BitTorrent is a peer-to-peer (p2p) file sharing protocol most commonly used for distributing large files over the Internet, and is estimated to account for some 35% of all Internet traffic. The protocol works initially when a file provider makes data available to the network by creating a BitTorrent (.torrent) file, which contains metadata about the file(s) to be shared and the tracker that coordinates its distribution. What essentially happens is that the file provider treats the file as a number of identically sized pieces and creates a checksum (used for detecting errors that may have been introduced during storage of the data) for each piece using a secure hash algorithm, which is then recorded in the .torrent file. This known as seeding, and enables others, peers, to connect and download the file. When a peer eventually receives the pieces, the checksum of each piece is compared to the recorded checksum to check that the piece is error-free by a BitTorrent client (a program that manages torrent downloads and uploads using the BitTorrent protocol). Once a peer has downloaded the file, it becomes available for other peers to download thus creating another seed for it. Depending on the number of seeds for a given file, this technology allows peers to download the file from multiple locations concurrently, exponentially increasing the likelihood of a successful download and significantly reducing the original distributor's hardware and bandwidth resource costs. In addition, the protocol provides redundancy against system problems and reduces dependence on the original distributor.
The Pirate Bay is a Swedish web service that indexes and tracks .torrent files. As such it provides a search engine to its database of .torrent files (not the actual files) and a BitTorrent tracker, which coordinates communication between peers attempting to download the payload of the torrents. The Pirate bay publicizes its tracker's URL, and the site's users then upload torrents to the index with the tracker's URL embedded in them, providing all the features necessary to initiate a download. That is, The Pirate Bay is no more responsible for the content hosted on its servers than a search engine like Google, which incidentally provides a far more comprehensive list of links to torrents hosted on virtually every one of the hundreds of BitTorrent trackers that exist. Please take note of this important fact, as it has been revisited a number of times during the actual trial.
International trade agreements, which have allowed consumers to buy their music across borders rather than accepting local prices on music based on the relative wealth of nations, rather than the actual value of the product, should not be forgotten either. Furthermore, the World Wide Web has become an omnipresent entity, allowing for cheap distribution of digital music, cutting out corporate music distributors, who, Roland argues, deal in trucks and CD covers rather than bytes and bandwidth. iTunes is a prime example: billions of songs are now purchased digitally, eliminating the need for the big labels' distribution networks. iTunes, by the way, has been very successful in competing with 'free', indicating that most consumers do not want to be criminals but consider the traditional model of the music market obsolete; not to mention that some music does not even become physically available in most countries, and ordering a CD from the United States adds the extra cost of customs tax. A quick read through the interviews on this site will reveal that the smaller acts with no international record deals look the other way when people download their music illegally because they would like to be heard by as many ears as possible and thus develop their careers and hopefully be able to embark on international tours, which, by the way, is what most bands make their money from. \"Merch and touring,\" has been the general consensus in our interviews when we have asked bands how they sustain themselves.
I'm not admitting to anything, but let's be honest, most of us download content on the Web from time to time. With copyright holders laying down the law more and more often, it can't hurt to do so with caution. And even if you aren't downloading copyrighted material, you still don't want companies snooping in on your online activities. So just how do you protect yourself when torrenting
This is the first and easiest line of defense for your downloading habits. When you torrent, your IP is shared with a number of other users who help you to finish the file by sending you pieces of it that they've already downloaded. In turn, you send them back the pieces you have, and everyone ends up with a completed file in the end. Copyright holders looking to get their lawsuit on might join a download and log the IPs of everyone they come in contact with. Once they have your IP, they can contact your ISP which will lead them right to you.
Public trackers, such as The Pirate Bay, are where these phony downloaders go to mine for IP addresses. Because these sites don't verify anyone's identity, and there are no restrictions on what downloads you can join, it's next to effortless for a company to jump in and grab some IPs. Now obviously, because popular torrents might have thousands of people connected to it at any time, the odds of them choosing your IP to go after is slim, but why take the risk
If you really can't scrounge up an invite to any of these private communities, the least you can do is check the files before you download. Almost every reputable torrent site has space for user comments on the download page. Always, always read these before putting any foreign files on your computer.
Not only is there the obvious and omnipresent virus threat, but some \"clever\" companies seed fake torrents holding tracking malware. Make sure to carefully scan the comments to see if anyone has found anything suspicious about the files, and if the torrent has no comments, it's probably your best bet just to avoid it.
This is probably the worst way to protect yourself, as it violates the \"community spirit\" of BitTorrent. But let's be honest, if it's between community spirit and a fat lawsuit, I'd rather err on the side of caution. Contrary to popular belief, corporations don't tend to target people downloading. They more often than not go after those uploading pieces of the file to others (seeding, in torrent terms). To avoid this, remove and delete the torrent from your system once the download is finished.
Say I create a torrent and only seed it for a short time and remove it from uTorrent. Can that torrent be traced back to me as the creator For instance, if I create it and lots of people download and reseed it and I remove it, is my IP still attached as the creator of the torrent
ALL torrent client programs have a upload / download (seed / leech) ratio and you should at the bare minimum have a 1.0 ; that means the (x)GB you downloaded to your pc has been matched by you sharing the same amount. Some people have low upload rates other people need upload but there is always down time - turn that feature on while you sleep.
Hey author.. You could also include the rather new service of cloud torrenting. A service will download your torrent for you, then you download it from them. So it will be no more than a browser download to your ISP; end result will look like you are downloading a big file. This middle man somehow is able to operate and keep you safe
I've been told that if one is accessing a torrent provider via a wireless connection to a public ISP (i.e. universities, coffee shop, some residential communities) rather than their own ISP, downloading and seeding will be tracked back to the wireless base, which has no way of knowing who is receiving the wireless signal... True 1e1e36bf2d