Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Privacy

Distributed Computing Program Hidden in Kazaa 491

The_THOMAS writes: "A federal securities filing Monday revealed that the hugely downloaded Kazaa P2P (file sharing) software contains a piggyback program which will create a second, new, network controlled by Brilliant Digital. They plan to awaken the software, already on millions of computers, within the next four weeks. The program will be used to host and distribute other companies' content and may be used for distributed computing. Read the details here."
This discussion has been archived. No new comments can be posted.

Distributed Computing Program Hidden in Kazaa

Comments Filter:
  • by JoeLinux ( 20366 ) <joelinux@gma[ ]com ['il.' in gap]> on Tuesday April 02, 2002 @12:23AM (#3268824)
    Which is better...something that reports back your habits, or something that uses spare cycle time for something constructive?

    Joe
    • Which is better...something that reports back your habits, or something that uses spare cycle time for something constructive?

      From the article:

      Brilliant Digital CEO Kevin Bermeister says computers or Internet connections won't be used without their owners' permission. But the company will nevertheless have access to millions of computers at once, almost as easily as turning on a light switch.

      "Everybody will get turned on in more or less a simultaneous fashion," Bermeister said. "This will be an opt-in program...We're trying to create a secure network based on end-user relationships."

      (emphasis mine)

      How many of the installers actually read the agreement and what would you bet the software installs pre-opt-in? I'd like to see what anyone who has installed it has to say to describe this bit of up-front opting in. If it's buried in the end user agreement, then it's about as good as something Dr. Evil would dream up.

      I'm currently fed up with what I'll call sneakware, that's pre-installed software on my 2 yr old laptop which has woken up and installed software and changed default settings. I caught Adobe Photo Deluxe changing itself when I went to edit some photos. I can't even figure out how to stop it, short of yanking the phone cord out of the modem when it goes to connect to websites. Bastards. Worst of it is that I actually need to use the software from time to time.

      • Fighting sneakware (Score:4, Informative)

        by Sheetrock ( 152993 ) on Tuesday April 02, 2002 @01:17AM (#3269027) Homepage Journal
        I'm currently fed up with what I'll call sneakware, that's pre-installed software on my 2 yr old laptop which has woken up and installed software and changed default settings. I caught Adobe Photo Deluxe changing itself when I went to edit some photos. I can't even figure out how to stop it, short of yanking the phone cord out of the modem when it goes to connect to websites. Bastards.

        You might have tried something like this already, but if not download or buy a package that monitors programs that try to access anything through TCP/IP and warns you when a program is trying to do something you haven't authorized over the network. Tiny Personal Firewall [tinysoftware.com] has worked out pretty well for me and is free for home use. It works in most cases, unless the application has a legit reason to use a particular port and also uses it for something you wouldn't expect. Adobe Photo Deluxe doesn't sound like it'd fit into that category, however...

        • by NoData ( 9132 )
          You might have tried something like this already, but if not download or buy a package that monitors programs that try to access anything through TCP/IP and warns you when a program is trying to do something you haven't authorized over the network.

          Zone Alarm from Zone Labs [zonelabs.com] is another free firewall that performs this job splendidly for my Win2K set up.
  • To rip, mix and burn their customers...
  • Re: (Score:2, Funny)

    Comment removed based on user account deletion
  • by flynt ( 248848 ) on Tuesday April 02, 2002 @12:26AM (#3268851)
    P2P = good
    Distributed computing = good
    p2p + distributed computing = bad.

    This reminds me of something my dad once told me regarding his school lunch as a boy. Just because kids like spaghetti, and kids like peanut butter, doesn't mean they'll like spaghetti and peanut butter.
    • Or to paraphrase Matt Groening:

      The French are funny. Sex is funny. Comedies are funny. Why is it that no French sex comedy is ever funny?

    • This reminds me of something my dad once told me regarding his school lunch as a boy. Just because kids like spaghetti, and kids like peanut butter, doesn't mean they'll like spaghetti and peanut butter.

      This is a bit more like taking a bite out of an apple and then seeing half a worm left it in.

    • by Crazy Diamond ( 102014 ) on Tuesday April 02, 2002 @01:06AM (#3268997)
      You can pick your friends. And you can pick your nose. But you can't pick your friend's nose.

      Applied to P2P this would be:

      You can pick your peers. And you can pick your computations. But you can't pick your peer's computations.
    • by jc42 ( 318812 ) on Tuesday April 02, 2002 @01:21AM (#3269046) Homepage Journal
      > Just because kids like spaghetti, and kids like peanut butter, doesn't mean they'll like spaghetti and peanut butter.

