Japanese P2P Users Arrested, Creator Targeted 205
nutznboltz writes "According to a story on CNET Asia, two Japanese users of the Winny P2P application have been arrested for copyright violations, and the developer of the P2P software has also had his home searched by police. Winny was 'supposedly anonymous', and purported to be based on Freenet, although Freenet creator Ian Clarke is claiming that Winny is not really like Freenet, and that he's 'not concerned that the Japanese police have somehow found a way to compromise Freenet's security'."
This is an outrage! (Score:5, Funny)
Re:This is an outrage! (Score:2, Funny)
Re:This is an outrage! (Score:2)
Share and enjoy!
Re:This is an outrage! (Score:2, Funny)
Let this be a warning.... to you!
Freenet/Winny (Score:1, Flamebait)
Re:Freenet/Winny (Score:5, Insightful)
But please, why not post uninformed opinions on Slashdot and get modded up as Insightful
Re:Freenet/Winny (Score:1, Insightful)
You just proved his point by thinking in the programmer mindset.
"IF you use a messageboard/filesharing application on top of Freenet" - but not if you haven't. You need to download and install a whole program to do something as basic as searching. This is nowhere near "_e
Re:Freenet/Winny (Score:3, Informative)
Pray tell - how do you search the regular World Wide Web?
Via som sort of service that knows webcontent since it spidered it - right?
Guess what Dolphin's Freenet Index [localhost] is
So, no - I know perfectly well what I'm talking about. Freenet is just as searchable as the World Wide Web. Exactly.
Re:Freenet/Winny (Score:1)
Re:Freenet/Winny (Score:2, Interesting)
Or do you know of a way to search the World Wide Web that does not include using servers which have spidered the content? Please let me know.
Re:Freenet/Winny (Score:1)
Ok I will! (Man I love people being this "helpful" with absolutely no hint of sarcasm/bitterness at all.)
Re:Freenet/Winny (Score:2)
First case of the Article not RTFA? (Score:3, Interesting)
"..but probably not those that allow Freenet to protect user anonymity." Clarke
I'm confused, it looks like Clarke said Freenet's compromised and he doesn't care, and that Freenet isn't compromised.
Re:First case of the Article not RTFA? (Score:2, Informative)
'Security is broken and I dont care'
or
'I dont care because security hasnt been broken'
His statement that FreeNet is not what the Japs were using indicates the second meaning is more probable.
Re:First case of the Article not RTFA? (Score:2)
After all, perhaps these guys thought they'd ditch some of the features to make P2P usable - Freenet would be hopeless for P2P because it is a performance slug (thanks to the number of hops etc. to fetch data) - and in the process compromised their own security. Or perhaps they were just idiots and boasted about getting wa
Uh oh! (Score:1, Funny)
Re:Uh oh! (Score:2)
Searched by police? (Score:2, Interesting)
Freenet is not save. (Score:2, Interesting)
It takes some time, but you can determine the IP and stored data of a user.
But I don't think that this is so bad, in free societies such anonymizer tools are often abused by criminals, spammers and perverts and in oppressive societies the use of the tool gets you in prison anyway. The Chinese gov is not so stupid to get caught
Re:Freenet is not save. (Score:2)
Erm, that's not the point of Freenet at all. The point is more like 'hahaha - my data was routed through 100 random IPs before it received you, has absolutely nothing to indicate who wrote it, and anyone on Freenet can read it. So go shove your fascist censorship up your ass.' If the government could get round it, it would be very unfortunate indeed.
Re:Freenet is not save. (Score:5, Informative)
If you want to be theoretical, then yes, Freenet does not provide anywhere near "absolute" anonymity. In fact, it doesn't even provide the level of anonymity that is used when judging such things as anonymous remailers or mixnets.
Basically, Freenet purports to be "anonymous" because you files do not recide on the computer of the person who uploaded them, and because all downloads and uploads are chained and tunneled through each host involved in the transfer. That means that the host you download a Freenet document from just knows it got it from some other node, which got it from some other node, which got it through some other node, all the way back to the person who uploaded it. It certainly makes tracking the people upload and download things more difficult then on networks like Kazaa (where it is, as we have seen, trivial) but in theory, and with enough resources, it is of course not impossible.
