<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>bittorrent &#8211; Privacy News Online by Private Internet Access VPN</title>
	<atom:link href="https://www.privateinternetaccess.com/blog/tag/bittorrent-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privateinternetaccess.com/blog</link>
	<description>Online privacy news from around the world.</description>
	<lastBuildDate>Wed, 26 Aug 2020 22:18:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>EU&#8217;s top court says The Pirate Bay can be blocked, because it knowingly links to unauthorized copyright material</title>
		<link>https://www.privateinternetaccess.com/blog/eus-top-court-says-pirate-bay-can-blocked-knowingly-links-unauthorized-copyright-material/</link>
		
		<dc:creator><![CDATA[Glyn Moody]]></dc:creator>
		<pubDate>Thu, 15 Jun 2017 16:29:31 +0000</pubDate>
				<category><![CDATA[Copyright]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[cjeu]]></category>
		<category><![CDATA[the pirate bay]]></category>
		<category><![CDATA[torrenting]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=5297</guid>

					<description><![CDATA[<p>A long-running legal battle between Dutch ISPs and the local anti-piracy organization BREIN over blocking The Pirate Bay has concluded with a ruling in favor of BREIN. The Court of Justice of the European Union (CJEU) said yesterday The Pirate Bay could be blocked because: &#160; &#8220;Making available and managing an online platform for sharing &#8230; <a href="https://www.privateinternetaccess.com/blog/eus-top-court-says-pirate-bay-can-blocked-knowingly-links-unauthorized-copyright-material/" class="more-link">Continue reading<span class="screen-reader-text"> "EU&#8217;s top court says The Pirate Bay <i>can</i> be blocked, because it knowingly links to unauthorized copyright material"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/eus-top-court-says-pirate-bay-can-blocked-knowingly-links-unauthorized-copyright-material/">EU&#8217;s top court says The Pirate Bay &lt;i&gt;can&lt;/i&gt; be blocked, because it knowingly links to unauthorized copyright material</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A long-running <a href="https://torrentfreak.com/isps-no-longer-have-to-block-the-pirate-bay-dutch-court-rules-140128/">legal battle</a> between Dutch ISPs and the local <a href="https://stichtingbrein.nl/english.php">anti-piracy organization BREIN</a> over blocking The Pirate Bay has concluded with a ruling in favor of BREIN. The Court of Justice of the European Union (CJEU) said yesterday The Pirate Bay could be blocked because:</p>
<p>&nbsp;</p>
<blockquote><p>&#8220;Making available and managing an online platform for sharing copyright-protected works, such as ‘The Pirate Bay’, may constitute an infringement of copyright&#8221;</p></blockquote>
<p>&nbsp;</p>
<p>That summary, from <a href="https://curia.europa.eu/jcms/upload/docs/application/pdf/2017-06/cp170064en.pdf">the CJEU&#8217;s press release</a>, doesn&#8217;t capture a key aspect of the case, which is that The Pirate Bay is not storing any copyright-protected works on its site, merely hosting links to torrents. The latest judgment builds on an earlier ruling by the CJEU, which held that <a href="https://www.privateinternetaccess.com/blog/2016/09/eu-supreme-court-hyperlinks-legal-even-linking-illegal-publications/">sharing hyperlinks to unauthorized copies was legal</a> but <i>only</i> if it was done unwittingly, and not for commercial benefit. In the case of The Pirate Bay, the court has now ruled that neither applied. The Pirate Bay was run to make a profit, the judges said, as the advertising on the site indicated, and it knew it was linking to unauthorized copies:</p>
<p>&nbsp;</p>
<blockquote><p>&#8220;the operators of ‘The Pirate Bay’ have been informed that their platform provides access to copyright-protected works published without the authorisation of the rightholders. In addition, the same operators expressly display, on blogs and forums accessible on that platform, their intention of making protected works available to users, and encourage the latter to make copies of those works.&#8221;</p></blockquote>
<p>&nbsp;</p>