      Well, if they're the kids of typical computer geeks, they'll be very familiar with Thai and Vietnamese food, so peanut butter on spaghetti won't strike them as the least bit odd. But they might complain that you left out the scallions and bean sprouts, and maybe it could use a bit of hot pepper sauce.
  • This actually sounds like a really cool thing, but my qualm with it lies in tha fact that they would be using MY bandwidth to "to host and distribute other companies' content, such as advertising or music. Alternatively, it might borrow people's unused processing power to help with other companies' complicated computing tasks."

    I don't like the idea of this network siphoning MY bandwidth (that some may have a monthly limit on) for their purposes. And yes, I do understand that they said "with the owner's permission" but what's to say they're not just saying that as a "cover my ass" line?

    • And yes, I do understand that they said "with the owner's permission" but what's to say they're not just saying that as a "cover my ass" line?

      When you installed the software and agreed to the EULA, you gave them permission. That's what they mean.


    • You don't want to pay for your new NSync CD.

      You don't even want to pay for the software that allows you to steal the new NSync CD.

      Yet you complain that *somebody* in the chain is trying to make money? What socialist wet dream are you living in, anyhow?
  • Its real, alright. (Score:3, Informative)

    by Anonymous Coward on Tuesday April 02, 2002 @12:27AM (#3268856)
    Unfortunately, the clause to allow kazaa to use your CPU cycles has been around since the day morpheus came out..

    Time to switch to giFT!
    • by delta407 ( 518868 )

      Well... no. KaZaA (or some other stupid capitalization) technically isn't using your CPU cycles... well, it is, but not for distributed computation. It's some other client, which (evidently) no one knew about. In any case, as far as I know, there was no such clause; no one knew about it. Plus, there need not be a clause, if the embedded program pops up a message box explaining what pushing "Yes" means. They don't need to include that in the license if you explicitly agree to it later.

      What I find interesting is the fact that they could distribute some other program -- even if it is a "stub" program -- inside of something as widely used as KaZaA is kind of impressive. Surely, some one would have noticed... but if they did, they must have remained pretty quiet. Has anyone heard about this before Brilliant Digital said something?

      Additionally, as a sidenote, giFT [sourceforge.net] is pretty cool. Granted, the website does need some work, they actually have to release the new version (so you don't have to suck it out of CVS), and so forth. However, it's still pretty cool. Not the largest network, but if we were to get even 1% of Slashdot to join then OpenFT would be in excellent shape.

  • April Fools? (Score:2, Insightful)

    by KanSer ( 558891 )
    Are we sure this isn't april fools stuff?
  • Firestorm (Score:3, Interesting)

    by GrokSoup ( 30253 ) on Tuesday April 02, 2002 @12:29AM (#3268859) Homepage
    While ignorance is no excuse, that seems the only one given that Kazaa/Brilliant apparently tip users off to this crazy strategem in the user agreement. That said, I can't understand how this isn't a trojan -- installing an app with no explicit warning on a third-party computer? Shame, shame.
    • Re:Firestorm (Score:3, Insightful)

      Their explicit warning is similar to the cry heard on many newsgroups one asks a simple question: RTFM. They do put the "i agree" buttons at the BOTTOM of the page for a reason.

      The devil's in the fucking details. That's for sure.
    • And Windows XP is different.... how?
  • I hope Kazaa users with get a monthly check for CPU and bandwidth consumption from their theftware. Or maybe the money will go to... pay the RIAA/MPAA tax, so "shared files" will be free, and legal, to the user.

    I'll bet not.

  • Trojan horse (Score:5, Insightful)

    by nebbian ( 564148 ) on Tuesday April 02, 2002 @12:31AM (#3268865) Homepage Journal
    If a trojan program is useful, does that make it any less of a trojan? Where do you draw the line? To my mind, people have downloaded a program, expecting it to do one thing, and really it has a payload that con do something completely different... Makes me wonder what else the makers of this 'brilliant' scheme aren't telling us about it :-)
    • Re:Trojan horse (Score:4, Insightful)

      by aminorex ( 141494 ) on Tuesday April 02, 2002 @12:45AM (#3268915) Homepage Journal
      That's why you should run open source software.

      If you agree to terms that permit them
      to do this, you don't have much to complain about.
    • "To my mind, people have downloaded a program, expecting it to do one thing, and really it has a payload that con do something completely different..."

      Unless they are hiding behind some ultra-fineprint legalese, I would say this is theft. They are stealing your computer resources, electricity and time without your permission.

      I have always been suspicious of KaZaA so I never downloaded it. I am stragely glad that my coursework keeps me more busy than I need to be so I don't spend my time infecting my machine with spyware file sharing apps. (Must leave now ... assignment is due tomorrow.)

    • I do mind. I run distributed.net on all my computers, and I want any other processor-selling program to get the hell off them.
    • To my mind, people have downloaded a program, expecting it to do one thing, and really it has a payload that con do something completely different...


      To my mind, this says people are stupid and should've read the damn EULA that they agreed to before they clicked "I agree."

