Re: [p2pi] OT ? : Consultation on legislative options to address illicit P2P file-sharing

The 8472 <the8472@infinite-source.de> Thu, 18 September 2008 13:50 UTC

Return-Path: <p2pi-bounces@ietf.org>
X-Original-To: p2pi-archive@ietf.org
Delivered-To: ietfarch-p2pi-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 729333A6947; Thu, 18 Sep 2008 06:50:24 -0700 (PDT)
X-Original-To: p2pi@core3.amsl.com
Delivered-To: p2pi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 03E093A68E8 for <p2pi@core3.amsl.com>; Thu, 18 Sep 2008 06:50:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.042
X-Spam-Level:
X-Spam-Status: No, score=-1.042 tagged_above=-999 required=5 tests=[AWL=1.207, BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JCgeiGdsvMbG for <p2pi@core3.amsl.com>; Thu, 18 Sep 2008 06:50:17 -0700 (PDT)
Received: from mo-p00-ob.rzone.de (mo-p00-ob.rzone.de [81.169.146.162]) by core3.amsl.com (Postfix) with ESMTP id 06E1B3A68DE for <p2pi@ietf.org>; Thu, 18 Sep 2008 06:50:16 -0700 (PDT)
X-RZG-CLASS-ID: mo00
X-RZG-AUTH: :LW0Wek7mfO1Vkr5kPgWDvaJNkQpNEn8ylntakOISso1hE0McXW12o8AG24SD41nTjy5r2olXm/kLo8KOmA==
Received: from [192.168.1.78] (Mcb3e.m.pppool.de [89.49.203.62]) by post.webmailer.de (fruni mo11) (RZmta 17.4) with ESMTP id 001e2dk8IDX4Xm ; Thu, 18 Sep 2008 15:50:03 +0200 (MEST) (envelope-from: <the8472@infinite-source.de>)
Message-ID: <48D25C90.4020502@infinite-source.de>
Date: Thu, 18 Sep 2008 15:50:08 +0200
From: The 8472 <the8472@infinite-source.de>
User-Agent: Thunderbird 2.0.0.9 (Windows/20071031)
MIME-Version: 1.0
To: Marshall Eubanks <tme@multicasttech.com>
References: <835B846B-1014-4CEE-9BA3-644D207FC231@multicasttech.com>
In-Reply-To: <835B846B-1014-4CEE-9BA3-644D207FC231@multicasttech.com>
Cc: p2pi@ietf.org
Subject: Re: [p2pi] OT ? : Consultation on legislative options to address illicit P2P file-sharing
X-BeenThere: p2pi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: P2P Infrastructure Discussion <p2pi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/p2pi>
List-Post: <mailto:p2pi@ietf.org>
List-Help: <mailto:p2pi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
Sender: p2pi-bounces@ietf.org
Errors-To: p2pi-bounces@ietf.org

Well, from a technical perspective this is trivial, ISPs cannot 
distinguish illegal from legal content, assuming a minimal amount of 
encryption/obfuscation. The content industry could only tell the ISP 
"user XY is doing something illegal, do something about it" and the ISP 
would have to believe that without being able to verify it. Most 
regulation proposals we currently see are after-the-fact measures, i.e. 
disconnecting the user's internet connection after he has been 
identified and warned about illegal filesharing.
Not to mention that some ISPs have an interest in preventing illegal 
filesharing on their own as they offer VoD, streaming and similar 
services or are owned by media companies.


As far as i can see this concerns ALTO in that it should not reveal any 
information about the user and his sharing behavior as it would be a 
singinficant dis-incentive for adoption if any data could be used 
against the users. Another issue is that such schemes might drive 
illegal filesharing deeper underground, e.g. onto darknets which provide 
pseudonymity and plausible deniability at the cost of increased 
bandwidth consumption, another network overlay and data being bounced 
through random nodes, which is completely the opposite of what we want 
to achieve.

Experience shows that fighting filesharing only makes filesharing 
networks more resiliant against attacks.

Marshall Eubanks wrote:
> Please forgive me if this is off topic, but I thought it might be of  
> strong interest to some :
>
> http://www.berr.gov.uk/consultations/page47141.html
>
> Consultation on legislative options to address illicit P2P file-sharing
> Starting Date: 24-07-08
>
> Closing Date: 30-10-08
>
> This consultation is intended to set out and gather views on a  
> proposal for a co-regulatory approach that could be adopted in order  
> to facilitate and ensure co-operation between Internet Service  
> Providers (ISPs) and rights holders to address the problem of illicit  
> use of Peer-to-Peer (P2P) file-sharing technology to exchange unlawful  
> copies of copyright material. This takes forward Recommendation 39 of  
> the Gowers Review of Intellectual Property which addressed the issue  
> of illicit use of P2P. The consultation also identifies and seeks  
> views on other potential options and calls for evidence on issues  
> related to illicit use of P2P.
>
> Consultation Documents
> 	• Consultation on legislative options to address illicit peer-to-peer  
> (P2P) file-sharing (499KB)
> http://www.berr.gov.uk/files/file47139.pdf
> _______________________________________________
> p2pi mailing list
> p2pi@ietf.org
> https://www.ietf.org/mailman/listinfo/p2pi
>
>   

-- 
The 8472
independent developer for the Azureus Vuze Bittorrent client
_______________________________________________
p2pi mailing list
p2pi@ietf.org
https://www.ietf.org/mailman/listinfo/p2pi