home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   can.internet.highspeed      Supposed to be for Canuck DSL/cable nets      27,972 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 26,457 of 27,972   
   Some Guy to JF Mezei   
   Re: So how is the Voltage Pictures / Tek   
   01 Feb 13 10:54:20   
   
   From: Some@Guy.com   
      
   JF Mezei wrote:   
      
   > For all I know, GardaLey can simply be monitory the list of peers   
   > that the tracker feeds it.  Yes, this means it can see % of file   
   > that a peer currently has. And yes, it can likely see whether a   
   > peer is accepting connections or if it is "chocked".   
      
   All of that is sufficient to establish that every IP participating in   
   that torrent is violating the rights of the owner of the work - as long   
   as the torrent does indeed constitute a copy of the work.   
      
   At that point, it doesn't matter how much of the work is uploaded to or   
   downloaded from any particular IP that is participating in the torrent.   
      
   > Finding over 4000 IP addresses who downloaded unknown/undesirable   
   > movies in a period of a month ?   
      
   The system is broken and needs to be fixed.   
      
   When a rights-holder finds a copy of their work on a file-locker, they   
   request that the work be taken down, and if it's taken down then that's   
   the end of the situation.   
      
   When a rights-holder finds a copy of their work on an active torrent,   
   they should be able to:   
      
   a) contacting the individual ISP's in question in "real time" and give   
   them their evidence and details of the torrent and compel the ISP to   
   disrupt / throttle / deactivate the internet connection of the customer   
   for a short period of time (6 to 24 hours) and send an e-mail to   
   what-ever e-mail address the ISP has on file for that customer   
   explaining what is going on and why, and that their connection will be   
   restored after the time-period is over, and that no further action will   
   be taken, and their identity will not be revealed to the rights-holder.   
      
   OR   
      
   b) do no real-time intervention, but impliment a "6-strikes" policy   
   against the customer (as as been implimented in the US).  Again, their   
   identity will not be revealed to the rights holder.   
      
   > > Poisoning a torrent has immediate effect in accomplishing relief   
   > > against financial loss without the costs associated with court   
   > > proceedings.   
   >   
   > You can't poison an existing torrent because there are checksums   
   > in each part.   
      
   I was under the impression that the individual parts or segments can be   
   composed of random data, and be constructed such that they have the   
   desired checksum, and these parts could be injected into the torrent by   
   the agent (Canipre).   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca