PROJET AUTOBLOG


TorrentFreak

Archivé

Site original : TorrentFreak

⇐ retour index

Sean Parker’s ‘Screening Room’ Patents Anti-Piracy Technologies

vendredi 26 mai 2017 à 19:34

Sean Parker is no stranger when it comes to online piracy.

The American entrepreneur, who co-founded the file-sharing application Napster, brought copyright infringement to the masses at the turn of the last century.

Fast forward two decades, during which he also served as Facebook’s first president, Parker is back with another controversial idea.

With his latest project, known as the Screening Room, he wants to pipe the latest blockbusters into homes on the day they’re released. For $50 per movie, people should be able to watch new films on their own screens, instead of going to a movie theater.

The project has been praised by some and criticized by others. Several movie industry insiders are skeptical because they believe movies should be seen on the big screen. Others fear that Screening Room will provide quick, quality content for pirate sites.

Given the Napster connection, Parker and his colleagues are particularly aware of these piracy fears. This is likely one of the reasons why they plan to ship their system with advanced anti-piracy technology.

Over the past several weeks, Screening Room Media, Inc. has submitted no less than eight patent applications related to its plans, all with some sort of anti-piracy angle.

For example, a patent titled “Presenting Sonic Signals to Prevent Digital Content Misuse” describes a technology where acoustic signals are regularly sent to mobile devices, to confirm that the user is near the set-top box and is authorized to play the content.

Similarly, the “Monitoring Nearby Mobile Computing Devices to Prevent Digital Content Misuse” patent, describes a system that detects the number of mobile devices near the client-side device, to make sure that too many people aren’t tuning in.

Screening Room patents

The patents are rather technical and can be applied to a wide variety of systems. It’s clear, however, that the setup Screening Room has in mind will have advanced anti-piracy capabilities.

The general technology outlined in the patents also includes forensic watermarking and a “P2P polluter.” The watermarking technology can be used to detect when pirated content spreads outside of the protected network onto the public Internet.

“At this point, the member’s movie accessing system will be shut off and quarantined. If the abuse or illicit activity is confirmed, the member and the household will be banned from the content distribution network,” the patent reads.

P2P polluter, and more

The P2P polluter will then begin to flood file-sharing networks with corrupted content if a movie leaks to the public.

“Therefore, immediately ‘diluting’ the infringement to a rate that would be extraordinarily frustrating, if not impossible, for further piracy of that copy to take place.”

As if that wasn’t enough, Screening Room’s system also comes with a wide range of other anti-piracy scans built in. Among other things, it regularly scans the Wi-Fi network to see which devices are connected, and Bluetooth is used to check what other devices are near.

All in all, it’s clear that Parker and co. are trying to do whatever they can to prevent content from leaking online.

Whether that’s good enough to convince the movie studios to offer their content alongside a simultaneous theatrical release has yet to be seen. But, with prominent shareholders such as J.J. Abrams, Martin Scorsese, and Steven Spielberg, there is plenty support on board already.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Copyright Troll Piracy ‘Witness’ Went Back to the Future – and Lost

vendredi 26 mai 2017 à 10:13

Since the early 2000s, copyright trolls have been attempting to squeeze cash from pirating Internet users and fifteen years later the practice is still going strong.

While there’s little doubt that trolls catch some genuine infringers in their nets, the claim that actions are all about protecting copyrights is a shallow one. The aim is to turn piracy into profit and history has shown us that the bigger the operation, the more likely it is they’ll cut corners to cut costs.

The notorious Guardaley trolling operation is a prime example. After snaring the IP addresses of hundreds of thousands of Internet users, the company extracts cash settlements in the United States, Europe and beyond. It’s a project of industrial scale based on intimidation of alleged infringers. But, when those people fight back, the scary trolls suddenly become less so.

The latest case of Guardaley running for the hills comes courtesy of SJD from troll-watching site FightCopyrightTrolls, who reports on an attempt by Guardaley partner Criminal Productions to extract settlement from Zach Bethke, an alleged downloader of the Ryan Reynolds movie, Criminal.