It should be noted what Freenet does NOT provide however. Freenet does do what the serious mixnets reffer to as "Onion routing", which basically means that the message is wrapped in an onion of cryptographic layers, which are pealed off at every step. The idea behind this is only the very last node can see contents of the message, and only the first knows it came from you (and none of the other nodes know anything except where the message came from and where it went).
If you request something from Freenet, your node will call up another node and ask it for that file - if that node is controlled by the Feds then you are busted. It is argued that there is plausible deniability, because it is possible that your node was not downloading the file because you asked for it, but simply forwarding it for somebody else. Given the state of the judicial process at the moment, I'm not terribly optimistic about this defense.
Freenet also doesn't protect (at least not very well) against traffic and timing analysis, allowing one to track down the author of something using the timing and amount of encrypted traffic that nodes exchange. I don't know of any case of traffic analysis having been used (except maybe on the NSA hyper-spook level), but it isn't impossible.
Another thing that Freenet does not "anonymise", and this is the most important IMO, is that you are running a node in the first place. Your Freenet node has to be public, so the feds could definitely "fish" the network for node addresses and start busting those who run them. Again there is an argument of deniability: you don't actually know what is in your nodes cache because it is encrypted, but again I don't have a lot of faith in this defense when the prosecutor will argue that you knowning acted in bad faith.
Regarding Winny, however, I think I agree with Ian. It seems doubtful that Winny works in the same manner as freenet, for the simple reason that Winny works, and well, freenet, umm, doesn't. Any time you try to put anonymity into something, useability IS going to take a hit, because trying to spread and bounce traffic necessarily hits performance. I have a very hard time believing that Japans most popular P2P network could be based on tunneling everything - purely for performance reasons.
(I have to run, so forgive typos and pitiful spelling errors.)
What Freenet does and doesn't do... (Score:2)
I don't think so. How could Freenet do
Re:What Freenet does and doesn't do... (Score:3, Informative)
There was a negative missing there. Freenet does NOT do onion routing. Sorry (though I think it can be seen from the context what I intended.)
Actually, the defense is both good and bad - the problem lies in the HTL - Hops To Live. As it is (or at least was, when I tried to convince them it was a bad idea) the maximum HTL is 25 (in node, no matter what the program requests). That is, if you requ
Ah, I don't think you understood what I ment... (Score:2)
1) Get one connection.
2) Flood it with ARKs from other compromised nodes
3) As new nodes connect, they too start sending ARKs for yet more compromised nodes
4) It quickly doubles... 1, 2, 4, 8, 16, 32, whoops 50 nodes which are all co
Re:Ah, I don't think you understood what I ment... (Score:2)
If a node starts sending you requests, and those requests are successfully fullfilled, then you can set "DataSource" value on the reply to yourself or one of your other compromised nodes - this is the value that is actually added to the routing table. We called
Re:Freenet is not save. (Score:2)
That depends. If the HTL on the request is high, or exactly one below the default start value, then the probability is very high that it was you. Maybe not enough for a court conviction, but enough to get a warrant to take your computer away, and find the files in question on your harddisk (unless encrypt your entire harddisk (and swap file!) usi
Re:Freenet is not save. (Score:2)
Umm, if you did download the file, then you saved it somewhere, viewed it in your webbrowser, streamed it to a media player, or something. These things will show up on your harddisk. If people are actually using Freenet to download files on mass (as they do with file s
Re:Freenet is not safe. (Score:5, Informative)
Pieces of data in Freenet are padded to the nearest exponent of two, so this particular attack would be pretty difficult.
Re:Freenet is Java while Winny is native C++ (Score:2)
Re:Freenet is not save. (Score:2)
Security was not comprimised. But the developer was accused anyway. It would be hard to prove anything, but it would give a lot of troubles to the developer.
And try to defend against "only people who have something to hide use cryptology"
'Only criminals' attitude (Score:2)
Using your thinking, since criminals often abuse locks since they hide in houses, I guess then so what if the government bans the use of locks on your doors..
Or they abuse the mail by sending kiddy porn.. so I guess that means its ok for the government to go ahead and read ALL Mail.. with no warrant..
Your type is why we are loosing our rights that our forefathers fought and died for to gain. Get lost, you dont deserve the rights you
Re:Freenet is not save. (Score:2)
That is such a naive argument. Not only that, you certainly aren't a liberatarian (not to be confused with Americans who call themselves liberatarian--these guys are liberatarian-conservative).