  • Wait a second... (Score:3, Interesting)

    by Anonymous Coward on Tuesday April 02, 2002 @12:32AM (#3268866)
    According to their licensing agreement, they're allowed to use any extra storage space and/or cpu usage. What happens if you run out of space on your HD because of this and delete their files? Could they have the right to say that you aren't allowed to delete these files because it's their intellectual property?
  • by Dr. Tom ( 23206 ) <tomh@nih.gov> on Tuesday April 02, 2002 @12:33AM (#3268868) Homepage
    Of course they need your permission to do this; in fact they should pay you when they use your cycles, bandwidth (that you already pay for), disk space, etc. My computers are all at 100%, thank you, I don't have any spare cycles to give away for free. Nor do I have disk space to store some l0ser's pr0n or crappy bootlegs. And don't even ask me about bandwidth.

    At the very least, they should let you have a large discount on downloads when you opt-in. For example make them free. Plus a credit based on the bandwidth they steal *cough* use.

    • They should pay you for their spending on R&D to write software that you can use for free. Right. If you don't like it, use a competitors, or write your own.
  • what a joke! (Score:5, Insightful)

    by Monkelectric ( 546685 ) <{slashdot} {at} {monkelectric.com}> on Tuesday April 02, 2002 @12:35AM (#3268882)
    Im not sure if this is an april fools joke or not ... I would guess not because unlike the other jokes, this one is liabel. So assuming it is not, the quote "...We're trying to create a secure network based on end-user relationships."

    Sneaking software onto peoples computers to create a good relationship with users ? ... or did they mean a good relationship with b3d's clients?

    • Re:what a joke! (Score:5, Informative)

      by 0xB ( 568582 ) on Tuesday April 02, 2002 @12:50AM (#3268933)
      I'm not sure if this is an april fools joke or not

      It's in their annual report [yahoo.com] and I don't think the SEC like jokes.
      • Then they have just committed corporate suicide. Glad I don't hold any of their stock...
        • by dstone ( 191334 )
          Then they have just committed corporate suicide. Glad I don't hold any of their stock...

          I disagree. What they've done sounds very rude and deceptive to me. But it may very well be legal and may result in them staking a claim in an emerging, lucrative market. Thus, the company's perceived value may increase and shareholders may be pleased. I'm not predicting that their stock price will rise with certainty, but I don't believe it's a foregone conclusion that this will tank it. Talk to a penny-stock promoter good at spinning publicity. He/she'll tell you that there's almost no such thing as bad publicity for an upstart. A piece of news (or even a rumor) like this that puts them on the map and on traders' tongues may be just what their stock price needed. Time will tell. Afterall, we only need to look to companies like Verisign with horrible, headline-making security and privacy goof-ups and deceptive practices to see that their rude actions and policies do not result in corporate suicide. (Unfortunately.)

          If they've committed any type of "suicide", it's simply image-suicide in the eyes of a very small, elite crowd (ie, Slashdotters, privacy defenders, etc.) The market and shareholders may not care about this.
  • Revenge (Score:5, Insightful)

    by 0xB ( 568582 ) on Tuesday April 02, 2002 @12:36AM (#3268885)
    Once the client starts receiving and transmitting data it shouldn't be hard to get a rough idea of what's being transmitted and then we can start sending duff data to their servers.
    It doesn't matter whether we know what the data is or not, it just going to be a binary chunk with probably a checksum somewhere. Fill their servers with random data and see how long they want to continue using our resources
    • Re:Revenge (Score:5, Funny)

      by Jester998 ( 156179 ) on Tuesday April 02, 2002 @01:19AM (#3269036) Homepage
      As an alternative to your idea, the article stated that the software will be automatically "updated" to allow new features... once the data starts flowing, I wonder how hard it would be to, ah, "submit a patch". :)

      I'll _finally_ have my beowulf cluster. :)

      - Jester
  • by NotoriousQ ( 457789 ) on Tuesday April 02, 2002 @12:37AM (#3268889) Homepage
    I find it very sad, that companies will trick the user into installing the software without the knowledge. I mean, how many users would mind a spare cycle burner to help the service they like. I mean if they included the abviosly visible message (not hidden inside license agreements) saying something like "We are providing this service free of cost to you, but in return, this service will install software that will use your computer while it is not being actively used by you, and only while kazaa is running. Unfortunately, if you do not wish to run this program you will not be able to run kazaa as our finances depend on it. We promise that no information about you or your files will be used." If such a message came from a company with not a bad reputation (winamp comes to mind), i would install the program, as would many other users, adn both parties gain. When it is done in secret, it only damages the company rep, thus making it even harder for them to make money..

