PDA

View Full Version : OiNK update



mrnobody
10-24-2007, 09:20 PM
Sit down, and shut the fuck up.

Right -- This stops now.

I'm Paine. I used to be a moderator at OiNK.cd, until, as you know, we were shut down by the BPI and IFPI.

Now, there are far, FAR too many rumours flying around, and I wanted to set some shit straight.

1. There is no official OiNK IRC right now.

No. The Dalnet IRC is by no means "official". In fact, the staff are point blank refusing to use dalnet. The complete lack of both SSL and vhosts/cloaking makes it a very poor choice. I, personally, am currently on irc://fucknet.wtf.la in #oink, however no other staff (at the time of writing) are, although I am in contact with them.

2. OiNK will _NOT_ be up today, or tomorrow.

We're not magic. None of the moderators have access to the current code and databases right now -- in fact, neither does OiNK himself, as his stuff was confiscated (remember the crap you saw in the plastic bags on the news?). People purporting to be TMT and/or OiNK are, to be frank, lying their fucking asses off.

3. There is currently _NO_ "save oink" fund.

DO NOT, I repeat, DO NOT give ANY money to ANY of these fake funds you are seeing. They are scams. OiNK will not see a penny of this money, and neither will you.

4. OiNK himself is safe and well.

He's fine and out on bail.

5. There is no "official" OiNK forum right now.

While there may not be an official forum, a lot of our ex-users are flocking to http://www.ohax.com/phpBB2/ -- Some of the users on there are actually staff. However there are also people maliciously using that site to link to scam sites and other various filth.

Anyway, I hope that's settled a lot of shit. If you're in doubt I'm who I say I am, then don't believe me. I encourage you all to exercise extreme caution when people are floating around throwing names about left right and center saying these things. The "TMT" on Dalnet was not our TMT. In fact, nobody has been in contact with him, and I expect it will remain that way for a very long time.


Edit: A few people have asked me if we logged the IP you snatched things from. The answer is no, we did not log snatch IPs.


Edit 2: This is an important one -- Your passwords do NOT need to be changed, they were stored as salted MD5 hashes. All the authorities have is the hashes. The only way they can get the original passwords is via brute force. The chances of that are slim to none if you followed standard good password practice.found @ THC

btw, here is the link if someone finds it annoying to read in quote...or seeks for later updates.

http://tehpaine.blogspot.com

Defy
10-24-2007, 09:23 PM
Smart man. I believe him. :)

iMartin
10-24-2007, 09:29 PM
Thank you.

WarrenBuffet
10-24-2007, 09:30 PM
Thank God, cya ON Oink in a few days guys :)

FUCK the
1. RIAA
2. BPI
3. IFPI

Elysium
10-24-2007, 09:42 PM
UPDATE: That blog has been deactivated now. Further updates arrive here:removed


3. There is currently _NO_ "save oink" fund.

DO NOT, I repeat, DO NOT give ANY money to ANY of these fake funds you are seeing. They are scams. OiNK will not see a penny of this money, and neither will you.

Be careful who you trust guys. Best to just sit tight for now i think..

import_fighter
10-24-2007, 09:44 PM
UPDATE: That blog has been deactivated now. Further updates arrive here:removed


begging for donations ....sounds like one of the scams paine was talking about. Especially since his blog is still up.

pandapop
10-24-2007, 09:47 PM
UPDATE: That blog has been deactivated now. Further updates arrive here: removed/ (http://oinkrevival.blogspot.com/)


DO NOT donate to the paypal address & fund set up on this page. It is a scam.

mrnobody
10-24-2007, 09:47 PM
UPDATE: That blog has been deactivated now. Further updates arrive here:removed/ (http://oinkrevival.blogspot.com/)


cough cough cough cough cough

wth? ur nick is oinkrevival? cough cough cough and u are the one who made theblog...please make sure before u donate their...higher chances of being scam. As the "original" (see first post) said...they are NOT asking for donation.

and why would u say? UPDATE:the blog has been deactivated? the "original" blog is still there.