You either stand for freedom, human rights, liberty, security, etc--or you don't! There is no if's and bu
Re:Duh! (Score:2)
Formally, 100% anonymous means that the set of suspects, given the information given, is exactly same as the entire population.
This is the final straw (Score:1, Offtopic)
Re:This is the final straw (Score:5, Interesting)
Couldnt agree more. But this isnt the main culprit. Globally more is spent on 'THE WAR ON DRUGS' and chasing criminals who only steal to feed their habits than on ANYTHING ELSE. Apologies for the caps - just trying to be sensationalist because Im talking about drugs - which we all know are REALLY SCARY AND BAD.
Of course - these kids coul dhave been P2Ping to support a crack habit. It all comes back to wasted money on THE WAR ON DRUGS...
News to me (Score:2)
I thought it was pretty clear to anyone with a brain that drugs ARE scary and bad.
Perhaps you have a favorite kind of drug which you do not consider to be all that bad? Like weed or meth perhaps?
Re:News to me (Score:3, Insightful)
Because the pushers are doing something very risky for very high profits; because the users have to pay a artificially high price for drugs. eliminate government interference, prices go down, it's no longer neccesary to have hired goons running around guarding the drug dealers, no longer worthwhile to KILL to protect your drug supply.
Drugs are a problem. the Violence and crime associated with drugs is 90%+ the result of the war on crime.
Don't believe me? think about t
Re:News to me (Score:2)
Where would you rather live, a neighborhood with a liquor store, or one with a Mob run speakeasy and bootlegging operation?
Lots of things are bad, but we don't legislate sensibility. Throwing ones life away is a basic human freedom.
Re:News to me (Score:2)
Re:News to me (Score:2)
Child neglect can take many forms, and is completely independent of whether drug use is involved. If "large family" you are talking about consists of the persons own children, then he should be prosecuted regardless of whether the children suffered because he did drugs, or because he gave all his money to charity.
If the "large family" are not his children, then they are moochers wi
Re:News to me (Score:2)
Just a thought.
Re:News to me (Score:2)
Re:News to me (Score:2)
Re:News to me (Score:2)
My post certainly didn't meant to say "la,la,la, drugs are safe
Re:News to me (Score:2)
And what has the billion dollars spent on the drug war done? The drug market is even worse now because they are controlled by monopolies (drug cartles) as opposed to being a little bit freer... When alcohol was banned (20's), it was run by the mafia. And guess what? There was a ton of violence associated with it! How much violence do you see now (that alcohol is legal)? Yes there are addicts but the d
Re:News to me (Score:2)
Re:News to me (Score:2)
Attacking the symptoms... not the disease (Score:2)
Stories like the one you just told are way too common, and they have been around for a long time, and during prohibition it was alchohol instead of meth. Lawmakers realized that it was causing more problems to have alchohol illegal, than legal, and drugs are the same way, but people are so damn thickheaded that they can't see it...
Re:This is the final straw (Score:2)
I just have to add a slight correction to your comment. A police officer's job isn't actually to keep the peace, rather to respond to less than peaceful actions, and to enforce law. They're actually different if you look at them syntactically.
Re:This is the final straw (Score:2)
Someone who is copying copyrighted works is not in the same league as a fraudster. Firstly, copying is not necessarily illegal - you may have rights to do so. An example would be any Linux distribution - the code is copyright, but the GPL gives you the right to copy and distribute - subject to certain conditions.
If we now look at music and films, which is what I presume you were thinking of, the case is again different. The fraudsters and thieves are taking something away from people. The co
Background Info (Score:5, Informative)
Re:Background Info (Score:5, Informative)
The reason that nobody's heard of Winny is that Winny has been deliberately kept off the radar of countries outside Japan by the author himself. He keept the source closed and only provided the program and documentation in Japanese.
Winny is "based" on Freenet only to the extent that the creator of it consulted Ian Clarke's papers to design the network. The possibility of Freenet code being reused in Winny is pretty low, as Winny is a native Windows application and there's that issue with GPL code anyway.
The architecture of Winny has some aspects in common with Freenet, but while Freenet was designed with anonymity as priority one and usability as backburner, Winny aimed to become both a usable AND anonymous P2P client. To achieve this goal, some of Freenet's anonymity features (such as the inability to know the data inside one's own node) was removed from the design of Winny, and some usability features such as searching within the program were implemented. Winny's design is not as modular or portable as Freenet is, either; Winny is a native Windows application tied to a GUI, more like "normal" P2P filesharing apps.
