PROJET AUTOBLOG


TorrentFreak

Archivé

Site original : TorrentFreak

⇐ retour index

Top 10 Most Pirated Movies of The Week – 02/22/16

lundi 22 février 2016 à 08:53

deadpoolThis week we have two newcomers in our chart.

Deadpool is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are BD/DVDrips unless stated otherwise.

RSS feed for the weekly movie download chart.

Ranking (last week) Movie IMDb Rating / Trailer
torrentfreak.com
1 (…) Deadpool (HDTS) 8.6 / trailer
2 (1) Creed 8.0 / trailer
3 (…) Victor Frankenstein 6.1 / trailer
4 (2) Ride Along 2 5.8 / trailer
5 (4) Spectre 7.9 / trailer
6 (3) The Big Short (DVDscr) 8.1 / trailer
7 (9) Kung Fu Panda 3 (Telesync) 8.0 / trailer
8 (5) The Good Dinosaur 6.9 / trailer
9 (6) The Revenant (DVDscr) ?.? / trailer
10 (8) The Martian 8.2 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Software Piracy Hurts Linux Adoption, Research Finds

dimanche 21 février 2016 à 18:01

microsoft-pirateIt’s no secret that the Windows operating system is one of the most widely pirated pieces of software in the world.

Microsoft is not happy with this fact as it costs the company millions in lost revenue, but new research suggests that Linux adoption is being hurt as well.

New findings published by Norwegian economics researcher Arne Rogde Gramstad show that software piracy significantly decreases the adoption of desktop Linux distributions.

In a paper titled “Software Piracy and Linux Adoption” Gramstad examines the relationship between local software piracy rates (based on BSA’s data) and the use of Linux as a desktop operating system, while controlling for potentially interfering factors such as the gross domestic product per capita and local anti-piracy efforts.

This results in a model which predicts that more people would use Linux if software piracy in general was less prevalent in a country.

“I find that an increase in the piracy rate by 1% in a country is expected reduce the user share of Linux by around 0.5%. Although there is some level of uncertainty on the exact estimate, the direction is negative with a high level of statistical certainty,” Gramstad explains to TorrentFreak.

This means that if all piracy was to disappear the number of Linux users would increase by 50%. While that’s an impressive number, the relative impact is modest. In most countries Linux is used by roughly 1% of desktop users, which would increase to 1.5%.

It does bring up an interesting issue though, as it suggests that Microsoft’s dominant position is actually reinforced through piracy.

“I think the results highlight that there are costs to software piracy besides losses to corporate profits,” Gramstad tells TF

“For operating systems, piracy has contributed to Windows’ dominant position, which in effect has undermined competition from open-source alternatives like Linux.”

More research is needed to see how other external factors may influence the relationship between piracy and Linux adoption, but Gramstad is confident that the direction of the results is stable.

While it’s doubtful that Microsoft is going to start encouraging piracy, the results show that the effect of software piracy is not always as straightforward as one would think.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Meet the ‘Pirate’ Journalist Hunted By the Music Labels

dimanche 21 février 2016 à 12:19

Three and a half years ago TF stumbled across a little goldmine. For reasons best known to IFPI their Latin America intranet had started spewing private anti-piracy related documents onto a public facing webpage.

We published several reports on the information IFPI had inadvertently revealed to the world, which included an interesting presentation on how pre-release music piracy could be reduced.

One of the slides alleged that a South American blogger called “ALEKO” had been observed by the labels posting pre-release music online. IFPI went on to say that they’d identified ALEKO as a music journalist and in an effort to stop his activities had sent a local investigator to track him down.

According to IFPI, ALEKO told their investigator that he’d been obtaining music from hackers while also confessing to blackmailing producers. So what happened to ALEKO and the investigation into his activities?

This week ALEKO contacted TorrentFreak and subsequently agreed to tell us more about his experiences with the IFPI. Had he really been leaking pre-release music online? Did he know hackers? Had he blackmailed anyone? Is he really a journalist from South America?

“Yes, I’m from Venezuela. That’s true. Right now I’m here just visiting, but I live in Bogotá, Colombia,” ALEKO told TF.

“I’m 27-years-old and well, I’ve done a little bit of everything after the music thing. I used to work at LaPatilla.com, Venezuela’s biggest news website.”

As the sixth most popular site in the country, LaPatilla.com is definitely influential. ALEKO said he was interested in the perks of the job there, such as gaining access to concerts and press interviews and, of course, experiencing pre-release music.

But while ALEKO did get to hear music early, how did he get copies of tracks up front? Well, it turns out that much like when the IFPI accidentally published their anti-piracy reports to the public, a huge record label had no idea how to properly secure its servers.

“I got the pre-release material from Sony Music’s servers. They had a BIG bug on internal ecards but it wasn’t like hacking,” ALEKO explains.

According to the former journalist Sony would provide him with a URL, much like the one shown below.

hXXps://ecard.mds.sonymusic.com/ecard/retrieveContent.action?getAsset=&authenticationKeyCode=2A3F08CC-6092-B042-33FB-80E874EA95DF&assetId=365400

However, the only thing that changed with each item of content was the ‘assetId’ at the end of the URL. Amending this would provide access to endless material.

“The only thing you needed to do was change the number at the end of that link (like for example changing 365400 to 365401). Each number was a different file such as PDFs, MP3s, WAVs, ZIPs, RARs, internal files like budgets, demos, instrumentals, acapellas, etc.”

But one item in particular remains particularly close to ALEKO’s heart.

“I think the most treasured thing we found on that server was an unreleased music video by Michael Jackson. I never liked him, but this was like gold. I know [some other people] sold it illegally to a few fans,” ALEKO reveals.

But interestingly enough, ALEKO insists that he never leaked full tracks online.

“I posted a few clips on my old Twitter account but that was it, I never leaked full songs or stuff. I knew that what I was doing was kind of illegal, that’s why I never got money benefits from my job at LaPatilla. For me it was enough getting into free concerts and press interviews,” he says.

As an artist and former remixer, ALEKO says that he was really interested in the recording sessions he found on Sony’s servers, particularly acapellas. Obtaining these before anyone else enabled him to quickly get his own remixes to A&R agents. But despite the head start, he had limited mainstream success.

“My mixes never got signed by Sony Music, Universal or a big label because my music wasn’t ‘commercial enough for radio’. I never wanted to make music for radio pop shit, I wanted to give a pop song a club rave feel, so my music would be played in clubs by real DJs,” he says.

But according to the 27-year-old it was his love of remixing and his desire to obtain acapellas by almost any means that eventually led IFPI to his door.

“The only reason IFPI tracked me was because I threatened a producer that I was going to leak a LOT of his recent unfinished stuff if he didn’t send me a couple of acapellas I wanted. I didn’t use my VPN to do that,” he recalls.

“I knew they were somehow watching me because I got a few emails before they appeared at my place. But it wasn’t until I emailed some producers to ask for some stuff that they got my real address. Of course I used fake emails, locations and a paid VPN to secure myself. But that time I think I was stupid enough to forget logging into the VPN.”

A few weeks later, in the first couple of months of 2012, IFPI got personal.

“[Their investigators] came to my place in Caracas, Venezuela, and told me they were the FBI, which is pretty stupid. They called into my apartment intercom and asked for my real name. I went down and they started threatening me and talking about jail,” ALEKO says.

“They make me sign a piece of paper that said something like ‘I, [real name redacted] am not going to leak any pre-release music anymore’ or face getting sued by them. I was of course scared because I wasn’t in a place that allowed me to pay for a good defense like [The Pirate Bay’s] Gottfrid Svartholm or Peter Sunde had. They made me feel like shit, called my job and of course I got fired.”

After his run in with IFPI, ALEKO stopped making remixes and of course no longer had a job as a journalist. While he’s since begun remixing again and still loves music, he could never see himself working for a label.

“Of course, the money would be great but that freedom they take away from the artist isn’t worth it. Its like selling your soul to the devil, you know?” he concludes.

Now, about that Michael Jackson video……

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Which VPN Services Take Your Anonymity Seriously? 2016 Edition

samedi 20 février 2016 à 14:16

VPN reviewMillions of people use a VPN service to browse the Internet securely and anonymously. Unfortunately, however, not all VPN services are as anonymous as they claim to be and some keep extensive logs of private information.

To help VPN users to make an informed choice we decided to ask dozens of VPN services how they protect the privacy of their users. Today we present the fifth iteration of our annual VPN services “logging” review.

In addition to questions about logging policies we also asked VPN providers about various other privacy related issues.

1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, what information and for how long?

2. What is the registered name of the company and under what jurisdiction(s) does it operate?

3. Do you use any external visitor tracking, email providers or support tools that hold information of your users / visitors?

4. In the event you receive a takedown notice (DMCA or other), how are these handled?

5. What steps are taken when a valid court order or subpoena requires your company to identify an active user of your service? Has this ever happened?

6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?

7. Which payment systems do you use and how are these linked to individual user accounts?

8. What is the most secure VPN connection and encryption algorithm you would recommend to your users? Do you provide DNS leak protection and tools such as “kill switches” if a connection drops?

9. Do you offer a custom VPN application to your users? If so, for which platforms?

10. Do you use your own DNS servers?

11. Do you have physical control over your VPN servers and network or are they hosted by/accessible to a third party?

12. What countries are your servers located in?

What follows is the list of responses from the VPN services, in their own words. Providers who didn’t answer our questions directly or failed by logging extensively were excluded. We specifically chose to leave room for detailed answers where needed. The order of the list holds no value.

Private Internet Access

VPN review1. We do not store logs relating to traffic, session, DNS or metadata. In other words, we do not log, period. Privacy is our policy.

2. We’re known as London Trust Media, Inc., and we are located in the US, one of the few countries that do not have a mandatory data retention policy. Additionally, since we operate in the country with the strongest of consumer protection laws, our beloved clients are able to purchase with confidence.

3. We take advantage of Google Apps and Analytics. All of our systems and support tools are in-house.

4. We do not monitor our users, period. That said, we have an active proprietary system in place to help mitigate abuse.

5. Every subpoena is scrutinized to the highest extent for compliance with both the “spirit” and “letter of the law.” We have not received a valid court order. All this being said, we do not log and do not have any data on our customers other than their e-mail and account username.

6. Yes. We do not censor our servers, period.

7. We utilize a variety of payment systems, including, but not limited to: PaypPal, Credit Card (with Stripe), Amazon, Google, Bitcoin, Stellar, Ripple, CashU, any major store bought gift card and OKPay. Over 100 new forms of international payment coming soon.

8. Currently, the most secure and practical encryption algorithm that we recommend to our users would be our cypher suite of AES-256 + RSA4096 + SHA256. That being said, AES-128 is still safe. Our users specifically also gain a plethora of additional protections, including but not limited to:

(a) Kill Switch: Ensure that traffic is routed through the VPN such that if the VPN connection is unexpectedly terminated, the traffic will not route. (b) IPv6 Leak Protection: Protects clients from websites which may include IPv6 embeds, which could leak to IPv6 IP information coming out. (c) DNS Leak Protection: This is built-in and ensures that DNS requests are made through the VPN on a safe, private, no-log DNS daemon. (d) Shared IP System: We mix clients’ traffic with many other clients’ traffic through the use of an anonymous shared-IP system ensuring that our users blend in with the crowd.

9. We have a great application to which our users have left amazing reviews. It is supported on the following platforms: Windows, Mac OS X, Linux, Android, iOS and a Chrome Extension (Coming soon).

Additionally, users of other operating systems can connect with other protocols including OpenVPN and IPSec among others. Our application maintains connection debug information, stored safely, locally and is regularly destroyed. This is for users who wish to seek assistance in the rare case of connection issues.

10. Yes, we operate our own DNS servers on our high throughput network. These servers are private and do not log.

11. We utilize third party datacenters that are operated by trusted friends and, now, business partners who we have met and completed serious diligence on. Our servers are located in facilities including 100TB, UK2, SoftLayer, Choopa, Leaseweb, among others.

12. We’re currently located in: USA, Canada, United Kingdom, Australia, New Zealand, Netherlands, Sweden, Norway, Denmark, Switzerland, France, Germany, Ireland, Italy, Russia, Romania, Turkey, Hong Kong, Singapore, Japan, Israel, Mexico, Brazil, India, Finland (Coming soon) and Spain (Coming soon)

We have over 3,000 servers deployed at the time of writing with over 500 in manufacture/shipping.

Private Internet Access website

TorGuard

VPN review1. No logs or time stamps are kept whatsoever. TorGuard does not store any traffic logs or user session data on our network. In addition to a strict no logging policy we run a shared IP configuration across all servers. Because there are no logs kept with multiple users sharing a single IP address, it is not possible to match a user with an IP and time stamp.