PirateEagle
10-24-2007, 09:50 PM
UPDATE: That blog has been deactivated now. Further updates arrive here:removed
i am donating right now :lol: via special paypal who bypasses the ban of my country :lol:

mrnobody
10-24-2007, 09:57 PM
oinkrevival (http://filesharingtalk.com/vb3/../members/oinkrevival-184375) got banned :lol: definitely a scammer

GoodOmens
10-24-2007, 10:26 PM
An interesting tibit dug up on torrentfreak:

a source has stated that the OiNK membership list was not only encrypted, but also equipped with a ’self-destruct’ type mechanism which relied on a regular signal to continue in ‘OFF’ mode.

Should be comforting to all the users^^

user2000
10-24-2007, 10:38 PM
i hope oink to come back...i hear its a good tracker.. but i dont have a account there
i wish to have!

Sylar666
10-24-2007, 10:52 PM
For the record, from Paine's blog:
Edit 2: This is an important one -- Your passwords do NOT need to be changed, they were stored as salted MD5 hashes. All the authorities have is the hashes. The only way they can get the original passwords is via brute force. The chances of that are slim to none if you followed standard good password practice.

Polarbear
10-24-2007, 10:53 PM
An interesting tibit dug up on torrentfreak:

a source has stated that the OiNK membership list was not only encrypted, but also equipped with a ’self-destruct’ type mechanism which relied on a regular signal to continue in ‘OFF’ mode.

Should be comforting to all the users^^

if this is true i would love to see the faces of the ifpi forensic dumbasses. :lol:

Sylar666
10-24-2007, 10:56 PM
In OinK we trust!
hi Polar, good 2 cU around...

Gish
10-24-2007, 10:57 PM
this is the first good news since the start of all this!
we need a place for current/old members to congregate but we will just have to wait!

Demigod
10-24-2007, 11:01 PM
Ugh, I just found out about this today.

This is sad and I really do hope that this isn't the end for OiNK. It was the best music torrent site, period.

Polarbear
10-24-2007, 11:02 PM
irc://irc.xevion.net / #oink

Connect to the server and then register with nickserv before /joining. Vhosts are automatic on this network.


somebody please join this and keep us posted. i'm too old and stupid for irc.

sexydingo
10-24-2007, 11:14 PM
Thank you for this, so good to see some solid information

Detale
10-24-2007, 11:29 PM
oinkrevival (http://filesharingtalk.com/vb3/../members/oinkrevival-184375) got banned :lol: definitely a scammer

Yes he did he was trying to scam using oink as a cover

Sylar666
10-24-2007, 11:30 PM
So I read Paine's blog? So how are we goin' Dudes? Do I have to talk to my Russian buddies to DDos IFPI?

mrnobody
10-24-2007, 11:38 PM
irc://irc.xevion.net / #oink

Connect to the server and then register with nickserv before /joining. Vhosts are automatic on this network.
somebody please join this and keep us posted. i'm too old and stupid for irc.

i will try to keep us all updated but i am kinda doing my hw as well :(

this is what the title says...

Seriously, Don't PM us. | Oink is well and long back home, computers seized | Users no need to fear anything | Rest of staff @sleep | Have fun.

so now just gotta wait for awesome mods at OiNK to fix 'em
:):D:yup::w00t::naughty::P:whistling

Cheeseman1208
10-25-2007, 01:00 AM
http://dot-slash-csc.iblogger.org/oinkfaq.html

Found on the IRC before it was shut down....

GoodOmens
10-25-2007, 01:00 AM
this is the first good news since the start of all this!
we need a place for current/old members to congregate but we will just have to wait!

Check out http://www.ohax.com/phpBB2/index.php ... its not mine but apparently has some real staff as mods.

rvt
10-25-2007, 03:34 AM
Hate to rain on the feelgood parade, but a couple of points.


An interesting tibit dug up on torrentfreak:

a source has stated that the OiNK membership list was not only encrypted, but also equipped with a ’self-destruct’ type mechanism which relied on a regular signal to continue in ‘OFF’ mode.

Should be comforting to all the users^^

That source doesn't know too much about encryption.
If the entire table was encrypted, the server would need a copy of the decryption key (in public/private keypair encryption) or another method for decrypting the contents in order to operate. A webserver cannot perform magic and call up details without decrypting. The police have the server which means they have the decryption key/method and it'll take no time to get the plain text.

The self wiping database may be true, and may not be. The problem with requiring a regular 'signal' comes when there are problems on either end that result in the signal not arriving. Leaseweb have had their share of problems lately, with something like 50-60% packet loss in one of their datacenters. The loss of signal would cause a downtime and loss of some stats as the site would have to be rolled back to a backup database. If that has never happened, it's unlikely to be true.

