Results 1 to 3 of 3

Thread: Promising Defense Strategy For People Targeted By

  1. #1
    Promising defense strategy for people targeted by the RIAA

    A research paper highlighting security weaknesses in a popular internet file-sharing network has raised concerns that innocent users could in theory be wrongly accused of sharing copyrighted music.

    The Recording Industry Association of America (RIAA), which represents the largest US music companies, has already begun legal action against 261 file-sharers who are accused of sharing "substantial" amounts of copyrighted material through peer-to-peer (P2P) networks.

    The RIAA carried out surveillance of P2P networks to determine the usernames of alleged copyright infringers. A subset of these users was then tracked down via their internet service providers.

    So far, 52 have agreed to settle with the RIAA for a few thousand dollars each. A further 838 have admitted infringements and promised to destroy illegally obtained files in return for a legal amnesty. An estimated 62 million Americans are thought to have used P2P networks, though it is not known how many have illegally shared music.

    The anonymous paper, Entrapment: Incriminating Peer to Peer Network Users, was posted to a free Australian web hosting service and suggests some users could claim that the evidence on which they are brought to trial is flawed. Experts contacted by New Scientist say the paper is a credible piece of work.


    False request

    The document focuses on the Gnutella file-sharing network that forms the backbone of a number of widely-used file-sharing clients including Morpheus and Bearshare.

    It describes various techniques that could be used to make it appear to a third party on the Gnutella network as if an innocent user is hosting or searching for copyrighted files. It also describes methods for tricking users into inadvertently downloading copyrighted files so that they actually host these files.

    Some of the methods described are made possible because peer-to-peer networks like Gnutella rely on users passing on requests for files and information about the files stored on users' machines. Manipulating these network messages can make it look as if a user is illegally offering files for download.

    "These Gnutella-specific attacks seem reasonable at first glance," says Adam Langley, a UK-based peer-to-peer programmer. But the techniques described are not surprising, he says: "Gnutella was certainly never designed to resist an attack like this."

    Unreliable evidence

    Others experts say the paper raises interesting issues about the ongoing legal furore. "The core point the author is making - the unreliability of the 'evidence' used to sue file sharers - is valid," says Ian Clarke, who invented Freenet, a file-sharing network designed to provide anonymity for users.

    Theodore Hong, a peer-to-peer networking researcher at Imperial College London, UK, comments: "It's interesting that these technical weaknesses may actually be a legal strength [for P2P users] by introducing doubt as to who is really doing what."

    Langley says it is unclear whether other P2P networks might be similarly vulnerable to misuse. But he notes that there are other ways to incriminate an innocent party: "Most Windows users will run any old attachment you send them, so if you want to implicate someone you can just send them a Trojan."

    SOURCE

  2. File Sharing   -   #2
    Yes true, though Fast Track seems to be more clear cut and a better target simply based on the fact if you share 1 byte then you have the whole file. Whereas others that support partial file sharing and swarming may be harder to prove what you have the file based on that alone, you may only have that few bytes. Also it remains that the out of court continues. I imagine some who request trial will have charges dropped quietly perhaps, we must wait and see who shall be the hero, if allowed.

  3. File Sharing   -   #3
    If that's true then it's an airtight defense for any Gnutella users, as long as you delete the files before they manage to supuena your hard drives or something. Just say that someone must've been spoofing your file list, and there's no way they can prove that wasn't the case.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •