Language Selection

English French German Italian Portuguese Spanish

BitTorrent may be next target for copyright cops

Filed under
Legal

U.S. content companies are riding high this week after their courtroom victory over illicit file-sharing networks, and the popular BitTorrent software may be next in their crosshairs.

Like Grokster, which ended up on the losing side of a U.S. Supreme Court ruling on Monday, BitTorrent is widely used to trade copyrighted materials such as movies and television shows. But it also has many non-infringing uses, and legal experts say it may fare better than Grokster under the freshly minted legal precedent handed down this week.

"BitTorrent has a more realistic case for non-infringing users than Grokster or the others ever had," said Mark Schultz, an associate law professor at Southern Illinois University who has studied the software. "(Cohen) didn't set out to trade Ammonium or Britney Spears. But we have to be realistic because we know it's used for massive illegal filesharing."

The Supreme Court verdict centered on intent, with the court concluding that Grokster was liable because it induced users to illegally download copyrighted material.

Since Cohen has repeatedly counseled people against using BitTorrent for illicit means, there is little evidence that he has behaved in a similar fashion, Schultz said.

However, there are several factors that could put BitTorrent at legal risk.

Cohen recently created a search engine on the BitTorrent home page, which could be seen as encouraging piracy. And in a manifesto on his Web site from several years ago, he stated that one of his goals was to "commit digital piracy."

In an preface added this week, he has said the item -- which also stated a desire to "synthesize drugs, maintain untrusted contacts, purchase anonymously, and secure machines and homes" -- was intended as a parody.

Cohen declined to comment when contacted by Reuters.

Regardless of BitTorrent's legal standing, Hollywood is not standing idly by while thousands of movies and TV shows are traded illegally.

There are also signs that Hollywood has hired technology companies to impede BitTorrent downloads.

Users on several discussion boards say that unknown third parties are sabotaging downloads of copyrighted material, flooding the network with fake data and gathering information that could be used in future lawsuits against individual users.

"To screw up BitTorrent it's relatively straightforward," said Andrew Parker, chief executive of CacheLogic, a UK firm that measures BitTorrent usage. "The big weakness is ... it's only after you download the entire file that you find out it's corrupt."

Parker said that any strategy to impede BitTorrent downloads would probably not last for long.

Full Story.

More in Tux Machines

Five reasons to switch from Windows to Linux

Linux has been in the ascendancy ever since the open source operating system was released, and has been improved and refined over time so that a typical distribution is now a polished and complete package comprising virtually everything the user needs, whether for a server or personal system. Much of the web runs on Linux, and a great many smartphones, and numerous other systems, from the Raspberry Pi to the most powerful supercomputers. So is it time to switch from Windows to Linux? Here are five reasons why. Read more

today's leftovers

Leftovers: OSS and Sharing

Security Leftovers

  • Chrome vulnerability lets attackers steal movies from streaming services
    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
  • Large botnet of CCTV devices knock the snot out of jewelry website
    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices. The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
  • Study finds Password Misuse in Hospitals a Steaming Hot Mess
    Hospitals are pretty hygienic places – except when it comes to passwords, it seems. That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff. The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
  • Why are hackers increasingly targeting the healthcare industry?
    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud