Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Privacy The Internet

Pirate Bay's Anonymity Service Enters Beta Testing 137

schliz writes "Developers of The Pirate Bay have launched their new Virtual Private Network (VPN) service to some 180,000 pre-registered beta testers. An e-mail to beta testers read. 'IPREDator does not store any personal details about its clients. IPREDator does not store any traffic habits you might have. IPREDator is the key to a free internet in the renaissance of censorship!' The new service was launched to protect file sharers in response to the Swedish Intellectual Property Rights Enforcement Directive (IPRED) that went into effect in April."
This discussion has been archived. No new comments can be posted.

Pirate Bay's Anonymity Service Enters Beta Testing

Comments Filter:
  • by Anonymous Coward on Thursday July 23, 2009 @12:24PM (#28797411)

    This has been the main problem with the beta as no one has been able to login to the vpn.

    I don't think anyone thought this thing through.

    • Re: (Score:1, Interesting)

      I don't understand your point. It doesn't need to store personal details, it only needs to confirm that your login and id are valid.

      After that, as long as it doesn't record the IP addresses you're visiting, it's effectively anonymous and thus valid.

      Yes, Pirate Bay could secretly store that information, but I somehow doubt they would.
      • by inotocracy ( 762166 ) on Thursday July 23, 2009 @02:18PM (#28798803) Homepage
        Yes, Pirate Bay could secretly store that information, but I somehow doubt they would.

        Yeah, because no one would think that the soon to be new CEO, who happens to be good friends with the RIAA [cnet.com], would ever do such a thing as log traffic or identifiable information. Right? ..right?
        • Re: (Score:2, Insightful)

          from TFA

          "Developers of The Pirate Bay have launched their new Virtual Private Network (VPN) service to some 180,000 pre-registered beta testers"

          The developers, not the current owners of the name.

        • Re: (Score:2, Insightful)

          Right, I don't think the developers would log traffic or identifiable information. These are people who started a whole political party based around anonymity. Take the tin hat off. (And as the other poster said, you are confusing developers with the new owners of the domain.)
          • If you read the legal terms ( https://www.ipredator.se/faq/legal/ [ipredator.se] ), you will notice the mention below: "For Swedish authorities to force Ipredator to hand over âoetraffic dataâ including your Ipredator IP at a specific point in time, they will have to prove a case with the minimum sentence of two years imprisonment". It is clearly implied that logs are kept, as it states the conditions for handing them over.. Now, considering this text is a mere copy/paste of the Relakks ones (https://www.relakks
  • by Ralph Spoilsport ( 673134 ) on Thursday July 23, 2009 @12:25PM (#28797421) Journal
    Invitation only. Goes back to BBS days in the 80s. Pirate Bay are just making black servers "grey".

    Black Servers won't go away, because they are impossible to find and stop.

    RS

    • Re: (Score:3, Interesting)

      Aren't those types of networks also referred to as "Darknets?" I recall hearing something about them a long time ago, but I haven't read much into them. Is it akin to using a botnet to host a server/communication system? Anyone with the sexy details?
      • by Nursie ( 632944 ) on Thursday July 23, 2009 @12:32PM (#28797509)

        Black server - server using encrypted comms that is not publicly know
        Darknet - layer on top of internet that uses encryption, multiple hop routing and other techniques to disguise nodes activity from each other

        That's my understanding of it anyhow. I2P and freenet are the only darknets I know about. I wouldn't go near 'em, personally.

        • by Anonymous Coward on Thursday July 23, 2009 @12:59PM (#28797831)

          I actually wrote my own at one point that tunneled itself steganographically using decent crypto disguised inside webcam sessions. Unfortunately, the throughput was abyssal, and of course--it was pretty difficult to get 'real' network behavior.

          I wouldn't say the point of a darknet is to hide a node's activity from one another--so much as it is to conceal their presence from anything not in the darknet. Tor helps hide a nodes activity from another node (sort of), but isn't a darknet. Freenet--you can search for, but generally speaking you can't find other nodes in freenet trivially. I'd call it a greynet.

          What's wrong with freenet?

          It works beautifully for its intended purpose, even if there's a sad amount of...malcontent littered throughout it. Despite the nastyness that you store on your own hard drive (which you couldn't read anyway unless you want searching for it), it's not like you or anyone else could ever prove it was on your system--if they could, the very trial itself would necessitate proving a means to crack commonly used cryptographic protocols--keeping that secret (if it's possible) would be worth more to anyone than convicting you ever would be.