Even if it is true, you have to consider data forensic methodology. When dealing with HDDs for evidentiary purposes, you never work on the HDD in the original machine. You never even boot from that HDD.
What the police teams will be doing is taking a copy of that drive before they do anything, then browsing the files with the drive attached as a non-booting slave. No cron jobs will run to wipe the database, no code will be running awaiting the 'signal', and all MySQL databases are copyable as files.
All they have to do is copy all the files from that HDD to a clean MySQL install and they can read everything at will.

The only thing that could save the data from being examined is if the users table was stored in a HEAP table (stored in memory). Even then, some data may have been written to disk as the table expands outside of memory allocation or is operated on with large join operations that would exceed available memory. In either case, data may be recoverable from disk.
It's unlikely the users table was stored only in memory though, as it means all data is lost on a power down or reset. Tables could be recovered from backups, but as the police have those anyway it kind of defeats the purpose of having it in memory only.


For the record, from Paine's blog:
Edit 2: This is an important one -- Your passwords do NOT need to be changed, they were stored as salted MD5 hashes. All the authorities have is the hashes. The only way they can get the original passwords is via brute force. The chances of that are slim to none if you followed standard good password practice.

Only if you follow good password procedure. If your password is kitten, it's likely to be broken in under 30 seconds.
The problem occurs because although password hashes are salted with a 'secret' key, the secret is stored alongside the hash. The MD5 hash of [secret]password[secret] is no harder to break in brute force than the MD5 of password, when you know what [secret] is. Because MD5 hashes are so quickly generated, if you used any regular word for your password a good dictionary attack will find it in seconds.


The thing that should give people hope is that nothing found on the server can in anyway be used in a real case against any members. It is impossible to say whether a user with certain stats listed in the database shared even one copyright file, or that they uploaded the amount listed in the database.
They may have filenames from the snatched table, but without having the exact file that was shared, the name of a file is not enough. I could share a file called starwars that was actually midget clown porn. Without a copy of that file, nobody can say it definately was or wasn't starwars that was shared.

All the talk of hunting down members is just BS on the part of the record industry, and they know it.

embolism
10-25-2007, 03:58 AM
phew! wow!! half of that was over ma head..but then..it did relieve some worries

AmpeD
10-25-2007, 04:09 AM
good to know rvt. and for the record all I dl'ed on oink was midget clown porn :D

Gish
10-25-2007, 04:27 AM
this is a question and answer from the memorial forum!
------------------------------------------------------

<smartface> does the paypal account have any funds on it ATM?
<OiNK> it had some, and the account has been permanently limited
<friggy> you just get bailed for free?
<OiNK> yes
<smartface> did they actually question you?
<OiNK> of course, for hours
<sretsof> what was the stupidest question they asked?
<OiNK> the police had very limited technical knowledge, which made the interview quite amusing actually.
<OiNK> i wasn't willing to teach them how to use a computer
<OiNK> they actually wanted me to teach them how to set up a website
<OiNK> i just told them to google it.
<Xenafor> IS YOUR FATHER OKAY AS WELL? <OiNK> my father is fine.
<OiNK> my father was not arrested, though they did take his work laptop
<apelure> what does the carges about fraud mean?
<OiNK> i've not been charged ...
<Xenafor> Are you a vegetarian?
<OiNK> yes.
<knifeboy> Did they do the good cop/bad cop routine?
<OiNK> no
<Stormx2> Everyone is first and foremost concerned for you and everything, but at the back of our minds (I think) we're interested in what you think will happen the the pink palace. Obviously you won't have a starring roll, but will the backups be destroyed? <OiNK> why would backups be destroyed?
<smartface> have you become a millionarie with our donations?
<OiNK> no
<j2los> do you think at minimum the forums will be restored as a community for discussing music?
<OiNK> i don't know
<guildmast> Are there any plans for an official OiNK donations fund we can feel comfortable donating to?
<OiNK> not yet
<ftdrs> seriously though, what did they accuse you of?
<OiNK> conspiracy to defraud and copyright infringements
<maxdoubt> do you have/need legal representation?
<OiNK> i'm still deciding on legal advice
<Kevix> did you have any warning before hand that the knock opn your door was coming?
<OiNK> no
<smartface> are you planned for a trial anytime soon? <OiNK> the earliest date for trial is 26th december - though highly unlikely
<Yawg> did you anticipate a raid in the past? Did you take any precautions regarding site design and logs and whatnot to protect the community?
<OiNK> the logs we store aren't enough to inciminate users
<Gl1mw0rm> are you still the rigtfull owner of the oink.cd domain?
<OiNK> unclear
<Barth> what about the recent security/privacy changes to the site and the irc? was that a coincidence or did you see something coming?
<OiNK> coincidence
<j2los> do you think it is absurd that only now that the site has been taken down has it been deemed notable enough for a wikipedia article?
<OiNK> i found that amusing, yes
<OiNK> i'm glad the article is staying neutral
<midnightgt> (without incriminating anyone) is there any copy of the source anywhere? Would you be in support of a second coming of the website? How do you think this reflects on the war on file sharing? (Certainly I do not feel like we are losing)
<OiNK> sorry, no comment :)
<lhnz> Why exactly did the cops want you to make a website for them?:P :D
<OiNK> not sure
<csc> so, do the cops know you're here?
<OiNK> dunno
<ATF> did you get fired from work?
<OiNK> yes
<gleam> do you think you or anyone else will ever hear from tmt again? :)
<OiNK> no
<MooIsTooWrong> do you think most of the people in this
channel are asking asshat questions?
<OiNK> yes
<uQ1> What grounds did your work fire you?
<OiNK> i'm not going to go into that, sorry.