    Furthermore, it seems that the wasted cpu tiem is becoming a precious commodity, which I am currently donating to seti, with no financial compension (in other words I am not selling the cpu time). I wonder how long till the government will accept donated cpu time as a real donation, so i can put it on my tax return....hmmm, i am thinking about at least a dollar per unit, and i am now at 780 units, that makes it 780$ deducted from taxes, and if it is a dollar per hour....

    that could be a hefty some for stuff donated to a good cause....

    maybe someone at seti would give me a receipt...hey, that would mean more people doing units for them...could be beneficial to both sides...
    • Quoth:

      If such a message came from a company with not a bad reputation (winamp comes to mind), i would install the program

      I guess you didn't realize that Winamp [winamp.com] is Nullsoft [nullsoft.com] is [http] America Online [aol.com] whom is also the proud owner of Time Warner [timewarner.com], among other things.

      Is there really a reason to go about trusting, implicitly, this "winamp" organization of which you speak?
  • If there's ever been a reason to support open source software, this is it. I think the plan is interesting, and ambitious. However, it's paramount that users know the function and operation (or at least be able to know) of software installed on their machines.

    I realize that this is an "opt-in" program, but it could just as easily been something else written by a disgruntled employee. And who would have known?

    • How many users of Windows XP understand how the
      NSA backdoor keys work in IE6? Maybe 100?
      Users accept this crap because Microsoft is a
      trusted brand. That's fine for them. It works.
      It may not be fine for you.

      The situation with Brilliant Digital is exactly the
      same. People trust the Kazaa brand. They agree to
      the terms, and everyone is happy.

      There's no scandal here. If you prefer not to
      use the software, by all means, don't use it.
      Brilliant isn't a monopoly, you know. You do
      have choice.

      And if you don't want to trust brands, you can
      always fall back on peer-reviewed open source
      software.

    • If there's ever been a reason to support open source software, this is it. I think the plan is interesting, and ambitious. However, it's paramount that users know the function and operation (or at least be able to know) of software installed on their machines.

      Let's see... The vast majority of users have the technical skill to read and comprehend the first couple of paragraphs of the EULA which clearly explain what the software does or what it may be used for. Or, the vast minority could spend unwanted hours wading through 1,000,000 lines of source. Heck, even if it was an Evil Company(tm) that didn't disclose this info in their EULA, it's not that hard (and a common practice of geeks) to packetsniff what's going in and out of your network. How do you think we found out about all of the Real spyware? Not with the source, Luke.
  • by ted danson ( 457612 ) on Tuesday April 02, 2002 @12:44AM (#3268910) Homepage
    It's legit, irritatingly enough.

    The program hides itself in different locations all over your hard drive, including copies of itself in your OS root and /system32 folders (if you're running Windoze)

    It's a bitch and a half to purge. There's no unistaller, and it's got dozens of registry entries to manually erase.

    (Search for 'bde' and 'b3d' on your HD and your registry to make sure you get it all.)

    I can only imagine the looks on people's faces when a gigantic 3D Cameron Diaz appears on people's computer screens and commandeers their system.
  • by Chagrin ( 128939 ) on Tuesday April 02, 2002 @12:44AM (#3268911) Homepage
    • "Everybody will get turned on in more or less a simultaneous fashion ... We're trying to create a secure network based on end-user relationships."
    Whoa - time to stock up on condoms. I sense a worldwide shortage soon!

    Download Kazaa now. Don't be left out!
  • IBHT, IHAGD (Score:4, Insightful)

    by Tackhead ( 54550 ) on Tuesday April 02, 2002 @12:44AM (#3268913)
    (I have been trolled, but I had a good day)

    Looks to me like this is just a new way for marketers to say "spyware".

    Let's read the article.

    The company plans to wake up the millions of computers that have installed its software in as soon as four weeks. It plans to use the machines--with their owners' permission--to host and distribute other companies' content, such as advertising or music. Alternatively, it might borrow people's unused processing power to help with other companies' complicated computing tasks.

    An advertising company plans to use your machine to host and distribute other companies' (not user-selected) content, such as advertising or music [or next week's winning lottery numbers], or it might use the CPU power for something other than advertising.

    Color me cynical, but I advertising think I know advertising what type of advertising content will be advertising hosted by this advertising new "network" hosted by an advertising company.

    The immediate plans for Altnet, Brilliant and the new peer-to-peer network remain unclear.

    Bermeister said the company had been testing the technology along with ad giants DoubleClick as a way to serve ordinary Web ads more quickly. Under this plan, an ad that a person sees on a Web site might be hosted by a nearby computer running Brilliant's Altnet instead of on a central ad server, as now typically happens with DoubleClick.

    Gee, not only was I not too cynical, I wasn't cynical enough!

    Brilliant's CEO was quick to note that people would be asked before their computers were used for this or other purposes. He said the software would show a pop-up box explaining the network's function and giving people a chance to turn it off.

    And of course, we all know that the description of the functionality won't say "we use your computer to serve banner ads!", it'll be "This is part of a new stealth P2P network! Join now!"