On May 12, Bethke’s lawyer, J. Christopher Lynch, informed Criminal Productions’ lawyer David A. Lowe that Bethke is entirely innocent.

“Neither Mr. Bethke nor his girlfriend copied your client’s movie and they do not know who, if anyone, may have done so,” Lynch wrote.

“Mr. Bethke does not use BitTorrent. Prior to this lawsuit, Mr. Bethke had never heard of your client’s movie and he has no interest in it. If he did have any interest in it, he could have rented it for no marginal cost using his Netflix or Amazon Prime accounts.”

Lynch went on to request that Criminal Productions drop the case. Failing that, he said, things would probably get more complicated. As reported last year, Lynch and Lowe have been regularly locking horns over these cases, with Lynch largely coming out on top.

Part of Lynch’s strategy has been to shine light on Guardaley’s often shadowy operations. He previously noted that its investigators were not properly licensed to operate in the U.S. and the company had been found to put forward a fictitious witness, among other things.

In the past, these efforts to bring Guardaley out into the open have resulted in its clients’, which include several film companies, dropping cases. Lynch, it appears, wants that to happen again in Bethke’s case, noting in his letter that it’s “long past due for a judge to question the qualifications” of the company’s so-called technical experts.

In doing so he calls Guardaley’s evidence into account once more, noting inconsistencies in the way alleged infringements were supposedly “observed” by “foreign investigator[s], with a direct financial interest in the matter.”

One of Lynch’s findings is that the “observations” of two piracy investigators overlap each others’ monitoring periods in separate cases, while reportedly monitoring the same torrent hash.

“Both declarations cover the same ‘hash number’ of the movie, i.e. the same soak. This overlap seems impossible if we stick with the fictions of the Complaint and Motion for Expedited Discovery that the declarant ‘observed’ the defendant ‘infringing’,” Lynch notes.

While these are interesting points, the quality of evidence presented by Guardaley and Criminal Productions is really called into question following another revelation. Daniel Macek, an ‘observing’ investigator used in numerous Guardaley cases, apparently has a unique talent.

As seen from the image below, the alleged infringements relating to Mr. Bethke’s case were carried out between June 25 and 28, 2016.

However, the declaration (pdf) filed with the Court on witness Macek’s behalf was signed and dated either June 14 or 16, more than a week before the infringements allegedly took place.

Time-traveler? Lynch thinks not.

“How can a witness sign a declaration that he observed something BEFORE it happened?” he writes.

“Criminal Productions submitted four such Declarations of Mr. Macek that were executed BEFORE the dates of the accompanying typed up list of observations that Mr. Macek swore that he made.

“Unless Daniel Macek is also Marty McFly, it is impossible to execute a declaration claiming to observe something that has yet to happen.”

So what could explain this strange phenomenon? Lynch believes he’s got to the bottom of that one too.

After comparing all four Macek declarations, he found that aside from the case numbers, the dates and signatures were identical. Instead of taking the issue of presenting evidence before the Court seriously, he believes Criminal Productions and partner Guardaley have been taking short cuts.

“From our review, it appears these metaphysical Macek declarations are not just temporally improper, they are also photocopies, including the signatures not separately executed,” he notes.

“We are astonished by your client’s foreign representatives’ apparent lack of respect for our federal judicial system. Use of duplicate signatures from a witness testifying to events that have yet to happen is on the same level of horror as the use of a fictitious witness and ‘his’ initials as a convenience to obtain subpoenas.”

Not entirely unexpectedly, five days later the case against Bethke and other defendants was voluntarily dismissed (pdf), indicating once again that like vampires, trolls do not like the light. Other lawyers defending similar cases globally should take note.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Pirate Site Pubfilm Taunts Hollywood With Domain Name Whac-A-Mole

jeudi 25 mai 2017 à 18:35

In recent years, most large pirate sites have faced domain name issues of some kind, which can be quite frustrating.

Copyright holders realize that going after a website’s domain name is a good way to decrease its traffic. Eventually, the site owner might even give up entirely.

The major Hollywood studios might have had this in mind as one of their main goals when they filed a complaint against the pirate site Pubfilm earlier this year.

The lawsuit was kept sealed initially, to prevent Pubfilm’s operator from moving to a new domain preemptively, hoping that this would maximize the effect. This worked, as the site was taken by surprise when it lost its domain name through a court order. However, Pubfilm didn’t throw in the towel.

Soon after the pubfilm.com domain name was suspended, the site moved to pubfilm.ac. And that wasn’t all. Pubfilm also started to actively advertise its new domain through Google Adsense, something we had never witnessed before.

Fast forward a few weeks and Pubfilm is still around, and so is the lawsuit. While the Hollywood studios managed to have the new .ac and .io domains suspended, Pubfilm is still not backing off.

Instead, the pirate streaming site now has a series of alternative domain names people can use to access the site.

Pubfilm.is is the main domain name since yesterday, but the operator also has Pubfilm.ru, Pubfilm.eu and Pubfilm.su in hand. These alternatives are actively advertised on the website, so users know where to go if the current domain is suspended.

“Alternative domain names: PUBFILM.IS PUBFILM.EU PUBFILM.RU PUBFILM.SU. Any other domains are fake!!” a notice on the site reads.

The domain name whac-a-mole is reminiscent of a similar situation The Pirate Bay was in two years ago. At the time, the notorious torrent site rotated close to a dozen domain names, before going back to its original .org gTLD.

The difference with Pubfilm, however, is that Hollywood has a US court order which they can wave at registrars and registries. This makes it easier to have domains suspended, although that’s not guaranteed.

We expect that other pirate sites will keep a close eye on the current situation. Instead of crushing Pubfilm, MPAA’s lawsuit may turn into a field experiment to see what domain names are safe from a US court order, which is not something Hollywood hoped for.

To be continued.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Facebook Bans Sale of Piracy-Enabling Products & Devices

jeudi 25 mai 2017 à 09:45

Riding the crest of a wave made possible by the rise of Internet streaming, piracy-enabled set-top boxes and similar devices have been hitting the homes of millions around the globe.

Often given the broad title of ‘Kodi Boxes’ after the legal open source software that commonly comes pre-installed, these devices are regularly configured for piracy with the aid of third-party addons.

Easy to use, set-top devices have opened up piracy to a whole new audience, normalizing it during the process. It’s a problem now being grappled with by anti-piracy outfits in a number of ways, including putting pressure on services where the boxes are being sold.

Now there are signs that Facebook has decided – or more likely been persuaded – to ban the sale of these devices from its platform. The latest addition to its Commerce Policy carries a new rule (13) which targets infringing set-top boxes almost perfectly.

“Items, products or services sold on Facebook must comply with our Community Standards, as well as the Commerce Policies,” the page reads.

“Sale of the following is prohibited on Facebook: Products or items that facilitate or encourage unauthorized access to digital media.”

The move by Facebook follows similar overtures from Amazon back in March. In a change to its policies, the company said that devices that promote or facilitate infringement would not be tolerated.

“Products offered for sale on Amazon should not promote, suggest the facilitation of, or actively enable the infringement of or unauthorized access to digital media or other protected content,” Amazon said.

“Any streaming media player or other device that violates this policy is prohibited from sale on Amazon,” the company added.

The recent move by Facebook was welcomed by Federation Against Copyright Theft chief, Kieron Sharp.

“It is great to see Facebook follow the likes of Amazon and eBay in making changes to their policies to prohibit the sale of illicit streaming devices on their platforms,” Sharpe said.

“These days social media sites are more than just a place to share photos and comments with friends and family. Unfortunately, the fast-paced development of these sites are being exploited by opportunists for criminal activity which needs to be disrupted.”

The sale of infringing devices on social media does indeed pose a challenge to the likes of FACT.

While most piracy devices have traditionally needed an expert touch to configure and then sell, in 2017 almost anyone can buy a standard Android device and set it up for piracy in a matter of minutes. This means that every interested citizen is a potential seller and Facebook provides a perfect platform that people are already familiar with.

