Language Selection

English French German Italian Portuguese Spanish

BitTorrent may be next target for copyright cops

Filed under
Legal

U.S. content companies are riding high this week after their courtroom victory over illicit file-sharing networks, and the popular BitTorrent software may be next in their crosshairs.

Like Grokster, which ended up on the losing side of a U.S. Supreme Court ruling on Monday, BitTorrent is widely used to trade copyrighted materials such as movies and television shows. But it also has many non-infringing uses, and legal experts say it may fare better than Grokster under the freshly minted legal precedent handed down this week.

"BitTorrent has a more realistic case for non-infringing users than Grokster or the others ever had," said Mark Schultz, an associate law professor at Southern Illinois University who has studied the software. "(Cohen) didn't set out to trade Ammonium or Britney Spears. But we have to be realistic because we know it's used for massive illegal filesharing."

The Supreme Court verdict centered on intent, with the court concluding that Grokster was liable because it induced users to illegally download copyrighted material.

Since Cohen has repeatedly counseled people against using BitTorrent for illicit means, there is little evidence that he has behaved in a similar fashion, Schultz said.

However, there are several factors that could put BitTorrent at legal risk.

Cohen recently created a search engine on the BitTorrent home page, which could be seen as encouraging piracy. And in a manifesto on his Web site from several years ago, he stated that one of his goals was to "commit digital piracy."

In an preface added this week, he has said the item -- which also stated a desire to "synthesize drugs, maintain untrusted contacts, purchase anonymously, and secure machines and homes" -- was intended as a parody.

Cohen declined to comment when contacted by Reuters.

Regardless of BitTorrent's legal standing, Hollywood is not standing idly by while thousands of movies and TV shows are traded illegally.

There are also signs that Hollywood has hired technology companies to impede BitTorrent downloads.

Users on several discussion boards say that unknown third parties are sabotaging downloads of copyrighted material, flooding the network with fake data and gathering information that could be used in future lawsuits against individual users.

"To screw up BitTorrent it's relatively straightforward," said Andrew Parker, chief executive of CacheLogic, a UK firm that measures BitTorrent usage. "The big weakness is ... it's only after you download the entire file that you find out it's corrupt."

Parker said that any strategy to impede BitTorrent downloads would probably not last for long.

Full Story.

More in Tux Machines

10 hot Android smartphones that got price cuts recently

With numerous smartphone getting launched each month, brands always adjust prices to give slightly competitive edge to older smartphone models and also to clear inventories. Here are 10 smartphones that got price cuts recently. Read more

Debian and Ubuntu News

  • Debian Project News - July 29th, 2016
    Welcome to this year's third issue of DPN, the newsletter for the Debian community.
  • SteamOS Brewmaster 2.87 Released With NVIDIA Pascal Support
  • Snap interfaces for sandboxed applications
    Last week, we took a look at the initial release of the "portal" framework developed for Flatpak, the application-packaging format currently being developed in GNOME. For comparison, we will also explore the corresponding resource-control framework available in the Snap format developed in Ubuntu. The two packaging projects have broadly similar end goals, as many have observed, but they tend to vary quite a bit in the implementation details. Naturally, those differences are of particular importance to the intended audience: application developers. There is some common ground between the projects. Both use some combination of techniques (namespaces, control groups, seccomp filters, etc.) to restrict what a packaged application can do. Moreover, both implement a "deny by default" sandbox, then provide a supplemental means for applications to access certain useful system resources on a restricted or mediated basis. As we will see, there is also some overlap in what interfaces are offered, although the implementations differ. Snap has been available since 2014, so its sandboxing and resource-control implementations have already seen real-world usage. That said, the design of Snap originated in the Ubuntu Touch project aimed at smartphones, so some of its assumptions are undergoing revision as Snap comes to desktop systems. In the Snap framework, the interfaces that are defined to provide access to system resources are called, simply, "interfaces." As we will see, they cover similar territory to the recently unveiled "portals" for Flatpak, but there are some key distinctions. Two classes of Snap interfaces are defined: one for the standard resources expected to be of use to end-user applications, and one designed for use by system utilities. Snap packages using the standard interfaces can be installed with the snap command-line tool (which is the equivalent of apt for .deb packages). Packages using the advanced interfaces require a separate management tool.
  • Ubuntu 15.10 (Wily Werewolf) Reaches End Of Life Today (July 28)
  • Ubuntu MATE 16.10 Yakkety Yak Gets A Unity HUD-Like Searchable Menu
    MATE HUD, a Unity HUD-like tool that allows searching through an application's menu, was recently uploaded to the official Yakkety Yak repositories, and is available (but not enabled) by default in Ubuntu MATE 16.10.