<p>A highly problematic aspect of the latest judgment is that the links in question were uploaded by users, not by The Pirate Bay itself, so arguably BREIN should pursue the former. However, the CJEU did not agree that this fact exonerated The Pirate Bay:</p>
<p>&nbsp;</p>
<blockquote><p>&#8220;Whilst it accepts that the works in question are placed online by the users, the Court highlights the fact that the operators of the platform play an essential role in making those works available. In that context, the Court notes that the operators of the platform index the torrent files so that the works to which those files refer can be easily located and downloaded by users. ‘The Pirate Bay’ also offers — in addition to a search engine — categories based on the type of the works, their genre or their popularity. Furthermore, the operators delete obsolete or faulty torrent files and actively filter some content.&#8221;</p></blockquote>
<p>&nbsp;</p>
<p>The CJEU seems to be saying that if a site carries out common activities like providing an index or categorizing content uploaded by its users, it can no longer be considered a &#8220;<a href="https://en.wikipedia.org/wiki/Electronic_Commerce_Directive#.22Mere_conduit.22">mere conduit</a>&#8220;, and can become an active participant in the linking to copyright material. As such, the court implies, it loses the intermediary liability protection that is enshrined in <a href="https://ec.europa.eu/digital-single-market/en/e-commerce-directive">the EU&#8217;s e-commerce directive</a>.</p>
<p>Undermining intermediary liability protection in this way is very bad news for companies offering online services in the EU that allow users to post links – the vast majority. It suggests that they must either stop providing any kind of search facility or content moderation/organization, or they must actively check <i>every</i> user posting for possible copyright infringement – clearly an impossible task, since there are so many legal factors involved. This is a hot issue at the moment, as the revised EU copyright directive includes measures that would require larger sites <a href="https://www.privateinternetaccess.com/blog/2017/06/bad-law-not-bad-luck-article-13-new-eu-copyright-directive-requires-general-upload-filters/">to filter all user uploads</a> for possible copyright infringements.</p>
<p>Ironically, one outfit that will not be much affected by the judgment is The Pirate Bay. For Internet users outside the EU, the ruling will have negligible impact. They will continue to access The Pirate Bay as before. Even within the European Union, the effect will be limited, and only make itself felt after a while. The CJEU&#8217;s ruling merely clarifies the underlying law, and now it will be up to the Dutch court that referred the case to make its own decision in accordance with the CJEU&#8217;s guidelines. Even then, the most that the local court can do is to order Dutch ISPs to block direct access to The Pirate Bay. Circumventing such blocks using VPNs or one of the many proxies available will be straightforward. If anything, imposing blocks in the EU will encourage even more people there to discover and start using these kind of tools – no bad thing at a time when online privacy is under threat from many quarters.</p>
<p>Featured image by <a href="http://www.publicdomainpictures.net/view-image.php?image=163629&amp;picture=rusty-metal-chains">Alex Borland</a>.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/eus-top-court-says-pirate-bay-can-blocked-knowingly-links-unauthorized-copyright-material/">EU&#8217;s top court says The Pirate Bay &lt;i&gt;can&lt;/i&gt; be blocked, because it knowingly links to unauthorized copyright material</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>BitTorrent is fifteen years old. What would a file sharing technology developed today look like?</title>
		<link>https://www.privateinternetaccess.com/blog/bittorrent-fifteen-years-old-file-sharing-technology-developed-today-look-like/</link>
					<comments>https://www.privateinternetaccess.com/blog/bittorrent-fifteen-years-old-file-sharing-technology-developed-today-look-like/#comments</comments>
		
		<dc:creator><![CDATA[Rick Falkvinge]]></dc:creator>
		<pubDate>Sat, 30 Jul 2016 06:33:49 +0000</pubDate>
				<category><![CDATA[Copyright]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[file sharing]]></category>
