Super Nintendo: Konsole 20 Jahre lang zum Spielstand sichern eingeschaltet

Das dürfte ein Rekord der ganz seltenen Art sein: Um den Verlust eines Savegames zu verhindern, hat ein japanischer Spieler rund 20 Jahre lang seine Nintendo-Konsole laufen lassen – bis auf einen kurzen, offenbar unvermeidbaren Augenblick. (Games, Nintendo)

Das dürfte ein Rekord der ganz seltenen Art sein: Um den Verlust eines Savegames zu verhindern, hat ein japanischer Spieler rund 20 Jahre lang seine Nintendo-Konsole laufen lassen - bis auf einen kurzen, offenbar unvermeidbaren Augenblick. (Games, Nintendo)

Betriebssystem: Quellcode von AmigaOS geleakt

Der Quellcode einer einigermaßen aktuellen Version von AmigaOS ist offenbar im Netz aufgetaucht – inklusive des Betriebssystemkerns Kickstart und des Dateimanagers Workbench. (AmigaOS, Betriebssystem)

Der Quellcode einer einigermaßen aktuellen Version von AmigaOS ist offenbar im Netz aufgetaucht - inklusive des Betriebssystemkerns Kickstart und des Dateimanagers Workbench. (AmigaOS, Betriebssystem)

Four Persistent Online Piracy Misconceptions Busted

While regular visitors to these pages are probably extremely tuned into the way the file-sharing world operates, more casual readers may have one or two things they’d like clearing up. Here are four of the most common and persistent piracy-related misconceptions of recent years, busted for your convenience.

Source: TorrentFreak, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

uploadFifteen years ago, online peer-to-peer file-sharing was a fairly straightforward process. One simply downloaded a file-sharing client such as Kazaa, searched for whatever tickled one’s fancy, and waited for the file to transfer.

While it was undoubtedly easy, slick it was not. ‘Shared folder’ type applications like Kazaa and LimeWire were slow, clumsy and a haven for fake files and junk. No wonder people got excited when BitTorrent came along a few years later.

Today, people getting into the P2P file-sharing scene experience an altogether different dynamic. In some ways it’s more difficult to get going from a standing start, but for those prepared to handle an initially steep learning curve the rewards are potentially much greater.

However, with great ‘rewards’ come great responsibilities, especially when it comes to sharing copyrighted content without permission. As a result there are many misconceptions about what is and isn’t legal and how people are ‘caught’ (and by whom) when using tools such as BitTorrent online.

I never ‘seed’ so I’m never going to get caught

For the vast majority of users, seeding is the act of sharing content they have already downloaded. So, when a movie has downloaded and clicks from 99% to 100% complete, their BitTorrent software starts sharing that entire copy with the world.

However, many users believe that if they stop their software before it starts seeding, that means they cannot be tracked by anti-piracy companies. Unfortunately for them, that is completely untrue.

Any user in a BitTorrent ‘swarm’ has the potential to be tracked, often within seconds and certainly within minutes of beginning their download. This is because unless there are special circumstances, all users are also automatically sharing the content they’re downloading with others.

Once that user’s IP address has been logged by an anti-piracy company, few give a damn whether the user is sharing 100% or 0.1% of a movie. While the time spent in a swarm increases the chances of being monitored, for anti-piracy companies participation is guilt – period.

I own the original DVD/CD so I can download a copy completely legally

So you went into the city and picked up a copy of Mission Impossible – Rogue Nation and helped to push the movie to the top of the Blu-ray charts. Then, having enjoyed it so much, you bought the soundtrack on CD from Amazon. Pat yourself on the back – you’re a paid-up member of the legitimate purchase club.

With that accolade under your belt, it must then follow that you can download backup copies from BitTorrent in case of scratches etc, right?

Err, no. Absolutely not.

Buying an original copy of a movie or CD provides the purchaser with a license to use that content in a certain fashion, usually including viewing/listening at home in front of a limited number of people. What that license definitely does not provide is permission to mass distribute that content to anyone else.

As noted above in the ‘seeding myth’ section, anyone downloading content from BitTorrent is almost always distributing (or uploading) the same content to other users in the same swarm. The act of uploading is illegal in most countries.

Put plainly, anti-piracy companies couldn’t give a damn whether uploaders own none, one, or a million copies of the content in question. Unauthorized mass distribution is illegal, period.

How can I stop my ISP from spying on me?

During the past several years many hundreds of thousands of file-sharers have received letters or emails advising them that they’ve been monitored sharing copyrighted content without permission. As detailed above, many participated in BitTorrent swarms and had their IP addresses logged.

However, since the correspondence they initially receive usually comes from their Internet service provider (Comcast in the US, or Sky in the UK, for example), people believe that their ISP has been spying on them. That is simply not true.

In all ordinary circumstances, especially involving file-sharers, ISPs have no interest in monitoring their users. Not only would this present a legal minefield for service providers, doing so would also represent a logistical nightmare.

To be clear, anti-piracy companies monitor pirates and, broadly speaking, ISPs would rather not know what their users are doing. Some like to throttle (slow down) BitTorrent users but their interest generally ends there.

I only need to use a VPN to avoid being traced

There can be little doubt that buying a decent VPN from a reputable company is one of the best things anyone can do to protect their online privacy. However, people should be aware that this is only one aspect of remaining anonymous and it does not allow them to act with impunity.

Very often it is not merely how people connect to the Internet (unprotected IP address) that causes them to breach their security, but what they say and do once they’re online. For anyone interested in reading more about how poor Internet hygiene can drive a bus and several trucks through VPN security, please refer to our earlier article detailing how the UK’s most prolific pirates were caught.

In summary, VPNs are great (some might argue ‘essential’) for maintaining privacy online and their use alone will stop casual monitors from tracking the user. However, for those taking the bigger risks, VPNs and similar technology only help when sheer carelessness is taken out of the equation.

Source: TorrentFreak, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Oculus Rift: Eingabegerät Touch kommt später

Die Entwicklung der Endkundenversion von Oculus Rift ist abgeschlossen, aber beim Eingabegerät Touch kommt es zu einer Verzögerung: Spieler werden bis zur zweiten Hälfte 2016 mit anderen Controllern wie dem Xbox-Gamepad vorliebnehmen müssen. (Oculus Rift, Eingabegerät)

Die Entwicklung der Endkundenversion von Oculus Rift ist abgeschlossen, aber beim Eingabegerät Touch kommt es zu einer Verzögerung: Spieler werden bis zur zweiten Hälfte 2016 mit anderen Controllern wie dem Xbox-Gamepad vorliebnehmen müssen. (Oculus Rift, Eingabegerät)

Internet: Beim Breitbandausbau bleibt noch viel zu tun

Hamburg und Berlin stehen beim Ausbau mit Breitband-Internet gut da, in Sachsen-Anhalt können nicht einmal 41 Prozent der Haushalte schnell surfen. Ein Problem für Firmen ist die ungleiche Verteilung der Kabelfernsehnetze. (Breitband, Kabelnetz)

Hamburg und Berlin stehen beim Ausbau mit Breitband-Internet gut da, in Sachsen-Anhalt können nicht einmal 41 Prozent der Haushalte schnell surfen. Ein Problem für Firmen ist die ungleiche Verteilung der Kabelfernsehnetze. (Breitband, Kabelnetz)

Leistungsschutzrecht: Warten auf Oettingers Hauptgericht

Ein einheitliches europäisches Urheberrecht wäre eine gute Sache. Die möglichen Pläne der EU-Kommission könnten aber einen großen Nachteil haben. (Leistungsschutzrecht, Urheberrecht)

Ein einheitliches europäisches Urheberrecht wäre eine gute Sache. Die möglichen Pläne der EU-Kommission könnten aber einen großen Nachteil haben. (Leistungsschutzrecht, Urheberrecht)

Blu-ray sales stats for the week ending 19th December 2015

The results and analysis for Blu-ray (and DVD) sales for the week ending 19th December 2015 are in. A trio of new releases, Mission: Impossible – Rogue Nation, Maze Runner: The Scorch Trials and Ted 2, and Holiday sales helped …



The results and analysis for Blu-ray (and DVD) sales for the week ending 19th December 2015 are in. A trio of new releases, Mission: Impossible - Rogue NationMaze Runner: The Scorch Trials and Ted 2, and Holiday sales helped Blu-ray record 2015's best results!

Read the rest of the stats and analysis to find out how Blu-ray (and DVD) did.

When Hollywood Raids Pirates, What Do They Search For?

During December five men from the UK received sentences totaling 17 years after leaking thousands of movies onto the Internet. In an earlier article we revealed how the men were tracked down. Today we’ll look more closely at what police and the Federation Against Copyright Theft were looking for when the men were raided.

Source: TorrentFreak, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

policedownloadFollowing a three year investigation by Hollywood-backed anti-piracy group the Federation Against Copyright Theft (FACT), in December five of the UK’s most prolific movie pirates were sentenced to more than 17 years.

The men, who were behind several interrelated movie release groups including RemixHD, 26K, UNiQUE, DTRG and HOPE/RESISTANCE, were tracked down with techniques detailed in our earlier article but when FACT and the police came knocking, what were they looking for?

TorrentFreak has obtained documents which reveal FACT’s “forensic strategy” in the case and details how the anti-piracy group sought to link the suspects with data gathered in the early stages of the operation.

A check-list shared with police underlined the need to corroborate existing intelligence and, if that was not possible, to determine whether suspects were involved in similar activities.

Find evidence of a conspiracy

As highlighted previously, FACT had long since abandoned attempting to prosecute defendants on copyright infringement grounds, largely since the maximum penalty in the UK for online offenses is ‘just’ two years. Working instead towards charges of Conspiracy to Defraud, officers were instructed to find evidence which would show that the defendants worked in concert (conspired) to defraud.

Since the case was about movies there is little surprise that evidence sought included information linking the defendants to the capturing or camming of movies or anything which indicated copyrighted video had been encoded.

The most obvious items to be searched for included the movies themselves but FACT and the police also searched for video encoding and conversion software plus anything that suggested the defendants were involved in counterfeit DVD production.

On the conspiracy side, it’s clear that securing evidence of communications was crucial. Those carrying out the raid were keen to secure not only emails, but Internet chat logs plus any other related documents such as spreadsheets.

Evidence of uploading infringing content to the Internet plus any discussion of doing so was desired. It was hoped that in part this could be achieved by finding logs from FTP software used to upload videos to servers operated by some members of the release groups.

Logs, logs, software – and more logs

While garage mechanics have their own unique tools to fix an engine or change some oil, Internet pirates’ tools largely exist in the digital domain. However, while the use of a wrench can be forgotten as soon as it’s been placed back in the box, pieces of software tend to have longer memories.

As a result, finding software on the machines of suspected pirates is a top priority since not only do these paint a picture of their owner, but they also carry detailed logs that can incriminate others.

On the machine of Sahil Rafiq police found lots of software designed to manipulate video and audio alongside ripping, encoding and torrent software. A copy of the DRM-busting software DVD Fab was also used in evidence.

At the time of the raid Rafiq’s machine was actually encoding a film but an inspection showed that the machine had been used for encoding before. Server logins, usernames and other passwords also provided useful pointers to previously monitored online behavior.

Also in apparent abundance were logs retained by chat software. The logs detailed links with groups releasing movies on the Internet and revealed discussions with Rafiq’s co-defendants alongside general comments indicating activity in the piracy business.