2. TorGuard is owned and operated by VPNetworks LLC under US jurisdiction, with our parent company VPNetworks LTD, LLC based in Nevis.

3. We use Sendgrid for bulk email services and encourage users to take advantage of TorGuard’s free email service for increased anonymity during signup. Our 24/7 live chat services are managed by Livechatinc’s platform. Advanced support desk requests are maintained by TorGuard’s own internal support ticketing system.

4. Because we do not host any content it is not possible for us to remove anything from a server. In the event a valid DMCA notice is received it is immediately processed by our abuse team. Due to our no log policy and shared IP network configuration we are unable to forward any requests to a single user.

5. If a court order is received, it is first handled by our legal team and examined for validity in our jurisdiction. Should it be deemed valid, our legal representation would be forced to further explain the nature of a shared IP configuration and the fact that we do not hold any identifying logs. No, we remain unable to identify any active user from an external IP address and time stamp.

6. Yes, BitTorrent and all P2P traffic is allowed. By default we do not block or limit any types of traffic across our network.

7. We currently accept over 200 different payment options through all forms of credit card, PayPal, Bitcoin, altcoins (e.g. dogecoin, litecoin + more), Alipay, UnionPay, CashU, 100+ Gift Cards, and many other methods. No usage can be linked back to a billing account due to the fact that we maintain zero logs across our network.

8. For best security we advise clients to use OpenVPN connections only and for encryption select AES256 with 2048bit RSA. AES128 is also considered very safe and is a great option if download speed is a priority. Yes, TorGuard provides a full range of security features including a connection kill switch, application kill switch, DNS leak protection, IPv6 leak protection, WebRTC leak protection, and Stealth VPN services. All encryption and security features are available to clients at no additional charge.

9. TorGuard offers a custom VPN application powered by OpenVPN for all versions of Windows, OSX, Linux and Android. We also offer a custom iOS app available on iTunes, however due to Apple’s API restrictions the app uses IPsec for VPN connections. TorGuard’s custom VPN applications do not store any connection logs on the user’s local machine.

10. Yes, we offer all clients the choice between private no log TorGuard DNS servers or Level 3 and Google DNS servers. Members also have the option of using TorGuard local DNS, which is a no log DNS solution running locally on each VPN endpoint.

11. Yes, we retain full physical control over all hardware and only seek partnerships with data centers who can meet our strict security criteria. All servers are deployed and managed exclusively by our in house networking team via a single, secure key.

12. TorGuard currently maintains thousands of servers in over 49 countries around the world and we continue to expand the network every month. All customers get full access to our network with servers in: Australia, Belgium, Brazil, Canada, China, Costa Rica, Czech Republic, Denmark, Egypt, Finland, France, Germany, Greece, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Italy, Japan, Korea, Latvia, Luxembourg, Malaysia, Mexico, Moldova, Netherlands, New Zealand, Norway, Panama, Poland, Portugal, Romania, Russia, Saudi Arabia, Singapore, South Africa, Spain, Sweden, Switzerland, Thailand, Tunisia, Turkey, Ukraine, United Kingdom, USA, and Vietnam.

TorGuard website

SlickVPN

slickvpn1. SlickVPN does not log any traffic nor session data of any kind.

2. Slick Networks, Inc. is our recognized corporate name. We operate a complex business structure with multiple layers of Offshore Holding Companies, Subsidiary Holding Companies, and finally some Operating Companies to help protect our interests. The main marketing entity for our business is based in the United States of America and an operational entity is based out of Nevis.

3. We utilize third party email systems to contact clients who opt in for our newsletters and Google Analytics for basic website traffic monitoring and troubleshooting.

4. If a valid DMCA complaint is received while the offending connection is still active, we stop the session and notify the active user of that session, otherwise we are unable to act on any complaint as we have no way of tracking down the user. It is important to note that we ALMOST NEVER receive a VALID DMCA complaint while a user is still in an active session.

5. This has never happened in the history of our company. Our customer’s privacy is of top most importance to us. We are required to comply with all valid court orders. We would proceed with the court order with complete transparency, but we have no data to provide any court in any jurisdiction. We would not rule out relocating our businesses to a new jurisdiction if required.

6. Yes, all traffic is allowed.

7. We accept PayPal, Credit Cards, Bitcoin, Cash, and Money Orders. We keep user authentication and billing information on independent platforms. One platform is operated out of the United States of America and the other platform is operated out of Nevis. We offer the ability for the customer to permanently delete their payment information from our servers at any point. All customer data is automatically removed from our records shortly after the customer ceases being a paying member.

8. We recommend using OpenVPN if at all possible (available for Windows, Apple, Linux, iOS, Android) and it uses the AES-256-CBC algorithm for encryption.

Our Windows and Mac client incorporates IP and DNS leak protection which prevents DNS leaks and provides better protection than ordinary ‘kill-switches’. Our IP leak protection proactively keeps your IPv4 and IPv6 traffic from leaking to untrusted networks. This was one of the first features we discussed internally when we were developing our network, it is a necessity for any good VPN provider.

SlickVPN Scramble is available to all of our customer accounts. This feature provides an added level of privacy by obfuscating the OpenVPN headers allowing the customer to bypass Deep Packet Inspection (DPI). Using SlickVPN Scramble will allow users to access our network when VPN access is restricted by certain countries, universities, workplaces, or organizations. We also offer our HYDRA product, which utilizes revolutionary multi-hop, multi-destination connections to block anyone from tracking your online activities.

9. Yes. Our users are provided with a custom client, designed by our in-house engineers. Currently, the client works with Windows and Mac products. Our client does NOT store logs on customer computers by default. We also provide guides for every other platform.

10. Yes

11. We run a mix. We physically control some of our server locations where we have a heavier load. Other locations are hosted with third parties unless there is enough demand in that location to justify racking our own server setup. To ensure redundancy, we host with multiple providers in each location. We have server locations in over forty countries. In all cases, our network nodes load over our encrypted network stack and run from ramdisk. Anyone taking control of the server would have no usable data on the disk. We run an algorithm to randomly reboot each server on a regular basis so we can clear the ramdisk.