		<category><![CDATA[torrenting]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=2846</guid>

					<description><![CDATA[<p>BitTorrent was developed in 2001: today&#8217;s file-sharing technology predates the launch of Facebook, Twitter, and the iPhone. In those fifteen years, surveillance and repression technologies have advanced massively. If we designed file sharing today to keep up with these developments, sharing technology would be an uncensorable, untrackable, and unidentifiable peer-to-peer mesh network between mobile devices. &#8230; <a href="https://www.privateinternetaccess.com/blog/bittorrent-fifteen-years-old-file-sharing-technology-developed-today-look-like/" class="more-link">Continue reading<span class="screen-reader-text"> "BitTorrent is fifteen years old. What would a file sharing technology developed today look like?"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/bittorrent-fifteen-years-old-file-sharing-technology-developed-today-look-like/">BitTorrent is fifteen years old. What would a file sharing technology developed today look like?</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>BitTorrent was developed in 2001: today&#8217;s file-sharing technology predates the launch of Facebook, Twitter, and the iPhone. In those fifteen years, surveillance and repression technologies have advanced massively. If we designed file sharing today to keep up with these developments, sharing technology would be an uncensorable, untrackable, and unidentifiable peer-to-peer mesh network between mobile devices.</strong></p>
<p>Ten years ago, activists argued that file sharing was unstoppable and would adapt to any threat using mobile transmissions. However, this innovation hasn&#8217;t taken place, maybe out of a lack of urgency. Let&#8217;s examine how such a technology could work.</p>
<p><strong>A little history</strong></p>
<p>When music sharing became file sharing with the advent of the first home computers, files were physically carried on cassette tapes and floppy disks to the recipient. This was the early 1980s, and this form of sharing has been nicknamed the <strong>AdidasLAN</strong> in retrospect, joking about the fact that files were carried by Adidas sneakers.</p>
<p>The first major development came with BBSes of the late 1980s and early 1990s, when an error-correcting and signal-quality-sensitive file transfer protocol appeared intended to transfer files over phone lines. It was known as <strong>ZModem</strong>, and you could call it an early poor man&#8217;s version of TCP (as in the TCP/IP suite of Internet protocols; this was not yet the Internet). This protocol was used to transfer a lot of correspondence and discussions (and other files) on an amateur network known as FidoNet that predated the mainstream Internet rollout.</p>
<p>Fast forwarding to 1999, and <strong>Napster</strong> appeared, with one centralized server and centralized client databases (where everybody could see everybody&#8217;s full collection). It was shut down by the copyright industry in a move that was the first in a long string of mistakes.</p>
<p>A few months later, a competitor named <strong>DirectConnect</strong> appeared, which quickly got many protocol-compatible clones. Thus, the servers had decentralized to many different servers &#8211; but the clients still served their full database, which presented a legal weakness, and a file was transferred between one source and one destination at a time, which presented an efficiency weakness.</p>
<p>In response to this in turn, <strong>BitTorrent</strong> was developed and released in the summer of 2001. It decentralized the client databases and the transmission, so nobody could see the full shared catalog of another peer. And&#8230; well, the innovation basically ends at that point.</p>
<p><strong>Let&#8217;s take that again: when BitTorrent was developed, not only did Facebook and Twitter not exist, but the world didn&#8217;t have modern mobile phones or the very concept of apps on mobile phones.</strong></p>
<p>If you want an idea of just how old BitTorrent is, consider the fact that it was released in the same summer as Windows XP (July 2 and August 26, respectively).</p>
