New P2P Fingerprint-And-Block Software Almost Ready

from the one-idea dept

Yet another prong in the music industry's strategy to stop file sharing is getting closer to launching. A couple of companies have teamed up to create a system that will intercept all internet traffic on any network it's installed on, copy it, compare it to a fingerprint database - and if it appears to violate a copyright, they'll stop the data transfer. This sounds like the perfect way to slow down all traffic on a network, if that's what you're looking for. Again, this is building barriers that annoy users instead of building value for the customer.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. identicon
    Anonymous, 11 Sep 2003 @ 6:12am

    Encrypt or Interleave

    Wow. People might actucally have a reason to start using encryption. Cool.

    Although, chaning the byte orders of an MP3s/DivXs before you send it would probably be just as effective against a system like this and could be done in the P2P clients with very little overhead. And chaging byte orders isn't illegal anywhere - yet.

    Another option would be to encrypt the files with a random 32-bit key and NOT share the key. The clients would then have to brute force the key. Fast and easy on most PCs, slow and expensive to do on the network level.

    link to this | view in thread ]

  2. identicon
    Beck, 11 Sep 2003 @ 6:24am

    Useful Technology

    I think they should also intercept and kill Internet traffic that contains bad words, dirty pictures, and email from married men to unmarried women.

    link to this | view in thread ]

  3. identicon
    Oliver Wendell Jones, 11 Sep 2003 @ 8:26am

    Re: Encrypt or Interleave

    Another option would be to encrypt the files with a random 32-bit key and NOT share the key

    Or you could implement a simple 4-bit key and then sue any company that develops software that 'decrypts' the key for violating the DMCA. It's always beautiful when you can use the other guy's tactics against him.

    link to this | view in thread ]

  4. identicon
    AMetamorphosis, 11 Sep 2003 @ 8:40am

    Re: Encrypt or Interleave

    I LOVE your thinking !
    Perfect idea !

    link to this | view in thread ]

  5. identicon
    AMetamorphosis, 11 Sep 2003 @ 8:46am

    No Subject Given

    This is a potentially dead issue simply because implementation would have to occur by the ISP's and I don't think they will voluntarily do so. If they try to make it law, we can work now to stop this from going forth.

    link to this | view in thread ]

  6. identicon
    Anonymous Coward, 11 Sep 2003 @ 9:20am

    This just won't happen....

    ISPs won't implement this, they know that the major reason for the broadband surge is P2P - jees they even advertise "download music faster"!

    How many people a fscked off that their ISP blocks port 80/25, if you block P2P traffic, whilst at the same time slowing other traffic, it would be by, by broadband.

    You could just use simply ROT13 (rotate bits) to circumvent this, or build an SSH client/server into the next KazaA Lite K++ ;)

    link to this | view in thread ]

  7. identicon
    Joe Schmoe, 11 Sep 2003 @ 12:35pm

    Re: This just won't happen....

    Why would this have to happen at the isp level? Couldn't it be done at a [larger] pipe ahead of them in the food chain?

    link to this | view in thread ]

  8. identicon
    Anonymous Coward, 12 Sep 2003 @ 3:34am

    Re: Encrypt or Interleave

    6 degrees of seperation + multiple instances of WASTE.

    All your musics are belong to us.

    Have a nice day RIAA and be sure to change your lame business model while passing through the threshold.

    link to this | view in thread ]

  9. identicon
    Anonymous Coward, 12 Sep 2003 @ 3:37am

    Re: Useful Technology

    > [..] email from married men to unmarried women. < br>
    Oh good, e-mail from married men to married women is still alright... you had be scared there for a minute.

    Well... it's like a friend of my once said about relationships: When you move into a new aparement, you don't move all your shit on to the streat and then start looking for a new aparement.

    link to this | view in thread ]

  10. identicon
    Anonymous Coward, 12 Sep 2003 @ 3:42am

    a day late and a doller short

    Uh, P2P caches are already here... and ISPs are using them to reduce traffic by *facilitating* sharing. Why on earth would they invest in a technology that actually works against their already substational investment?

    Oh, let me guess... they use it or the RIAA will sue them?

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.