CSC 379 SUM2008:Week 2, Group 4: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
Line 1: Line 1:
==File Sharing Countermeasures==
==File Sharing Countermeasures==


Intro Here
Even before the days of the fall of Napster, file-sharing peer-to-peer (P2P) networks have been transferring copyrighted material.  File-sharing networks stemmed from the need for researchers and programmers to share and collaborate with others.  Peer-to-Peer file sharing is now associated with the illegal transferring of copyrighted material that included music, movies, and software. 
 
Most media companies do not have the means to defend against such actions.  In response to the huge amount of peer-to-peer activity, companies and services have emerged whose goal is to minimize the amount of copyrighted material.  Various countermeasures have been developed by these companies to prevent users from successfully obtaining material from these file-sharing networks.


===Example Countermeasure Methods===
===Example Countermeasure Methods===

Revision as of 23:29, 17 July 2008

File Sharing Countermeasures

Even before the days of the fall of Napster, file-sharing peer-to-peer (P2P) networks have been transferring copyrighted material. File-sharing networks stemmed from the need for researchers and programmers to share and collaborate with others. Peer-to-Peer file sharing is now associated with the illegal transferring of copyrighted material that included music, movies, and software.

Most media companies do not have the means to defend against such actions. In response to the huge amount of peer-to-peer activity, companies and services have emerged whose goal is to minimize the amount of copyrighted material. Various countermeasures have been developed by these companies to prevent users from successfully obtaining material from these file-sharing networks.

Example Countermeasure Methods

Juniper NetScreen

University Screening

MediaDefender

MediaDefender is a company with the sole purpose of providing clients with content protection against Peer to Peer networks. Their goal is to stop the illegal sharing of copyrighted content over these file sharing software programs. Clients for this service include music recording companies, movie publishing companies, and software companies.

The means by which MediaDefender protects the content of clients vary widely and are greatly debated. Publicly, MediaDefender is said to employ only non-invasive countermeasure to foil users of P2P file-sharing networks. Spoofing and Decoying are the two main ways MediaDefender blocks the sharing of copyrighted content. Decoying involves sending a barrage of fake media files to the P2P network, making it extremely hard for the users of the network to decide which file is the true media or just a fake put up by MediaDefender. Spoofing goes along with Decoying by making the file seem more popular than it actually is. This makes the legitimate files even harder to find.

There is controversy whether MediaDefender has used illegal means to block illegal users. Hackers have supposedly retrieved evidence that MediaDefender has used invasive means of foilings file-sharing users. In addition, it is suspected that they have been involved with Denial-Of-Service attacks on websites that distribute copyrighted content.

From an ethical standpoint, it is perfectly legitimate to foil users on a P2P network site in a non-invasive manner. Just as other users are able to post valid but copyrighted material, MediaDefender should be able to post invalid and fake material. However, if MediaDefender takes any means, especially illegal, to prevent copyrighted material from being shared; that is unethical.

Using invasive and illegal means to prevent illegal activity effectively nullifies the act of enforcing laws. it must also be noted that MediaDefender has never been legally convicted of using illegal means to spoof file-sharing activity.

Ethical Concerns

Do Not Remove Yet

Many strategies have been used to reduce sharing of copyrighted content on networks. Examine in detail the ethical considerations surrounding at least two of your choosing.