New P2P Fingerprint-And-Block Software Almost Ready
from the one-idea dept
Yet another prong in the music industry's strategy to stop file sharing is getting closer to launching. A couple of companies have teamed up to create a system that will intercept all internet traffic on any network it's installed on, copy it, compare it to a fingerprint database - and if it appears to violate a copyright, they'll stop the data transfer. This sounds like the perfect way to slow down all traffic on a network, if that's what you're looking for. Again, this is building barriers that annoy users instead of building value for the customer.Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Reader Comments
Subscribe: RSS
View by: Time | Thread
Encrypt or Interleave
Although, chaning the byte orders of an MP3s/DivXs before you send it would probably be just as effective against a system like this and could be done in the P2P clients with very little overhead. And chaging byte orders isn't illegal anywhere - yet.
Another option would be to encrypt the files with a random 32-bit key and NOT share the key. The clients would then have to brute force the key. Fast and easy on most PCs, slow and expensive to do on the network level.
[ link to this | view in chronology ]
Re: Encrypt or Interleave
Or you could implement a simple 4-bit key and then sue any company that develops software that 'decrypts' the key for violating the DMCA. It's always beautiful when you can use the other guy's tactics against him.
[ link to this | view in chronology ]
Re: Encrypt or Interleave
Perfect idea !
[ link to this | view in chronology ]
Re: Encrypt or Interleave
All your musics are belong to us.
Have a nice day RIAA and be sure to change your lame business model while passing through the threshold.
[ link to this | view in chronology ]
Useful Technology
[ link to this | view in chronology ]
Re: Useful Technology
Oh good, e-mail from married men to married women is still alright... you had be scared there for a minute.
Well... it's like a friend of my once said about relationships: When you move into a new aparement, you don't move all your shit on to the streat and then start looking for a new aparement.
[ link to this | view in chronology ]
No Subject Given
[ link to this | view in chronology ]
This just won't happen....
How many people a fscked off that their ISP blocks port 80/25, if you block P2P traffic, whilst at the same time slowing other traffic, it would be by, by broadband.
You could just use simply ROT13 (rotate bits) to circumvent this, or build an SSH client/server into the next KazaA Lite K++ ;)
[ link to this | view in chronology ]
Re: This just won't happen....
[ link to this | view in chronology ]
a day late and a doller short
Oh, let me guess... they use it or the RIAA will sue them?
[ link to this | view in chronology ]