YTS Lawsuits Offer Clearest Sign Yet That Pirates Shouldn’t Trust Anyone

One of the most common recurring questions in respect of downloading, sharing and even streaming, is whether service X or platform Y is ‘safe’ to use, from a copyright-infringement perspective. Recent developments show that no matter how safe users think they are, security is something that should never be taken for granted.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

When mainstream piracy was in its infancy two decades ago, the majority of file-sharers had no idea that they were even at risk from snoopers. Thanks to a massive wave of lawsuits from the RIAA in 2003, that perception soon changed.

Somewhere around 2004, the MPAA embarked on a parallel campaign to drive the message home to pirates that the Internet is not anonymous.

“If you can think you can get away with illegally swapping movies, you’re wrong,” the ‘You Can Click But You Can’t Hide’ posters read. “Illegally trafficking in movies is not just a dirty little secret between you and your computer. You leave a trail.”

The MPAA also gave unquestionably good advice: the only way to guarantee that users weren’t caught for sharing pirated movies was not to share them at all. Of course, millions didn’t listen and by the time that VPNs really started to take off around 2006/2007, file-sharers were laughing into their keyboards.

The biggest threat back then (as it is now) was sharing torrents without protection. Torrents are public and any rightsholder can monitor them before filing a lawsuit for damages. But by 2009 or so, when streaming sites had already embedded themselves as the next big thing, a whole new click-and-play generation had become complacent again, lulled to sleep by the perceived security offered by third-party hosting sources.

Today, millions of people are streaming content via apps and so-called Kodi boxes, mostly with zero protection. The idea, if people even consider it, is that ‘pirate’ sites can’t or won’t give up their information. That is a dangerous assumption.

As recently documented here on TF, there is a worrying situation playing out on YTS, one of the Internet’s most popular torrent indexes. Taking all the facts at hand and adding in some educated guesses, it seems that after being subjected to massive legal pressure, the owner of that torrent resource may be handing information on some of its users to movie companies.

To many file-sharers, that might seem an outrageous proposition but when faced with multiple six-digit claims for damages, no one should expect anything different. Once the identity of the site’s operator became known to the movie company plaintiffs, the pressure seems to have increased to the point that skin-saving might now be the order of the day. That seems to have been the case at Cotomovies as well.

The thing is, if a torrent site or app developer can be pressured in this way, so can any other site holding potentially incriminating user data. There can be little doubt that many file-hosting and streaming platforms carry detailed logs and if the proverbial hits the fan, they could be handed over. Even some so-called debrid download sites, that appear to offer enhanced security, state that they carry download logs for up to a year.

The bottom line is that if users are expecting pirate sites (or even gray area sites like the now-defunct Openload) not to store their personal information or carry download and upload logs, they are effectively banking on a third-party’s security and their determination not to buckle under the most severe pressure imaginable.

In 2020 and after almost two decades of aggressive litigation, it’s perhaps surprising that anyone is taking such things for granted. But people do. They use their regular email addresses to sign up for questionable services, access all kinds of pirate sites without using a VPN, use their personal PayPal accounts for payments and donations, and generally fail to take seriously what could be a very expensive exercise in complacency.

As an example, just last week a user on Reddit reported that a copyright troll in the US had tracked him down with evidence that he’d shared 20 movies. To put that into settlement terms (to make a lawsuit go away) that could mean paying out $20,000, $40,000 or even $60,000 – a potentially life-changing or indeed life-ruining sum.

A decade-and-a-half ago the MPAA’s “Click But Can’t Hide” campaign declared that the Internet is not anonymous. It was accurate (at least by default) but many people continue to believe that security isn’t important. The truth is, the Internet is getting less anonymous every single year and rightsholders know how to exploit that.

Like the apparent YTS fiasco, expect more preventable ‘surprises’ in the months and years to come.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Email release reveals chaos sowed by President Trump’s hurricane tweets

“What’s next? Climate science is a hoax?”

President Donald Trump displaying a doctored forecast map that incorrectly shows Hurricane Dorian hitting Alabama.

Enlarge / President Donald Trump displaying a doctored forecast map at the White House on September 4, 2019, in Washington, DC. (credit: Getty Images | Chip Somodevilla )

For meteorologists and senior leaders at NOAA, the first week of September 2019 is one they're never going to forget.

Amidst the tumult of Hurricane Dorian and its threat to the United States, President Trump injected himself into the story by warning that several states, including Alabama, would "most likely be hit (much) harder than anticipated. Looking like one of the largest hurricanes ever." Alabama faced virtually no risk from the storm at the time. After being ridiculed for this errant forecast, the president responded with a White House event where he displayed an official National Hurricane Forecast map with a Sharpie-drawn extension that included Alabama in Dorian's "cone of uncertainty."

The controversy only burned all the brighter when the Birmingham office of the National Weather Service tweeted that Alabama residents had nothing to fear from Dorian (which was accurate). This tweet occurred after the president's tweet about Alabama's risk but was apparently not directly in response to the president. Instead, it came in response to a surge of public inquiries. According to the meteorologist-in-charge of the Alabama office, Chris Darden, his office's phones "started ringing off the hook" with public inquiries and concern after the president took to Twitter.