<p>There has been basically no innovation at all in the file sharing field after BitTorrent, and that&#8217;s a problem on many fronts. The development that has happened has mostly been in the convenience field &#8211; like the ability to subscribe to certain TV shows using RSS.</p>
<p>The one major security add-on is VPNs, and although they are tremendously useful in anonymizing and the best we&#8217;ve got today, they are but one security layer on top of an old technology.</p>
<p><strong>Convenience or security?</strong></p>
<p>There&#8217;s always a case to be made for user convenience if you want adoption of software. <em>Popcorn Time,</em> for example, can be argued to be the most recent big innovation in file sharing &#8211; but it adds convenience only, and not one piece of security. If we&#8217;re updating the security to account for the latest fifteen years, convenience may be nice, but it&#8217;s not our main focus.</p>
<p>The founders, operators, and spokespeople for The Pirate Bay have long argued that it&#8217;s a weakness of the ecosystem that they&#8217;re a centralized chokepoint. It&#8217;s easy to see they&#8217;re right in this. In the latest installment, Peter Sunde <a href="https://torrentfreak.com/pirate-bay-founder-piracy-scene-needs-innovation-160726/">argues</a> that IPFS or ZeroNet would provide significant innovation &#8211; but much of this just builds another interceptable layer on top of legacy BitTorrent instead of doing what BitTorrent did: reinventing ground-up to meet a clear and present threat.</p>
<p><strong>It&#8217;s important to understand that developing a technology to protect dissidents in repressive regimes, and a technology to enable the nonprofit sharing of culture and knowledge, are one and the same thing &#8212; even up to where repressive regimes and the copyright industry use the same surveillance/repression vendors.</strong></p>
<p>Therefore, in this thought experiment, we&#8217;re focusing on developing a technology to enable the free <em>and safe</em> information sharing for dissidents in repressive regimes; a tool to safeguard human rights. As a bonus, we&#8217;re also getting a general information-wants-to-be-free technology. (This is a common factor of the copyright industry, that they fight against basic human rights in order to enforce their monopoly. For example, the copyright industry recently <a href="https://torrentfreak.com/tor-and-bitcoin-hinder-anti-piracy-efforts-160715/">complained</a> that TOR and bitcoin &#8211; two tools used to help dissidents in repressive regimes safeguard human rights &#8211; indeed &#8220;get in the way&#8221; of copyright monopoly enforcement.)</p>
<p>Once you&#8217;re focusing on making information anonymous and untraceable, you&#8217;re doing the bulk of your transmission off the traceable Internet. You&#8217;re using the fact that there are many clusters forming daily (if not hourly) of random sets of mobile devices (Androids and iPhones) that happen to come into physical proximity of each other &#8211; at subway stations, in buses, in parks. You use the fact that these can hold massive data amounts today, and that they can contact each other and transfer tons of data anonymously and untraceably in such spontaneous clusters, using low-energy long-range Bluetooth 4 as the most obvious transmission candidate. Thus, we have huge set of constantly shifting mesh networks (a supermesh) where nodes come and go, and carry data from one mesh to the next.</p>
<p>When using a network like this, you would choose to publish a document or subscribe to a certain flow (maybe a series of documents from a dissident), and a peer somewhere &#8211; at a safe distance from you, many hops away &#8211; could choose to act as a gateway to the Internet, thereby making the endpoints truly anonymous and untraceable, not to mention uncensorable.</p>
<p>As a funny observation, such a transmission technology would build more on the original AdidasLAN than it builds on BitTorrent, as the successful transmission of data depends on nodes being in physical motion through the day.</p>
<p>Of course, as mentioned, such a technology could also be used to tell the mesh network to subscribe to episodes of a certain TV show, where those episodes would practically appear everywhere at once in a city with just a few gateway feeds into the supermesh in that particular city. That&#8217;s a byproduct of developing human rights software, as observed earlier.</p>
