P2p File Sharing - PUBLIC EDUCATION School
- Public Access Systems
"There are many legitimate uses for P2P technology.
Among the entities that use BitTorrent are
NASA, Red Hat Fedora, NetBSD and ironically Time-Warner
Do not talk to the FBI without
representation
Department of Justice, DOJ, Entrapment, FBI Manipulation, Form 302, Harvey Silverglate by Michael Krieger.
"Three Felonies a Day: How the Feds Target the Innocent" Criminal defense attorney Harvey Silverglate explains how the body of federal law has grown to such an extent that the average white collar worker can commit several federal crimes a day and not know it. The author argues that the executive branch uses the law to gain greater control over upper-middle class and wealthy professionals.
The Pirate Bay, Torrentz, isoHunt, KAT and Extratorrent are the most popular torrent sites in terms of traffic, but there are plenty of others to choose from.
How to get into DevOps? The OSL and the Oregon State University School of Electrical Engineering and Computer Science have a joint commitment to expand open source and devops curriculum to an increased number of students. DevOps BootCamp provides the OSL with a channel to reach out to students interested in DevOps and open source, regardless of their discipline
What we Actually Know about software Development and Why We Believe It's True
2013 U.S. Government Fears End of Megaupload Case
Megaupload based its request on “Rule 4” of criminal procedure, which requires the authorities to serve a
company at an address in the United States. However, since Megaupload is a Hong Kong company, this was and
is impossible. The defense argued that the court can only protect Megaupload's due process rights by
dismissing the case. However, the Government disagreed and asked the court to deny Megaupload's motion.
Among other things the Government claimed that federal rules shouldn't be interpreted so narrowly.
Megaupload renewed
its request and the defunct file-hosting company noted that the Government was trying to change the
law in its favor. The lawyers cited a letter to the Advisory Committee on the Criminal Rules where the DoJ
made suggestions that would directly influence the Megaupload case.
Don't Get Busted
BitTorrent Launches Private and Secure Dropbox Alternative 1/2013
BitTorrent Inc. has released a new application that allows users to securely sync folders to multiple
devices using the BitTorrent protocol. The free application has no storage limits and can serve
both
as a public backup system and a shared drive. BitTorrent Sync is especially efficient for
groups
who need to share many large files over the Internet,.
BitTorrent is a very powerful distribution tool. There is simply no faster way than BitTorrent for those
who
share files with several devices at once. Just ask Twitter and Facebook, two major technology companies
that
rely on BitTorrent technology to distribute files across their networks.
For the public, however, there's never really been a good tool to securely backup and sync files over the
Internet via BitTorrent. This may change, however, with the new Sync application just announced by
BitTorrent Inc.
BitTorrent Sync has very similar functions to those offered by popular cloud storage services such as
Dropbox and Skydrive, except for the fact that there's no cloud involved. The upside to this is that no
third-party has access to one's files. Other advantages are that transfers generally go a lot faster with
BitTorrent, and that there are no storage limits.
BitTorrent Inc. is inviting the public to try the application but the company emphasizes that the current
release is pre-alpha development, meaning that there may be a few bugs here and there. “It fits into our
overall goal of making a better Internet using P2P,” TorrentFreak was told in a comment on the release.
The
company looks forward to comments from the public on how to improve the product. “This is a great
opportunity for participants to help us shape this developing product.”
http://torrentfreak.com/bittorrent-launches-private-and-secure-dropbox-alternative-130125/
MEGA "The Internet belongs to no man, or industry, or government!" he said, to applause. "No matter how many politicians you lobby, no matter how many SOPAs you put together in Congress, you will not succeed in efforts to take control of our Internet!"
I Can Use A Banana to Rob a Bank: Why We Don't Ban Things Just Because They Can Be
Misused
It is possible to use a banana to rob a bank. It is also possible to use a phone to defraud people of
millions of dollars. But we do not make possession of a banana or the use of a phone illegal. We make bank
robbery and fraud illegal. We do not outlaw bananas and phones because bananas and phones serve any number
of socially useful services. It would be dumb to outlaw them just because someone could use them in a bad
way.
That's why the test that the Supreme Court identified in the famous Betamax case is so useful. As long as
a
technology is capable of “substantial noninfringing uses” we welcome it. Because those substantial
noninfringing uses are great to have, and we cannot stop innovation just because it can sometimes be
abused.
