Dan Warne writes
"The most explosive documents in the ongoing Kazaa court case have emerged today, including logs of discussions between parent company Sharman and the Estonian developer of the Kazaa Media Desktop. They include extraordinary admissions like: "Reporting will make Kazaa look like spyware, as soon as it becomes evident we record downloads and playbacks, users will flee to competitive networks" and then "One can argue that we have knowledge of copyrighted material being downloaded in our network and have to install filters. If we are reporting [gold] files, then technically we could do the same for every file." Finally, "RIAA [could] collect the IP addresses for everyone who has searched for or downloaded that file." Despite the Kazaa developer's concerns over these issues, Kazaa went ahead with the logging." (More below.)
Warne continues "APC Magazine journalist Garth Montgomery, who has covered every day of the trial in the Australian Federal Court, says: "In a nutshell, this has got to rate as the most explosive document revealed. It makes it damn near impossible to maintain the separation theory that Sharman and Altnet rely on in terms of business independence and technical infrastructure. The control they exercise over the system is complete." Montgomery has also scanned in all the documents and made them available in PDF format, including the confidential Kazaa purchase contract and technical specifications for the Kazaa Media Desktop."
Re:Once again... (Score:5, Informative)
Piratebay is hardly private, although I think your response is a bit of a troll-if they were doing that, they'd hardly have any users left, not to mention they'd be on PG's blacklist by now.
Evidence of what you're claiming aside, though, I've never used piratebay, although I have had a look at their legal correspondence. The site I use has, to my knowledge, not had its url posted here, and I'm not going to change that today.
A good private tracker, registration and ratio required, is a good degree of protection. I've never gotten -one- hit against my protowall while using those torrents.
logged IP addresses (Score:4, Informative)
use earth station 5 (Score:4, Informative)
pS,
Re:"I could care less" (Score:2, Informative)
http://www.worldwidewords.org/qa/qa-ico1.htm [worldwidewords.org]
In my opinion it's lazy, wrong and just plain annoying English but then again I don't want to interfere with the natural evolution of language.
So feel free to use whatever you wish - just remember that a lot of people will think you're an idiot for using "I could care less".
Skype? (Score:1, Informative)
Stop the Bullshit Now (Score:5, Informative)
For example, they're not actually logging file downloads, nor what you do. All they acknowledged is that they do this for Altnet, which you must have figured out (How can you buy a file from Altnet without the owner knowing about it?), and that they could potentially do this for Kazaa if they were so inclined and able:-
"Pritt: Posting stats to to 3rd party servers...."
it starts. But then, the fact of the matter follows:-
"Of course we won't know about downloads and playbacks of non-signed content, but it doesn't make a difference because:-
1) It's hard to communicate this to lawyers and users.
2) If we are reporting signed files [Ed: Altnet] then technically we can do the same for any file."
See for yourself, http://www.apcmag.com/apc/v3.nsf/0/2F22997D6933B1
Bottom of page 4.
In other words, they only logged what they said they would in the user agreement, but they didn't broadcast it because people who don't check their fucking facts will post it on large public forums for debate, and immediately leap to all the wrong conclusions.
It's not the dynamite people think it is. All it shows is that they can log, it means that the next few moves are foretold:-
1) The argument will be made that they can log, and therefore are complicity.
2) The counter-argument will be that logging on
such a scale is an invasion of privacy, illegal and out of the scope of the user agreement.
3) The argument will be made that the agreed upon logs with the users can be used as evidence against P2P users. It's not a serious logistical blow, but will be the *real* credibility damage Kazaa will face.
The endgame is either a Kazaa concession to log all activity, another sale to a different country or just a block on un-authorized files through a deliberately dis-incentivised weak version of Kazaa noone will want, and the winding down of the network will play to the Napster tune.
Re:Can Skype be trusted? (Score:3, Informative)
Re:So... (Score:2, Informative)
So if you have been uploading music or movies, you broke the law and now they have proof (the logs).
server can't track your downloads--its PEER 2 PEER (Score:1, Informative)
What I think was going on here was that the SPYWARE on kazaa was sending info back to the server on what files you downloaded. That is the spyware part of kazaa/altnet. Specfically, the file topsearch.dll.
However, and please correct me if I am wrong, kazaalite, and specifically the hacked version 2.4.1 does not contain this topsearch dll file. Thus, kazaalite, at least the old hacked versions of it, do not inform the server of what you do, or what you download.
THen we have the question of how long your ISP keeps server logs of IP numbers.....
Re:Once again... (Score:2, Informative)
And belive me, I have downloaded more than a few torrents from them....I'm still waiting to learn the hard way. I might actually believe your trolling had you at least provided a link to backup your tinfoil conspiracy theory.