<p>Privacy remains your own responsibility.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/bittorrent-fifteen-years-old-file-sharing-technology-developed-today-look-like/">BitTorrent is fifteen years old. What would a file sharing technology developed today look like?</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privateinternetaccess.com/blog/bittorrent-fifteen-years-old-file-sharing-technology-developed-today-look-like/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Your ISP is Going to Spy on You Starting July 12, 2012</title>
		<link>https://www.privateinternetaccess.com/blog/your-isp-is-going-to-spy-on-you-starting-july-12-2012/</link>
					<comments>https://www.privateinternetaccess.com/blog/your-isp-is-going-to-spy-on-you-starting-july-12-2012/#comments</comments>
		
		<dc:creator><![CDATA[rasengan]]></dc:creator>
		<pubDate>Fri, 16 Mar 2012 00:59:35 +0000</pubDate>
				<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[isp]]></category>
		<category><![CDATA[riaa]]></category>
		<category><![CDATA[spying]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=257</guid>

					<description><![CDATA[<p>Your ISP is going to spy on you starting July 12, 2012. One year ago, the RIAA and the MPAA organized a project with the largest internet service providers in the US to begin monitoring their customer&#8217;s internet activity.  This monitoring was introduced as a joint coalition to combat piracy.  A list of providers that &#8230; <a href="https://www.privateinternetaccess.com/blog/your-isp-is-going-to-spy-on-you-starting-july-12-2012/" class="more-link">Continue reading<span class="screen-reader-text"> "Your ISP is Going to Spy on You Starting July 12, 2012"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/your-isp-is-going-to-spy-on-you-starting-july-12-2012/">Your ISP is Going to Spy on You Starting July 12, 2012</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><a href="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/iStock_000003502484XSmall.jpg?x63129"><img loading="lazy" class="alignleft size-medium wp-image-264" title="ISPs will Spy Starting July 12, 2012" src="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/iStock_000003502484XSmall-260x300.jpg?x63129" alt="Headless Man" width="260" height="300" srcset="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/iStock_000003502484XSmall-260x300.jpg 260w, https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/iStock_000003502484XSmall.jpg 323w" sizes="(max-width: 260px) 85vw, 260px" /></a>Your ISP is going to spy on you starting July 12, 2012</strong>.</p>
<p><span style="text-align: center;">One year ago, the RIAA and the MPAA organized a project with the largest internet service providers in the US to begin monitoring their customer&#8217;s internet activity.  This monitoring was introduced as a joint coalition to combat piracy.  A list of providers that are on board includes, but is not limited to, Time Warner, Comcast, Cablevision, Verizon and AT&amp;T.</span></p>
<p>According to <a href="http://news.cnet.com/8301-31001_3-57397452-261/riaa-chief-isps-to-start-policing-copyright-by-july-12/">CNet&#8217;s Greg Sandoval</a>, Cary Sherman of the RIAA has announced this week that deployments of the spying tools are nearly prepared and a tentative launch of July 12, 2012 has been set.</p>
<p>Reports indicate that there will be consequences for users who are caught pirating digital media.  First offenses may include forced educational rehabilitation as well as throttled connection speeds.  There have also been discussions stating that the top 200 websites will become inaccessible for users who are caught pirating.</p>
<p>However, the fact that ISPs are able to detect this activity indicates that they will be spying on their users.</p>
<p><strong>Tips to protect your privacy</strong></p>
<p>Using the internet, as well as using the internet to fileshare, is completely legal.  Here are ways to protect your privacy when engaging in legal activities:</p>