Ghost+Rider
10-25-2007, 04:28 AM
Hate to rain on the feelgood parade, but a couple of points.



That source doesn't know too much about encryption.
If the entire table was encrypted, the server would need a copy of the decryption key (in public/private keypair encryption) or another method for decrypting the contents in order to operate. A webserver cannot perform magic and call up details without decrypting. The police have the server which means they have the decryption key/method and it'll take no time to get the plain text.

The self wiping database may be true, and may not be. The problem with requiring a regular 'signal' comes when there are problems on either end that result in the signal not arriving. Leaseweb have had their share of problems lately, with something like 50-60% packet loss in one of their datacenters. The loss of signal would cause a downtime and loss of some stats as the site would have to be rolled back to a backup database. If that has never happened, it's unlikely to be true.

Even if it is true, you have to consider data forensic methodology. When dealing with HDDs for evidentiary purposes, you never work on the HDD in the original machine. You never even boot from that HDD.
What the police teams will be doing is taking a copy of that drive before they do anything, then browsing the files with the drive attached as a non-booting slave. No cron jobs will run to wipe the database, no code will be running awaiting the 'signal', and all MySQL databases are copyable as files.
All they have to do is copy all the files from that HDD to a clean MySQL install and they can read everything at will.

The only thing that could save the data from being examined is if the users table was stored in a HEAP table (stored in memory). Even then, some data may have been written to disk as the table expands outside of memory allocation or is operated on with large join operations that would exceed available memory. In either case, data may be recoverable from disk.
It's unlikely the users table was stored only in memory though, as it means all data is lost on a power down or reset. Tables could be recovered from backups, but as the police have those anyway it kind of defeats the purpose of having it in memory only.


For the record, from Paine's blog:
Edit 2: This is an important one -- Your passwords do NOT need to be changed, they were stored as salted MD5 hashes. All the authorities have is the hashes. The only way they can get the original passwords is via brute force. The chances of that are slim to none if you followed standard good password practice.

Only if you follow good password procedure. If your password is kitten, it's likely to be broken in under 30 seconds.
The problem occurs because although password hashes are salted with a 'secret' key, the secret is stored alongside the hash. The MD5 hash of [secret]password[secret] is no harder to break in brute force than the MD5 of password, when you know what [secret] is. Because MD5 hashes are so quickly generated, if you used any regular word for your password a good dictionary attack will find it in seconds.


The thing that should give people hope is that nothing found on the server can in anyway be used in a real case against any members. It is impossible to say whether a user with certain stats listed in the database shared even one copyright file, or that they uploaded the amount listed in the database.
They may have filenames from the snatched table, but without having the exact file that was shared, the name of a file is not enough. I could share a file called starwars that was actually midget clown porn. Without a copy of that file, nobody can say it definately was or wasn't starwars that was shared.