Winny version 2 also includes an anonymous message board system, a bit like Frost's TOF; Due to the original Winny's immense popularity, The Winny message board became a lively place of discussion, also often used to request and announce up/download of illegal files.
Presumably, it was this that the Japanese police used. Due to the way Winny implements the anonymous message board, reading and posting in the threads are anonymous, but creating a new thread is not. Both of the two people arrested were thread creators, and they announced the upload of files in their threads. As this was not anonymous, the police probably traced them using this.
Any additions/corrections from Japanese Winny users are welcome
Ever *truly* Anonymous? (Score:4, Interesting)
After all the encryption, all the routing and packet filtering... eventually we're always left with unavoidable IP addresses. There's always going to be, has to be, a destinaton and origination. If a computer program can find the location of a song, so eventually can a human.
The FBI tracked the release of an email virus to some upstairs apartment laptop with a temporary dial up connection in a third world country within three days of it's release. What was it, the I love you virus or something written by some tech students? I sat in wonder watching the news reports and the video of dirt streets and old third world buildings wondering how the hell they did it. How they knew it came from that upstairs apartment. Probably logged in just long enough to send it. Not just in three days, but probably sooner with them taking 1-2 days for the "public" release.
Then I consider a truly anonymous P2P file share and wonder if it is even possible. The song is going to be on a hard disk. That hard disk is attached to the net and will have a number representing it's network location. All of which can be traced. In my mind, again, if a program can find the song, even as difficult at it may seem, so eventually can a human.
Just like *they* can never make an unbrakable copy protection, Will *we* ever be able to completely anonymous while on the Net.
I'm just wondering....
Re:Ever *truly* Anonymous? (Score:2, Informative)
Re:Ever *truly* Anonymous? (Score:1, Funny)
It's only a matter of what do you mean by truly. Same thing as always - how hard are you ready to work, how much time and money to spend to approach a given task. If it's anonymous to a degree that in order to find the originator you have to physically obtain 10 PC from 10 different countries and interrogate (beat up) their owners so that they tell you their passwords - is it TRULY anonymous or not ?
freenet (Score:2)
the clincher is that you don't know what it is you're sharing.
Freenet for example, doesn't work like typical p2p programs; you dedicate a portion of disk for it to use, and it's all encrypted, and you don't even know what you're sharing.
I don't know which is worse
Re:freenet (Score:2)
Sivaram Velauthapillai
Re:freenet (Score:2)
Sivaram Velauthapillai
that was the philippines (Score:2)
Re:Ever *truly* Anonymous? (Score:5, Informative)
Bascially, there is no source and destination, just a bunch of message passing between random nodes, the 'destination' just keeps and eye out for something that belongs to them. Put very basically. Theres a bunch of asymmetric crypto involved also. Look it up for more details.
Re:Ever *truly* Anonymous? (Score:3, Informative)
The communication is passed through a bunch of nodes each of which only know about the one before and after themselves.
In a p2p situation the clients sometimes act as servers so onion routing is a bit pointless by itself.
Re:Ever *truly* Anonymous? (Score:3, Funny)
Re:Ever *truly* Anonymous? (Score:4, Insightful)
Hey presto, no-one knows if it came from you, or the person behind you, and there is no ISP that can be asked who "owned" an IP at a certain time.
Re:Ever *truly* Anonymous? (Score:2)
Oh, and the fragments move across the network and expire, based on usage.
Re:Ever *truly* Anonymous? (Score:2, Interesting)
Imagine the following system:
1) Basic requirements from the system:
Each computer in the network when signs to this software is commiting certain amount of disk space to store network data and certain amount of bandwitch to exchange storage information. The exchange of information consists of background traffic which is independent from the user and user request traff
Re:Ever *truly* Anonymous? (Score:2)
Okay, here's the answer: No.
Why?
It's all about rescources:
It's impossible to create "unbreakable" crypto because the processes needs to be reversible and given enough resources and time the proper decryption method can be found.