It is worth mentioning that the situation between YouTube and YouTube-MP3.org is a bit more complicated
than
the one between the RIAA and Download.com. The RIAA has specifically mentioned fears about infringement in
its request to CNET. YouTube's letters apparently focus on the use of its API, which is governed by
contract
law. While YouTube is generally free to limit how people use its API, that power does not extend to
preventing people from downloading videos by other means - means that YouTube-MP3.org is apparently using
instead of the API. While YouTube can tell people how to use their API, their ability to dictate what I do
with the videos that are streamed to my computer is much more limited. [2012 more]
The
History of File-Sharing April 22, 2012
Last century filesharing was a fringe hobby, only for geeks who were lucky enough to own a computer that
could dial into the World Wide Web. How different is that today, where filesharing has become daily
routine
for hundreds of millions of people worldwide. In just a few years swapping files has become
mainstream.
How it all came about. Digital filesharing has come a long way since the early days of
the
floppy disk, starting with a 79.7 kB storage capacity in the early 1970s. Two decades ago 3.5″ disks were
the most sought after medium to distribute files. At the time, their massive 1.4 MB file size was more
than
enough to distribute files. But things got really interesting when people started to swap files on the
Internet.
In just 24 years, filesharing has evolved into an amazingly efficient process which has enhanced lives
everywhere. It has brought great exposure to underexposed types of media and democratized distribution,
making it possible for individuals to share files with the rest of the world at virtually no cost.
BBS: The Early Days (70s-90s)
The BBS, or Bulletin Board System, has been largely attributed with the beginning of contemporary digital
filesharing. Beginning with the Hayes Smartmodem, Bulletin Board Systems became automatic enough
that Sysops (or administrators) were able to own and operate these mediums from their own homes
as both a hobby and, later, as a business. Typically, the BBS was almost like an intranet in which users
would dial-in with their modems to read/send messages, access news, and most importantly for us, share
files.
Shareware became incredibly popular through the distribution provided by Bulletin Board Systems. From
Wolfenstein to Commander Keen, users were able to learn about a BBS by word of mouth and, in its pinnacle,
through printed magazines focusing on BBS's. Many well-known software packages, including PKZIP, were made
popular through the BBS. Many users today still use PKZIP's .zip algorithm when compressing and
decompressing archives. There are still many traditional Bulletin Board Systems in operation today.
Study suggests U.S. box office not affected by BitTorrent
February 11, 2012
A study by researchers from Wellesley College and the University of Missouri, has found that U.S. box
office
sales are not affected by BitTorrent pirating. More importantly, the report revealed that movie studios
hold
the power to curb piracy by decreasing international box office release windows.
Online piracy may not be as bad as Hollywood would like you to believe.
"Reel Piracy: The Effect of Online Film Piracy on International Box Office Sales," conducted by
Brett Danaher, from the Department of Economics at Wellesley College, and Joel Waldfogel from the
Department
of Economics at University of Missouri, suggests little, if any, loss of revenue on U.S. box office sales
after the release of BitTorrent. More importantly, while piracy is exhibited to have a direct correlation
to
a loss of revenue in the international box offices, decreasing the release window would be sufficient
enough
to curtail losses.
Despite the mounting evidence and studies providing evidence to the needlessness of the movie studios'
assault against file-sharing services, their attacks have been intensifying. At the end of the day, these
results suggest that, while directing the blame at file-sharing services induces the fear of prosecution
among other file-sharing competitors, much of the power to curb piracy remains in the hands of the
studios.
Researchers were unable to discern an irregular drop in returns of domestic box office sales, which could
fault BitTorrent as the culprit.
The study underlines 4 key problems for movie studios:
- 35mm film print (a 110 year old technology) for distribution to movie theaters, both domestic and international, typically consumes 3.5 percent of a film's budget. In an effort to cut costs, it's common practice for distributors to reuse film from theater to theater, thereby exacerbating the time between releases.
- There is a shortage of international theaters.
- The complexity of organizing promotional appearances for the film's actors adds to the delay.