Tablet review: BQ Aquaris M10 Ubuntu Edition

As employees have become more and more flexible in recent years thanks to the power and performance of mobile devices, the way we work has changed dramatically. We frequently chop and change between smartphones, tablets and laptops for different tasks, which has led to the growth of the hybrid market – devices such as Microsoft’s Surface Pro 3 and Apple’s iPad Pro – that provide the power and functionality of a laptop with the mobility and convenience of a tablet. Read more

Leftovers: Software

  • qutebrowser v0.8.1
  • Anonymous publishing with Riffle
    Preserving anonymity online is an understandably hot topic these days. But it can be confused with related concepts like privacy and secure communication. A new protocol called Riffle was recently published [PDF] by researchers at MIT; it offers a different take on anonymity than that implemented by other projects. A Riffle network could be used to implement an anonymous but verifiable blogging or publishing platform: one in which the messages are visible to everyone, but the identity of all users remains hidden. For comparison, the most well-known anonymity project is, no doubt, Tor, which enables users to access Internet services without revealing their physical location on the network. It is possible to use Tor to access publishing services like Twitter and, thus, to broadcast content to the Internet at large without revealing one's identity. But Tor is just as useful at solving other problems, such as accessing remote servers that are blocked by a firewall. While important, that usage of Tor does not necessarily involve anonymity; one could, for instance, use it to log in to Facebook, and Tor alone does not prevent the use of web trackers by sites. Furthermore, Tor is the focus of near-constant attacks (against the network itself and against the algorithms that keep it working), and it may be vulnerable to large-scale traffic analysis—such as a national ISP could perform. One of the stated goals of Riffle is to prevent such traffic analysis, which has led to popular reports and online discussions referring to Riffle as a Tor competitor. But Riffle, in fact, tackles a narrower problem set. In a Riffle network, every message sent or file uploaded is eventually published in plaintext form where everyone can see it. The Riffle protocol offers strong guarantees that the identity of the message's uploader cannot be discovered—even in cases where multiple servers in the network have been compromised.
  • Announcing Serval!
    Serval is launching on Tuesday the 2nd of August, 2016. It will be available under the GPLv2 and is completely free to use.
  • Tangent Animation studio will support the Blender Institute to hire two devs full time to work on Blender 2.8 and a third one for Cycles
  • 5 Best Calendar Apps for Linux Desktop
    Time is money, as goes an old saying, therefore you need to manage it very well. This then calls for proper planning of your daily schedule, future events, appointments and several other daily activities.
  • Pandora Client `Pithos` Sees New Major Release
    Pithos 1.2.0 was released today and it includes a new explicit content filter option, new dialog design, along with other improvements and important bug fixes.
  • Terminix Now Available In PPA For Ubuntu 16.04 And Linux Mint 18 [Quick Update]
    Terminix was uploaded to the Debian Sid repositories recently. To make it easier to install and stay up to date with the latest Terminix versions, I used the official Debian packaging (thanks to the packagers!) and created a Terminix PPA for Ubuntu 16.04 and Linux Mint 18.
  • Geary – A Good Looking Modern Email Client for Linux
    Geary is a free and open source email client. It’s simple to setup and install, in a few minutes your done. No need to add extra features or add ons to install, it just works. The user interface is the easiest and simplest to use.
  • PVS-Studio confesses its love for Linux
    This post is about love. About the love of the static code analyzer PVS-Studio, for the great open source Linux operating system. This love is young, touching and fragile. It needs help and care. You will help greatly if you volunteer to help testing the beta-version of PVS-Studio for Linux.