12. At SlickVPN we actually go through the expense of putting a physical server in each country that we list. There are: Australia, Austria, Belgium, Brazil, Bulgaria, Canada, Chile, China, Czech Republic, Denmark, France, Germany, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Israel, Italy, Japan, Latvia, Liechtenstein, Luxembourg, Macau, Malaysia, Netherlands, New Zealand, Norway, Panama, Poland, Portugal, Republic of Kosovo, Romania, Russian Federation, Singapore, South Africa, Spain, Sweden, Switzerland, Taiwan, Thailand, Turkey, Ukraine, United Kingdom and United States

SlickVPN website

Ipredator

ipredator1. No logs are retained that would allow the correlation of a user’s IP address to a VPN address. The session database does not include the origin IP address of the user. Once a connection has been terminated the session information is deleted from the session database.

2. The name of the company is PrivActually Ltd. which operates out of Cyprus.

3. We do not use any visitor tracking mechanism not even passive ones analyzing the webserver logs. Neither do we use a ticket system to manage support requests. We stick to a simple mail system and delete old data after 3 months from our mail boxes.

4. The staff forwards them to the BOFH. Notices sent via paper are usually converted into energy by combustion … to power the data center in the basement where the BOFH lives. Digital SPAM^WDMCA notices are looped back into the kernel to increase the VPNs /dev/random devices entropy.

5. We evaluate the request according to the legal framework set forth in the jurisdictions we operate in and react accordingly. We had multiple cases where somebody tried but did not succeed to identify active users on the system. Examples:

– A french company which sent lawyers to identify a whistle-blower.
– The Polish police which contacted us because somebody made a bomb threat in a bigger mall in Poland.
– The Russian oligarch state which tried to learn who was hosting a torrent website on the VPN.

All cases were resolved without disclosing the identities. Our general stance is that IF we are in a position where we would need to weigh common good vs. running the VPN service we would sacrifice the VPN service.

6. Besides filtering SMTP on port 25 we do not impose any restrictions on protocols our users can use on the VPN, quite the contrary. We believe our role is to provide a net-neutral internet access.

Every user is free to share his/her/its files. We are conservative people and firmly believe in the heritage of our society, which was built upon the free exchange of cultural knowledge. This new age patent system, and the idea that we need companies who milk creators are simply alien to us.

7. We offer PayPal, Bitcoins, Payza, and PaySon fully integrated. OkPay, Transferwise, WU, PerfectMoney, Webmoney, Amazon Giftcards, Cash and Credit Cards on request. An internal transaction ID is used to link payments to their payment processors. We do not store any other data about payments associated with the users account.

8. We provide up to date config files and enforce TLS1.2 for the control channel on all supported systems. For further protection we provide detailed setup instructions for our users. Besides the public and VPN internal DNS servers we also support DNSCrypt as a means to encrypt DNS requests. Howtos for kill switches are available as well. We do not enforce a particular client.

9. Not at the moment.

10. As stated in 8) we run both public and VPN internal DNS Servers and also support DNSCrypt.

11. We own our complete setup, network, and data center with everything in it – no 3rd parties are allowed access. We do not trust in 3rd parties operating our core infrastructure. More details are available here.

12. They are in Sweden due to the laws that allow us to run our service in a privacy protecting manner.

Ipredator website

IPVanish

ipvanish1. IPVanish is a no log VPN.

2. Mudhook Marketing, Inc. State of Florida

3. We use basic inbound marketing tools like Google Analytics, but we do not track user activities outside of our site. We also do not track the browsing activities of users who are logged into our VPN service.

4. We do not store, host, stream or provide any content, media, images or files that would be subject to a properly formed takedown notice.

5. First, any request has to be a valid and lawful request before we will even acknowledge the request. If the request is for user data or identification of a subscriber based on an IP address, we inform the agency making the request that we do not keep any logs and we operate in a Jurisdiction that does not require mandatory data retention. Sometimes, legal agencies or authorities may not be happy with this response. We politely remind them that IPVanish operates within the letter of the law and is a valid and needed service to protect the privacy of its subscribers.

6. Yes.

7. Bitcoin, PayPal and all major credit cards are accepted. Payments and service use are in no way linked.

8. We recommend OpenVPN with 256 bit AES as the most secure VPN connection and encryption algorithm.

IPVanish does have a Kill Switch feature that terminates all network traffic to prevent any DNS leaks in the event your VPN connection drops. We also have a user-enabled option that automatically changes your IP address randomly at selected time intervals.

9. Yes. iOS, Android, Windows and Mac. IPVanish is also configurable with DD-WRT and Tomato routers (pre-configured routers available), gaming consoles, Ubuntu and Chromebook.

10. Yes.

11. We own and have physical control over our entire operational infrastructure, including the servers. Unlike other VPN services, we actually own and operate a global IP network backbone optimized for VPN delivery which insures the fastest speeds of any VPN provider.

12. We have servers in over 60 countries including the US, Australia, United Kingdom, Canada and more. You can view the complete list on our servers page.

IPVanish website

Mullvad

VPN review1. No. This would make both us and our users more vulnerable so we certainly don’t. To make it harder to watch the activities of an IP address from the outside we also have many users share each address, both for IPv4 and IPv6.

2. Amagicom AB. Swedish.

3. We have no external elements at all on our website. We do use external email and encourage people sending us email to use PGP encryption, which is the only effective way to keep email somewhat private. The decrypted content is only available to us.

4. There is no such Swedish law that is applicable to us.

5. We get requests from governments from time to time. They never get any information about our users. We make sure not to store sensitive information that can be tied to publicly available information, so that we have nothing to give out. We believe it is not possible in Swedish law to construct a court order that would compel us to actually give out information about our users. Not that we would anyway. We started this service for political reasons and would rather discontinue it than having it work against its purpose.

6. Yes.

7. Bitcoin, cash (in the mail), bank transfers, and PayPal / credit cards.

8. OpenVPN (using the Mullvad client program).

Regarding crypto ideally we would recommend Ed25519 for certificates, Curve25519 for key exchange (ECDHE), and ChaCha20-Poly1305 for data streams but that suite isn’t supported by OpenVPN. We therefore recommend and by default use RSA-2048, D-H (DHE) and AES-256-CBC-SHA.

That said, cryptographic algorithms, key lengths etc are usually the strongest part of a system and hardly ever the right thing to focus on. It’s like worrying about whether to have a 128 mm or 256 mm thick steel door on a house with wooden walls and glass windows.

We provide a kill switch and DNS leak protection as well as IPv6 leak protection (and IPv6 tunneling).

9. Yes. Windows, Linux and OS X. The client program stores connection logs for the current and last time it ran on the its computer.

10. Yes.

11. We have a range of servers. On one end servers lovingly assembled and configured by us with ambitious physical security in data centers owned and operated by people we trust personally and whose ideology we like. On the other end rented hardware in big data centers. Which to use depends on the threat model and performance requirements.

12. Sweden, the Netherlands, USA, Germany and Canada.

Mullvad website

BlackVPN

VPN review1. No. We purge this information when the user disconnects from the VPN.

2. BLACKVPN LIMITED is registered company in Hong Kong and operates under the jurisdiction of Hong Kong.

3. We use StreamSend for sending generic welcome and renewal reminder emails, as well as for the occasional news updates. We have Facebook and Twitter widgets on our front page that may track visitors. We host our own website analytics, support system and live chat systems using open source tools.

4. We temporarily block the port on the VPN server listed in the notice.

5. If we received a valid court order from a Hong Kong court then we would be legally obliged to obey it. This has never happened yet.

6. It is only allowed on our Privacy VPN locations, due to stricter enforcement of these notices in the USA and UK.

7. PayPal, Bitcoin and PaymentWall (for Credit Cards and Bank Transfers). The transaction details (ID, time, amount, etc) are linked to each user account.

8. We always recommend OpenVPN and our VPN servers enforce AES-256-CBC encryption and use 4096 bit RSA and Diffie Hellman keys. The open source OpenVPN client can now be configured for DNS leak prevention and not to leak any traffic if VPN the connection drops. We package the Windows OpenVPN client pre-configured this way for our users, and we also package the OS X Tunnelblick app to prevent IP leaks too.

9. Android – currently in beta but almost ready for release. Only the connection log from the last connection is kept.

10. We proxy DNS queries to UncensoredDNS.org / CensurfriDNS.dk

11. We use dedicated servers which are hosted in 3rd party data centers.

12. USA, UK, Canada, Brazil, Netherlands, Switzerland, Luxembourg, Estonia, Lithuania, Romania, Russia, Ukraine, Singapore and Australia

BlackVPN website

IVPN

ivpn1. No, this is fundamental to the service we provide. It is also in our interests not to do so as it minimizes our own liability and is not required by law.

2. Privatus Limited, Gibraltar.

3. No. We made a strategic decision from day one that no company or customer data would ever be stored on 3rd party systems. Our customer support software, email, web analytics (Piwik), issue tracker, monitoring servers, code repo’s, configuration management servers etc. all run on our own dedicated servers that we setup, configure and manage. No 3rd parties have access to our servers or data.

4. Our legal department sends a reply stating that we do not store content on our servers and that our VPN servers act only as a conduit for data. In addition, we never store the IP addresses of customers connected to our network nor are we legally required to do so.

5. Firstly, this has never happened. However, if asked to identify a customer based on a timestamp and/or IP address then we would reply factually that we do not store this information, so we are unable to provide it. If they provide us with an email address and asked for the customer’s identity then we would reply that we do not store any personal data. If the company were served with a valid court order that did not breach the Data Protection Act 2004 we could only confirm that an email address was or was not associated with an active account at the time in question.

6. Yes, we don’t block BitTorrent or any other protocol on any of our servers. We do kindly request that our customers use non-USA based exit servers for P2P. Any company receiving a large number of DMCA notices is exposing themselves to legal action and our upstream providers have threatened to disconnect our servers in the past.

7. We accept Bitcoin, Cash, PayPal and credit cards. When using cash there is no link to a user account within our system. When using Bitcoin, we store the Bitcoin transaction ID in our system. If you wish to remain anonymous to IVPN you should take the necessary precautions when purchasing Bitcoin. When paying with PayPal or a credit card a token is stored that is used to process recurring payments. This information is deleted immediately when an account is terminated.

8. We provide RSA-4096 / AES-256 with OpenVPN, which we believe is more than secure enough for our customers’ needs. If you are the target of a state level adversary or other such well-funded body you should be far more concerned with increasing your general opsec than worrying about 2048 vs 4096 bit keys.

The IVPN client offers an advanced VPN firewall that blocks every type of IP leak possible (DNS, network failures, WebRTC STUN, IPv6 etc.). It also has an ‘always on’ mode that will be activated on boot before any process on the computer starts. This will ensure than no packets are ever able to leak outside of the VPN tunnel.

9. Yes, we offer a custom OpenVPN based client for Windows and OSX which includes our advanced VPN firewall that blocks every type of possible IP leak.

10. Yes, absolutely.

11. We use bare metal dedicated servers leased from 3rd party data centers in each country where we have a presence. We install each server using our own custom images and employ full disk encryption to ensure that if a server is ever seized it’s data is worthless. We also operate an exclusive multi-hop network allowing customers to choose an entry and exit server in different jurisdictions which would make the task of legally gaining access to servers at the same time significantly more difficult.

12. Iceland, Switzerland, Sweden, United Kingdom, Netherlands, Germany, Romania, France, Italy, Hong Kong, USA, Canada,

IVPN website

LiquidVPN

liquid1. No, we do not.

2. LiquidVPN Inc out of Wyoming, USA

3. We use Google Analytics with Anonymous IPs turned throughout the site. We use Facebook insights and Open Graph on our front end website to track our blogs impact on social media. We use Stripe as our credit card processor.

4. All datacenters in the USA require some response now. Some are just a simple checkbox, and others want a written reply. We have had to remove servers from several locations because of our zero log policy. We respect and abide by U.S. and EU copyright laws including the requirements of the DMCA and rely on our users to do the same. Because we do not log our users’ activities we are not able to identify users, that may be infringing the legal copyrights of others.

5. This has never happened. Depending on your payment method we limit the amount of personal data on file. So much so that if a user pays with Bitcoin it is just a first name and email address. If a valid court order comes in asking us to identify someone that is in our system, we would be required to provide that persons billing information. Even if it is just a transaction number, first name and email address.

6. Yes, they are.

7. We currently accept Credit cards, BTC, cash and PayPal. Billing and Authentication are separate. Recently we have completely overhauled our billing and authentication infrastructure to make use of SHA512 salted credentials that our billing system updates using encrypted tokens. Everything related to billing and user authentication that is sent “over the wire” is done so with the use of proxies on both sides that encrypt the data using 256 bit AES encryption and pass it to another proxy that turns it back into something our authentication network can process.