Simlarly, it's impossible to be perfectly anonymous on an untrusted network like the internet because, given enough resources, someone can always
Its OK... the RIAA may be paying for spam. (Score:2, Interesting)
Subject: Digital Music News: Don't Go to Jail
Music Industry Informs Internet Users of Risks Peer-to-Peer Networks Pose
STAY OUT OF COURT - USE LEGAL 'SHARING'
Staff Writer, The Digital Music News
The Recording Industry Association of America has filed 300 lawsuits against alleged file swappers. Don't want to become victim number 301? Then it's time to switch from programs like Kazaa and Morpheus to a legal music download service Songs purchased on legal services are mor
Speed of the Japanese legal system (Score:4, Informative)
And, I'm told, most people can escape imprisonment or heavy fining by just apologising well.
So, I'm not sure what kind of resolution the companies are expecting, but I'm sure it will be a long time til we hear anything
Re:Speed of the Japanese legal system (Score:4, Interesting)
Unless you're a foreigner [justicefornickbaker.org]
I'm not saying this guy is innocent, but he got a longer prison sentence than most murderers. Japan has a conviction rate above %90 percent. They can also hold someone on suspicion for up to 21 days without so much as a phone call. My greatest fear is just being a suspect. It doesn't matter if you're guilty or not here. So I get a heavy fine and no "prison sentence." I could still be in prison for almost a month before charges are even filed.
Re:Speed of the Japanese legal system (Score:2)
But yeah, unless you're a foreigner, you can get off easily.
That goes without saying really.
Actually, if he'd just "confessed" and apologised profusely, he still might have got a more lenient sentence. Maybe get out in a couple of years.
In any case, its an unfortunate incident, I'm going to forward it to people I know here in Japan. I don't think the lo
Re:Speed of the Japanese legal system (Score:2)
From discussions I've had with people here on the matter, if you look like you're truly repentant and willing to accept any punishment that's meted out to you, the sentencing is more lenient. The more you try to protest your innocence, the more that the law will look at you unfavourably.
I don't know if this is true nor
Hara-kiri Over Hanson!! (Score:3, Funny)
Re:Hara-kiri Over Hanson!! (Score:2)
You're saying listening to Hanson wouldn't drive someone to kill themselves *first*? Mind you, going by some of the J-Pop acts, maybe the Japanese have a higher tolerance.
Winny is more advanced than Freenet (Score:5, Interesting)
Since then, among Japanese users and hackers, non-encrypted P2P which is still popular in the West today became things of past.
Since Freenet made of Java was very slow application then (not much improved today), he made Winny as native Windows P2P application, with encrypted storage distrubited across peers. According to the developper, Winny is good at the both anonymity and efficiency, but anonymity is slightly lower than Freenet. Because a receiver can't determine a sender is the one who originally inserted the file to the network or not, it was considered anonymous and then more secure than ordinary P2P network, say, Gnutella or eDonkey etc. Winny has other functions like forum system, and clustering by keywords combination set by its users which help users with similar interest mold cluster. Other remarkable difference from Freenet is it dosn't split files, but can do multiple-source download.
With the help of community and its own efficiency as P2P network, Winny become extremely populor in Japan unlike experimental Freenet in the West and consumed huge bandwidth.
But those who were arrested the last month was arrested because they sent files directly, without being a bridge, or put some warez onto web page and running Winny beside it. Therefore it is still not clear whether just running Winny and sending cached files without modest deliberation means guilty or not.
And Winny is really WinNY, means the next of WinMX (Score:5, Interesting)
Winny Background (Score:5, Informative)
Winny knows how to descramble the name and data, and it can search on the P2P network a specific file using its filename or MD5 checksum.
When a file is found, it is either downloaded directly or through another random user (think proxy).
Files goes into the cache either by local upload, by downloading a file (which Winny will descramble for you, leaving a copy in the cache), or by files passing through your node. It is then available for further download by other people.
This provides a kind of load-sharing where more popular a file is, it will be found in more people's cache and more easily available. Downloading from multiple sources is also possible.
You can find out who your immediate neighbour is, but he can claim he doesn't know what the content of his cache contains an infringing file, but of course this requires him to remove the original on his disk
To give an incentive to people to cache files, # of simultanenous downloads is limited to # of uploads+1 with a lower limit of 2.
It is a very convinent system because winny has a function that let you specifies search parameters and you can just leave it alone and it'll download everything that meets the parameters, meanwhile donating bandwidth and cache space to other people on the P2P network.
This model can be possible only because Winny is closed source. Cracks have both appeared for both the download limit and cache descrambling. It is easy to see widespread use of the cracks will compromise the model (less files to be found on the network).