- Action and science fiction genres exhibit the highest supply of online pirated movies.
digitaltrends.com/international/study-suggests-u-s-box-office-not-affected-by-bittorrent/
Tribler Makes BitTorrent Impossible to Shut Down
The free Tribler is a fully decentralized BiTtorrent client that would allow you to
search
and download torrents from the peers themselves without the need of external central servers.
Researchers at Delft University of Technology continue to work on their decentralized BitTorrent network.
The Tribler BitTorrent client has been in
development for more than 5 years it doesn't rely on central servers and has delivered many innovative
features.
Their Tribler client doesn't require torrent sites to find or download content, as it is based on pure peer-to-peer communication. "The only way to take it down is to take the Internet down,"
Tribler is designed to keep BitTorrent alive, even when all torrent search engines, indexes and trackers are pulled offline. The free Tribler is a fully decentralized BiTtorrent client that would allow you to search and Download Files, No Reliable Tracker Required and download torrents from the peers themselves without the need of external central servers.
Pirate Bay to abandon .torrent files for magnet links 2012
On Feb. 29 in will be taking what on the surface appears to be a mind-blowing move -- deleting all
torrents
hosted directly on the site, which are being actively shared by more than 10 individuals. Filesharing
titan
the Pirate Bay has promised to remove all .torrent files from its site. But it's not to placate rights-holders
it's going to replace them with "magnet links" instead.
Back in 2009, the Pirate Bay shut down its tracker a server that helps people who want a file to find a
person who has it. While a tracker doesn't actually host any files, operating one for the purposes of
helping people share copyrighted content has generally been found to break the law in the countries where
cases have gone to court. Trackers have largely been made redundant by magnet links which allow for TorIindex a "trackerless"
torrent.
TorIindex is still in very early beta, but we aim to be the best search-engine to locate content using magnet URI:s.
All content is automatically indexed by our crawler. You may tell our crawler where to look by manually adding a torrent file URL or providing a torrent file to our indexing engine, and it will be added to our search index. We will soon add support to provide our crawler with RSS feeds URL:s that will be included in the crawling. Our indexing engine automatically determents what type the contents of a magnet URI is, there is no moderating or filtering of incoming results, everything is fully automatic to keep everything as simple as possible. Swarm peer statistics is primarily collected directly from the DHT cloud, to make sure that swarms that are widely available are displayed before smaller swarms in search results, but also if needed we collect peer statistics from the included trackers. As we only index magnet URI:s, we don't index from torrent files that have the private flag set because it's incompatible with the magnet URI:s.
Originally, BitTorrent users would download a .torrent file which, when opened in your BitTorrent
software
on your computer, calculates a "torrent hash" that identifies the files required. The software
then sends that hash to a server, and connects to people who have the files that you want. They then
download.
Magnet
links differ by making the torrent hash calculation on the server, sending that data within the link
itself. In the same way that opening a link to a Spotify track sends that data to Spotify, a magnet link
sends the relevant data to your BitTorrent client, so that the download can begin.
The other function that a tracker provides is helping people find other people that are downloading the
same
files, so that they can share completed chunks of those files. That role has been superceded by
technologies
like DHT and Peer Exchange (PEX), which share information on who is downloading what over the network.
Instead of asking a central server who has what file, you ask the people you're already downloading
from, who ask the people they're downloading from, and so on. The downside is that it can take a
little
longer for downloads to "get going," but the network effect means that this information can
generally be found very quickly, especially for popular files. The development of these technologies means
that .torrent files are pretty redundant now. That has side benefits, too.
Side Effects: It shrinks the size of the Pirate Bay massively allowing copies of the site to be hosted
with
significantly less bandwidth, so that it's even harder to shut down. It's even feasible that you
could carry a copy of the site on a USB stick. It's worth noting that .torrent files will never
disappear entirely. One person needs to use a .torrent for each new file to inject crucial information
about
a download into the "swarm" of people downloading. For most practical purposes, though, and for
most users, they'll soon become a thing of the past.
The RIAA's and MPAA's worst nightmare - Inside The Pirate Bay's Torrent
Purge 2/14, 2012
The Pirate Bay has long been synonymous with one thing -- torrents. In essence it will be impossible for
the
RIAA or MPAA to put millions of Americans in prison or fine them. No more torrents will help more content
to
be shared, render "copyright watchdogs" more toothless.
