The technique involves runtime re-encryption of each file piece, which may already be encrypted, before a peer uploads it to any other peer. To access the re-encrypted pieces, a tracker site generates decryption keys that are unique for each peer and for each file piece. While any user can take part in the content distribution, only legitimate users with the unique decryption keys can access the plaintext of the encrypted distributed content
Archive for 2011/02/04
To leverage the efficiency and the scalability of BitTorrent (BT) systems for Internet content distribution, the present invention discloses enhancing BT peer-to-peer systems to enable digital rights management without infrastructure changesPosted: 2011/02/04 in Education / Awareness, Tech Evolution
As of Friday afternoon, about $5,700 had been raised on the site, which featured a picture of Assange with the words, “I need your help. Please give.”
London law firm Finers Stephens Innocent established the fund together with accounting firm Hazlems Fenton LLP and Assange’s “support team at WikiLeaks,” the firm said. It was not clear when they established the fund.
On its website, the law firm gave information including a bank account number and sort code, and a PayPal link, so donors can give money directly to the fund.
Bill Cheswick of AT&T: WikiLeaks’ head, Julian Assange should be prosecuted for putting lives at risk, and cyber-threats are dangerous because of the very democracy of the InternetPosted: 2011/02/04 in Education / Awareness, Filtering, Tech Evolution
“We did deep packet inspection in 1987,” he says. “We just didn’t call it that.”
If Julian Assange is prosecuted in the U.S., he’ll have at least two powerful allies standing behind him: Guardian and New York Times editors Alan Rusbridger and Bill Keller. Speaking at a Columbia Journalism School panel on WikiLeaks last night, Rusbridger and Keller said that they would go to bat for Assange’s right to publish secrets, despite recently strained relations with the WikiLeaks founderPosted: 2011/02/04 in Education / Awareness
La Quadrature du Net obtained exclusive access to the WikiLeaks US diplomatic cables regarding the Anti-Counterfeiting Trade Agreement (ACTA). Although they only give a partial account of the history of this secretly-negotiated agreement, these cables shed an interesting light on the coming into being of ACTA. They show the prime role of the US in the advent of this extremist imposition of violent sanctions against citizens and their fundamental rights. The cables expose the stakes and debates surrounding the participation of developing countries, as well as the evolution of the position of European Union during the negotiations.
I can’t say I’ve ever seen this one before. One of our mobile users was pulling down updates from download.windowsupdate.com (from what I can tell by public DNS records and the IP, this is a valid microsoft website) and a driver for a USB device is being flagged as maliciousPosted: 2011/02/04 in Education / Awareness, Network Security, Privacy / Data Protection
Cell Phones Don’t Crash Airplanes – the thing about the electromagnetic interference is that it’s a liePosted: 2011/02/04 in Education / Awareness
So, sure, cell phones might cause interference. But a megashark might jump out of the water and bite your plane in half, too.
Andy Baio has created a website indexing each issue of The Daily and linking every article for your reading pleasure. To be honest, it might be the easiest way to read The Daily.
Full Affidavit On Latest Seizures Again Suggests Homeland Security Is Twisting The Law
Will Gibson get away with this legal extortion? Or will someone, somewhere, pick up the case for Brian and make sure Gibson gets what he deserves?
The publisher of the Runes of Magic videogame is defying a hacker who has threatened to release personal details and payment information on usersPosted: 2011/02/04 in Cybercrime, Education / Awareness
A meeting on Monday between Minister for Culture Ed Vaizey and representatives of UK ISPs could be a game-changing moment for the way in which we are all allowed to use the internetPosted: 2011/02/04 in Blocking, Education / Awareness, Filtering, New Business Models, Public Policy, Tech Evolution
At stake is the seemingly academic question of whether PCs should arrive with adult filters turned off – the current default – or on
Netflix is “putting a great stress on the Internet,” said Canada’s top telecom regulator today, and people need an incentive to stop clogging the tubesPosted: 2011/02/04 in Bandwidth Management, Education / Awareness, New Business Models, Public Policy, Tech Evolution
Verizon has quietly begun throttling the wireless connections of its heaviest data users, the company revealed in a PDF buried on its website (hat tip to BGR). The document explains that Verizon has begun two new network management practices in order to “provide the best experience to our more than 94 million customers,” and that they go into effect starting today, February 3.
In the document, Verizon says it’s using techniques such as caching less data on its network, reducing network capacity, and sizing video “more appropriately” for devices. “While we invest much effort to avoid changing text, image, and video files in the compression process and while any change to the file is likely to be indiscernible, the optimization process may minimally impact the appearance of the file as displayed on your device,” Verizon writes.
The possible solutions a .movie extension could provide – Roelof Meijer, director of SIDN, the Dutch internet domain registryPosted: 2011/02/04 in Education / Awareness, File Sharing, Illegal File Sharing, New Business Models, Tech Evolution
All in all, a .GTLD movie won’t provide a rock solid solution against piracy. There will always be people who prefer free, pirated content, even with sufficient legal online supply. A well-developed .movie gTLD however still has some great advantages. It would provide consumers of online entertainment who are willing to pay for their content a recognizable legal source for guaranteed safe and high quality movies. Moreover, it addresses the desire expressed by many that the industry itself should come up with new business models
BT continues to evolve its child-protection offering and is also evaluating network-based parental controls. However, at this time these controls can’t match the functionality offered by PC-based parental-control softwarePosted: 2011/02/04 in Blocking, Education / Awareness, Filtering, New Business Models, Tech Evolution
BT will continue to lead the debate amongst the industry in order to keep this technology under review as it evolves
They’re being used to determine the geo-location of individuals suspected of criminal activities. The SMS text messages can not be detected by the receiver. It is believed that the method can also be used to activate phones (to eavesdrop on conversations) and have phones upload pictures.
Dutch language article: http://binnenland.nieuws.nl/628316/recherche_gebruikt_geheime_spionage-sms
Time Warner Busts Windows In VOD Move – Leading Hollywood’s effort to take back control of the homevid bizPosted: 2011/02/04 in Education / Awareness, New Business Models, Tech Evolution
Julian Assange: Our time has come. WikiLeaks founder Julian Assange says the era of the internet generation has arrived and he’ll continue to expose “abusive organisations”Posted: 2011/02/04 in Education / Awareness
For the internet generation this is our challenge and this is our time
A number of software licenses are available to address specific business objectives:
- Network Analytics – gain visibility into the traffic usage on the network for enhanced operational and marketing decisions
- Fairshare Traffic Management – manage growing bandwidth demands while ensuring subscriber fairness
- Usage Management – create differentiated service offerings to meet subscribers broadband usage needs
- Network Protection – protect network infrastructure, subscribers and limit the impact of malicious network traffic
- URL Access Control – simplify regulatory filtering compliance with in-country legislation
- VoIP Quality of Experience – improve VoIP experience while minimizing VoIP costs and maximizing revenue
- Third Party Partner Integration- expand offerings with new value-added services
Swedish Law Professor Files Complaints Against Visa and MasterCard – Claims their actions against WikiLeaks are illegalPosted: 2011/02/04 in Education / Awareness, Litigation
In an information-based world of cyber-insecurity, power diffusion may be a greater threat than power transitionPosted: 2011/02/04 in Education / Awareness, Public Policy
Conventional wisdom has always held that the state with the largest military prevails. In an information age, however, it may be the state (or nonstate) with the best story that wins. Today, it is far from clear how to measure a balance of power, much less how to develop successful survival strategies for this new world
Wikileaks went from damaging attack helicopter video of murdered civilians, to petty school girl chatter about foreign diplomats to finally, outright propagandaPosted: 2011/02/04 in Education / Awareness
Wikileaks has all of the power to spread the truth on the internet and all of the secrecy that the Elite uses. When this site first came on the scene, I’ll admit that I bought it hook line and sinker. A group of rich, sophisticated hackers that want to shed light on everything the Elite want to keep secret… “That is awesome!” I knew in the beginning that their intelligence dumps would not be big or yield much of a result. It is the nature of the beast in this business. No one will stick their neck out for you, until you have some street credibility.
“Cablegate” to Date: A Unique List of What’s Been Revealed