Fortunately normally people don't care (it is just spare upload bandwidth and disk space, which broadband P2P users usually have surplus of).
Chasing after file sharers doesn't work! (Score:2, Interesting)
More musings on power and on civil disobedience [slashdot.org]. I should say that I admire the independent artist who chooses to share samples, and do not especially admire those who trade music illegally
Society is reaching a fork in the road (Score:2, Interesting)
Re:Society is reaching a fork in the road (Score:2)
"Its society's job as a whole to decide the balance here, personally i think filesharing should be accepted and that it will lead to a positive change in the way things are done and the way music is made."
The problem here is that giving rights to one group (those who desire to have copyrighted material without requiring permission from the rightsholder) means taking rights away from another group (artists, poets, composers, writers, or anybody who would like to have a say in who can "share" their work).
Re:Society is reaching a fork in the road (Score:2)
The problem here is that giving rights to one group (those who desire to have copyrighted material without requiring permission from the rightsholder) means taking rights away from another group (artists, poets, composers, writers, or anybody who would like
Re:Society is reaching a fork in the road (Score:2)
Someone mod this up plz...
Sivaram Velauthapillai
Re:Society is reaching a fork in the road (Score:2)
Ok, it's illegal to download music. You're getting something for nothing, right? Even if you do
Re:Society is reaching a fork in the road (Score:2)
Something is happening in the tv industry that is similar to the music industry (although not on the same scale). Believe it or not, there are actually attempts to ban people from skipping commercials. There is massive controversies over Digital Video Recoders and other similar things. The tv industry (I'm not sure who; maybe the studios) d
AUdit the code? (Score:2)
If so, its time to let it come across the pond... and see if it flys or dies....
Re:Piracy is a crime (Score:3, Funny)
MOD DOWN, troll (Score:4, Insightful)
2. copying software isn't theft or crime, it's just copyright violation (I'm not saying it's cool, it's just not a crime)
Re:MOD DOWN, troll (Score:2, Insightful)
Also, although IANACL isn't copyright violation a crime? So I can just violate copyrights willy nilly and get away with it until I'm slapped with a civil suit?
Re:MOD DOWN, troll (Score:2, Informative)
Re:MOD DOWN, troll (Score:3, Informative)
It's a crime here in the UK. It was changed from a civil offense to a specific crime around about 1990.
Uh, not quite... (Score:5, Insightful)
Uh, not quite. Software piracy may be a crime, but writing a P2P application, which has practical purposes for sharing files legally, isn't (as far as I know).
It's a sad day when writing a file sharing application is enough to get your house turned upside down by the police or get you thrown into jail.
Re:Uh, not quite... (Score:3, Insightful)
If the government feels it should prosecute writers of p2p applications because copyright infringment can take place with these, why not also go after the firearms industry, because people get shot by guns?
Re:Uh, not quite... (Score:2, Insightful)
Because government profits from taxes they pay. As soon as you pay 0.01 cents per download government is p2p's best friend.
Re:Uh, not quite... (Score:2)
Software "piracy" is merely copyright infringement, which (despite the efforts of the media cartels) is not a crime. p2p networks are not being used for crimes.
So, if there is any restriction of tools to be done, starting with those that can be and are actually be used to commit crimes would be a good idea.
ie, restrict guns if you must, not p2p software.
Re:Uh, not quite... (Score:4, Insightful)
Because the firearms industry is (relatively) huge, has lots of money, generates a lot of tax revenue, and has a few volunteer groups campaigning against it. In contrast, file-sharing tech is (relatively) tiny, has next to no money, is used by people to avoid paying for stuff and therefore generating tax revenue*, and has large, multinational groups with lots of money campaigning against it. Logic doesn't come into it, money does.
* Yes, I know, it has legitmate uses too, but they don't generate any tax revenue either
Re:Uh, not quite... (Score:2)
Re:Uh, not quite... (Score:2)
Please don't give these idiots any more ideas. It's hard enough being a law abiding gun owner already...
Re:Uh, not quite... (Score:1)
"two Japanese users of the Winny P2P application"
Emphasis Mine
They were only users and the article is saying that the software didn't protect their identity.
Re:Uh, not quite... (Score:1)
could you maybe, ust maybe RTFS
Re:Piracy is a crime (Score:1)
Re:What democracy? (rhetorical) (Score:2)
Sivaram Velauthapillai