Pirate bay court case

Nice website - looks very interesting - a little expensive but then the bandwidth will cost a lot the one TPB are looking to do is reported at costing around $5 so wait and see time I guess.



M.
 
Correct me if I'm wrong, but:

Even if you encrypt traffic on your line, you'll still appear on the tracker and therefore they'll still be able to contact your ISP to get your personal details as with previous cases?

Secondly, this VPN thing, I would assume these use different trackers to stop companies scraping the IPs from the tracker, but what's to stop them signing up to these trackers themselves?

I've had a quick search to see if I could find out a bit more about TPB's encryption and it seems they're just using SSL to get around Sweden's wiretapping rules, something we shouldn't be concerned about in this country; I'm not aware of any cases where people have had letters through after having traffic intercepted?

edit: forgot about how you'd appear on the tracker if you're using a VPN; I assume it'd be a bit like using TOR so they wouldn't be able to trace back to you, they'll just end up with an address from the VPN and your ISP obviously wouldn't have a clue what you were downloading as it's encrypted?
 
Last edited:
Nice website - looks very interesting - a little expensive but then the bandwidth will cost a lot the one TPB are looking to do is reported at costing around $5 so wait and see time I guess.

M.

If you purchase a yearly sub the cost is reduced to £8 a month which isn't so bad, I use this service because I trust the cto.

Surely if everything is encrypted, then it's obvious you're doing dodgy stuff?

It appears as normal https traffic, however your isp doesn't monitor traffic (apart from traffic shaping purposes), it just tracks urls/ip's visited, which it can't do when your only connecting to a proxy. Also, almost every vpn, even my uni vpn is encrypted, so it would not look suspicious.

edit: forgot about how you'd appear on the tracker if you're using a VPN; I assume it'd be a bit like using TOR so they wouldn't be able to trace back to you, they'll just end up with an address from the VPN and your ISP obviously wouldn't have a clue what you were downloading as it's encrypted?

Exactly, all someone would see from the backend is the ip the vpn has assigned to you and from the frontend some https traffic to and from the vpn server.
 
Last edited:
Surely if everything is encrypted, then it's obvious you're doing dodgy stuff?

Well, it depends. The ISP can still find out where the traffic is going/coming from and how much of it there is. If there's a 700MB download from a site soley hosting illegal CD ISOs then they've got pretty good circumstantial evidence, but no actual proof of what you downloaded.

There's a lot of perfectly legitimate reasons for encrypting traffic.

edit: I'm referring to non-VPN traffic here
 
Both, everything goes through the vpn.

www.cryptocloud.com

I am sorry but i have to laugh. I see no need for this for home use at all.

If all your doing is surfing the web and downloading no one in the government is really gonna care what you do.

Sorry to say, i do think you are wasting your time. Do you think its cool to say you route your net connection through a VPN?
 
Last edited:
I am sorry but i have to laugh. I see no need for this for home use at all.

If all your doing is surfing the web and downloading no one in the government is really gonna care what you do.

Well unless you download child porn... oh wait no, there's now "extreme porn", and the guy who published a story on the internet and was then later arrested for it, seems the government are interested in quite a number of things....

It's just prudence, I don't want anyone to be able to track me online, I value my privacy, and I don't want to be arrested for some dodgy image coming up in a google search or visiting an uncylopedia article. No doubt there will be a torrent of new laws in the future to invade our privacy, where they will arrested anyone who has a certain website in their isp history.

Sorry to say, i do think you are wasting your time. Do you think its cool to say you route your net connection through a VPN?

Yeah a vpn is so cool, only every person who goes to uni has access to one...
 
Last edited:
Correct me if I'm wrong, but:

Even if you encrypt traffic on your line, you'll still appear on the tracker and therefore they'll still be able to contact your ISP to get your personal details as with previous cases?

Secondly, this VPN thing, I would assume these use different trackers to stop companies scraping the IPs from the tracker, but what's to stop them signing up to these trackers themselves?

I've had a quick search to see if I could find out a bit more about TPB's encryption and it seems they're just using SSL to get around Sweden's wiretapping rules, something we shouldn't be concerned about in this country; I'm not aware of any cases where people have had letters through after having traffic intercepted?

edit: forgot about how you'd appear on the tracker if you're using a VPN; I assume it'd be a bit like using TOR so they wouldn't be able to trace back to you, they'll just end up with an address from the VPN and your ISP obviously wouldn't have a clue what you were downloading as it's encrypted?