    (This leaves aside the larger issue - namely, every spyware manufacturer makes similar claims. "It makes your cursor look cool!" "It enhances your web experience!" "It's like a buddy who helps you while you surf on the web!" Need I go on?)

    People who allow their computers to be used will be compensated somehow, possibly with gift certificates or free videos, the company's filing said. [...]

    However, people who accept "terms of service" already distributed with Brilliant's and Kazaa's software are already agreeing to let their computers be used without any payment at all.

    [...]

    Anybody who declines this provision is not able to install the Kazaa file-swapping software."

    And if you're really lucky, we'll send you some stuff. Sign up today! We don't have to send you anything or compensate you for the use of your bandwidth for our advertising network, but, uh, we might, if you give us all your personal data! Honest, we might!

    Moral of the story:
    It calls itself a new stealth P2P network that'll "turn on" millions of PCs. But it looks like a spyware duck, quacks like a spyware duck, and leaves runny turds that look an awful lot like duckshit.

    I call it a duck.

    Here we are, after spending a whole day bitching at the Slashdot editors for an April Fool's Joke about advertorials, and nobody notices an advertorial when it's staring them right in the face.

    (Of course, if this is CNET's own version of the "Advertorial April Fool's Joke", I admit it - it's scummy enough to be believable, and the advertorial is from a source I believe to engage in advertorializing. So if it's a joke, I admit it - they got me fair and square. Wotthehell, I thought the idea of Teoma going after Google was an AF joke too ;-)

    • Re:IBHT, IHAGD (Score:3, Insightful)

      by Dr. Tom ( 23206 )
      They will turn on millions of zombies. That's the word for what they are doing to their customer's computers. It's not just spyware, it's zombieware.
      • The "official" term is malware, but it could also be called trojans or script kiddie tools :)
      • " They will turn on millions of zombies. That's the word for what they are doing to their customer's computers. It's not just spyware, it's zombieware."

        Umbrella Corporation strikes again!

        How long before they send Nemesis, Tyrant or Mr. X down the wire?

        Where is Jill when you need her ?

        graspee

  • by Hostile17 ( 415334 ) on Tuesday April 02, 2002 @12:49AM (#3268928) Journal
    I see great potential for fun here. Think about it, They rent out your hard drive to someone, who uses it host advertisment, or demoware or music. You, being the wiley Hacker guy, replace the content porno or pirated music/software and let the fun begin. Optionaly you can sue them for using your hardware and bandwidth for morally objectionable purposes.
  • Well, the question is, could something like this be used for other less desirable purposes.

    I am thinking of everything from the Classic Napster to DDOS, reverse engineering, or what ever.

    The long term trust issue is the point here. pre distributing this capability in the client in advance of notifying me is annoying in the extreme.

    I have added the following features without asking sounds like an MS tactic.

    watch Passport become a distributed computer app for MS development projects, for example.

    feh.

  • I can cry and complain all day long that this is just wrong. It's immoral. It's subversive. It's sneaky, nasty, low-down, dirty, shitty, crappy, stinky and generally F'd up!! I can get a lot of people to respond in agreement I'm sure.

    I want to hear from intelligent and thoughtful people about why they think this should be okay?

    When I run a program, it's because I expect a desired result. The result is generally expected and that's why I run it. Among such programs are web browsers, email clients, video players, etc. I also use Bearshare.

    I think it's a simple matter to include advertising in the client software and if it's free to use like Bearshare is, it's FAIR. I know it's there. It's pretty damned obvious. If I don't want to see the advertising I can either (a) not run it or (b) run the Borland resource editor and see if I can't pull the component out of the software causing me distraction. I don't to (b) because it's too much trouble and I don't mind it that much. I can't do (a) because I love getting random treasures from across the net from generous and often stupid people. (try searching for common filenames associated with personal files such as resumes or digital pictures... it's a hoot! Naked strangers! yeah!)

    Anyway... I'm straying from my point. I'm writing to solicit intelligent and thoughtful rationales for adding 'secret software' into such programs.
    • I'm writing to solicit intelligent and thoughtful rationales for adding 'secret software' into such programs.


      A) It's not secret software. You agree to an EULA which clearly mentions this "feature".

      B) Essentially, Kazaa is not free. Instead of paying money, you agree to paying CPU cycles. It's a simple form of bartering.

      C) They're not a monopoly, and they're not leveraging an existing monopoloy to push this product. Therefore, they make the terms (read: Free Market), and as long as those terms are fully disclosed (as they are), there is no problem. It is of no burden for you to disagree with said terms and use a competitors product.