Magnet links represent the supreme ultimatum to media organizations (many of which themselves engage in
active for-profit piracy that steals hundreds of millions of dollars from independent artists annually):
"Develop fair, reasonably priced, accessible content distribution and create content that users think
is actually worth paying for, or you can and will be pirated."
But in reality this move is not as mind-blowing and drastic a departure from the site's operational
model as some are thinking/hoping/fearing. The site will continue to host the content, where possible, via
magnet links. All new content will be hosted via magnetic links.
The Pirate Bay can now be compressed to a 90 MB torrent-free site, for easy hosting. Under the new scheme scores of new users will be able to host free proxy servers for The Pirate Bay, helping it escape takedown attempts, local firewalls, or ISP restrictions. At the same time The Pirate Bay washes its hands of any of the actual process of file-sharing. It is simply hosting magnet links -- links to torrents which share the same unique hash value. In that regard, thousands, if not millions of users will be privately hosting the scores of torrents that make up The Pirate Bay users worldwide know and love.
P2P networks has become a "substantial issue for government
[agencies] and for banks and for large corporate enterprises.Millions of documents, both governmental
and
private, containing sensitive and sometimes classified information, are floating about freely on
file-sharing networks after being inadvertently exposed by individuals downloading peer-to-peer (P2P)
software on systems that held the data. Also found the board minutes of one of the world's largest
financial services organizations, the entire foreign exchange trading backbone of a financial company
and
a comprehensive launch plan -- complete with growth targets -- of yet another financial company that was
diversifying into a new region.
May 2010 BitTorrent has decided to open source its new uTorrent protocol, which has now entered a public beta. The software is available at GitHub and the license can be viewed here. Reportedly this is the MIT License. BitTorrent has decided to open source its new uTorrent protocol, which has now entered a public beta. The new software supports streaming as files are downloading, by downloading portions of a file in order. The software also has features ISPs might like. It's more aware of congestion [1], and will automatically rein itself in. This dynamic throttling capability may make some downloads slower, but Ars Technica notes [2] uTorrent will also grab 100% of available bandwidth when that's available, so some might be faster.
Protecting Your Privacy
The fact that a German citizen can be arrested in New Zealand upon request from the US authorities
signaled
that regardless of local laws, people connected to file-sharing sites have become a global target.
"It's turning into a witch hunt. It is worrying," said the admin.
Ter·ror·ist (Noun): Anyone Who Disagrees with the Government
How to Download Torrents anonymously
How to set up your own Raspberry Pi powered VPN
VPN - hide your IP before downloading
or
Hide Your IP Address FREE Anonymous Web Browsing Online Change My IP Address Proxy Encryption safeproxy.com
How to Teach Webcraft and Programming to Free-Range Students
Greg Wilson of Software Carpentry and Beautiful Code
fame,
is teaching an online course called How to Teach Webcraft and Programming to Free-Range Students via P2PU: What do we
know
about how novices learn webcraft and programming, and how can we apply that knowledge to teaching
free-range
learners?
Greg is great lecturer and all about being data-driven. Learn about the data behind the demographics of
programming and some recent grassroots outreach efforts to get more women into programming communities.
Everyone is welcome to participate or follow along.
This group will explore how we, as mentors, can best help them. Topics will include:
* What does research tell us about how people learn?
* Why are the demographics of programming so unbalanced?
* What best practices in instructional design are relevant to
free-range learners?
* What skills do people need in order to bake their own web?
* How are grassroots groups trying to teach these things now?
* What's working and what isn't?
What We Actually Know About Software Development, and Why We Believe It's True
This page contains a Flash video. To view it requires that the Flash plugin is installed and Javascript enabled.
Judge Slams RIAA, $675k Fine Ruled Unconstitutional
July 09, 2010 Another break happened today in the RIAA's case against Boston University student Joel
Tenenbaum, as the $675k fine was reduced by 90%. The judge in the case criticised the RIAA and held that
the
jury's damages were unconstitutional. Even the reduced fine is described as “severe, even harsh” by
the
District Judge. Reducing the jury's $675,000 award, however, also sends another no less important
message: The Due Process Clause does not merely protect large corporations, like BMW and State Farm, from
grossly excessive punitive awards. It also protects ordinary people like Joel Tenenbaum.
