Torrents are so 200x, Usenet here I come!!!!!!!!!!!!!
Ha..ha..ha..ha....oh my god..
Torrents are so 200x, Usenet here I come!!!!!!!!!!!!!
Who do you use? Is it expensive? I see Giganews have their own VPN+Usenet service now for $30/month.
I'm pretty sure you have to give the encryption keys/passwords to police.
Simple solution, make copyright infringement a straight criminal matter and sentence in line with other property offences.
I'm pretty sure you have to give the encryption keys/passwords to police.
Simple solution? I think not.
Half the issue with copyright infringement is the burden of proof, and how hard it is to gain reliable proof. This is the same if it's civil or criminal.
It is somewhat easier for the state to gather information than for companies, not least because the state has their monopoly of force to use if necessary. Following up IP identification with a search warrant and requirement for the bill payer to identify the issue or be charged (as exists with driving offences) would be much better than the systems used now of dodgy tagged downloads and the like.
Personally, I'd rather see the Digital Economy bill be passed than what you are suggesting.
I'm not sure that's a price point that the media industry would be happy with. Personally I think micropayments is the way forward.
I'm confused, how did the 'Computer Forensic Officer' access the routers admin page? To my knowledge you need to first enter the password for the wireless access point before you can even attempt to access the router admin page. If the wireless access point is unsecured why bother snooping in the admin page?
What this tool does is detect whether a file/volume is encrypted or not. Clearly a 1gb file of random data is encrypted, you don't get files like that normally, what matters is proving it in a court of law, does a piece of software with a 10% false positive rate do that? It's also a defence to have forgotten the key, which would happen when you create many decoy files and don't record the password for them.
However with hidden volumes you admit the data is encrypted and provide a "false" key appearing compliant and as though you have nothing to hide, so the above is irrelevant, you do not wish to hide the fact the volume is encrypted.
You can change your posts as many times as you want. If an investigating officer asks to see encrypted data then you have to be able to give them access to it. Otherwise you're very probably going to go to jail.