Poland Noticed Organized Attacks On Torrent SwarmsAdded: Monday, May 28th, 2012
Category: About Torrents > Staying Safe And Secure
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extrattorrent.com
The appearance of the Pirate Pay and its plan to protect the entertainment industry’s interests seems to revolve around some anti-piracy method. The latter, apparently, works quite well by attacking torrent swarms.
This method appeared to be so effective that it is now mentioned in the worldwide news. Indeed, the massive amounts of traffic generated by those attacks have been so effective that even Poland’s Cyber Emergency Response Team noticed them. The technique is the following: in order to disrupt or temper with a torrent swarm, you have to send massive data packets, able to flood the group by reaching all members of the targeted swarm. Meanwhile, the targeted groups are exclusively Russian torrent swarms containing films. This is a major reason to suggest that it’s the hand of the Pirate Pay. Nevertheless, the origins of the packets have been recognized as coming from Russia, Canada, China, Australia, and the United States.
However, what is the most interesting in all this is that at least one of the companies involved in the attacks received money from the country’s largest copyright holder – Microsoft Russia. Of course, the Pirate Pay is also involved, as it was financed to fight piracy by applying its own flooding technique. One may wonder, first of all, how many companies from around the world have been bought off to carry out these attacks, and most of all, how legal is this technique? DDoS attacks (distributed denial of service) are usually against the law, and industry experts believe that this case is no exception.
Thus far, Russian file-sharers haven’t complained about any problems with BitTorrent networks.
May 28th,2012Posted by:
Monday, May 28th, 2012
|If we know the origins then surely there is some IP address ranges that needs to be added to our block lists.|
|posted by (2012-05-28 19:07:56)|
|i would also be intrested in know whether they block specific files or whether they block ip's. if it's the latter i would expect a lawsuit in the near future.|
|Okay so where is this all powerful anonymous and why are they not doing what they claim to stand for; going after something like this?|
|As more servers use Java backends from companies like Oracle /Delphi Denial of service become a thing of the past and if using DHT-Distributed Hash Tables in private torrents such attacks are not conceivably possible unless perpetrated by fake torrents or ISP`s to begin with.|
PARG-Paul Graham did a plug in for Azureus some years ago at my instigation from Ants p2p to prevent such tracking and disruption when I answered the call for decentralised torrenting to prevent tracking as JD6667/jeff666 @sourceforge.net so we have anonymity and a defence against such attacks through irc internoding as well as blocklists,to actually stop us doing what we do through bittorrent they would have to DDos all ISP`s and that would take down the internet g;obally a feat even [email protected] Meade is not capable of as yet.
|Anonymous perpetrate attacks to cause disruption in protest against the fascists who would control the Internet globally to show them that their dirty tricks will not be taken lying down and to show them they only think they have the power,the CIA/NSA global cyber strategy 2001-2011 whitepaper shows what Americas intentions are and groups Like Anonymous are out to see they do not achieve their Goals unhindered,a free internet is what we all want,N`est pas. (:^D)||
Most Popular Stories