Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Shows a continuing lack of standards (Score 1) 123

As the article points out, these practices are identical to the lax enforcement practices described last year on slashdot and elsewhere.

The use of indirect evidence as "proof" of downloads is known, the interesting bit here is that in spite of pushback from ISPs and users, industry practices have not changed.

Perhaps this (and the widespread lack of privacy in cloud-based services generally) will drive more users to privacy-preserving data sharing options, such as OneSwarm.

Submission + - All your secrets are belong to us (again) (nytimes.com)

sertsa writes: "Earlier this year a group of researchers at the University of Washington came up with a scheme to use peer-to-peer networks to store and ultimately forget the keys for encrypted messages causing them to "Vanish". Now a group from researchers from the University of Michigan has come up with a way to break this approach.

In our experiments with Unvanish, we have shown that it is possible to make Vanish messages reappear long after they should have disappeared nearly 100 percent of the time . . ."

Security

Submission + - Combining BitTorrent with darknets for P2P privacy (washington.edu) 3

CSEMike writes: "Currently popular peer-to-peer networks suffer from a lack of privacy. For applications like BitTorrent or Gnutella, sharing a file means exposing your behavior to anyone interested in monitoring it. OneSwarm is a new file sharing application developed by researchers at the University of Washington that improves privacy in peer-to-peer networks. Instead of communicating directly, sharing in OneSwarm is friend-to-friend; senders and receivers exchange data using multiple intermediaries in an overlay mesh. OneSwarm is built on (and backwards compatible with) BitTorrent, but includes numerous extensions to improve privacy while providing good performance: point-to-point encryption using SSL, source-address rewriting, and multi-path and multi-source downloading. Clients and source are available for Linux, Mac OS X, and Windows."
The Courts

Submission + - How to frame a printer for copyright infringement (washington.edu)

An anonymous reader writes: Have you ever wondered what it takes to get "caught" for copyright infringement on the Internet? Surprisingly, actual infringement is not required. The New York Times reports that researchers from the computer science department at the University of Washington have just released a study that examines how enforcement agencies monitor P2P networks and what it takes to receive a complaint today. Without downloading or sharing a single file, their study attracted more than 400 copyright infringement complaints. Even more disturbing is their discovery that illegal P2P participation can be easily spoofed; the researchers managed to frame innocent desktop machines and even several university printers, all of which received bogus complaints.

Slashdot Top Deals

Old programmers never die, they just branch to a new address.

Working...