<p>1. Use an<a title="anonymous vpn" href="https://www.privateinternetaccess.com/"> anonymous VPN service</a>.  For us, not only is it obligatory to recommend a VPN, but in general, this is also the <strong>most widely accepted solution</strong> to privatize internet traffic.  VPN services provide tunnels which are completely encrypted.  Your ISP will not be able to monitor your connection.  Additionally, every application will communicate through the VPN without any manual configuration.  Bonus points for paying with anonymous crypto-currencies like <a href="http://www.bitcoin.org">Bitcoin</a>, but for no log VPN services it is not necessary. <strong>UPDATE:</strong> Be sure to disable <a href="http://support.google.com/accounts/bin/answer.py?hl=en&amp;answer=54067">Google Web History</a> and use Chrome in Incognito mode to gain even more privacy!</p>
<p><strong>Difficult:</strong> Easy<br />
<strong>Cost:</strong> Paid<br />
<strong>Pros:</strong> All applications are encrypted.  Your ISP will not be able to spy on you.<br />
<strong>Cons:</strong> Paid service.<br />
<strong>Recommended:</strong> <strong>✮</strong><strong>✮</strong><strong>✮</strong><strong>✮</strong><strong>✮</strong></p>
<p>2. Use an ssh based SOCKS5 proxy.  You can run a local SOCKS5 proxy with the distributed ssh client in *nix and Mac OS X as well as PuTTY for Windows.  In Windows, simply set the options for PuTTy.   In Mac OS X and *nix, simply connect via SSH like:</p>
<pre>ssh -D &lt;port&gt; (&lt;user&gt;@)&lt;server&gt;</pre>
<div>Afterwards, simply open your application and manually configure it to connect to the SOCKS5 proxy running on the above specified port on the <em>localhost (or 127.0.0.1)</em>. <strong>UPDATE: </strong>In FF, you will need to route DNS traffic through the ssh tunnel as well &#8211; enter &#8220;about:config&#8221; in the address bar and search for <strong>network.proxy.socks_remote_dns</strong><strong>.  </strong>Set the value to <em>true</em>.</div>
<p>&nbsp;</p>
<div><strong>Difficulty:</strong> Medium</div>
<div><strong>Cost:</strong> Paid (free if you already have a *nix shell)</div>
<div><strong>Pros:</strong> Can be free if you already have a shell (like developers)</div>
<div><strong>Cons:</strong> Manual configuration.  Does not protect all applications.</div>
<div><strong>Recommended:</strong> <strong>✮</strong><strong>✮</strong><strong>✮</strong></div>
<div><strong><br />
</strong></div>
<p>&nbsp;</p>
<p><strong>UPDATE:</strong></p>
<p><strong></strong>3. <a href="https://www.torproject.org/">Tor</a> is an amazing tool for obtaining privacy and anonymity.  For all your regular browsing needs, Tor is ideal, and best of all, it&#8217;s absolutely free.  However, Tor is not recommended when using heavy peer to peer file sharing protocols.</p>
<p><strong>Difficult:</strong> Easy<br />
<strong>Cost:</strong> Free<br />
<strong>Pros:</strong> Very anonymous and completely free.<br />
<strong>Cons:</strong> Slow and unable to do heavy p2p.<br />
<strong>Recommended:</strong> <strong>✮</strong><strong>✮</strong><strong>✮</strong></p>
<div><strong>UPDATE #2</strong>:</div>
<div></div>
<div>One reader has suggested a few options:</div>
<div></div>
<div>4. <a href="http://en.wikipedia.org/wiki/I2P">I2P</a></div>
<div>5. <a href="http://freenetproject.org/">Freenet</a></div>
<div></div>
<div></div>
<div><strong>Protect your privacy.</strong></div>
<p>&nbsp;</p>
<div></div>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/your-isp-is-going-to-spy-on-you-starting-july-12-2012/">Your ISP is Going to Spy on You Starting July 12, 2012</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privateinternetaccess.com/blog/your-isp-is-going-to-spy-on-you-starting-july-12-2012/feed/</wfw:commentRss>
			<slash:comments>23</slash:comments>
		
		
			</item>
		<item>
		<title>Exclusive Interview with Suren Ter from YouHaveDownloaded.com</title>
		<link>https://www.privateinternetaccess.com/blog/exclusive-interview-with-suren-ter-from-youhavedownloaded-com/</link>
					<comments>https://www.privateinternetaccess.com/blog/exclusive-interview-with-suren-ter-from-youhavedownloaded-com/#comments</comments>
		
		<dc:creator><![CDATA[rasengan]]></dc:creator>
		<pubDate>Wed, 14 Mar 2012 03:22:24 +0000</pubDate>
				<category><![CDATA[Copyright]]></category>
		<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[file sharing]]></category>
		<category><![CDATA[piracy]]></category>