ISPs Don't Have To Block The Pirate Bay, Court Rules
July 10, 2010 Two ISPs have won their court battle against an anti-piracy group which had demanded that
they
block subscriber access to The Pirate Bay. Yesterday a judge at the Antwerp Commercial Court rejected the
blocking demands and labeled them “disproportionate”. The Belgian Anti-Piracy Federation has reacted
angrily, accusing the ISPs of siding with The Pirate Bay.
Pirate Bay and MegaUpload Escape Domain Seizure by US
July 07, 2010
As part of an initiative to crack down on Internet piracy and counterfeiting, the US Government recently
took action against sites making available movies and TV shows. Arrests did not feature in the action, but
controversially the authorities seized site domain names instead. TorrentFreak has learned that both The
Pirate Bay and MegaUpload domains were also on the target list.
Should ISPs (including the university in its role as an ISP for faculty, staff, and students)
have
the responsbility for proactively blocking illegal traffic? If so, how can they distinguish
between, say, a stolen Time-Warner movie and the legitimate copy that's being redistributed via
BitTorrent at Time-Warner's explicit request?
Do we give up one of the fundamental tenets of the Internet architeture, the notion that endpoints
determine
what traffic flows, rather than the center? In this regard, it is worth remembering that the three most
radical Internet innovations -- the Web, Napster, and Skype -- came not from ISPs, "official"
standards bodies (i.e., the IETF or the ITU), or major research labs or universities, but from the edges
of
the Net. (Yes, I know that CERN is a major research lab, but for physics!)" ~ Steve Bellovin
At PCPS we use both WinGuardian and Fortress to prevent students from installing or deleting software on our public access systems.
- First, I install Windows 95 Custom to insure that I pick the componants I desire. If you are purchasing Dell's Windows will come pre-installed. Go to the Control Panel Add/Remove Programs and check the installation componants, adding the ones you want and deleting the ones you don't.
- Second, I use TweakUI, to set up the desktop and other options the way I want.
- Third, I install all of the application software and set-up the defaults the way I want them.
- Fourth, I use PolEdit from the MicroSoft PowerToys to set various policies for my users.
- Fifth, I use regedit to make an export copy of the Current_User/Software and Local_Machine /Software
keys. This creates two files with a *.reg name. When a student changes the software setting double-click
on the two *.reg files and back to default.
Please note that unless you disable Password caching every user & set the Password profile to every user uses the same profile, they will get a copy of the desktop, start menu & registry in their profile directory. - Sixth, I install either WinGuardian or Fortress, (different departments wanted different protection schemes) and set the protection policies needed.
- Seventh, I use Ghost to copy the hard drive of the standard system to all of the others. I keep the one standard system for testing purposes and reuse Ghost whenever, a new machine comes in or I wish to upgrade or change an application.
Roy G. Schriftman, MS, MBA
Instructor Computer Science, Manager Computer Laboratory
[e] r.schrif at usip dot edu
Textbook Torrents, promises more than 5,000 textbooks for download in PDF format, complete with the original textbook layout and full-color illustrations. Users must simply set up a free account and download a free software program that uses a popular peer-to-peer system called BitTorrent.
MediaSentry, is the service that scours peer-to-peer networks for the Internet-protocol numbers of copyright infringers used by Steven Marks, general counsel for the Recording Industry Association of America who goes after college students.NewYorkCountryLawyer writes "Is Warner Music, EMI, Vivendi Universal and Sony BMG 'investigator' MediaSentry operating illegally in your state?. The Massachusetts State police has already banned the company, and it's been accused of operating without a license in Oregon, Florida, Texas, and New York. Similar charges have now been leveled the organization in Michigan. Michigan's Department of Labor and Economic Growth, in response to a complaint, has confirmed that MediaSentry is not licensed in Michigan, and referred the complainant to the local prosecutor."
Jimmy Lovine will no longer be employed by Universal Music. He will run LimeWire, the P2P service based on the Gnutella protocol. All the music you can eat for about $10.00 a month. About Gnutella, P2P GNU, Bit Torrent, Darknet and Waste an encrypted p2p application meant chiefly for secure communication.
FILE SHARING APPLICATIONS AND RESOURCES
1. Educational CyberPlayGround: TRENDS IN COMPUTING F**k Big Media:
Rolling Your Own
of a program into the network of P2P clients, and they handle the work themselves. More than this, because
of the P2P technology used by the BBC
2. Educational CyberPlayGround: Free Music Downloads, MP3's, Music
Piracy, Peer to
Revenue decline due to P2P. P2P - Much of the 'piracy' that ... tracks. More important, P2P
networks
enable sharing of content
3. Educational CyberPlayGround: Digital Rights Management and FREE MUSIC
DOWNLOADS
Peer-to-Peer (P2P) file sharing restrictions After all ... network, but not P2P? How about P2P
applications
reconfigured to share songs ... can recognize P2P transmissions by their unique
4. Educational CyberPlayGround: Copyleft and the Creative Commons
License
5. Educational CyberPlayGround: NetHappenings NewsLetter
writes about using p2p networks, specifically bittorrent, to create ... the power of P2P distribution to
create a global ... network of P2P clients, and the p2p network peers distribute
6. Educational CyberPlayGround: INTERNET II
News Articles
powered, peer-to-peer (P2P) file-sharing technology for academia has ... peer-to-peer (P2P) networks, many
college students have ... Direct Connect, a P2P system designed to exploit
Internet2's
7. Educational CyberPlayGround: Security - TOOLS
procedure to tighten up P2P What they will find out about you when you use p2p and are tracked. - See What
You Share ... the World YaCy a p2p-based distributed Web Search Engine
8. Educational CyberPlayGround: Internet
ll
- P2P - California Colleges Building Own
9. Educational CyberPlayGround:
Free Music Downloads, MUSIC SITES ONLINE, Burn CD's
Video Game Music Archive Music Commercials Listening Online P2P BITTORRENT, KaZaA , Grokster , Morpheus
,
Emusic which works with Windows, Mac, and Linux platforms, allows users
10. Educational CyberPlayGround: Music Deals, Music Contract Law,
Copyright
Law, Free ...
LYRICS FOR EVERY SONG About DeCSS and P2P Ripping and EnCoding CD Audio DIGITAL RIGHTS MANAGMENT - DRM
ABOUT DeCSS and DVD's K12 Classroom
TOOLS
- Open Source - Classroom Curriculum Sharing Tools
- Internet Tools
- Stanford Videos
- P2P Tools
Tor
traffic disguised as Skype video calls to fool repressive governments By Dan Goodin Apr 3,
2012
Computer scientists have released a tool that disguises communications sent through the Tor anonymity
service as Skype video calls, a cloak that's intended to prevent repressive governments from blocking
the anonymous traffic.
SkypeMorph, as the application is called, is designed to remedy a fundamental
limitation of Tor: While the communications are cryptographically secured, unique characteristics
of their individual data packets make them easy to identify as they travel over the networks. In the past,
for example, the cryptographic key exchange was different in Tor transactions and the certificates used
were
typically valid for only a matter of hours, compared with as long as a year or two for certificates used
by
most Web servers. These fingerprints made it possible for government censors in Iran, China, and elsewhere
to block data traveling over Tor while leaving the rest of the country's communications intact.
Tor developers have remedied those shortcomings, but other unique signatures still exist. The idea behind
SkypeMorph is to camouflage Tor communications so they blend in as traffic that government censors are
reluctant to restrict.
"The goal is to make the traffic look like some other protocol that they are not willing to
block," Ian Goldberg, a professor at the Cheriton School of Computer Science at the University of
Waterloo, told Ars. "They could just shut off the Internet, of course, like Egypt did for a few days
a
year or so ago, but that, of course, would be extremely unpopular to their own people that are wondering
why
can't see pictures of cute cats."
The release of SkypeMorph comes a few
months after a separate research team in Sweden uncovered changes the Chinese
government made to its "Great Firewall" censorship infrastructure to make it harder for
citizens
to use Tor. Although their research paper (PDF) was only recently published, the findings have
been
public for a few months, said Goldberg, who sits on the Tor Project's board of directors. As censors
in
China and elsewhere devise increasingly sophisticated measures of detecting and blocking the anonymity
service, it falls on Tor volunteers to find new ways to thwart them.
[snip]