          Amusing: Captcha = "crimes"

          • Re: (Score:3, Insightful)

            by Anonymous Coward

            Despite the nastyness that you store on your own hard drive (which you couldn't read anyway unless you want searching for it), it's not like you or anyone else could ever prove it was on your system-

            I dunno. If I were a Fed, I'd break Freenet like this:

            Fed: "We have a bunch of nodes on the darknet that contain Bad Things."
            Judge: "How do you know what your nodes contain?"
            Fed: "We surfed for Bad Things on Fed1, wrote the offending keys of the Very Worst Things into a textfile, and then ran a script on F

            • by m.ducharme ( 1082683 ) on Thursday July 23, 2009 @02:05PM (#28798601)

              Despite the nastyness that you store on your own hard drive (which you couldn't read anyway unless you want searching for it), it's not like you or anyone else could ever prove it was on your system-

              I dunno. If I were a Fed, I'd break Freenet like this:

              Fed: "We have a bunch of nodes on the darknet that contain Bad Things."

              Judge: "What's a node?"

              Fed: "We surfed for Bad Things on Fed1, wrote the offending keys of the Very Worst Things into a textfile, and then ran a script on Fed2 that downloaded a whole bunch of the Very Worst Things. Fed2 is running a modified client that doesn't save chunks that are being passed through it to other machines. Therefore, the only stuff in its datastore is stuff that got there from our own requests. Then we walked away from Fed2's keyboard and let it stew for a few hours."

              Judge: ......

              Fed: "Right. When a request for a chunk comes in, and Fed2 doesn't have it, we just pass the request on to the next node. When a chunk comes through from some other node, our modified client passes it on without storing it locally."

              Judge: *blank stare*

              Fed: "...we add the requestor's IP address to the list of IP addresses for which we have probable cause to believe are requesting - or facilitating - the transmission of Bad Things. By the way, here's the list."

              Judge: "Signed. Go get 'em."

              I think the above changes might more accurately reflect reality.

            • the thing about that is, that EVERY other node on freenet is also acting as a relay for those chunks, you actually don't have a reasonable expectation that the node you are getting requests from is the actual node that wanted it.
            • Re: (Score:1, Interesting)

              by Anonymous Coward

              The evidence you cite would not prove intent, and therefore fail to obtain a conviction. That is because requests made through the FN network make copies all along the request path. Making requests actually increase the likelihood that material will be found on the network, and will definitely copy the material to the node that returns the material to you. Sure, that node that served you will have the material. But you put it there, unless you can prove otherwise.

              Even if you could isolate the node from

          • by cjb658 ( 1235986 )

            It works beautifully for its intended purpose, even if there's a sad amount of...malcontent littered throughout it. Despite the nastyness that you store on your own hard drive (which you couldn't read anyway unless you want searching for it), it's not like you or anyone else could ever prove it was on your system--if they could, the very trial itself would necessitate proving a means to crack commonly used cryptographic protocols--keeping that secret (if it's possible) would be worth more to anyone than convicting you ever would be.

            Unfortunately, the MAFIAA doesn't need to prove anything to rack up massive legal costs against you, or threaten to sue you.

          • Well, to slightly correct you there, _one_ Freenet (0.7) is a darknet. And it sucks. The whole thing's still basically Alpha software, even though they made an 'official release' about two years ago. The devs screwed it up horribly.
            There is, however, another Freenet network. Freenet 0.5. It's an opennet, and as a long time user I can say that it works very well.

          • by Nursie ( 632944 )

            "What's wrong with freenet?"

            Uh, it's full of child porn. I'm not handing over part of my hard drive to help propagate that stuff.

            • No offense, but if you haven't used it, how can you be sure what's it's full of? This is the first I've heard of this stuff, so I am asking out of true ignorance, not to be snarky.
        • by gilgongo ( 57446 )
          "Darknet" is the term for a general concept, coined by Microsoft researchers in 2002. [boingboing.net]
        • Darknet - layer on top of internet that uses encryption, multiple hop routing and other techniques to disguise nodes activity from each other

          No. A darknet is a P2P network where individual nodes are trying to hide their existence. This means that, in order to connect to a node, you need an invitation from the owner of the node, and nodes don't advertize their existence. Some such networks might try to hide their traffic with steganography.