		<category><![CDATA[torrenting]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=140</guid>

					<description><![CDATA[<p>Your BitTorrent downloads are very public, and Suren Ter, the producer behind  YouHaveDownloaded.com, has helped to raise public awareness on this reality.  We sat down with our friend, Suren, to discuss the idea behind YHD, piracy, and the future of file sharing. • • • Please give the world a brief introduction about yourself, such &#8230; <a href="https://www.privateinternetaccess.com/blog/exclusive-interview-with-suren-ter-from-youhavedownloaded-com/" class="more-link">Continue reading<span class="screen-reader-text"> "Exclusive Interview with Suren Ter from YouHaveDownloaded.com"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/exclusive-interview-with-suren-ter-from-youhavedownloaded-com/">Exclusive Interview with Suren Ter from YouHaveDownloaded.com</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/Anti-piracy2_medium.jpg?x63129"><img loading="lazy" class="alignleft size-full wp-image-145" title="FBI Anti-Piracy Warning" alt="FBI Antipiracy Warning" src="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/Anti-piracy2_medium.jpg?x63129" width="240" height="221" /></a>Your BitTorrent downloads are very public, and Suren Ter, the producer behind  <a title="You Have Downloaded" href="http://www.youhavedownloaded.com/">YouHaveDownloaded.com</a>, has helped to raise public awareness on this reality.  We sat down with our friend, Suren, to discuss the idea behind <strong>YHD</strong>, piracy, and the future of file sharing.</p>
<p style="text-align: center;"><strong>• • •</strong></p>
<p><strong>Please give the world a brief introduction about yourself, such as past projects, interests, beliefs?</strong><br />
I’m a mathematician. I’m not great with people but I’m good with abstract ideas. All of my projects have the same influence and characteristics. For example, <a href="http://XMLshop.com">XMLShop.com</a> is an automated drop-shipping system. Then, there’s <a href="http://SEMRush.com">SEMrush.com</a>, a competitive intelligence tool. They have teams, of course. But if the team were to disappear one day, customers wouldn’t notice for weeks. When it comes to beliefs, I have none. I’m a facts and numbers guy. Having beliefs indicates a lack of knowledge and/or the ability to draw conclusions based on known facts. I have no problem admitting when I have no knowledge of something, so I simply don’t need to believe.</p>
<p><strong>Why did you create YouHaveDownloaded?</strong><br />
It started as a joke. We were talking with two other guys, having a beer and a few laughs. Some guys talk about football, other guys talk about girls – we talk about P2P protocols, social aspects of file sharing and privacy concerns. Some conversations end up in a bar fight, some end up in hangovers (most of them, actually) – our conversation ended up in a little coding. By the way, just to prevent nerd jokes, all of us are pretty successful with girls and money <span style="font-family: Wingdings;"></span>. We just find complicated ideas a bit more interesting then discussions about whether John Doe hit a ball or not.</p>
<p><strong>What roadblocks or difficulties did you face when launching and operating YHD?</strong><br />
You must be kidding. What obstacles could such a simple site have? Actually, the only challenge was Facebook. They turned off the Facebook login when they saw too many registrations. It was a minor inconvenience though. The website had up to 4 million visitors per day. But my system administrator is one of the best. Ilya (the coder) is a very smart guy as well. The system only utilized less than 10% of its capacity and it is just one server.</p>
<p><strong>What are your predictions for the future of file sharing?</strong><br />
I think new, anonymous protocols will surface pretty soon. They’ll make file sharing “safer” in legal terms. On the other hand, initial copies will get digital watermark fingerprints. It will still be possible to share but the copies will be traceable to the first uploader. For the rest, it’s a never ending power struggle or as I like to say, “A fight between the bullet and the armor.”</p>