      I hope that was at least semi-intelligent!
  • gnucleus (Score:2, Informative)

    Gnucleus [gnucleus.com] is a FAST, open-source window$ client in a relatively stable state right now. It also works in Wine, from what I hear. It has lots of features not present in slower clients like Limewire [limewire.com] and, being open-source, doesn't lock out other clients like BearShare [bearshare.com] does. Morpheus has switched its entire network to Gnutella on a modified Gnucleus client, so there is no longer the "lack of files" excuse for using a proprietary network instead of gnutella. If you download it, be sure to "evolve" to version 1.6.3, as the version on the site is not very stable.
  • OK lots of people use these types of programs, so what if this was put in each one, then the distributed time sold to companies? The money could then go to the RIAA/MPAA. If every user of this software let it run 24/7, this might be a fair way of doing things.

    Of course, this would have to be with the user's consent.

    The fact is this software DOES cause damage to artists and the RIAA/MPAA. Maybe this would be a good way of offsetting the damage without paying a tax/tarriff/fee.
    • Problems:
      • It's used to distribute non-music, non-video files
      • It's used to distribute music by artists not covered under RIAA members
      • Many artists may actually want their music distributed on this network. (In which case, by the same argument that says consumers should pay for access to Kazaa, artists should pay to have their music on Kazaa. Hrm. Then where would we be? :) )
  • i would like to coin a term for this practice. Compulsory P2P. Sounds catchy, doesnt it?
  • There's something tricky going on here that is not immediately apparent if all you do is look at and knee-jerk react to this story:

    I download Kazaa. I download Kazaa because Napster doesn't work anymore. Napster doesn't work anymore because the music companies say it rips them off. I don't care about ripping off music companies. But that makes me think: I can see how I'm ripping off artists. Gawd I love Kazaa! But I feel bad about ripping off artists.

    BDE through Kazaa wants to use my computer cycles? Well geez, I feel bad about getting all this great music for free... I owe somebody something... Oh alright, that's a fair exchange.

    The power of guilt.

    Mark my words, people will accept this barter, except for one small problem: the artists still aren't getting paid!

    BDE is getting away with murder: benefiting off of artists by proxy, and benefiting off of consumers, through guilt.
  • EULA (Score:3, Redundant)

    by ralian ( 127441 ) on Tuesday April 02, 2002 @01:44AM (#3269104) Homepage
    No hoax here, folks:

    From the Kazaa EULA, addendum section on BDE:

    4(b) You hereby grant BDE the right to access and use the unused computing power and storage space on your computer/s and/or internet access or bandwidth for the aggregation of content and use in distributed computing. The user acknowledges and authorizes this use without the right of compensation. Notwithstanding the above, in the event usage of your computer is initiated by a party other than you, BDE will grant you the ability to deny access.

    Interestingly as well:
    5. Term; Termination.
    (a) This Agreement will be effective as of the date you accept this Agreement and will remain effective until terminated by either party ("Use Period").
    (b) BDE may terminate this Agreement at any time by providing notice to you. You may terminate this Agreement at any time by ceasing use of the Software and Services and destroying or removing from all hard drives, networks, and other storage media all copies of the Software. Upon any termination, all licenses and rights to use the Software and the Services shall terminate and you must remove the Software from your computer equipment and dispose of all originals and copies of the Software in your possession. The following Sections shall survive any termination of this Agreement: 2, 3, 4, 5, 6, 7, 8, 9 and 10.

    So you can't terminate once you've accidentally clicked "OK". Although you sort of wonder how they're going to apply section 4 once you've "destroyed or removed from all hard drives, networks, and other storage media all copies of the Software."

  • Double Screw Kazaa (Score:2, Informative)

    by Veramocor ( 262800 )
    First download Kazaa lite:

    http://www.kazaalite.tk/

    It removes all spyware and inserts a fake file which looks like syware so that kazaa can't shut itself down. Kazaa: 'Your stealing my program!" Kazaalite"Stealing is a strong word, we're copy infringing on your program :)"

    Then heres the cool thing, edit your "hosts" file. Go ahead search for it. Good you found it. Now any server you don't want to connect to say ads.kazaa.com (just an example.)

    type in your hosts file

    127.0.0.1 ads.kazaa.com

    Everytime kazaa tries to download an add from ads.kazaa.com it'll be looped back to your own computer. No ad!

    Of couse kazaa could always just use IP addresses directly bypassing hosts. But they havn't yet.

    Another thing, I have no idea whether kazaa lite has this distributed trojan active in it.
  • So basically, what this company has done is quietly install software that will -- real soon now -- pop up a window that says, "Click OK to install root kit", or words to that effect.

    Maybe they're trustworthy. But who cares? How long do you think it will take before a pack of sixteen-year-olds with packet sniffers reverse-engineer the protocol and begin installing whatever "updates" they like on the tens of millions of systems infected with Kazaa?

    I wish to hell I'd listened to my mother and become a lawyer instead of a programmer. I could retire on the class action suit that will come out of this.

