in Morocco.

“How did they know she was at her gynecologist’s office?” Radi asked.

Radi says the government falsified documents to make it look like Raissouni had an abortion even though the medical expert hired by Raissouni reviewed her records and concluded it did not happen. Amid international outcry, she was pardoned in October.

“But all the press insulted Hajar because she (supposedly) had an abortion in addition to having sex outside of marriage. So defamation and discredit has already been thrown at her.”

“It’s gibberish that has no limits. There are no ethics, no morals. It’s the height of immorality that governs the operation of these services,” he said. “It’s a state that protects itself, that protects its interests by denouncing, by discrediting people who point the finger.”
https://www.thestar.com/news/canada/...y-website.html





Republicans Push Bill Requiring Tech Companies to Help Access Encrypted Data

The proposed legislation is Congress' latest attempt to weaken encryption from tech giants.
Alfred Ng

A group of Senate Republicans is looking to force tech companies to comply with "lawful access" to encrypted information, potentially jeopardizing the technology's security features.

On Tuesday, Republican lawmakers introduced the Lawful Access to Encrypted Data Act, which calls for an end to "warrant-proof" encryption that's disrupted criminal investigations. The bill was proposed by Sen. Lindsey Graham, chairman of the Senate Judiciary committee, along with Sens. Tom Cotton and Marsha Blackburn. If passed, the act would require tech companies to help investigators access encrypted data if that assistance would help carry out a warrant.

Lawmakers and the US Justice Department have long battled with tech companies over encryption, which is used to encode data. The Justice Department argues that encryption prevents investigators from getting necessary evidence from suspects' devices and has requested that tech giants provide "lawful access."

That could come in many ways, such as providing a key to unlock encryption that's only available for police requests. The FBI made a similar request to Apple in 2016 when it wanted to get data from a dead terrorist's iPhone in a San Bernardino, California, shooting case.

Giving access specifically to government agencies when requested is often referred to as an "encryption backdoor," something tech experts and privacy advocates have long argued endangers more people than it helps.

End-to-end encryption protects billions of people from hackers, oppressive governments and abusive romantic partners by providing security measures that even the companies themselves aren't able to crack. Creating a way for investigators to access that data raises concerns that the method could also open the door for hackers and criminals to abuse that exposure.

The proposed legislation stops short of requiring tech companies to create a backdoor, noting that the attorney general is prohibited from giving specific steps on how tech companies need to comply with lawful access orders.

The proposed legislation also allows for tech companies that receive a request to appeal to federal court to change or set aside the orders.

"My position is clear: After law enforcement obtains the necessary court authorizations, they should be able to retrieve information to assist in their investigations," Graham said in a statement. "Our legislation respects and protects the privacy rights of law-abiding Americans. It also puts the terrorists and criminals on notice that they will no longer be able to hide behind technology to cover their tracks."

The bill also allows the attorney general to create a competition with a prize for anyone who can come up with a way to access encrypted data while protecting privacy and security. Security experts have long noted that this is an impossible request.

Facebook responded to the proposal by saying that weakening encryption in apps would make consumers more vulnerable.

"End-to-end encryption is a necessity in modern life -- it protects billions of messages sent every day on many apps and services, especially in times like these when we can't be together," Facebook said in a statement. "Rolling back this vital protection will make us all less safe, not more. We are committed to continuing to work with law enforcement and fighting abuse while preserving the ability for all Americans to communicate privately and securely."

The legislation introduced on Tuesday isn't Congress' first attempt at weakening encryption policies in the US. In March, Graham and a bipartisan group of senators introduced the EARN IT Act, which could take away tech companies' Section 230 legal shield if they continued to help protect child predators through tools like encryption.

The Justice Department has criticized tech companies like Apple and Facebook for embracing encryption, arguing the technology is protecting terrorists and child predators. In May, the FBI said it had an "Apple problem," alleging that the company refused to help unlock a terrorists' iPhone from a 2019 attack on a naval base in Florida.

Apple didn't respond to a request for comment for this story, but said in May that it had helped the FBI's investigation in every way possible.

Lawmakers also pointed to how drug dealers used WhatsApp, a Facebook-owned encrypted-messaging service, and how law enforcement has been unable to gather evidence from it. Facebook didn't respond to a request for comment.

The legislation would also allow the attorney general to require tech companies to report on their ability to comply with these warrants.

"The bill announced today balances the privacy interests of consumers with the public safety interests of the community by requiring the makers of consumer devices to provide law enforcement with access to encrypted data when authorized by a judge," Attorney General Bill Barr said in a statement. "I am confident that our world-class technology companies can engineer secure products that protect user information and allow for lawful access."
https://www.cnet.com/news/republican...ncrypted-data/





Big Tech Decry Republican Bill Seeking to Break Encryption
Aditi Agrawal

In response to the Lawful Access to Encrypted Data (LAED) Act proposed by three Republican senators, Big Tech companies have registered their opposition through their Reform Government Surveillance coalition. They said that building encryption backdoors would jeopardize the sensitive data of billions of users and “leave all Americans, businesses, and government agencies dangerously exposed to cyber threats from criminals and foreign adversaries”. They also pointed out that as the pandemic has forced everyone to rely on the internet “in critical ways”, digital security is paramount and strong encryption is the way forward.

The coalition’s members are Apple, Microsoft, Facebook, Google, Twitter, Snap Inc., Verizon Media, Dropbox, and Microsoft-owned LinkedIn. The coalition was established in December 2013, a few months after documents about the United States’ PRISM data collection program were leaked.

This is not the first time Big Tech have resisted American government’s calls to undermine encryption.

• In 2016, Apple refused to assist the FBI in breaking into the iPhone used by one of the San Bernadino shooters, saying that building a backdoor to its encrypted products would undermine the privacy of all its users. FBI eventually managed to get into the phone by exploiting a zero-day vulnerability in the software to bypass its ten-try limitation, Washington Post had reported. Earlier this year too, Apple refused to assist the FBI in breaking into two iPhones of the Saudi gunman who was involved in a shooting at an American naval base in Pensacola (Florida). This time too, FBI found a way to get access to the data without Apple’s assistance, though the method of access is not yet known.
• In October 2019, when the Times had misreported that a bilateral agreement between the UK and the US could force social media platforms to disclose encrypted messages from serious criminals, Will Cathcart, the head of WhatsApp, had said, “We will always oppose government attempts to build backdoors because they would weaken the security of everyone who uses WhatsApp including governments themselves.” He had called backdoors “a horrible idea”. We had later reported the bilateral agreement was a Data Access Agreement under the CLOUD Act and thus did not mandate decryption of encrypted communications, despite government orders to the contrary.
• In response to an October 2019 open letter by the governments of US, UK and Australia that called on Facebook to not implement end-to-end encryption on its messaging platforms, at least not without building a backdoor, WhatsApp and Facebook replied with a firm no, citing privacy and cybersecurity.

https://www.medianama.com/2020/06/22...ak-encryption/





Appeals Court Says California's IMDb-Targeting 'Ageism' Law Is Unconstitutional
Tim Cushing

The state of California has lost again in its attempt to punish IMDb (the Internet Movie Database) -- and IMDb alone -- for ageism perpetrated by [checks notes] movie studios who seem to refuse to cast actresses above a certain age in choice roles.

The law passed by the California legislature does one thing: prevents IMDb (and other sites, theoretically) from publishing facts about actors: namely, their ages. This stupid law was ushered into existence by none other than the Screen Actors Guild, capitalizing on a (failed) lawsuit brought against the website by an actress who claimed the publication of her real age cost her millions in Hollywood paychecks.

These beneficiaries of the First Amendment decided there was just too much First Amendment in California. To protect actors from studio execs, SAG decided to go after a third-party site respected for its collection of factual information about movies, actors, and everything else film-related.

The federal court handling IMDb's lawsuit against the state made quick work of the state's arguments in favor of very selective censorship. In only six pages, the court destroyed the rationale offered by the government's finest legal minds. Here's just a sampling of the court's dismantling of this stupid law:

AB 1687 is a direct restriction on speech. The law prohibits certain speakers from publishing certain truthful information – information that, in many instances, is supplied by members of the public – because of concerns that a third party might use that information to engage in illegal conduct.

SAG-AFTRA contends that publication of facts about the ages of people in the entertainment industry can be banned because these facts "facilitate" age discrimination – an argument that, if successful, would enable states to forbid publication of virtually any fact.


The court also pointed out that the law targeting IMDb did nothing to address the underlying problem. In fact, it appeared the state wasn't even addressing the right problem.

The defendants describe this as a problem of "age discrimination." While that may be accurate on some level, at root it is far more a problem of sex discrimination. Movie producers don't typically refuse to cast an actor as a leading man because he's too old for the leading woman; it is the prospective leading woman who can't get the part unless she's much younger than the leading man. TV networks don't typically jettison male news anchors because they are perceived as too old; it is the female anchors whose success is often dependent on their youth. This is not so much because the entertainment industry has a problem with older people per se. Rather, it's a manifestation of the industry's insistence on objectifying women, overvaluing their looks while devaluing everything else.