          A darknet is targeted for environments where the very act of partici

        • GNUnet [gnunet.org] is another one, personally I like it more because it does not store not requested chunks on your local hard-drive (if you configure it not to do that). This means you don't help with all that child pornography. But, you do route data packages to create anonymous traffic.. so in the end you are still helping.

          I would like to see a network where you can democratically decide wether something is right or not, where you can say: I don't like this content and I will help in finding who is distributing it i

      • by Znork ( 31774 )

        Darknet is a catch-all term used to describe covert networks.

        More recently, it's begun to be used to describe friend-to-friend and small-world theory based distributed networks. In these networks the users connect only to their closest friends by sharing encryption keys with each other, but as those friends then connect to their own friends you eventually get a vast encompassing network that is untraceable, anonymous and yet globally searchable and reachable.

        Quite similar to cell based covert organizations

    • by Anonymous Coward on Thursday July 23, 2009 @12:59PM (#28797829)

      Post your damn initials in your signature spot. God almighty it's so pretentious when people put their initials in their posts.

      AC

      • Post your damn initials in your signature spot. God almighty it's so pretentious when people put their initials in their posts.

        AC

        Is that any way to talk to RMS? Oh wait, sorry. It just says RS.

  • This is scary... (Score:4, Insightful)

    by Eastender ( 910391 ) <catsdelhi@yahoo.com> on Thursday July 23, 2009 @12:29PM (#28797471) Journal
    ... so many people being given assurance of "complete privacy", wonder how many will believe it almost blindly, indulge in piracy (or whatever the civilized world calls it), get caught and get into unnecessary trouble. And what are the bets that the demographics of these 180,000 people is among some of the better placed and prosperous human beings on this planet? About getting into trouble part, I do hope I am wrong though...
    • Well duh (Score:5, Insightful)

      by dazedNconfuzed ( 154242 ) on Thursday July 23, 2009 @12:41PM (#28797613)

      And what are the bets that the demographics of these 180,000 people is among some of the better placed and prosperous human beings on this planet?

      Well, considering that they HAVE a computer, are most likely using it (at least during TPB activities) for leisure instead of survival, understand enough of broadband network technology to realize encryption is useful for their activity, understand VPNs, understand encryption, appreciate anonymity, and apply all of it to the indicated activity, I dare say that they're in all likelihood doing much better than the half of the world's population trying to get by on less than $2/day. ... is there a problem with that? Why do you call them out as "some of the better placed and prosperous human beings on this planet"?

      • I think that the GP was trying to point out that when the authorities do make major busts, there is almost always someone who is powerful and influential involved. Mayors, governors, chiefs of police, members of parliament, congressmen, etc.

        He may or may not be aware that possession of a personally owned computer puts him into the wealthiest 10% of the world's population, by definition.

    • Agreed. There are a number of applications designed to anoynymize your traffic before and/or as it leaves your own machine. I trust that a lot more than I trust anyone to protect my anonymity. The lackwitted "h4x0r" who broke into Palin's email trusted the "anonymous proxy" that he went through, and THAT bastard cooperated with the Feds. WTF was he keeping logs for, anyway? Without logs, the Feds couldn't have got a thing!! Stealthnet, Freenet, TOR, I2P and the rest of the darkweb apps may be slow, bu

    • And what are the bets that the demographics of these 180,000 people is among some of the better placed and prosperous human beings on this planet?

      And your point is?

  • bool IsDoingSomethingIllegal(IpAddress dest)
    {
    if (dest == TBP_ADDRESS){ //make a law against using services like TPB's VPN
    return true;
    }
    else {
    return false;
    }
    }

    Or in other words, if the government isn't happy, they just make using TPB's VPN illegal (I'm sure they could come up with an anti-terrorism excuse).
    • If TPB can figure out secure bittorrent over Twitter, the government will have the general public up in arms if they try to outlaw it.
    • by harl ( 84412 )

      VPNs have been in use forever, at least in computer terms. Every remote user in the business work uses a VPN. Likely on a daily basis. To make the claim that someone using one is doing something illegal is nonsensical.

  • by Anonymous Coward on Thursday July 23, 2009 @12:35PM (#28797529)

    Shoun't that be Virtual Pirate Network?

  • Doesn't running a proxy for hundreds of thousands of users downloading large files over bittorrent cost a lot of money? It'll have to be a paid service. A fully anonymous paid service that doesn't keep any records. Hm.
    • Re: (Score:2, Informative)

      by Nuno Sa ( 1095047 )

      RTFA, please. Who said it's free?

