Posts by robbery
Last ←Newer Page 1 2 3 4 5 Older→ First
-
if you also support the disconnection-on-accusation rules in the Copyright Amendment Act
did I say that, ever?
I'm outlining how I think it's going to go down, without taking sides on it. you seem to think you're invisible on the net. That's just so not the case. once people have access to the bottle neck of the internet, (the isp) you're fucked, simple as that. that's all I'm saying regarding this point, there are no costs issues, no technical issues that will be too difficult to over come, if they want to know what you're doing they'll figure it out. There will be exceptions to the rule, some clever technical people who can stay ahead of the game but for most people, once there is access to information at isp level its game over for that particular style of piracy, and probably many other types of privacy too.
No I don't think this is a good thing, just to be clear, but I see it as inevitable, and I would have much rather played along with drm been supportive of that rather than have some nosy prick look at what I'm up to on the net, but that's not where the game has gone now has it. I blame russell :) -
.
Which means getting the entire destination file, completely, in order to compute the final hash
no it doesn't. my compter when I start up the program spits out the details of the things its looking for, it finds people sharing it and makes a connection. that's internet to pirate right there. It says the name of the file, it goes to the people who have it, who are obviously advertising they have it in computer speak and my computer negotiates to extract the info off them. its pretty simple and one you know how the program works then all you need to do is write an interface to deal with the data flowing freely around the net. I can't do that obviously cos i'm not a computer programmer but it wouldn't be hard for someone who is to do it.
Also, if a user only torrents part of a file and then cancels the download, have they actually downloading infringing material? What they've got is of no utility, and technically isn't a copy, only a partial one. What then?
that's a good question. I don't think they'll go for people downloading anyway. I think they'll go for people who allow others to download off them.
this is an issue with bit torrent cos it allows people to download the parts they need off a partial file. ie it doesn't have to a be a complete file, it just has to have the bit someone needs, so yes you could have people sharing partial garbage which doesn't become anything till the final bit is loaded, but obviously that information is available on the net too, otherwise how would my computer know where to go to find the bits it needs, it has to know who has what and where etc. just watch for the completed files to show up and pounce, and if those people remove their files as soon as they download then it makes it harder for others to grab the files. There's a constant plea for people to seed stuff so obviously sources are a problem to some extent, if they made it more difficult for people to be sources then the system starts to fall down and piracy becomes difficult. (speaking of movie files mostly here, music files are much quicker to transfer etc) -
Try downloading part of a torrented file and using it, and tell me if it works.
depends if the file has been archived and split into partitions or not.
if not then the file is playable so long as the first section is there.
you can tell your program which part of the file to download first.If the torrent file is requesting something named FreeBSD-7.1-RELEASE.dvd1.iso but it's actually the latest Batman movie, how is ISP filtering going to pick that up?
sure, this is a good point but even I can think my way around that one.
at present the pirating scene, (yes there is a scene and they have sites and openly discuss rules and formats and files) demand their files in 700 meg, 1.4 gig, and what ever an hd or blueray file is. file sizes. so thats a good start point. look for those files sizes and who's transferring them.
the scene is pretty dumb and they do use actual film names at present, but they could dodge action by using fake names. but they've got to tell people about those fake names so you can find the torrents, so frequent the pirate sharing sites, write down the names and look for them. easy.
yes there are private sites, infitrate if needed , but the main thrust will mostlikely be to push it all underground. right now even your grand mother can download anything she wants, its that easy. making it covert and difficult will take the edge off it and access to isp uage is the gateway to that. forget DRM and the hissey fits over that. that's going to seem like a walk in the park once access to your usage is granted.The only way filtering can catch that is to assemble the entire file and then compare it to known hashes.
no it just needs the first bit. to check. you can even part un encode a partitioned file if you know what you're doing.
its not as mysterious and secret as we'd like to think.none of that will stop people taking hard drives to their friends loaded with files and sharing that way but with that you remove the anonymity factor to internet filesharing, and we're back to the good old days of home taping essentially.
-
sorry I should have been more specific.
putting his ideas to practice in a regular and repeatable way. its all very well to be radiohead and use their gimmick first but lets see it happen again and again. -
There's bugger all point debating this issue with someone who just refuses
I thought we were over all this sacha. why don't you talk to the other people and ignore me, just don't address anything I say. It makes me feel bad when you have a hissey fit which lets face it happens on a regular basis so lets just avoid it all together and you can preach to everyone else and completely ignore me. deal?
-
But determining what a torrent is retrieving requires capturing the entire download, reassembling, and then hashing it against known infringing materials
really? and you know this how?
Cos my little pirating machine can identify bits of files it needs and start download them all with in a few seconds of opening the program. it knows who its talking to (ip address) which bit of the file it needs and where to find it and place it and it does it all without asking me to help it at all. ie its not very labour intensive on my part.
so just addressing your whole exorbitant cost angle of argument and nothing its chances are once people are allowed access to the activities of users and they have knowledge of how those people are sharing pirated material (bit torrent via vuse and the likes) all they have to do is write them selves a simple program to log files (which are named things like I robot and lethal weapon 8 etc) and they're away. and it won't cost them fuck all, infact it will be fully automated and what they'll get at the end of it all will be a list of names and addresses of people they can fuck with. pretty simple really, and inexpensive at that. -
1) You’re not giving away music, you’re giving away RECORDINGS of your music;
that's pretty meaningless.
its not necessarily 'your music for a start, it could be written by someone else and its merely your version of it.
it does nothing to address the issue that the recording IS the product in many cases.
Dubbers a radio lecturer at Birmingham uni, he's not managing a company that is putting his ideas into practice with stunning results. until he puts his own ideas into practice and buys that Mediterranean retreat with the profits its just hot air. -
and a device restricting the way you chew those nuts afterwards.
that's a nicely sensational way of putting it simon.
its a device that restricts the way you distribute the item.
A device that has been poorly implement but its intent is to restrict distribution, not use, that it has failed on occasion to do that and that commentators have spat the dummy in the way they have reflects badly on both sides of the argument.I have no problem with media owners attempting to direct their media to the people that paid for it only, others it seems do have a problem with it.
-
apparently the dubbster is saying that giving music away is not in fact a business model but promotion. I'm pretty sure we were already aware of that concept in other fields (thank you unknown shampoo company for the free samples).
so glad we've got that sorted. now we can give up on the whole "humans are inherently honest so don't worry, be happy and let the media flow free" spiel. -
tracking torrent traffic to ensure that you're not chasing someone who's downloading, say, FreeBSD (as I did this afternoon) is a very, very intensive exercise on several fronts)
not wanting to further the argument that the sky is not falling at all (life's much more exciting when it is) but you sound like a technical expert on this sort of thing Matthew. Please do go into further detail on the costing of such an exercise.
Be specific, we can handle it.