All the talk of hunting down members is just BS on the part of the record industry, and they know it.

Fuck we are taking all this shit so serious!
Password recovery/hashes Are we Another terrorist group planning to hijack some plane or wtf :lol::lol:

Oh forgive the police wud never go after terrorsits cuz they have millions of pirates to be put behind bars :w00t:

mrnobody
10-25-2007, 05:04 AM
good to know rvt. and for the record all I dl'ed on oink was midget clown porn :D

they don't have porn there lol



Fuck we are taking all this shit so serious!
Password recovery/hashes Are we Another terrorist group planning to hijack some plane or wtf :lol::lol:

Oh forgive the police wud never go after terrorsits cuz they have millions of pirates to be put behind bars :w00t:

can't agree more :lol:

Jiggles
10-25-2007, 05:16 AM
publicity stunt? a miracle recovery?

anyway, they still got owned.

Gish
10-25-2007, 05:25 AM
http://i62.photobucket.com/albums/h104/e30cabriolet/stickers/OiNK.gif

Ghost+Rider
10-25-2007, 05:28 AM
publicity stunt? a miracle recovery?

anyway, they still got owned.

FBI at your door step Knock Knock :O

Jiggles
10-25-2007, 05:39 AM
publicity stunt? a miracle recovery?

anyway, they still got owned.

FBI at your door step Knock Knock :O

im typing this in prison as we speak, so you make no sense.

gnlstryker
10-25-2007, 05:41 AM
http://bp2.blogger.com/_w6BD02rLjME/Rx5_0pz4o-I/AAAAAAAAAD0/4Kij8sNFevI/s1600-h/bgimageoink.jpggood Bye Cruel Pig World !

Ghost+Rider
10-25-2007, 06:15 AM
FBI at your door step Knock Knock :O

im typing this in prison as we speak, so you make no sense.

Then i must send u some Prison break DvdS :lol:

Detale
10-25-2007, 06:55 AM
Hate to rain on the feelgood parade, but a couple of points.



That source doesn't know too much about encryption.
If the entire table was encrypted, the server would need a copy of the decryption key (in public/private keypair encryption) or another method for decrypting the contents in order to operate. A webserver cannot perform magic and call up details without decrypting. The police have the server which means they have the decryption key/method and it'll take no time to get the plain text.

The self wiping database may be true, and may not be. The problem with requiring a regular 'signal' comes when there are problems on either end that result in the signal not arriving. Leaseweb have had their share of problems lately, with something like 50-60% packet loss in one of their datacenters. The loss of signal would cause a downtime and loss of some stats as the site would have to be rolled back to a backup database. If that has never happened, it's unlikely to be true.

Even if it is true, you have to consider data forensic methodology. When dealing with HDDs for evidentiary purposes, you never work on the HDD in the original machine. You never even boot from that HDD.
What the police teams will be doing is taking a copy of that drive before they do anything, then browsing the files with the drive attached as a non-booting slave. No cron jobs will run to wipe the database, no code will be running awaiting the 'signal', and all MySQL databases are copyable as files.
All they have to do is copy all the files from that HDD to a clean MySQL install and they can read everything at will.

The only thing that could save the data from being examined is if the users table was stored in a HEAP table (stored in memory). Even then, some data may have been written to disk as the table expands outside of memory allocation or is operated on with large join operations that would exceed available memory. In either case, data may be recoverable from disk.
It's unlikely the users table was stored only in memory though, as it means all data is lost on a power down or reset. Tables could be recovered from backups, but as the police have those anyway it kind of defeats the purpose of having it in memory only.


For the record, from Paine's blog:
Edit 2: This is an important one -- Your passwords do NOT need to be changed, they were stored as salted MD5 hashes. All the authorities have is the hashes. The only way they can get the original passwords is via brute force. The chances of that are slim to none if you followed standard good password practice.

Only if you follow good password procedure. If your password is kitten, it's likely to be broken in under 30 seconds.
The problem occurs because although password hashes are salted with a 'secret' key, the secret is stored alongside the hash. The MD5 hash of [secret]password[secret] is no harder to break in brute force than the MD5 of password, when you know what [secret] is. Because MD5 hashes are so quickly generated, if you used any regular word for your password a good dictionary attack will find it in seconds.