Read 9 remaining paragraphs | Comments

White dwarf causes strange relativity effect called frame dragging

We’ve struggled to measure it near Earth, but now have data from a distant stars.

Image of diffuse blue rings surrounding a long, thin object.

Enlarge / The lit up rings in this image are caused by wobbles in a pulsar's axis of rotation. (credit: NASA)

Ask about some mind-bending physics, and people will tend to focus on the many mind-bending oddities of quantum mechanics. But there's no shortage of strangeness in another one of physics' cornerstone theories: relativity. From time being relative to things getting more massive as they accelerate, there are lots of head scratchers in relativity.

But the thing that may top the strangeness scale is an effect called "frame dragging," where a massive, rotating object distorts the space-time around it. While it was first identified as a relativistic effect shortly after relativity was proposed, we weren't in any position to test it until the satellite error. While a number of missions have produced results consistent with relativity, the experiments had rather large uncertainties.

Now, an international team of scientists have used an interstellar laboratory to test the proposal. Taking advantage of a large white dwarf with a close-by neutron star, the researchers have detected frame dragging effects in the regular pulses of emission from the neutron star.

Read 11 remaining paragraphs | Comments

Winnti: Wenn eine APT protestierende Studenten angreift

Bisher hatte es die Hackergruppe Winnti auf Unternehmen wie Bayer oder Steam abgesehen, nun haben sich die Ziele verändert. Statt Wirtschaftsspionage geht die APT gegen protestierende Studenten in Hong Kong vor. (Winnti, Virus)

Bisher hatte es die Hackergruppe Winnti auf Unternehmen wie Bayer oder Steam abgesehen, nun haben sich die Ziele verändert. Statt Wirtschaftsspionage geht die APT gegen protestierende Studenten in Hong Kong vor. (Winnti, Virus)

We are entering the Golden Age of studying our Sun

“There is no doubt that the observations and insight will be unprecedented.”

The Sun is our closest star, and without it life on our world could not survive. So it is essential to understand its nature. And yet, even though the Sun shines brightly on every clear day on Earth, it is difficult for astronomers to observe the star closely for a number of reasons.

Most obviously, it is hot—so hot, it is difficult to get too close without getting burnt to a crisp. Additionally, due to high solar gravity, it requires a lot of energy to insert a spacecraft into an orbit near the Sun. The harsh radiation near the Sun also plays havoc with the scientific instruments on spacecraft.

For all of these reasons, while astronomers have made steady progress in understanding the Sun and its effects on Earth, our atmosphere, and other bodies in the Solar System, we still have big questions. The good news is that we are now entering the golden age of Solar research with a major new ground-based telescope and two space-based observatories that will come close to the Sun.

Read 8 remaining paragraphs | Comments

Icann: Kalifornischer Generalstaatsanwalt verzögert .org-Verkauf

Der kalifornische Generalstaatsanwalt ist für die Kontrolle der Icann zuständig. In einem umfangreichen Fragenkatalog fordert er Informationen und Transparenz zum .org-Verkauf. Dieser dürfte sich dadurch um mindestens zwei Monate verzögern – und vielle…

Der kalifornische Generalstaatsanwalt ist für die Kontrolle der Icann zuständig. In einem umfangreichen Fragenkatalog fordert er Informationen und Transparenz zum .org-Verkauf. Dieser dürfte sich dadurch um mindestens zwei Monate verzögern - und vielleicht sogar erledigen. (Icann, DNS)

Künstliche Intelligenz: Intel schließt Nervana-Abteilung

Wenige Jahre nach der Übernahme kommt das Ende, denn Intel macht Nervana dicht. Das KI-Startup ist durch den Zukauf der Habana Labs überflüssig geworden, die Hardware nicht leistungsstark genug. (Intel, KI)

Wenige Jahre nach der Übernahme kommt das Ende, denn Intel macht Nervana dicht. Das KI-Startup ist durch den Zukauf der Habana Labs überflüssig geworden, die Hardware nicht leistungsstark genug. (Intel, KI)

Dear Ashley Madison user. I know everything about you. Pay up or else.

Emails threaten to publish intimate details unless members pay a hefty ransom.

Dear Ashley Madison user. I know everything about you. Pay up or else.

Enlarge (credit: ashleymadison.com)

Four years after hackers dumped the intimate details of 32 million Ashley Maddison subscribers, criminals have revived an extortion scheme that targets people who used the dating website to cheat on their partners.

In the past two weeks, researchers have detected “several hundred” emails that threaten to air those intimate details to the world unless the former subscribers’ pay a hefty fee.

“I know everything about you,” one of the emails, dated January 15, says. “I even know that you ordered some … let’s call them ‘male assistance products’ online on 12/11/2018 using your account at Bank of America N,a routing# 121000358 account# [redacted] for $75 for mailing to [redacted] CA [redacted]!” The extortionist goes on to say: “If you do not act very fast your full AMadison profile and proof of it will be shared with friends, family, and online over social media—and of course your internet orders.”

