Protect Your P2P Privacy 39
BillGatesInABikini writes "APC Magazine has a short piece on protecting your privacy online while using P2P software with the likes of Peerguardian (Windows) and MoBlock (Linux). It's concise and to the point, and a real eye opener if you don't currently protect yourself while using P2P for transferring files, legitimate or otherwise."
Interesting article.... (Score:1)
It's a panacea (Score:5, Insightful)
What? (Score:2)
Or is this one of those Americanisms where words/phrases/idioms suddenly mean exactly the opposite of what they actually say and we're supposed to accept the fact that language is always changing?
:o\ (Score:5, Insightful)
Just looking at the screenshot, why would you block 'the State of Wisconsin'? I suspect that those lists are just a big mashup of every corporate IP block ever, because a bigger list has to be more secure.
Re::o\ (Score:4, Insightful)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Now imagine what happens when you're Chinese and wrongly blocked... You might not even know PeerGuardian exists; how would you file a complaint?
Remember, they don't need to care about the *IAA as much over there - they'd just have their own equivalents that use different hosts to begin with.
Safest Method? (Score:5, Insightful)
Seeing as how various law-groups continue to think they run the universe and thus have the right to destroy computers by "injecting" infected files onto the P2P network.. Egh.
Re: (Score:1)
Re: (Score:2, Funny)
Well said, Joshua, well said...
Re: (Score:2)
The safest method of using P2P software is not to at all.
And the safest way to avoid catching an STD is not to have sex at all. If hope nobody modded you insightful for your first line.
Blocked slashdot (Score:2)
Re: (Score:2)
Must be from all the GNAA and goat.cx trolls putting nasty stuff on slashdot.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Azureus plugin (Score:4, Interesting)
Re: (Score:3, Informative)
Scary (Score:5, Funny)
Interesting "fluff" article for the everyman. (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2, Informative)
Re: (Score:1)
True, anyone who thinks peer guardian is an airtight solution is an idiot, but that doesn't stop me from using it (or at least the azureus plugin). Like many aspects of internet security
Won't you be my neighbor? (Score:3, Funny)
WTF -- Are the editors retarded? (Score:3, Informative)
First, these tools truly do not anonymize your P2P activity. All they do is block whole groups of IP addresses. The blocked addresses are presumably the record labels and other alleged "bad actors".
Second, the assumption that this is an effective means of blocking the record labels or other entities from finding out what you are up to is seriously flawed. The breadth of the IP groups that these tools block are bound to yield many false positives (many innocent and unrelated sites get blocked). Additionally, they are fundamentally flawed because they presume that RIAA/MPAA/etc will confine their activity to obvious named entities and not one or several cable modems leased from comcast. Even when this monitorer has been active reporting copyright violations and such, there is generally no reliable means for these list-makers to establish which IP actually was responsible for the original observation/evidence gathering. Even if the list-makers could presumably establish that, they would need to ban whole blocks of IPs on dynamic networks (e.g., all of Comcast in LA) to just to block that one account...
Third, using these tools as akin to admitting you are committing piracy because the only concievable utility is to attempt to hide from industry. Though I personally believe that almost all of these P2P systems are used almost exclusively, in practice, for various forms of copyright infringement, with the exception of BitTorrent (which has clear legit uses), using these tools basically just reinforces that you are trying to hide your actions from a particular set of people, namely, RIAA, MPAA, and other related organizations that are trying to enforce copyright.
You might argue that the powers that be are misreporting violations, but I, for one, do not buy into the notion that users would go through the trouble of installing this tool (and all the pains that go with it) just to try to escape the very remote chance that RIAA/MPAA will falsely report your linux distro download as a piracy.
Re: (Score:3, Insightful)
Ironically, the first thing that caught my eye about this article was the potential use of this software for spyware/malware protection in an organization. Eg, I think tools like spybot (free) and windows defender (free?) and adaware (not free for orgs) do not do this kind of ip blocking. Maybe I'm wrong? Anyways, the fact that it is open source makes it par
multifacetted (Score:1)
Anyone use MSN Messenger? If so, you've probably noticed those medium-sized advertisements at the bottom of the contact list. Well, fire up PeerGuardian with "Block HTTP" on, and you won't see any advertisements on your contact list at all!
According to PeerGuardian those advertisements are coming from "Doubleclick," which is also why some Firefox+MSN Messenger users will occasionally have IE Doubleclick cookies pop up in a report after running AdAware or SpyB
Shoop da whoop! You gonna get raped son! (Score:1)
RIAA/MPAA commissioned security firm runs an ultrapeer/server/hub and you connect to it. You happilly upload an index of your hashes. An automatic flag alerts them that you may be hosting someone elses copyrighted materials because you have a known hash. They attempt to connect via their corporate connection, but recieve no response, you have an IP range block firmly in place. They t
Re: (Score:2)
Revised scenario:
Your computer tries to upload your list of hashes, but the packet never gets through, so they don't have your list of hashes or you IP in the first place. If you are using a client such as eMule that lists server info, it is very unlikely that you will even try to connect to said server since eMule is unable to query that server such as name, current/max users, and number of files
How to set up Azureus to work with I2P (Score:2)
Crypto is the key my friends
Makes no sense (Score:4, Insightful)
Using P2P whith blocking blacklists makes absolutely no sense.
The point of P2P is sharing. So you are supposed to share, or eventually there is no P2P at all.
Yes, the blacklists are supposed to only block the "bad guys", and let you keep sharing with the "good guys". What an idiocy! Does anyone believe that people spying on P2P networks are SO stupid? It seems obvious that they will use plain DSL connections with dynamic IPs which are not on any blacklist, so you definitely won't block them.
An effective blacklist would block everyone, and if everyone used it, it would destroy the P2P network.
With a partial blacklist you can be pretty sure that you are NOT blocking the machines you would want to.
Look at the screenshot in the article. Yes, it was choosen carefully so that you can see Sony in there. The rest is mainly (European) Universities, and the like. Do you really think that RIAA sying on P2P would be from European universities?
Either use P2P and share, or don't use P2P.
what a load of crocodile shit (Score:1)
The lists work by adding addresses that have busted people, and other suspicious blocks. I've had two cease and desists, one from the studios, and one from Microsoft. If it wasn't for PeerGuardian, I would have had to stop using p2p altogether because a C&D would quickly become a civil suit if I didn't CEASE AND D