  • Kazaa Lite (Score:2, Interesting)

    by Dwedit ( 232252 )
    What does this mean for users of Kazaa Lite? [kazaalite.tk]
  • Will I be taxed? (Score:3, Insightful)

    by anthony_dipierro ( 543308 ) on Tuesday April 02, 2002 @02:20AM (#3269167) Journal
    So Brilliant Digital is providing me with a service, the Kazaa network, in return for another service, use of my computer's storage and spare CPU cycles... First of all, it's a great idea. But I wonder whether or not users of this service will be legally required to pay taxes on their barter income [irs.gov], and more importantly, whether Brilliant will have to mail out 10,000,000 1099-Bs (along with collecting 10,000,000 social security numbers).
  • by MadFarmAnimalz ( 460972 ) on Tuesday April 02, 2002 @04:10AM (#3269344) Homepage
    Under this plan, an ad that a person sees on a Web site might be hosted by a nearby computer running Brilliant's Altnet instead of on a central ad server, as now typically happens with DoubleClick.

    Well, this seems pretty much to be the end of ad blocking through firewall rules... Pretty easy to see why doubleclick would like this scheme.

    You'd basically never know what host would be spamming your browser...

    *sigh*

  • Incredible (Score:5, Insightful)

    by TheCrunch ( 179188 ) on Tuesday April 02, 2002 @04:38AM (#3269383) Homepage
    Am I the only one who thinks these P2P apps are evil?

    I used Grokster on my networked Win2K box at home. This box contains my personal files, such as financial info and I also use it to do online banking. So my privacy really matters. I also use this box for work and I have it streamlined and tweaked to run as efficiently as possible. No foolish system tray or startup apps etc...

    Well it seems that P2P apps like Kazaa or Grokster work hard to breach my privacy and fudge my system. I've never known software to be so malicious. First, I see that Grokster has web-based ad support. Okay, that's tolerable, they need some form of revenue. But don't think I haven't noticed your "secret" stash of cached ads in my system directory, Mr Grokster. Then I notice the popup ads. Also annoying.. but again I tolerate. I didn't run Grokster for longer than a day and my system can handle twenty browser windows. But then, incredibly, it turns out that the required advert component also sends out information about me, including my browser history. Big no-no, Mr Grokster. Now I have to spend time to counteract this. I found a replacement set of libraries which do not send personal information. From that point on, I figured I was safe. Oh no... this weekend, after a Grokster session, I spotted a strange "extract.exe" on my desktop. Hmmm. How did that get there? I took a look inside and found various executables and libraries. How quaint. I most certainly did not download it. So I searched my system and lo and behold, it seems some ActiveX has automatically downloaded and run this program for me, spreading half a dozen files around my system. Looking through the registry I see that in fact it's installed a browser toolbar. Oh lovely.. just what I wanted. Took me a good half hour to rid my system of it's leeches.

    The moral of the story, don't run Grokster. Well fine, I've learnt my lesson and I'm fortunate enough to have another disposable machine to unleash the Grok on. But my concern is the X million people who don't have a clue. The sort who click on "www.yahoo.com.exe". They see Grokster or Kazaa on download.com or whatever, download it and use it blissfully ignorant of what I consider to be a virus. In fact, the only difference I see between Grokster, Kazaa etc.. and viruses is a service. Package your virus as an application and you earn amnesty from antivirus software.

    Slashdot articles and anti-spyware sites keep us geeks in the loop, but that doesn't help the masses. Only laws help the masses. There must be some law somewhere that states such practices to be illegal. Tricks used by these programs such as placing independent components in the system directory posing as actual system files, running programs without permission, not informing users of these hidden "features" and so on, are clearly malicious.

    I'm for P2P networks, but clients such as these seriously rub me the wrong way and I'll be glad when the RIAA eats them. I just pray for a nicer client to take their place.
    • by HiThere ( 15173 )
      The current implementations of P2P computing tend to be invasive and, ok, evil. (I'd rather save that word for more intense areas, but the concept's the same.)

      The reason that they are evil tends to be because they are the creation of commercial entities that intend to make money by stealing you information. This is not inherent (though on the MS systems that I am familiar with there is no effective security to prevent this from happening).

      Commercial entities need to have something to sell. If you want to get a service from them, then you will need to pay them in some way. The "freebies" that they offer will always be a hook. Always. You may not be the intended target, you may steal the cheese, but the hook is there. Red Hat is trying to get commercial companies to buy software maintenance and development services. As a commercial entity, they distribute Linux at not much more than cost to lure in potential customers. It isn't free, but the hook is still there.

      Non-commercial entities need to be able to pay for the activities that they engage in. So do individuals. You can always take an economic view of an organization or individual, and it must always either balence or yield a profit. Or be drawing down assets.

      If you buy a pig in a poke you are likely to end up with a cat instead of a pig. Open source is partially the requirement that one be able to look into the bag before buying it. But if you can't, then you should expect that the seller is going to take such advantage of the fact as he can. Becuase he frequently will.