Nevertheless, recent rulings from the EU Court of Justice have clarified two key issues, both of which will help in the fight to reduce the availability of ‘pirate’ boxes, wherever they appear.

In April, the ECJ declared such devices illegal to sell while clarifying that users who stream pirate content to their homes are also breaking the law.

It’s unlikely that any end users will be punished (particularly to the ridiculous extent erroneously reported by some media), but it certainly helps to demonstrate illegality across the board when outfits like FACT are considering prosecutions.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Was The Disney Movie ‘Hacking Ransom’ a Giant Hoax?

mercredi 24 mai 2017 à 18:48

Last Monday, during a town hall meeting in New York, Disney CEO Bob Iger informed a group of ABC employees that hackers had stolen one of the company’s movies.

The hackers allegedly said they’d keep the leak private if Disney paid them a ransom. In response, Disney indicated that it had no intention of paying. Setting dangerous precedents in this area is unwise, the company no doubt figured.

After Hollywood Reporter broke the news, Deadline followed up with a report which further named the movie as ‘Pirates of the Caribbean: Dead Men Tell No Tales’, a fitting movie to parallel an emerging real-life swashbuckling plot, no doubt.

What the Deadline article didn’t do was offer any proof that Pirates 5 was the movie in question. Out of the blue, however, it did mention that a purported earlier leak of The Last Jedi had been revealed by “online chatter” to be a fake. Disney refused to comment.

Armed with this information, TF decided to have a dig around. Was Pirates 5 being discussed within release groups as being available, perhaps? Initially, our inquiries drew a complete blank but then out of the blue we found ourselves in conversation with the person claiming to be the Disney ‘hacker’.

“I can provide the original emails sent to Disney as well as some other unknown details,” he told us via encrypted mail.

We immediately asked several questions. Was the movie ‘Pirates 5’? How did he obtain the movie? How much did he try to extort from Disney? ‘EMH,’ as we’ll call him, quickly replied.

“It’s The Last Jedi. Bob Iger never made public the title of the film, Deadline was just going off and naming the next film on their release slate,” we were told. “We demanded 2BTC per month until September.”

TF was then given copies of correspondence that EMH had been having with numerous parties about the alleged leak. They included discussions with various release groups, a cyber-security expert, and Disney.

As seen in the screenshot, the email was purportedly sent to Disney on May 1. The Hollywood Reporter article, published two weeks later, noted the following;

“The Disney chief said the hackers demanded that a huge sum be paid in Bitcoin. They said they would release five minutes of the film at first, and then in 20-minute chunks until their financial demands are met,” HWR wrote.

While the email to Disney looked real enough, the proof of any leaked pudding is in the eating. We asked EMH how he had demonstrated to Disney that he actually has the movie in his possession. Had screenshots or clips been sent to the company? We were initially told they had not (plot twists were revealed instead) so this immediately raised suspicions.

Nevertheless, EMH then went on to suggest that release groups had shown interest in the copy and he proved that by forwarding his emails with them to TF.

“Make sure they know there is still work to be done on the CGI characters. There are little dots on their faces that are visible. And the colour grading on some scenes looks a little off,” EMH told one group, who said they understood.

“They all understand its not a completed workprint.. that is why they are sought after by buyers.. exclusive stuff nobody else has or can get,” they wrote back.

“That why they pay big $$$ for it.. a completed WP could b worth $25,000,” the group’s unedited response reads.

But despite all the emails and discussion, we were still struggling to see how EMH had shown to anyone that he really had The Last Jedi. We then learned, however, that screenshots had been sent to blogger Sam Braidley, a Cyber Security MSc and Computer Science BSc Graduate.

Since the information sent to us by EMH confirmed discussion had taken place with Braidley concerning the workprint, we contacted him directly to find out what he knew about the supposed Pirates 5 and/or The Last Jedi leak. He was very forthcoming.

“A user going by the username of ‘Darkness’ commented on my blog about having a leaked copy of The Last Jedi from a contact he knew from within Lucas Films. Of course, this garnered a lot of interest, although most were cynical of its authenticity,” Braidley explained.