<p><strong>Do you think your site has helped people become more aware of the privacy risks when file sharing?</strong><br />
Definitely! However, the majority is too dumb to learn anything. For example, we get the same question about dynamic IP at least ten times a day. The answer is right on the first page. It’s on every page, actually. Ignorance is bliss but most people abuse it. They never really learn, they just get used to something.</p>
<p><strong>How did you handle the load on your site when you were being linked to from everywhere?</strong><br />
As I mentioned before, it was quite easy. When visitors search for something on the website, there’s a small pop-up that jumps out and offers you to “like us while you’re waiting”. That’s an artificial delay. We can return results in milliseconds. The pop-up and delay was my idea just to collect more likes.</p>
<p><strong>Have you ever thought of selling your data to the RIAA/MPAA?</strong><br />
Nah. First of all, they have their own data. Second of all, they’re arrogant jerks. I don’t like to deal with people like that. I think of them as the inquisition. They took a promising idea and turned it into a giant sledgehammer to crush others for profit.</p>
<p><strong>What are your moral views on piracy?</strong><br />
Just like I told a French journalist and to the lady at the Washington Post, pirates are thieves and they do steal. Yeah yeah, “when I steal your DVD, you have no DVD, but when I copy a file, you still have a file” – I get that BS. We all know that it’s BS too. However, SOPAs and PIPAs create tyranny. If given the choice between thieves and tyranny, I’d rather stay with the thieves. That reminds me of a piece of history…at the beginning of Nazi Germany, a lot of Germans didn’t pay the public transportation fare. But young Nazis decided to put an end to that. They stopped busses and shot several gatecrashers dead. That’s when things changed. You can say the gatecrashers brought it on themselves. The truth is it’s cruel, but effective. The problem is that it didn’t stop there and we all know what happened next. See, I was born in the Soviet Union and I’ve seen things that, for you, would be an abstract social theory. The US is going in a very wrong direction here.</p>
<p><strong>What are your thoughts on bitcoins?</strong><br />
There are two aspects. Scientifically, it’s a very neat algorithm. Kudos to the inventor – the guy (or team) is brilliant. Socially – it’s another great thing. It’s a new, perfect gold. If some big social network (hmm, who might that be?) or a big social network game manufacturer (hmm, and who might that be?) started using bitcoins as in-game currency…Wow. It would create initial demand. It’s hard to predict the outcome. But it will be outrageous for sure. It’s a distributed and corruption-free Federal Reserve. Governments will need new underwear. A lot of new underwear. It seems like the inventors realize where it fits pretty well. The creator has been hiding for a reason. If I were in his shoes, I’d be hiding too <span style="font-family: Wingdings;"></span><strong></strong></p>
<p><strong>Do you have any projects in the pipeline you would like to announce?</strong><br />
<a href="http://SEMrush.com"> SEMrush.com</a> is the interesting one. It’s not necessarily in the pipeline in terms of being new. But we are constantly adding many new features. Some idiots were concerned about the privacy invasion of YHD. Ha! SEMrush.com – that’s a real invasion of privacy. It reveals the commercial secrets of large corporations. YHD is just a toy. SEMrush is the real thing.</p>
<p><strong>Do you have any other words you would like to share with the world?</strong><br />
I’m not so good with words. I’d rather share some real stuff with the world <span style="font-family: Wingdings;"></span></p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/exclusive-interview-with-suren-ter-from-youhavedownloaded-com/">Exclusive Interview with Suren Ter from YouHaveDownloaded.com</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privateinternetaccess.com/blog/exclusive-interview-with-suren-ter-from-youhavedownloaded-com/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 26/85 objects using disk
Page Caching using disk: enhanced 

Served from: ok.piaservers.com @ 2021-01-26 07:58:58 by W3 Total Cache
-->