      This isn't to say that Kazaa is in this case acting unethically. They have indicated that they will ask permission before adding computers to the distributed computing system, so one should, perhaps, wait until we find out how they will interpret that before getting outraged. They might not just say "the license already gave us permission". But it's also true that we can't know what will occur later. The license that was reported seems to be similar to the MS XP license in that it essentially gave them permission to install arbitrary software. And I find it quite difficult to feel comfortable with that. Especially on a system that gives essentially no protection against rogue software. (Similarly, on Linux I'm uncomfortable with the programs that require being run with root permissions.)

  • criminal trespass (Score:3, Interesting)

    by maxpublic ( 450413 ) on Tuesday April 02, 2002 @05:47AM (#3269499) Homepage
    Given that no EULA has the force of contract law anywhere in the U.S., it's rather doubtful that it could be used as 'consent' for utilizing spare cycles in a legal fashion. The company is treading dangerous ground here and just begging to be bitch-slapped with a lawsuit.

    While I doubt a serious argument could be made for damages, unless the EULA is upheld by some clueless court then using the spare cpu cycles of personal computers clearly constitutes criminal electronic trespass as outlined in the PATRIOT act. And, as we know, this automatically brands one as a terrorist.

    I don't use Kazaa but I can't imagine that very many users will be happy to have their 'spare' cpu cycles appropriated for someone else's gain. Just another reason to dump this software in the electronic crapper.

    Max
  • Some observations (Score:5, Interesting)

    by Rogerborg ( 306625 ) on Tuesday April 02, 2002 @10:13AM (#3269968) Homepage
    • Bermeister said the company had been testing the technology along with ad giants DoubleClick as a way to serve ordinary Web ads more quickly. Under this plan, an ad that a person sees on a Web site might be hosted by a nearby computer running Brilliant's Altnet instead of on a central ad server, as now typically happens with DoubleClick.

    "Quickly" is mendatious. The majority of end users will have port 80 traffic cached by their ISP, and you can bet that cache will be juicy-full of DoubleClick stuff. My ISP routes all traffic via my local access point, even traffic to other people under that access point, and they run a cache at the access point. So even if I were to get ads from the guy next door, it would still be slower than getting them from the cache. All this would do would be to cut down DoubleClick's bills for uncached accesses, and (interestingly) stop me blocking DoubleClick using my hosts file. If this latter reason is actually material, then it's a sad indicator that the ad market has given up any pretence that ads are in any way connected to revenue. If I've gone out of my way to actively block your adverts, and you force them on me anyway, what exactly are your chances of gaining one red cent in revenue from me? Farcical.

    • Bermeister said. "This will be an opt-in program..." [...] the software would show a pop-up box explaining the network's function and giving people a chance to turn it off

    Hey, opt-in, opt-out, what's the difference, eh? To apply an equally muddled metaphor, they'll probably burn that bridge when they come to it.

    • People who allow their computers to be used will be compensated somehow, possibly with gift certificates or free videos, the company's filing said.

    Ah. Anybody with a typical residential DSL/cable connection should check their contracts. There will almost certainly be a clause in there that prohibits providing services to third parties, and especially selling services to third parties. Most ISP's have tolerated filesharing up to now because it's (generally) an active use thing. And CETI@home is low bandwidth, fully opt-in from the user side, and non-commercial. But this might be different. It's a commercial company using ISP bandwidth to make profit, and pass some of that (a very, very little) back to residential users, who have only agreed in general to provide services, not on an active case by case basis. This might be where ISP's start to draw the line.

  • by tcc ( 140386 ) on Tuesday April 02, 2002 @04:21PM (#3272422) Homepage Journal
    "we're sorry for the spyware"

    they remove it

    a month later

    "We're sorry for the spyware"

    they remove it

    goto 10.

    As much as I love the P2P concept, if these guys go out of buisness or get the crap sued from them, I just hope EFF won't protect them in the name of P2P, because these guys aren't the Good Guys(tm). They are opportunists that are hiding behind ignorants and people that want to defend P2P to play their dirty scheme instead of being just dead honest.

    It doesn't kill a buisness to mention any spyware or whatever, if people skip the warning and download it, well now It's their problem, but running it and acting like if you were transparent is just plain unethical, they did it many times, it simply piss me off. That's why I am using winMX since the first time I saw Kazaa doing crap to their users. It's been at least reported 2 times here if not more.

    Again, being honnest about it won't change much, it'll just remove a FEW users like me and most of slashdot readers that want their privacy. Most of the people won't give a damn, so why being so dishonnest!? it could just trigger lawsuits against them for absolutely no gain.

    The proof to this? well look at how many times you saw kazaa and spyware, and look at their userbase still growing (which doesn't make sense but again, MOST people just don't care, they'd sell their souls for free stuff).

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...