8. Well if you are concerned about your privacy then use our IP Modulation. Which changes a user’s public IP address several times during a single page load. It can sometimes break websites, so we recommend it only for that 1% of users.

We use AES-256-CBC, 4096 bit RSA keys and SHA512 auth. Currently, it is the best encryption OpenVPN supports natively. Our software comes with a tool called Liquid Lock which builds custom firewall rules using your Operating systems firewall to prevent DNS leaks, disconnect leaks, WebRTC leaks, IPv6 leaks and any other type of leak preventable with firewall rules.

9. Yes, we do. We have Windows, Mac and Android applications currently available. OSX and Linux are in production. Our client only keeps essential connection logs for the active session, once the session is disconnected the logs erase from memory.

10. Yes, they provide SMART DNS functionality for USA and UK content providers.

11. We have control over our network. Every server we own runs on either a custom compiled Gentoo kernel or RouterOS. We lease the hardware from tier 3 or higher datacenters all over the world. No one but us has access to these servers.

12. Currently, we have multiple USA and the Netherlands locations. We also have servers in Canada, the United Kingdom, Sweden, Germany, Romania, Singapore and Switzerland.

LiquidVPN website


SmartVPN

smartvpn
1. We don’t keep any kind of logs.

2. The company name is Anonymous SARL and operates under the jurisdiction of the Kingdom of Morocco.

3. We use Google Analytics and Tawk live support.

4. There is nothing to take down since we don’t host any files in the first place.

5. This has never happened before, but we won’t be able to cater their demand as we can’t identify that user within our system.

6. BitTorrent and other P2P protocols are allowed on all our servers.

7. We use BitPay ( BitCoins ), PayPal, HiPay.

8. We recommend OpenVPN for Desktop and IKEv2 for Mobile devices, As of the encryption we use AES-256-CBC algorithm. DNS leak protection is already enabled however “kill switches” will be available soon.

9. We provide custom VPN application for Mac and Windows-based on OpenVPN, and Mobile apps ( Android and iOS ) based on IKEv2. And again.. we do not keep any connections logs.

10. We use our own DNS servers.

11. We have a mix, physical control over most of our infrastructure and some exotic locations are hosted by 3rd party partners.

12. Germany, Netherlands, France, USA, Morocco, Russia, Canada, United Kingdom, Spain, Italy, Ukraine, Singapore, Brazil, Korea, Sydney, Ireland, Japan and Isle Of Man… And of course new servers/locations are added on a weekly basis.

SmartVPN website


PrivateVPN

VPN review1. We don’t keep ANY logs that allow us or a 3rd party to match an IP address and a time stamp to a user of our service. We value the privacy of our customers.

2. Privat Kommunikation Sverige AB and we operate under Swedish jurisdiction.

3. We use a service from Provide Support (ToS) for live support. They do not hold any information about the chat session. From Provide support: Chat conversation transcripts are not stored on Provide Support chat servers. They remain on the chat server for the duration of the chat session, then optionally sent by email according to the user account settings, and then destroyed. We’re also using Google Analytics and Statcounter for collecting static of how many visitors we have, popular pages and conversion of all ads. This data is used for optimization of the website and advertisement.

4. We do not store any kind of logs of our customers’ activity, which also will be informed.

5. Due to our policy of NOT keeping any logs, there is nothing to provide about users of our service. It has never happened.

6. Yes, we allow Torrent traffic. We buy high-capacity internet traffic so we can meet the demands. On some locations we use Tier1 IP transit providers for best speed and routing to other peers.

7. PayPal, Payson, Bitcoin. Every payment has an order number, which is linked to a user. Otherwise we wouldn’t know who has made a payment. To be clear, you can’t link a payment to an IP address you get from us or a user activity.

8. OpenVPN TUN with AES-256. On top is a 2048-bit DH key. For our Windows VPN client, we have a feature called “Connection guard”, which will close a selected program(s) if the connection drop. We have no tools for DNS leak but, best way, which is always 100%, is to change the local DNS on the device to DNS servers we provide. We’re working with a feature that doing this so the customer don’t need to change it manually for 100% protection.

9. Yes, for Windows. We’re working on a custom VPN application for Mac OS X also. Our VPN application, as all other VPN applications, stores a connection log local on the computer for troubleshooting purpose. This information is only stored locally and can’t be accessed by us or anyone else. The connection logs contains information about which VPN server the user is connecting to and any kind of errors.

10. We use a DNS from Censurfridns.

11. We have physical control over our servers and network in Sweden. All other servers and networks are hosted by ReTN, Kaia Global Networks, Leaseweb, Blix, Creanova, UK2, Fastweb, Server.lu, Selectel and Netrouting. We ONLY work with trusted providers.

12. Sweden, United States, Switzerland, Great Britain, France, Denmark, Luxembourg, Finland, Norway, Romania, Russia, Germany, Netherlands, Canada, Singapore, Australia, Spain, Italy, Poland and Ukraine. We’re still expanding our locations on customers’ demands.

PrivateVPN website

CryptoStorm

cryptostorm
1. Nope, no logs. We use OpenVPN with logs set to /dev/null, and we’ve even gone the extra mile by preventing client IPs from appearing in the temporary “status” logs using our patch available at https://cryptostorm.is/noip.diff.

2. We’re a decentralized project, with intentional separation of loosely-integrated project components. We own no intellectual property, patents, trademarks, or other such things that would require a corporate entity in which ownership could be enforced by the implied threat of State-backed violence; all our code is published and licensed opensource.

3. No, we don’t use any external visitor tracking or email providers..

4. Our choice is to reply to any such messages that are not obviously generated by automated (and quite likely illegal) spambots. In our replies, we ask for sufficient forensic data to ascertain whether the allegation has enough merit to warrant any further consideration. We have yet to receive such forensic data in response to such queries, despite many hundreds of such replies over the years.

5. See above. We have never received any valid court orders requesting the identity of a user, but if we ever did receive such a request, it would be impossible for us to comply as we keep no such information.

6. Yes, all traffic is allowed.

7. We accept PayPal and bitcoin via BitPay, although we will manually process any other altcoin if a customer wishes. We don’t have financial information connected in any way to the real-life identity of our network members; our token-based authentication system removes this systemic connection, and thus obviates any temptation to “squeeze” us for private data about network membership. We quite simply know nothing about anyone using our network… save for the fact that they have a non-expired (SHA512 hash of a) token when they connect. Also, we now process BitPay orders instantly in-browser, so we no longer require an email address for bitcoin orders.

