Demonstrating A Legitimate Use Of File Sharing For Microsoft's Update?
from the non-infringing-or-infringing? dept
The BBC is reporting on Downhill Battle's move to offer the new Microsoft Windows XP update via BitTorrent as a way of showing how distributed file sharing applications can be used for legitimate, non-infringing purposes (though, the article hints that Microsoft isn't particularly thrilled about this). Of course, anyone who understands how BitTorrent works knows that there are already plenty of examples of non-infringing uses of BitTorrent. At this point, unfortunately, this demo may only serve to show how immature BitTorrent actually is. While the concept is great, the implementation still needs quite a bit of work.Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Reader Comments
Subscribe: RSS
View by: Time | Thread
Hell yeah it's a good example
[ link to this | view in chronology ]
I had better luck
My question, though, is what assurance do I have that the final file is, indeed, an unmolested copy of XPSP2? Seems like some sort of digital signature is needed to verify authenticity, or we could be in for a whole new round of trojans.
[ link to this | view in chronology ]
Authenticity
[ link to this | view in chronology ]