Tuesday , April 16 2024

Hiding and Seeking

File sharing services are making efforts to hide user identities in the wake of the RIAA sue-the-world campaign:

    the makers of file-sharing software are fortifying their programs to try to mask users’ identities.
    Some of the upgrades reroute Internet connections through so-called proxy servers that scrub away cybertracks. Others incorporate firewalls or encryption to thwart the sleuth firms that the recording industry employs.

    “Everyone is concerned about their privacy,” said Michael Weiss, chief executive of StreamCast Networks. The upgrade to his Morpheus file-sharing software has been downloaded more than 300,000 times since its release last week.

    Music industry officials insist file-swappers can’t hide.

    “Nothing that has been invented has prevented us from being able to identify substantial infringers and collect evidence,” said Matt Oppenheim, senior vice president of business and legal affairs for the Recording Industry Association of America.

    Yet experts say some of the countermeasures could make it more difficult to trace individuals on peer-to-peer networks. Though none can guarantee total anonymity, they ultimately may not have to.

    “With enough technology it may not be worth the effort for the RIAA to come after somebody,” said Mark Rasch, a former U.S. Justice Department computer crimes prosecutor. “At some point it can become so difficult to find out who did something that it becomes practically anonymous.”

    ….The RIAA scours the most popular file-swapping systems for users with large collections of copyright works and tries to identify their Internet service provider through the Internet Protocol, or IP, numbers assigned to computers on the Internet. The RIAA can then subpoena a service provider demanding a user’s identity.

    Upgrades to the file-sharing software seek to short-circuit that detection process.

    Morpheus, for one, lets members connect to a Web site that links to several public proxy servers, which help mask the user’s IP number. The more proxy servers involved, the more difficult it can be to trace connections to their source.

    The chase is further complicated because proxy servers operate independently of Internet providers.

    ….Two Spanish-based peer-to-peer services–Filetopia and Blubster–claim to have the strongest privacy protections.

    Filetopia uses encryption to scramble data on its network. Users also have the option to use a program that reroutes data similar to a proxy server.

    Pablo Soto, the developer of Blubster, said his program scatters packets of data at random using other computers on a file-swapping network. Each data packet eventually finds its way to the computer seeking the file, where the packets are reassembled.

    The scattering process makes it difficult to gather evidence because transmission logs don’t reveal a file exchange has taken place, Soto said. [AP]

All of this time and effort on both sides could be put to much better use.

About Eric Olsen

Career media professional and serial entrepreneur Eric Olsen flung himself into the paranormal world in 2012, creating the America's Most Haunted brand and co-authoring the award-winning America's Most Haunted book, published by Berkley/Penguin in Sept, 2014. Olsen is co-host of the nationally syndicated broadcast and Internet radio talk show After Hours AM; his entertaining and informative America's Most Haunted website and social media outlets are must-reads: Twitter@amhaunted, Facebook.com/amhaunted, Pinterest America's Most Haunted. Olsen is also guitarist/singer for popular and wildly eclectic Cleveland cover band The Props.

Check Also

SXSW

SXSW 2023: Connecting Your Brain to Computers

Brain Computer Interface technology will allow you to control the world with just your thoughts and bluetooth.