As is usually the case, FACT took an interest in Rafiq’s cellphone. According to evidence collated by the anti-piracy outfit, this device contained several messages from torrent sites which offered thanks for uploaded torrents.

Reece Baker’s machine had actually been wiped clean and a new operating system installed around two weeks before the raid. While that might have been a good start, when FACT arrived the machine was encoding the movie Gangster Squad which Baker had obtained from a Chinese torrent site.

The presence of the software VirtualDub was also viewed as a negative, as were logins which revealed Baker’s connection to the pirate group DEYA and a dozen uploads to ExtraTorrent.

In common with the others, Baker’s computer also carried lots of chat logs which detailed encoding and uploading of movies. Discussion surrounding the “de-dotting” of cams were seen as a negative as were incriminating comments made over Skype.

Baker’s phone was also seized – that contained a reminder for Rafiq’s birthday.

Like the others, Graeme Reid’s computer contained encoding and ripping software. It also had logins to a server used by the group and chat logs indicating that Reid was the leader of release group RemixHD and involved in another called UNiQUE.

A batch of emails showed how Reid had collaborated with others to source, encode and release movies. In total 1,725 torrent files were found plus DVD copying software.

Ben Cooper’s computer was also found to contain software for encoding and editing movies and carried chat logs confirming that he operated a server used to store films encoded by the groups.

With Scott Hemming it was a similar story. Evidence of encoding, incriminating chat logs with his co-defendants, and logins for a seedbox.

Conclusion

While FACT had built a pretty strong case against all of the defendants during its preliminary investigation, it’s very tempting to conclude that without the troves of information found on their computers, things would have turned out very differently indeed.

Quite how many of the 17 years sentenced could have been avoided will never be known, but it’s not beyond the realm of possibility that the case would have faltered before ever reaching a court room.

Source: TorrentFreak, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Reusable, sugar-based polymer purifies water fast

Can pull out pharmaceuticals, chemicals used to make plastics, and more.

(credit: City of Boulder)

Clean water is essential, yet in certain parts of the world, it's very difficult to obtain. Unfortunately, our limited water resources are being polluted by chemicals from industrial plants, pesticides, pharmaceuticals, and more.

Adsorbant materials composed of carbon are often used to remove many of these organic pollutants. However, they act slowly, typically miss hydrophilic micropollutants, and can be difficult to reuse.

Scientists working on developing inexpensive materials that can purify water quickly have been working with an insoluble polymer called β-cyclodextrin (β-CD)—a big loop of linked sugar molecules. Recently, they've discovered a way to cross-link β-CD using aromatic groups forming a porous, cross-linked complex. The porous, cross-linked β-CD has an increased surface area that significantly speeds the removal of pollutants.

Read 6 remaining paragraphs | Comments

In 2016, terror suspects and 7-Eleven thieves may bring surveillance to Supreme Court

This year, US v. Graham is just one of several privacy cases we have our eye on.

(credit: Chris Wieland)

It has now been 2.5 years since the first Snowden revelations were published. And in 2015, government surveillance marched on in both large (the National Security Agency) and small (the debut of open source license plate reader software) ways.

Within the past year, Congress voted to end Section 215 of the Patriot Act—but then substituted it with a similar law (USA Freedom Act) that leaves the phone metadata surveillance apparatus largely in place even if the government no longer collects the data directly. Even former NSA Director Michael Hayden admitted in June 2015 that this legal change was pretty minor.

We also saw some notable 2015 reforms as to how federal law enforcement uses stingrays, the invasive cell-phone surveillance devices in use by everyone from local cops all the way up to the FBI, the Department of Homeland Security (DHS), and the Internal Revenue Service (IRS). The Department of Justice (the parent agency of the FBI) and DHS both announced new policies that require the agencies to get a warrant prior to deploying the snooping device.

Read 31 remaining paragraphs | Comments