    • It'll have to be a paid service.

      No shit? They said it was going to be a paid service when it was first announced. From the title of the original Slashdot article from March: Pirate Bay To Offer VPN For $7 a Month [slashdot.org]. From where did you get the idea that this was ever going to be a free service?

    • Re: (Score:2, Informative)

      by SteelRat ( 11640 )

      RTFA, guy. It's not free.

      Also It's been done [slashdot.org] before and well [wikipedia.org]. The code has been open for a long time now. I'm just surprised it hasn't happened sooner.

      The code used to be archived by some of the industry cool kids for quite a while, but I'm not readily finding it in the allowed attention span of this comment.

      • Read the rest of his post, guy. His point isn't that it's not free, but that any service that accepts money from you is gonna have to keep some kind of records of those payments; therefore it's not fully anonymous.
        • Re:Free? (Score:4, Interesting)

          by Freetardo Jones ( 1574733 ) on Thursday July 23, 2009 @01:12PM (#28797945)

          gonna have to keep some kind of records of those payments; therefore it's not fully anonymous.

          Yes, the record that have to keep would amount to this: "x user paid his monthly fee". There is no need to retain any other information.

          • Re: (Score:3, Insightful)

            Thank you ChinggisK for restoring my faith in humanity after all of these idiots.

            There is no need to retain any other information.

            Oh god, this is slashdot isn't it? Where's the healthy paranoia? Of course they don't need to keep logs but they could. You're handing them your identity, committing a crime, and hoping that they don't keep laws. I guess you trust the name The Pirate Bay (from these other posts I gather you all are stupid enough for this in the first place) but keep in mind they were just bought

        • There are a number of illicit services which have to accept payment and don't keep records. Now, if there is a subscription then I would be suspect. However if its non-recurring payment, I could believe that they don't have any records. For instance, "seed banks" do the same thing for many entheogenic plants. You make a payment, they ship your product, and the records of the transaction are deleted and shredded. However, that would mean a *lot* of hands on work for a few people to perform since I doubt most
        • Re: (Score:3, Informative)

          Keeping account information is far different that keeping activity logs. Completely anonymous, no. Where you have been and what you may have downloaded, yes. So unless they make having an account on the VPN illegal, it is "anonymous enough".
        • Why are they mutually exclusive? Maybe I'm missing an epic troll here, but I'm thinking you don't understand the word anonymous, nor any of the concepts/methods involved in creating that status on the net. The service isn't really the VPN, it's the not keeping (or anonymizing -speel) transaction records for your VPN connection. Having a bill for a service doesn't mean the service provider keeps a log of my usage.
        • These *are* pirates we are talking about ... of course they'll be using stolen credit card numbers ... duh

    • by cjb658 ( 1235986 )

      It's 5 euros per month: http://www.ipredator.se/ [ipredator.se]

  • Old News (Score:5, Informative)

    by Anonymous Coward on Thursday July 23, 2009 @12:39PM (#28797577)

    It's entered Beta? Hardly news, I got my invite on the 1st of July, it contained a unique HTTPS URL which was the only way to access the login page. I signed up (and paid up), connected the VPN after following the simple steps to create a Windows VPN connection. My IP then geo-located to somewhere in Sweden. It's nice, cheap and easy solution, assuming it does indeed remain anonymous. Speeds are pretty much wirespeed on my 5MB ADSL in the UK.

  • Keep in mind... (Score:5, Informative)

    by jshackles ( 957031 ) on Thursday July 23, 2009 @12:39PM (#28797579)
    that here in the USA, using a service like this (and subsequently being caught) can stiffen any penalties or jail time your may receive because you're actively obstructing justice.
    • Re: (Score:3, Insightful)

      by Dan667 ( 564390 )
      Certainly groups like the RIAA are going to play that up while they secretly freak out they are not longer losing control, but have completely lost it to services like this.
    • Re:Keep in mind... (Score:5, Insightful)

      by CopaceticOpus ( 965603 ) on Thursday July 23, 2009 @12:50PM (#28797721)

      I fear you're probably right. But it is messed up that "taking steps to avoid sharing your personal information with your ISP" can be construed as "actively obstructing justice."

      A person who does nothing illegal might want to use this service simply because they value privacy.