Read 9 remaining paragraphs | Comments

‘The US Shouldn’t Sanction South Africa for Copying US-Style Fair Use’

Several US entertainment industry groups are unhappy with South Africa’s copyright policies, including plans to adopt a fair use exceptions inspired by US law. The complaints triggered a review into possible trade sanctions by the US Government. This is totally unwarranted, opponents now say, highlighting that South Africans have just as much right to fair use as Americans.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

A few months ago, the office of the US Trade Representative (USTR) started an in-depth inquiry into South Africa’s copyright policies and plans.

The US Government launched this official review following complaints from the International Intellectual Property Alliance (IIPA).

The coalition of prominent rightsholder groups, including the MPA and RIAA, informed the USTR that they’re not happy with how South Africa addresses copyright issues. Lacking enforcement of online piracy was prominently mentioned, as well as the country’s approach towards fair use.

The fair use angle has triggered a wide range of responses from stakeholders who sent their thoughts to the USTR a few days ago.

South Africa plans to introduce a fair use provision into law that is largely based on the US model. According to the IIPA, this is dangerous, as the country can’t rely on 150 years of existing case law. In addition, the new provisions are even broader than the US variant while they arrive on top of the existing ‘fair dealing’ system, the group warns.

The public submissions show that several rightsholders are siding with IIPA, but there’s also overwhelming pushback from public interest groups, organizations, and legal experts.

Pretty much all critics of the IIPA’s stance explain that South Africa’s fair use proposal is largely the same as the US model. The problems signaled by the IIPA are overblown, they argue, adding that South Africans should enjoy the same freedoms as Americans.

There’s not enough space to highlight all protests, but we will provide a short overview of some of the opposition’s responses.

The Internet Association, which represents many large technology companies including Amazon, Google, Microsoft, and Spotify, strongly urges the USTR to reject the IIPA’s fair use complaints.

“South Africa’s fair use measure is modeled on U.S. law and includes a standard four-factor test that strikes an appropriate balance between the interests of authors, creators, and users,” the Internet Association writes. ​

“If the U.S. does not stand up for the U.S. copyright framework abroad, then U.S. innovators and exporters will suffer, and other countries will increasingly misuse copyright to limit market entry.”

Wikipedia’s parent company Wikimedia also chimes in. The organization stresses that fair use has allowed US creators and consumers broader access to knowledge. The South African fair use proposal is very similar and by no means a threat, they add.

“While we respect the need to ensure that copyrighted works are properly protected abroad, the reasonable exceptions and limitations included in the draft amendments to South African copyright law are not going to erode that protection any more than the century-long tradition of fair use has in the United States.

“[]It makes little sense to prevent South African citizens from the freedoms that have long been held by citizens in our own country,” Wikimedia notes.

The African Library and Information Associations and Institutions (AfLIA) stresses than many countries have been able to enjoy fair use for decades. Not allowing South Africans the same right is a breach of constitutional rights.

“A developing country like South Africa, that wants to improve its copyright law by modeling it on the US copyright law and other progressive copyright regimes, should be encouraged and affirmed, not punished for doing so,” AfLIA writes, urging the USTR to stop its review.

The International Federation of Library Associations and Institutions (IFLA) agrees with the other opponents. The group compared the US and South African fair use texts and found “no substantive differences.”

Any additional exceptions in the South African proposal follow the model that already exists in US copyright law and can draw on existing jurisprudence, the IFLA adds.

Peter Jaszi, Emeritus Professor of Law at the American University’s Washington College of Law, sees no roadblocks for the fair use proposal either.

“It seems anomalous that the creative industries in a country where fair use is a venerable part of the law would object to another nation’s decision to adopt it as part of an effort to promote domestic innovation,” Jaszi says.

Finally, the South African government is not being swayed by the IIPA’s concerns either. In its submission, it cites other US businesses, including Google, that support its plans. In addition, South Africa stresses that it has a widely-respected tradition of judicial competence and independence when it comes to intellectual property law.

A complete overview of all the responses, including those in favor of the IIPA, is available here. The USTR will take these into account when it makes it final decision on any possible trade sanctions or other recommendations.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

The fractured future of browser privacy

Browser makers increase privacy protection but disagree on how exactly it should work.

The fractured future of browser privacy

Enlarge

In the 1990s, web browsers like Netscape Navigator and Microsoft Internet Explorer competed bitterly to offer the snazziest new features and attract users. Today, the browser landscape looks totally different. For one thing, Chrome now dominates, controlling around two-thirds of the market on both desktop and mobile. Even more radical, though, is the recent competitive focus on privacy, a welcome change for anyone who's gotten sick of creepy ad tracking and data mismanagement. But as browsers increasingly diverge in their approaches, it's clear that not all privacy protections are created equal.

At the USENIX Enigma security conference in San Francisco this week, developers, security researchers, and privacy advocates presented differing views of how browsers should protect their users against data abuses. In a panel discussion that included representatives from Mozilla Firefox, Google Chrome, Microsoft Edge, and Brave, all participants agreed that collaboration across the industry has driven innovation and helped make privacy a priority. But some browsers are taking a hardline approach, while others prefer to increase protections within the status quo.

Read 16 remaining paragraphs | Comments