Not quite - you see the IP you're presenting to the traffic will be cryptoclouds and not your own.

You have to imagine it like this:

Your PC <---> Cryptocloud <---> Dodgy Traffic

So the only traffic the ISP can monitor and do anything with is from:

Your PC <---> Crycptocloud

It does not know anything about the Dodgy Traffic. And because it's https wrapped they can't really do that much with it. To deep inspect it would kill the connection and be quite illegal without court orders. You also have to imagine that as it's https traffic it would be hard to traffic shape you could do it on a to and from and hope that works but then IP's change, etc.

As cryptocloud (from the websites description) uses encryption on both ends of the tunnel then it would be very hard to trace back it also depends on what cryptoclouds retention records are but I'm guessing they don't keep records or have a 24 hour policy for it to be viable.

Also from the websites description it doesnt look like they limit the traffic.




M.
 
I've read through the website but I can't find anything on bandwidth limitations, are there any?

It says unlimited, and I've never come across any limit.

As cryptocloud (from the websites description) uses encryption on both ends of the tunnel then it would be very hard to trace back it also depends on what cryptoclouds retention records are but I'm guessing they don't keep records or have a 24 hour policy for it to be viable.

This is their policy.

If you prefer, we are happy to work with you to pay for your CryptoCloud service with a 100% anonymous procedure: cashier's checks, etc. Not many customers ask for this service, but we've never said no to any procedure a customer suggested.

We don't store logs of your network activity whilst "in the Cloud." Ever. Yes, we mean that: we do not store logs of your network activity. We don't have a privacy policy regarding those records because we don't keep those records. Yes, sometimes less is more.

We do not sell or provide your customer information to anyone, ever. We are a 100% privately-owned company. We do not have a parent company. We are not owned by the CIA, NSA, or INTERPOL. We are happy to provide ample evidence of these assertions, if you would like to confirm them yourself via independent sources. Our business is entirely dependent on our public reputation for providing reliable, secure service to our customers - we will do nothing to jeopardize this, it benefits neither our company nor our customers.

If you cancel your CryptoCloud service, we wipe your account information - completely - after 10 days. This includes payment information, and contact information. If your payment method is having trouble during renewal, we'll do our best to let you know so that we can get it fixed. If we can't get ahold of you, we'll try for 14 days and then we'll delete your old information. Completely.

If a law enforcement agency with proven jurisdiction over our business comes to us with a valid order from a valid judicial authority that our own corporate lawyers are able to independently verify, we will comply with that order as written. Naturally, we can't provide information we don't store - such as network traffic logs. We cannot be compelled to provide what we do not have.

If a court orders us to close an account, we will do so. If a court orders us to allow them to secretly place surveillance "sniffers" on a specific account, we will fight this order to the highest judicial authority possible. If we lose, we will shut down the business and call it a day. End of story.
 
Last edited:
Poor TPB. Prison time for this, ouch. Then again they lasted longer than many others. And, hell they're still running it.
 
Is that ok then? It's fine to host illegal material as long as you take it down when asked? Because that's what mininova does, just wondering if it'll stop them going after them.

Yes, that's what the law is in the UK. If you are a host and a user uploads material to your site without lawful reason to do so, as long as you remove it when asked then no liability can be attached to you.
 
http://www.canadianmanufacturing.co...trol/article.jsp?content=20090417_160302_4912

Interesting reading..... TPB have been charged with breaking copyright laws by indexing the trackers of torrents.... but this is effectiely exactly the same thing as search engines do... does this set a presidence for any website that indexes torrent files or sites, or for that matter, anything illegal, to be shutdown? Interesting thought. TPB has always defended itself saying to doesnt host the illegal content, only point people to it... but this, it seems, is no longer a valid excuse....

Engage your brain: Sweedish law is not UK law, US law, French law, or any other country's law.
 
so how come if i type in the name of almost any game +.iso google takes me to hundreds of torrents, newsgroups and other ways of pirating that game?
This is because nobody's asked for them to be removed. Google fully comply with requests for stuff to be de-listed - in fact the IFPI have gone on record stating that they have someone full time getting as much stuff removed as possible. At a guess, I would say that IDSA/ESA aren't doing the same thing.
 
Back
Top Bottom