      • You can also use a gun for target practice, but if you use one during the comission of a crime, the penalties are stiffer.
        • Re: (Score:3, Insightful)

          by Bigby ( 659157 )

          Is the penalty really stiffer if you kill someone using a gun instead of a knife? Or you rip out their heart with your bare hands?

        • Re: (Score:3, Insightful)

          by zmollusc ( 763634 )

          Well, in theory you can use a gun for target practice, but if you have a gun at all you must be a crazy would-be mass murderer. Hence all guns (except those protecting Important People) are confiscated and guns are never used to commit crimes ever again.

        • Re: (Score:3, Insightful)

          That's because using a gun endangers lives. This would be more akin to drawing the blinds while making illegal copies of Hollywood movies in your basement.

          The real scary bit is when they decide that anyone with drawn blinds is acting suspiciously and needs to be searched. Just wait, I guarantee you someone will propose that anyone using this anonymity service should be investigated.

        • by cjb658 ( 1235986 )

          You can also use a gun for target practice, but if you use one during the comission of a crime, the penalties are stiffer.

          You heard it from slashdot: downloading pirated content with a VPN is the same as shooting someone.

      • Privacy is illegal these days. Soon to be in the "Land of the Free" Just step out on to your porch. Be sure to wave (in all directions, ya never know which camera is active...)
      • by Tuoqui ( 1091447 )

        Well... We have the right to ask what does the ISP need with our personal information? All they need is a place to send the bill and the IP Address of the source and destination in packets you send on the network.

      • I fear you're probably right. But it is messed up that "taking steps to avoid sharing your personal information with your ISP" can be construed as "actively obstructing justice."

        Not quite. There's no way that using this while going about legal activities is a crime.
        The only way this could possibly be "actively obstructing justice" would be if you used it during the commission of a crime.

    • as a serious question....are you saying that using encryption in your communications would increase your penalties?

      Is this codified law somewhere? Since the future of all electronic communications is going to be encrypted I would think this presents a pretty serious problem (or from a law standpoint a powerful club).

      Using encrypted wireless communications on your router is not by nature going to increase your penalties, why should encrypting the rest of your communications do so?
  • Viva la Fra.... Oh, wait, wrong episode...

  • by Anonymous Coward

    I dunno what you're talking about -- there is no "pirate bay", no more "black servers" or "darknets"; now, everyone be quiet!

  • ... have finally found a way to pay that 3.6 million dollar judgement from the trial, eh? Unlike TPB, this has a subscription fee to use it.

    • They sold the pirate bay website for twice the amount of their fines. So they are fine financially.
      • by Holi ( 250190 )

        wait did the sale actually go through? last I heard the buyers may be backing out.

  • I never actually thought about what IPRED stands for. Now I see the acronym refers to words in english...

    I all ready knew the swedish elite takes its directions regarding copyright law from the big ol' US of A, but jesus, couldn't you at least bother to translate the names of laws they've ordered into swedish !?!

    • by migla ( 1099771 )

      Ok. Here's me looking foolish. IPRED is an eu directive, hence the name not being in swedish.

      • by Xest ( 935314 )

        No it's not, it's a result of an EU directive. The IPRED name is still distinct to Sweden I believe. Certainly here in the UK we have no IPRED, but we do have similar laws or attempts at such laws.

        The EU directive just states what must be done in the local country, IPRED is the local name for their local implementation of the directive (and then some more above and beyond the directive i believe).

  • ...will this service belong to the old or the new TPB owners?
  • Except their only payment portal doesn't accept payment using US credit cards. The portal told me themselves when they rejected 3 of my cards and a Paypal temporary credit card.
  • by noidentity ( 188756 ) on Thursday July 23, 2009 @02:08PM (#28798655)
    In my neighborhood they even have a wireless version of this VPN. It's called "linksys" for some reason, but it allows anonymous access, and it's even free.
    • by smcn ( 87571 )

      Hm, there's a similar service in my neighboorhood named "belkin54g". I'll bet they're the same service but using a different name for double plus anonymity! Brilliant!

  • Turns out this is just a repainted version of Relakks... (see http://www.golem.de/0907/68539.html [golem.de] (german))
  • Interesting how the poster refers to STEALING as censorship. I wonder if someone stole from the poster the thief could just accuse the victim of trying to censor him from having anything he wants for free.

There is no opinion so absurd that some philosopher will not express it. -- Marcus Tullius Cicero, "Ad familiares"

Working...