Michael Watterson wrote:
> Instead the Rights Holders are NOT looking at traffic. Their agents run
> honeypots, connect as P2P clients etc and then they know exactly what
> material is exchanged and encryption or ports used doesn't matter.
*sigh* - if only this were the case. It appears (from the PoV of an outsider
looking in) that a number of different techniques are used to gather
information on what file sharing is going on, and some further techniques are
used to verify that the material being shared IS what it says on the time (and
not, for example, a rather large Word document that I have decided to share
with a filename of 'SomeGreatMovie.avi')
It further appears that these techniques give varying degrees of accuracy, at
varying times, from varying perspectives. They are nowhere close to 100%
accurate (though I have not gathered statistics to indicate my assessment of
To have an agreement, even an implied agreement, that these warnings shall be
passed on is one thing - but to agree to terminate service based on these
reports which have provably dubious accuracy is another thing entirely.
To suggest that there is some technology which can accurately identify the
illegal redistribution of content is misleading, at best.
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!