SlideShare a Scribd company logo
1 of 13
Case Study: interception of torrent 
traffic and what should we do about 
it 
Jelena Jovanović
Right to share and seek culture and knowledge 
“Everyone has the right to freedom of expression. 
This right shall include freedom to hold opinions 
and to receive and impart information and ideas 
without interference by public authority and 
regardless of frontiers.” 
(European Convention of Human Rights, article 10)
File-sharing is state of mind! 
Filesharing is not a side-effect of internet 
It changed the way we communicate 
NOT a crime!
Copyright regime
5 scenarios of obtaining 
user’s data
1. server seizure by the FBI
2. DMCA or LAW Agency sets up 
own torrent server and monitors 
who downloads content
3. They track our IP 
adresses
4. Providers on behalf of copyright 
holders perform continuous 
interception of user data
5. The execution of court 
decisions
Say no to copyright trolling!

More Related Content

What's hot

Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalGraham Smith
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age - Mark - Fullbright
 

What's hot (6)

Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Ict Legislation
Ict LegislationIct Legislation
Ict Legislation
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Blogging & Law
Blogging & LawBlogging & Law
Blogging & Law
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 

Viewers also liked

Lecture4(hydro)
Lecture4(hydro)Lecture4(hydro)
Lecture4(hydro)mltan4
 
Elint Interception & Analysis
Elint Interception & AnalysisElint Interception & Analysis
Elint Interception & AnalysisJim Jenkins
 
Interception and Depression Storage
Interception and Depression StorageInterception and Depression Storage
Interception and Depression StorageHannalee Perdez
 
Hydrology and irrigation engineering cel 303
Hydrology and irrigation engineering   cel 303Hydrology and irrigation engineering   cel 303
Hydrology and irrigation engineering cel 303Gaurav Mittal
 
Infiltration and runoff
Infiltration and runoffInfiltration and runoff
Infiltration and runoffMoudud Hasan
 
Geography AS Level full revision notes
Geography AS Level full revision notesGeography AS Level full revision notes
Geography AS Level full revision notesBrittany Farrant
 

Viewers also liked (8)

Lecture4(hydro)
Lecture4(hydro)Lecture4(hydro)
Lecture4(hydro)
 
Https interception
Https interceptionHttps interception
Https interception
 
Elint Interception & Analysis
Elint Interception & AnalysisElint Interception & Analysis
Elint Interception & Analysis
 
Interception and Depression Storage
Interception and Depression StorageInterception and Depression Storage
Interception and Depression Storage
 
Hydrology and irrigation engineering cel 303
Hydrology and irrigation engineering   cel 303Hydrology and irrigation engineering   cel 303
Hydrology and irrigation engineering cel 303
 
Infiltration and runoff
Infiltration and runoffInfiltration and runoff
Infiltration and runoff
 
Hydrology
HydrologyHydrology
Hydrology
 
Geography AS Level full revision notes
Geography AS Level full revision notesGeography AS Level full revision notes
Geography AS Level full revision notes
 

Similar to Interception of torrent traffic BalCCon2k14

Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessmentblogzilla
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright InfringementWCU_Becca
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet Emily Allbon
 
International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...USAID CEED II Project Moldova
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
PerspectivesmanageArt Bowker
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectiveJason Nathu
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11TeamOneI1MBA11
 
Privacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraPrivacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraJason Nathu
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi lawsbsookman
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 

Similar to Interception of torrent traffic BalCCon2k14 (20)

Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
Reboot11 Elvira Berlingieri
Reboot11 Elvira BerlingieriReboot11 Elvira Berlingieri
Reboot11 Elvira Berlingieri
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet
 
Cyber crime law
Cyber crime lawCyber crime law
Cyber crime law
 
Cyber crime law
Cyber crime lawCyber crime law
Cyber crime law
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
 
Privacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraPrivacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing Era
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
 
Digital law
Digital lawDigital law
Digital law
 

More from Jelena Jovanovic

Jelena jovanović - conference "Women in IT "
Jelena jovanović - conference "Women in IT "Jelena jovanović - conference "Women in IT "
Jelena jovanović - conference "Women in IT "Jelena Jovanovic
 