The thing that should give people hope is that nothing found on the server can in anyway be used in a real case against any members. It is impossible to say whether a user with certain stats listed in the database shared even one copyright file, or that they uploaded the amount listed in the database.
They may have filenames from the snatched table, but without having the exact file that was shared, the name of a file is not enough. I could share a file called starwars that was actually midget clown porn. Without a copy of that file, nobody can say it definately was or wasn't starwars that was shared.

All the talk of hunting down members is just BS on the part of the record industry, and they know it.

God damn you're one smart f*ck!! Glad you're on our side. Glad you are here to enlighten us. I'm sure this will put some of the worry warts minds at ease. Thanks

Jiggles
10-25-2007, 07:11 AM
im typing this in prison as we speak, so you make no sense.

Then i must send u some Prison break DvdS :lol:

and i'll be busted in seconds, you must have seen the fakeness of the tv ep. i'll have a better chance running straight for the main entrance.

Probability
10-25-2007, 07:17 AM
"A few hours later OiNK was released on bail"

OiNK: i've not been charged ...

They wouldnt arrest a guy and then not charge him lol.

What happens to an "IT worker" in jail?

Necronomicon
10-25-2007, 07:50 AM
Yes. Why?

http://torrentfreak.com/why_are_the_ifpi_and_bpi_allowed_071024/

Norway next? Some speculation about raids to come by Espen Tøndel a Norwegian lawyer

http://torrentfreak.com/oink-down-norwegian-bittorrent-trackers-next-071024/

DJRupture on OiNK (very good, solid article, realistic approach)
http://www.negrophonic.com/2007/defending-the-pig-oink-croaks/

pbjabba
10-25-2007, 08:49 AM
DJRupture on OiNK (very good, solid article, realistic approach)
http://www.negrophonic.com/2007/defending-the-pig-oink-croaks/
Good read, cheers for link ;)

Necronomicon
10-25-2007, 09:07 AM
First realistic article on happenings and all of the desinformation press made on basis of initial police reports:
http://blogs.guardian.co.uk/technology/2007/10/24/time_to_clear_up_the_murk_about_oink.html

hkxsx
10-25-2007, 02:46 PM
I hope Oink can come back

luckylittle
10-25-2007, 03:13 PM
http://torrentfreak.com/oink-down-norwegian-bittorrent-trackers-next-071024/

Detale
10-25-2007, 06:41 PM
My advice is be patient it will be back soon enough

CrAcK
10-25-2007, 08:23 PM
What will happen if Oink couldnt come back??
What will the Scene Releaser do?? Mayb they can open a new tracker like oINK!!
Without this sh*t i cant live :D

carinio
10-25-2007, 08:29 PM
i dont think that oink is going to open in a few days, in fact i think that oink is dead for ever

rvt
10-25-2007, 08:37 PM
What will happen if Oink couldnt come back??
What will the Scene Releaser do??

They'll do exactly what they always did, which is to release onto top sites.

The scene do not release to torrent sites, and many of them will be happy that oink is gone.

sexydingo
10-25-2007, 08:39 PM
DJRupture on OiNK (very good, solid article, realistic approach)
http://www.negrophonic.com/2007/defending-the-pig-oink-croaks/

Great read! Thanks for the link.

mrnobody
10-25-2007, 10:52 PM
i dont think that oink is going to open in a few days, in fact i think that oink is dead for ever

isn't dead "forever", thats for sure :P

snowultra
10-25-2007, 11:23 PM
might comeback under a new name? possibly

mrnobody
10-26-2007, 12:08 AM
dunno but it's likely under new URL.

briand5379
10-26-2007, 12:10 AM
They must do things differently in the UK. I always thought you had to be charged with a crime to have a bail set.

GoodOmens
10-26-2007, 12:47 AM
Some people are working on a replacement. Will have staff endorsement when they find out for sure if oink will not be returning.

wayn3
10-26-2007, 06:41 AM
Check this out.

http://oink.cx.la/

More like a scam to me.