The state appealed and the Ninth Circuit Appeals Court is no more impressed than the lower court. (h/t Courthouse News Service)

Content-based restrictions are generally First Amendment violations. So is the targeting of certain speakers and very specific speech emanating from them. From the opinion [PDF]:

On its face, AB 1687 restricts speech because of its content. It prohibits the dissemination of one type of speech: “date of birth or age information.” And, perhaps more troubling, it restricts only a single category of speakers. Thus, AB 1687 “impose[s] direct and significant restrictions” on a category of speech. It does not apply generally.

The state argued that this only affected subscribers to the site who paid to control the information contained in their profiles. The Appeals Court says this doesn't matter. The law targets more than paid accounts. It forbids the dissemination of age information contributed by third parties.

The statute does not restrict only information misappropriated through the parties’ contractual relationship; it also prohibits the publication of information submitted by members of the public with no connection to IMDb. These restrictions apply regardless of whether an IMDb public profile existed independent of, or prior to, any contractual agreement between IMDb and an IMDbPro subscriber.

Even if money changes hands for paid accounts, the speech being targeted is not "commercial" speech. The site refers to itself as a "database" for a reason. And that nullifies the state's argument.

These free, publicly available profiles are found in an “online database of information” and are surrounded by content that “includes information on cast, production crew, fictional characters, biographies, plot summaries, trivia and reviews.” The content is encyclopedic, not transactional.

The court also dispenses with the state's argument that the publication of age information allows other parties to engage in illegal discrimination. And it does so by pointing out the obvious: the target of anti-discriminatory laws should be the entities that actually engage in discriminatory behavior.

If accepted, SAG’s interpretation of Pittsburgh Press would require this court to permit the restriction not only of speech that proposes an illegal activity but also facially inoffensive speech that a third-party might use to facilitate its own illegal conduct. [...] Rather than restrict truthful speech, the typical “method of deterring unlawful conduct is to impose an appropriate punishment on the person who engages in it.”

The court also notes that the law appears to have been crafted specifically to prevent one site from publishing age information. That's not what "narrowly-tailored" means in the First Amendment sense of the phrase. Narrow tailoring can impose speech restrictions that pass the First Amendment test. Targeting one site while leaving others free to publish what the law says IMDb cannot isn't Constitutional.

On its face, AB 1687 restricts only websites like IMDb.com while leaving unrestricted every other avenue through which age information might be disseminated. This presents serious concerns here because AB 1687 appears designed to reach only IMDb.

AB 1687 is underinclusive because it fails to reach several potential sources of age information and protects only industry professionals who both subscribe to such service and who opt-in. This malady means that the statute is not narrowly tailored, and thus, is unconstitutional.


And that's it for California's extremely bad law.

Unlawful age discrimination has no place in the entertainment industry, or any other industry. But not all statutory means of ending such discrimination are constitutional. Here, we address content-based restrictions on speech and hold that AB 1687 is facially unconstitutional because it does not survive First Amendment scrutiny.

Even if the law had somehow survived a First Amendment challenge, it still wouldn't have prevented studios from engaging in discriminatory hiring practices. If this was really the state's concerns, it would have stepped up its regulation of the entertainment industry, rather than a single site that was unsuccessfully sued by an actress, who speculated IMDb's publication of her age was the reason she wasn't landing the roles she wanted.
https://www.techdirt.com/articles/20...tutional.shtml

















Until next week,

- js.



















Current Week In Review





Recent WiRs -

June 20th, June 13th, June 6th, May 30th

Jack Spratts' Week In Review is published every Friday. Submit letters, articles, press releases, comments, questions etc. in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. The right to publish all remarks is reserved.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
__________________
Thanks For Sharing
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Peer-To-Peer News - The Week In Review - July 16th, '11 JackSpratts Peer to Peer 0 13-07-11 06:43 AM
Peer-To-Peer News - The Week In Review - July 9th, '11 JackSpratts Peer to Peer 0 06-07-11 05:36 AM
Peer-To-Peer News - The Week In Review - January 30th, '10 JackSpratts Peer to Peer 0 27-01-10 07:49 AM
Peer-To-Peer News - The Week In Review - January 16th, '10 JackSpratts Peer to Peer 0 13-01-10 09:02 AM
Peer-To-Peer News - The Week In Review - December 5th, '09 JackSpratts Peer to Peer 0 02-12-09 08:32 AM






All times are GMT -6. The time now is 07:32 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)