It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Microsoft backs torrent blocker!

page: 2
4
<< 1   >>

log in

join
share:

posted on May, 14 2012 @ 04:52 PM
link   
Lets suppose that it wasn't your network that was under attack but users were attacking members of your game site or Utorrent club to disrupt activities.

So you as net admin might not know, but the company's bottom line would suffer. And if the user does not complain to any feedback group, then it might even go unnoticed until some news media mentioned it or similar.

So then the software itself and user controls, at the end user would have to be able to deal with these things themselves. So its really up to the software engineers to ensure that users understand how to make their software work effectively. And part of that is anticipating the weak points in their system. And they are continuously upgrading their systems and removing these weak points.

This is the game you have all been playing now for years. SO I don't see how this is really any different.

So maybe they were just being cynical, and no one really was interested in watching a Russian Walt Disney Film. So they didn't bother to download it.

Go to secure encryption using something real like bitmaps and get out of the kindergarten sandbox and stop flinging sand in each other's eyes because the tech boat is still sailing, and those who are riding the waves properly, and not floundering and flailing and claiming to be making progress based on no real analyzable data,
will be the ones with the pockets that jingle.




posted on May, 14 2012 @ 05:47 PM
link   
Lets suppose you were the server. And you are the software company.
So then you pay someone or yourself take 100 pictures outside of scenery in the countryside.

And you divide those into 20 pieces so now you have 100x20 2000 bitmaps and so your software randomly picks one and it becomes the current key. The data is merely added to each pixel in line and repeated back at the start of the image. With a start to align the encryption.

So then the receiving software client, gets the bitmap, through any means you want including via courier if you are a multinational corporation, and now only those who have that exact same bitmap can decode the data.

So then if you are not a multi-national corporation but a free public network, then you give the initial bitmap freely and the client software joins the network.
But if you have users of that software who are using it maliciously, then you can merely not send them the current bitmap. The software will no longer work and no longer be able to decrypt the data.
And or ban their IP.
And you change the bitmap constantly, and to ensure that the Russians don't find a way to beat the system you make sure the software uses a bitmap key to install keys, and you use two math operations and or you can then double encrypt the data and they won't even be able to read your code when they try to reverse engineer the assembler because it will be too confusing and futile.

You see if you do this, the cable company will not even know what you are doing on the net and neither will anyone else except the client software on the other end.
In the case of trackers, they know. But then so does the client no matter what client it is.

If you examine Pirate Bay and see how many seeders there are for a torrent, and there are thousands, then maybe thats a messed with torrent that has lots of paid for assassins trying to prevent you from getting the data whereupon people pick the next listing of the same topic or item, which has fewer seeders maybe even 30 or 40 and that is that for the Russians and their yachts and their 50,000 dollar bottles of wine they have at dinner in N.Y.
edit on 14-5-2012 by Rocketman7 because: (no reason given)



posted on May, 14 2012 @ 08:40 PM
link   

Originally posted by SaturnFX

and how would this effect ATS and the like?


ATS doesn't host illegal torrents, so it's unrelated and would have zero effect on this site.



posted on May, 15 2012 @ 11:51 AM
link   

Originally posted by LightSpeedDriver
Not to mention people that download illegally spend more money on packaged product than people that don't, according to an independent survey.

This is true. If I'm contemplating whether to buy an album or not, I want to hear it in its entirety. If it's rubbish, I delete it. If it's good, I buy it.

I don't think of it as "illegal downloading". I think of it as sampling. I have a right to know if I'm going to enjoy something before I buy it.



posted on May, 15 2012 @ 01:33 PM
link   
reply to post by Xaphan
 

Indeed, the good old-fashioned "going to the record store and asking them to play it for you before buying it" scenario. They still do that here (with headphones) in most of the specialised music shops here. Having the whole thing to listen to at home first is just a next step thing. People who really like it will (eventually) buy it. Over 90% of the stuff I watch, listen to, and games on the computer I own legally. ID Software is a company I have followed since uh...Doom?
And not because the recent games are multiplayer either! That all goes way too fast for me now....


*adopts croaky old voice*
When I was young...cough cough....my reflexes were like...
*coughs some more and hacks up phlegm*
....cats on a hot tin roof with razor blades on it! Ah yes...those were the days....
*hides handkerchief covered in phlegm*

*Fade scene*
edit on 15/5/12 by LightSpeedDriver because: Typo



new topics

top topics
 
4
<< 1   >>

log in

join