8. We only support one cipher suite on-net. Offering “musical chairs” style cipher suite roulette is bad opsec, bad cryptography, and bad administrative practice. There is no need to support deprecated, weak, or known-broken suites in these network security models; unlike browser-based https/tls, there are no legacy client-side software suites that must be supported. As such, any excuse for deploying weak cipher suites is untenable. Everyone on cryptostorm receives equal and full security attention, including those using our free/capped service “Cryptofree”

There are no “kill switch” tools available today that actually work. We have tested them, and until we have developed tools that pass intensive forensic scrutiny at the NIC level, we will not claim to have such. Several in-house projects are in the works, but none are ready yet for public testing.

We take standard steps to encourage client-side computing environments to route DNS queries through our sessions when connected. However, we cannot control things such as router-based DNS queries, Teredo-based queries that slip out via IPv6, or unscrupulous application-layer queries to DNS resolvers that, while sent in-tunnel, nevertheless may be using arbitrary resolver addressing. Our Windows client attempts to prevent some of this, but it’s currently impossible to do so completely. We are saddened to see others who claim they have such “magical” tools; getting a “pass” from a handful of “DNS leak” websites is not the same as protecting all DNS query traffic. Those who fail to understand that are in need of remedial work on network architecture.

As we run our own mesh-based system of DNS resolvers, “deepDNS”, we have full and arbitrary control over all levels of DNS resolution presentation to third parties.

9. We offer an open source application written in Perl (dubbed the “CS widget”), source code available at https://github.com/cryptostorm/cstorm_widget/blob/master/client.pl. Currently only for Windows, but we are working on porting it to Linux. The application is essentially an OpenVPN GUI with some tweaks here and there to prevent different types of leaks (DNS, IPv6, etc.), and to make connecting as easy as possible. Output from the backend OpenVPN process is shown in the GUI. When you exit the program, that data is forgotten.

10. We have constructed a mesh-topology system of redundant, self-administered secure DNS resolvers which has been collected under the label of “deepDNS”. deepDNS is a full in-house mechanism that prevents any DNS related metadata from being tied to any particular customer. It also allows us to provide other useful features such as transparent .onion, .i2p, .p2p, etc. access. There is also DNSCrypt support on all deepDNS servers to help protect pre-connect DNS queries.

11. We deploy nodes in commodity datacenters that are themselves stripped of all customer data and thus disposable in the face of any potential attacks that may compromise integrity. We have in the past taken down such nodes based on an alert from onboard systems and offsite, independently maintained remote logs that confirmed a violation was taking place. It is important to note that such events do not explicitly require us to have physical control of the machine in question: we push nameserver updates, via our HAF (Hostname Assignment Framework) out via redundant, parallel channels to all connected members and by doing so we can take down any node on the network within less than 10 minutes of initial commit.

12. Our current server list (as of the beginning of 2016) are: Moldova, Switzerland, Canada, Portugal, Germany, Italy, France, England ans USA. Keep in mind that we are constantly adding new servers to this list.

CryptoStorm website

BolehVPN

bolehvpn1. No.

2. BV Internet Services Limited, Seychelles.

3. We use Zendesk and Zopim but will be weening this off. We generally delete Zendesk tickets older than 6 months. We are exploring moving to open source self hosted options (such as osticket) but feel that the user experience of such options are less than ideal. This is definitely an area that we are actively looking at with the revision of our customer portal that is underway. We have been using Google Analytics to gauge our conversions and where our customers are coming from but have removed this. E-mail is self hosted.

4. Generally we work with the providers to resolve the issue and we have never given up any of our customer information. Generally we terminate our relationship with the provider if this is not acceptable. Our US servers under DMCA jurisdiction or UK (European equivalent) have P2P locked down.

5. This has not happened yet but we do not keep any user logs so there is not much that can be provided especially if the payment is via an anonymous channel. One of our founders is a lawyer so such requests will be examined on its validity and will resist such requests if done without proper cause or legal backing. We also endeavor to keep our customers informed if there are any such requests. If we are prevented from doing so, we also maintain a PGP signed warrant canary which is updated in the first week of every month which will cease to be updated if we are required to log without informing our users. (http://bolehvpn.net/canary.html)

6. Yes, it is allowed except on those marked Surfing-Streaming and BolehGEO which are restricted either due to the provider’s policies or limited bandwidth.

7. We use MolPay, 2Checkout, Paypal, Coinbase (Bitcoin), Coinpayments (Dash and XEM) and direct deposits. On our system it is only marked the Invoice ID, the account it’s for, the method of payment and whether it’s paid or not. We however of course do not have control of what is stored with the payment providers.

8. Our Cloak configurations implement 256 bit AES and a SHA-512 HMAC combined with a scrambling obfuscation layer. We do have a lock down/kill switch feature and DNS leak protection.

9. Yes, for Windows and Mac OS X. There’s a basic user log with a very minimal verbosity level of 1 (where 0 is silent and 9 is most verbose) stored in log.txt in the installation folder. Users are free to delete this if they wish from time to time. They are mainly used for troubleshooting purposes.

10. Yes, we do use our own DNS servers.

11. Our servers are rented from server providers throughout the world with whom we have built a longstanding relationship. However we do retain full root access. We are not a white label reseller and control our own infrastructure. It is to be noted that our VPN service authenticates entirely using public key infrastructure (PKI) without the requirement to use a central authentication server. This means that there is no communication needed from our customer portal server to establish a valid VPN connection to our VPN servers meaning there is no central authentication point.

12. We have servers in Canada, France, Germany, Italy, Japan, Luxembourg, the Netherlands, Singapore, Switzerland, United Kingdom and United States.

BolehVPN website

Anonymizer

anonimizer1. Anonymizer does not log ANY traffic that traverses our system, ever. We do not maintain any logs that would allow you to match an IP-address and time stamp to a user of our service.

2. Our company is registered as Anonymizer Inc. Anonymizer Inc. operates under U.S. jurisdiction where there are no data retention laws.

3. Anonymizer uses a ticketing system for support, but does not request user verification unless it is needed specifically in support of a ticket. Anonymizer uses a bulk email service for email marketing, but does not store any details on the individual email address that would connect them to being an existing customer. Anonymizer uses Google Analytics and Google Adwords to support general marketing to new customers. Both of these tools do not store identifiable information on any unique customer or any way to identify a specific individual as a user of our service. We also actively ensure no link is created to from the data in either system to any specific customer following a trial or purchase of our product.