Re:WOW (Score:3, Informative)
Emule's credit system is stingy because of how it's credit system works. First, It only trusts itself, which is good since you can't trust anyone else. Second, it only uploads on priority, in other words, the person that uploads the most to you gets the best queue rating and gets more download time from you.
So if for example you download File X, Client X will put you in the bottom of the queue unless Client X has ever downloaded from you in the past, which is statisticlly unlikely. It doesn't matter if you have file A-Z shared on your pc, as long as client X never wanted file A-Z and never downloaded files A-Z from you, your at the bottom of client X's queue.
Since you just started the download, you have nothing to share to the clients that have all or part of what you are downloading, so they will put you on the bottom of their queue. once you finally get a chunk you can share, the download speed increases since your sharing something to them and your rating is going up, but the process of getting the first chunk could take hours if not days in some cases.
Emule can fix this easily by doing one of two things. First, set the priority of uploads that you are actively downloading release priority. and set it back to auto once the file is completed, and second, giving clients with no chunks to download a Very high priority so that they can get something to share quicker and can give back to the network, Then once they get a chunk drop the priority to a standard client level.
Re:Woah (Score:5, Informative)
Bzzzt! Wrong! This is one of the biggest Urban Myths out there right now. It seems I see this every copld months or so.
The internet began as a RFP in ARPA(long before ARPA became DARPA). It was started as way to:
1 - eliminate the need for 4 different terminal types on one desk.(that was how the idea germinated)
2 - Facilitate the sharing of information beteween gov't contractors and researchers who had ARPA grants.
3 - A way to timeshare systems for researchers who would not oridinarily have access to such systems.
It was US centric at the beginning and ARPA and ARPA's subcontractors/researchers only.
ARPA net was not designed for fault tolerence of command/control during a nuclear war. That was the impetus behind Paul Baran's development of the idea of packet-switching networks (that wasn't his name - the term "packet" came from Davies who sorta developed the same idea concurrently). He could never drum up support for the idea with ATT (really the only entity that could impliment it at the time). They said it was stupid idea. ARPA later grabbed the idea of packet switched networks and used it because it lent a robustness to otherwise unreliable lines of communications and the IMPs that terminated each line. The fact of the fault tolerence in terms of catastrophic destruction due to war is simply a coincidental side effect when you take into account the reasons the ARPA project was using packet switched networks.
Sorry. Got on my high-horse there. I just can't stand when people say that ARPAnet was designed in a distributed manner to survive a nuclear war. Not true. It was the basis of Paul Baran's conceptual model of a packet switching distributed network.
Re:They're just clueless (Score:4, Informative)
You can remove [googleguide.com] your phone number from that feature.
"If you wish to remove your listing from Google's PhoneBook, complete the name removal form, which you can find at Name Removal [google.com] or by searching for [ remove phone number Google ].
Re:Once again... (Score:5, Informative)
The first example that springs to mind is the Space Madness episode of Ren and Stimpy. Stimpy would normally never press the History Eraser Button, but when he's not only deliberately put in proximity to it, and the narrator keeps pushing his face in it, that's basically how much effort is needed for something to be entrapment.
Just being undercover -- that's not entrapment.
You could probably google for a discussion of the issue with some good case cites or something.
Re:Skype? (Score:2, Informative)
Many people have been confusing this lately, so I wouldn't feel bad. I'm just trying to correct the error because I, I'll admit, am a Skype fanboy.
Re:Once again... (Score:1, Informative)
You use a "reputable" service that facilitates your stealing other peoples' property?
I mod down everybody who confuses copyright infringement and theft as -1, Troll. Everybody reading Slashdot knows that this is deliberately provoking an offtopic flame war.
Copyright infringement isn't theft. Not in any way, shape or form. The dictionary says so. The Supreme Court says so. Common sense says so. The only people who claim otherwise are the MPAA, the RIAA, and Slashdot trolls. None of these people can back up their assertion that two very different actions are actually the same.
Re:Once again... (Score:2, Informative)
Re:Once again... (Score:3, Informative)
the RIAA demonizes people in order to remove the guilt they feel and paint other people as the bad guys doing wrong in order to justify their actions.
That makes much more sense now, as, after all, file sharing probably would be legal if it wasn't for the lobbying efforts of the above said corporations, and the media companies are racketeers.
Re:Oh, Lordy, here we go again (Score:5, Informative)
You're not saying why it's obvious (apparently it isn't obvious enough for the parent, or for me, or for most people for that matter). You're even using the language you're trying to defend in your argument, which is classical circular reasoning.
Also, you're attacking the person, not the argument, by calling him childish and stuffing words into his mouth.
As far as a counter-argument goes, you haven't even produced an cohesive argument, so why bother.
Re:use earth station 5 (Score:3, Informative)
What's your ip address dude?