Polarbear
10-26-2007, 07:19 AM
Check this out.

http://********

More like a scam to me.

don't publish those scam urls !!!!!

briand5379
10-26-2007, 09:43 AM
As they say I'll believe it when I see it. That would be interesting if the site was actually back up and running within a week of being closed.

mrnobody
10-26-2007, 10:24 AM
Check this out.

http://****.**.**/ (http://oink.cx.la/)

More like a scam to me.

they made an announcement regarding that site

http://oinkmemorial.blogspot.com/

Ali-g
10-26-2007, 04:37 PM
Well I hope at least the admins of the site were so brave and kind-hearted to have cleared all snatched-IP's. If not so... that'd be a serious problem for any user, u bet it

rvt
10-26-2007, 09:36 PM
Even if the snatched table is full of IPs, there's nothing that can be used as evidence.
The data is from an untrusted source (oink, untrusted in terms of prosecution), which has gathered it's own data from untrusted sources (the announce protocol is open to abuse and false data).

None of it meets any sort of basic standards for evidence.

scribble
10-26-2007, 10:59 PM
poor oink :(
he seems like a good guy.

Sylar666
10-26-2007, 11:06 PM
Even if the snatched table is full of IPs, there's nothing that can be used as evidence.
The data is from an untrusted source (oink, untrusted in terms of prosecution), which has gathered it's own data from untrusted sources (the announce protocol is open to abuse and false data).

None of it meets any sort of basic standards for evidence.
Good news again, Sir!;) Thanx, at least people ought not worry that much. These trade groups tried to scare the living shit out of the Users, but it's getting more obvious that this might have been a bluff - despite the 2 year long investigation.

Polarbear
10-26-2007, 11:16 PM
Even if the snatched table is full of IPs, there's nothing that can be used as evidence.
The data is from an untrusted source (oink, untrusted in terms of prosecution), which has gathered it's own data from untrusted sources (the announce protocol is open to abuse and false data).

None of it meets any sort of basic standards for evidence.

correcto mundo

and if you have a dynamic ip and a provider that has to delete your ip logs after 7 days by law, there's really absolutely nothing to worry about :D

ekk3123
10-27-2007, 12:37 AM
BOiNK is in progress by the guys at pirate bay. but I don't think that will be the same..
http://torrentfreak.com/the-pirate-bay-to-bring-back-oink-071026/

fOrUmAs
10-27-2007, 01:07 AM
BOiNK is in progress by the guys at pirate bay. but I don't think that will be the same..
http://torrentfreak.com/the-pirate-bay-to-bring-back-oink-071026/

we knows,there was a topic abouth this but it seems it was deleted for some reasone dont no why.

albatrossSKYER
10-27-2007, 01:13 AM
BOiNK can never replace what was going on at OiNK. its going to be a public garbage tracker like the pirate bay is. something i will not use

Polarbear
10-27-2007, 01:15 AM
this is very long and probably has been posted before. but it's worth it:

http://www.demonbaby.com/blog/2007/10/when-pigs-fly-death-of-oink-birth-of.html

spread the message!

Sylar666
10-27-2007, 01:19 AM
It is awesome, PB! Just wanted to post, but U overtook me. Worth reading, it's from Paine's blog.

PlainShane
10-27-2007, 01:42 AM
The message that is being sent by PB is phenomenal and I swear I will remember these events for years to come. Nothing like this has happened in a long time with so many principles and ideals involved.

Why not try out bo!nk? its worth a shot. Peace.

PS: keeping up with the news the past few days has been very exhilarating.

Pzero
10-27-2007, 04:14 AM
Probably been said before, but as a statement, TPB does a great job and they need to keep showing that this sorta thing won't be killed so easily. As a tracker replacement for OiNK, it won't work at all, millions of transcodes, no incentive to seed, no banning, flood of random users.

Gish
10-27-2007, 05:02 AM
the fact that Boink will have more users in one day than oink had total. is message that even the RIAA will be listening to.
Boink will never replace oink but one thing is certain!

oink will return:)

memike
10-27-2007, 07:19 AM
http://oink.cx.la/
someone posted this .i dont know if it is real hope so if yes may see you back on 1.11.07

relleuM
10-27-2007, 07:28 AM
http://oink.cx.la/
someone posted this .i dont know if it is real hope so if yes may see you back on 1.11.07
Page no longer exists

briand5379
10-27-2007, 10:05 AM
I was just there and it still exists.

Actatoi
10-27-2007, 10:14 AM
http://oink.**.**/ (http://oink.cx.la/)
someone posted this .i dont know if it is real hope so if yes may see you back on 1.11.07

That's a scam site.