4. We can’t. We don’t monitor or log traffic. When we receive reports of abuse, we have no way to isolate or remediate it.

5. Anonymizer Inc. only responds to official valid court orders or subpoenas that comply with information we have available. Since we do not log any traffic that comes over our system, we have nothing to provide in response to requests associated to service use. If a user paid by credit card we can only confirm that they purchased access to our service. There is, and would be, no way to connect a specific user to specific traffic ever. There have been instances were we did receive valid court orders and followed our above procedures. In the 20 years of service we have never identified details about a customer’s traffic or activities.

6. All traffic is allowed on all of our servers.

7. Anonymizer Inc. uses a payment processor for our credit card payments. There is a record of the payment for the service and the billing information associated to the credit card confirming the service has been paid for. We also offer a cash payment option and will soon offer crypto-currency options i.e. Bitcoin. Cash payment options do not store any details.

8. We would recommend OpenVPN for a user that is looking for the most secure connection. We feel it is the most reliable and stable connection protocol currently. Our OpenVPN implementation uses AES-256. We also offer L2TP, which is IPSEC. Anonymizer’s client software has the option to enable a kill switch that prevents any web traffic from exiting your machine without going through the VPN.

9. We offer a custom VPN application for OSX and Windows. Our default application log only logs fatal errors that occur within the application which prevents the application from running.

10. Yes, we operate our own DNS servers.

11. We own ALL of our hardware, and have full physical control of our servers. No third party has access to our environment.

12. We have servers in the United States and Netherlands.

Anonymizer website

More VPN providers Without Logs

StrongVPN

VPN Land

OctaneVPN

ZorroVPN

Hide.me

AirVPN

HideIPVPN

OVPN

Perfect Privacy

Proxy.sh

VPNsecure

SecureVPN.to

Cryptostorm

Doublehop

NordVPN

VikingVPN

ShadeyouVPN

Ghostpath

VPN providers With Some Logs (max 7 days)

NolimitVPN

VPN Unlimited

Faceless

Ironsocket

Seed4.me

VPN providers who think they deserve a listing in this overview are welcome to get in touch.

Note: several of the providers listed in this article are TorrentFreak sponsors.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Dear Kanye: Please, Please, Please Sue The Pirate Bay

samedi 20 février 2016 à 11:59

yeezusIs Kanye West a genius, a lunatic, a megalomaniac, an egomanic, or an amalgamation of all four? That’s just one of the puzzles on the table this week following the launch of the new album by the self-styled “greatest artist of all time.”

For those just who’ve just returned to civilization following a week long trek to the Amazon basin, West launched his new album last Saturday. Then, following the genius decision to limit its availability only to those subscribing to Tidal, Life of Pablo was illegally downloaded, uploaded, torrented, streamed, swapped and exchanged all over the Internet, all week long, without West getting a cent.

Stop the press – did anyone really think that it wouldn’t?

Restricting the availability of the album reviewed by West himself as “one of the greatest” of all time was a move that probably made commercial sense somewhere along the line. After all, these industry people know what they’re doing, right? But isn’t artificial restriction and man-made shortages what caused piracy to boom in the first place?

What’s perhaps most frustrating about this entire episode is that the pirating masses had just begun to understand that music can be obtained legally, conveniently and at a reasonable price via services such as Spotify. Signing up for a fair monthly fee would rid of them of their piracy habits while rewarding creators, customers were told.

Then along came West, waving his self-important “exclusive” flag while shitting all over fans’ $10 and £10 per month subscriptions. Like a rich and perverted Oliver Twist (and without a billion forthcoming from Zuckerberg), West still wants more.

Look, West is a popular guy, no doubt about that. Even his most ridiculous of tweets (and there are plenty of them) get tens of thousands of positive reactions. Millions love his music too, that can’t be taken away from him. But apparently he’s now surprised and angry that his music is being pirated to heaven and back. Is he really that self-absorbed that he didn’t see this coming?

pablo-sq

With further Twitter rants now appearing tantalizingly on the horizon and about to put yet more icing on this considerably over-baked cake, Jesus West is now reportedly thinking of kicking some pirate ass by taking on the people behind The Pirate Bay.

“He’s going to talk to his lawyers and see where he stands, and hopefully Tidal will partner up with him in any legal proceedings because it was supposed to be an exclusive release,” a source revealed this week.

From a selfish perspective this is the best news, almost ever. The prospect of Kanye West spouting daily anti-Pirate Bay rhetoric on Twitter and in the media guarantees we’ll never be short of something to write. And if he can rope Kim in to say something controversial too, that would be beyond brilliant.

But most of all we should be pleased for The Pirate Bay. Since the raid in late 2014 things haven’t quite been the same on the PR front for the notorious site. There hasn’t been a lot in the way of provocative comments (certainly nothing involving retractable batons) and as a result they’ve been losing ground to a surging KickassTorrents who are now grabbing the limelight.

To be frank, an expensive lawsuit initiated by someone like Kanye West is just what The Pirate Bay needs. Then, every day when he says something dumb on Twitter, the millions of West fans who haven’t yet heard of The Pirate Bay can be introduced to the site, learn all about torrents, and tell Tidal to shove their subscriptions where the sun don’t shine.

Sadly, some will also use their new-found knowledge to tell Spotify to screw themselves too.

The point here is that this needless posturing over a single album has the potential to considerably damage people’s trust in legal services. Sure, Tidal will have benefited short term, but what West has done is shown fans that subscribing to just one service is not enough and that any point any ‘star’ can flick a switch and require them to pay out more money.

The uncomfortable truth here is that The Pirate Bay has never done that. Sure, the site gives nothing to creators and that will understandably sit poorly with some, but people know where they stand with the site. It is there, week in and week out, and it always costs nothing to use. There’s a reason it has tens of millions of users and West’s exclusive just gave the site yet more recruits. It’s insane.

What Kanye needs to know is that despite the mock begging in the title, suing The Pirate Bay would be the most stupid thing in the world. It didn’t work for Prince, it didn’t work for Michael Jackson. It even managed to make the Village People look like fools.

Kanye, the way you deal with The Pirate Bay is to stop giving fans a reason to go there. The notion of online exclusivity is so old fashioned it’s mind-bending. Easy access to all music for everyone at a fair price is what you should be aiming for – rant about that in a tweet when you get a minute.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.