Language Selection

English French German Italian Portuguese Spanish

BitTorrent may be next target for copyright cops

Filed under
Legal

U.S. content companies are riding high this week after their courtroom victory over illicit file-sharing networks, and the popular BitTorrent software may be next in their crosshairs.

Like Grokster, which ended up on the losing side of a U.S. Supreme Court ruling on Monday, BitTorrent is widely used to trade copyrighted materials such as movies and television shows. But it also has many non-infringing uses, and legal experts say it may fare better than Grokster under the freshly minted legal precedent handed down this week.

"BitTorrent has a more realistic case for non-infringing users than Grokster or the others ever had," said Mark Schultz, an associate law professor at Southern Illinois University who has studied the software. "(Cohen) didn't set out to trade Ammonium or Britney Spears. But we have to be realistic because we know it's used for massive illegal filesharing."

The Supreme Court verdict centered on intent, with the court concluding that Grokster was liable because it induced users to illegally download copyrighted material.

Since Cohen has repeatedly counseled people against using BitTorrent for illicit means, there is little evidence that he has behaved in a similar fashion, Schultz said.

However, there are several factors that could put BitTorrent at legal risk.

Cohen recently created a search engine on the BitTorrent home page, which could be seen as encouraging piracy. And in a manifesto on his Web site from several years ago, he stated that one of his goals was to "commit digital piracy."

In an preface added this week, he has said the item -- which also stated a desire to "synthesize drugs, maintain untrusted contacts, purchase anonymously, and secure machines and homes" -- was intended as a parody.

Cohen declined to comment when contacted by Reuters.

Regardless of BitTorrent's legal standing, Hollywood is not standing idly by while thousands of movies and TV shows are traded illegally.

There are also signs that Hollywood has hired technology companies to impede BitTorrent downloads.

Users on several discussion boards say that unknown third parties are sabotaging downloads of copyrighted material, flooding the network with fake data and gathering information that could be used in future lawsuits against individual users.

"To screw up BitTorrent it's relatively straightforward," said Andrew Parker, chief executive of CacheLogic, a UK firm that measures BitTorrent usage. "The big weakness is ... it's only after you download the entire file that you find out it's corrupt."

Parker said that any strategy to impede BitTorrent downloads would probably not last for long.

Full Story.

More in Tux Machines

RaspArch Offers an Easy Way to Run Arch Linux on Raspberry Pi 2

Arne Exton had the pleasure of informing Softpedia about a new distribution of GNU/Linux created from the ground up for the Raspberry Pi 2 tiny computer board and called RaspArch. Read more

Leftovers: Software

  • goobook: Command-line contacts
  • Calibre eBook Editor Gets Much Better Support for DOCX
    Calibre, a complete application to edit, view, and convert eBook files, has been updated yet again, and the developer has added a number of new features and various other fixes.
  • GNOME Builder - 3.16.2
    I released 3.16.0 a couple weeks ago without much fanfare. Despite many months of 16-hour days and weekends, it lacked some of the features I wanted to get into the "initial" release. So I didn't stop. I kept pushing through to make 3.16.2 the best that I could.
  • PacketFence v5.0 released
    The Inverse team is pleased to announce the immediate availability of PacketFence 5.0.0. This is a major release with new features, enhancements and important bug fixes. This release is considered ready for production use and upgrading from previous versions is strongly advised.
  • What are good open-source log monitoring tools on Linux
    In an operating system, logs are all about keeping track of events, be it critical system errors, resource usage warnings, transaction history, application status, or user activities. These logs, which are stored as (text or binary) files in the system, are useful for system auditing, debugging and maintenance. However, with so many different system entities generating log files, and even at growing rate, the challenge as a system admin is to how to "consume" these log files effectively.
  • Apache Fortress Core 1.0-RC40 released !
  • Say Hello to Open Source Puppet 4!
    Production-ready Open Source Puppet 4 is now available! We’re excited to announce new features and enhancements that will extend your use of Puppet for faster, more consistent management of server configurations. We’ve added capabilities to help you save time, reduce errors, and increase reliability.
  • textprint: Visually impressive, in only 18K
    textprint takes a flat data file as input, and arranges it graphically to fit the terminal without distorting the image. From there, textprint goes from zero-to-60, in about two seconds.

today's howtos