The claim that ‘Darkness’ had obtained the copy from a contact within Lucas was certainly of interest ,since up to now the press narrative had been that Disney or one of its affiliates had been ‘hacked.’

After confirming that ‘Darkness’ used the same email as our “EMH,” we asked EMH again. Where had the movie been obtained from?

“Wasn’t hacked. Was given to me by a friend who works at a post production company owned by [Lucasfilm],” EMH said. After further prompting he reiterated: “As I told you, we obtained it from an employee.”

If they weren’t ringing loudly enough already, alarm bells were now well and truly clanging. Who would reveal where they’d obtained a super-hot leaked movie from when the ‘friend’ is only one step removed from the person attempting the extortion? Who would take such a massive risk?

Braidley wasn’t buying it either.

“I had my doubts following the recent [Orange is the New Black] leak from ‘The Dark Overlord,’ it seemed like someone trying to live off the back of its press success,” he said.

Braidley told TF that Darkness/EMH seemed keen for him to validate the release, as a member of a well-known release group didn’t believe that it was real, something TF confirmed with the member. A screenshot was duly sent over to Braidley for his seal of approval.

“The quality was very low and the scene couldn’t really show that it was in fact Star Wars, let alone The Last Jedi,” Braidley recalls, noting that other screenshots were considered not to be from the movie in question either.

Nevertheless, Darkness/EMH later told Braidley that another big release group had only declined to release the movie due to the possiblity of security watermarks being present in the workprint.

Since no groups had heard of a credible Pirates 5 leak, the claims that release groups were in discussion over the leaking of The Last Jedi intrigued us. So, through trusted sources and direct discussion with members, we tried to learn more.

While all groups admitted being involved or at least being aware of discussions taking place, none appeared to believe that a movie had been obtained from Disney, was being held for ransom, or would ever be leaked.

“Bullshit!” one told us. “Fake news,” said another.

With not even well-known release groups believing that leaks of The Last Jedi or Pirates 5 are anywhere on the horizon, that brought us full circle to the original statement by Disney chief Bob Iger claiming that a movie had been stolen.

What we do know for sure is that everything reported initially by Hollywood Reporter about a ransom demand matches up with statements made by Darkness/EMH to TorrentFreak, Braidley, and several release groups. We also know from copy emails obtained by TF that the discussions with the release groups took place well before HWR broke the story.

With Disney not commenting on the record to either HWR or Deadline (publications known to be Hollywood-friendly) it seemed unlikely that TF would succeed where they had failed.

So, without comprimising any of our sources, we gave a basic outline of our findings to a previously receptive Disney contact, in an effort to tie Darkness/EMH with the email address that he told us Disney already knew. Predictably, perhaps, we received no response.

At this point one has to wonder. If no credible evidence of a leak has been made available and the threats to leak the movie haven’t been followed through on, what was the point of the whole affair?

Money appears to have been the motive, but it seems likely that none will be changing hands. But would someone really bluff the leaking of a movie to a company like Disney in order to get a ‘ransom’ payment or scam a release group out of a few dollars? Perhaps.

Braidley informs TF that Darkness/EMH recently claimed that he’d had the copy of The Last Jedi since March but never had any intention of leaking it. He did, however, need money for a personal matter involving a family relative.

With this in mind, we asked Darkness/EMH why he’d failed to carry through with his threats to leak the movie, bit by bit, as his email to Disney claimed. He said there was never any intention of leaking the movie “until we are sure it wont be traced back” but “if the right group comes forward and meets our strict standards then the leak could come as soon as 2-3 weeks.”

With that now seeming increasingly unlikely (but hey, you never know), this might be the final chapter in what turns out to be the famous hacking of Disney that never was. Or, just maybe, undisclosed aces remain up sleeves.

“Just got another comment on my blog from [Darkness],” Braidley told TF this week. “He now claims that the Emoji movie has been leaked and is being held to ransom.”

Simultaneously he was telling TF the same thing. ‘Hacking’ announcement from Sony coming soon? Stay tuned…..

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.