Leverage social media and start remixing politics
Leverage social media and start remixing politics Leverage social media and start remixing politics
Leverage social media and start remixing politics Jelena Jovanovic
 
East Weekend Fest aktivizam na webu
East Weekend Fest aktivizam na webuEast Weekend Fest aktivizam na webu
East Weekend Fest aktivizam na webuJelena Jovanovic
 
Elektronska trgovina, Ekonom:east magazin
Elektronska trgovina, Ekonom:east magazinElektronska trgovina, Ekonom:east magazin
Elektronska trgovina, Ekonom:east magazinJelena Jovanovic
 
Hype or Hope? The impact of digital media on journalism and development FoM...
Hype or Hope?  The impact of digital media on journalism and development  FoM...Hype or Hope?  The impact of digital media on journalism and development  FoM...
Hype or Hope? The impact of digital media on journalism and development FoM...Jelena Jovanovic
 
ABC New Media Summit 28. October 2011
ABC New Media Summit 28. October 2011ABC New Media Summit 28. October 2011
ABC New Media Summit 28. October 2011Jelena Jovanovic
 
Isporuči vrednost - Web Strategija 9
Isporuči vrednost - Web Strategija 9Isporuči vrednost - Web Strategija 9
Isporuči vrednost - Web Strategija 9Jelena Jovanovic
 
BizBuzz: eShopovi dobre i loše prakse
BizBuzz: eShopovi dobre i loše prakse BizBuzz: eShopovi dobre i loše prakse
BizBuzz: eShopovi dobre i loše prakse Jelena Jovanovic
 
Na dorucku sa Silikonskom dolinom 2
Na dorucku sa Silikonskom dolinom 2Na dorucku sa Silikonskom dolinom 2
Na dorucku sa Silikonskom dolinom 2Jelena Jovanovic
 
Na dorucku sa Silikonskom 1
Na dorucku sa Silikonskom 1Na dorucku sa Silikonskom 1
Na dorucku sa Silikonskom 1Jelena Jovanovic
 
Internet advertising je stanje svesti
Internet advertising je stanje svesti Internet advertising je stanje svesti
Internet advertising je stanje svesti Jelena Jovanovic
 
Kako Etarget pomaže PR menadžerima (PR 2.0)
Kako Etarget pomaže PR menadžerima (PR 2.0)Kako Etarget pomaže PR menadžerima (PR 2.0)
Kako Etarget pomaže PR menadžerima (PR 2.0)Jelena Jovanovic
 
Hakovanje Demokratije u XXX koraka
Hakovanje Demokratije u XXX korakaHakovanje Demokratije u XXX koraka
Hakovanje Demokratije u XXX korakaJelena Jovanovic
 
Blogeri u potrazi za Svetim Gralom - BLOGOPEN 2009
Blogeri u potrazi za Svetim Gralom - BLOGOPEN 2009Blogeri u potrazi za Svetim Gralom - BLOGOPEN 2009
Blogeri u potrazi za Svetim Gralom - BLOGOPEN 2009Jelena Jovanovic
 
New Challenges For Journalists
New Challenges For JournalistsNew Challenges For Journalists
New Challenges For JournalistsJelena Jovanovic
 

More from Jelena Jovanovic (17)

Jelena jovanović - conference "Women in IT "
Jelena jovanović - conference "Women in IT "Jelena jovanović - conference "Women in IT "
Jelena jovanović - conference "Women in IT "
 
Cyberpunk PR
Cyberpunk PRCyberpunk PR
Cyberpunk PR
 
Leverage social media and start remixing politics
Leverage social media and start remixing politics Leverage social media and start remixing politics
Leverage social media and start remixing politics
 
East Weekend Fest aktivizam na webu
East Weekend Fest aktivizam na webuEast Weekend Fest aktivizam na webu
East Weekend Fest aktivizam na webu
 
Elektronska trgovina, Ekonom:east magazin
Elektronska trgovina, Ekonom:east magazinElektronska trgovina, Ekonom:east magazin
Elektronska trgovina, Ekonom:east magazin
 
Hype or Hope? The impact of digital media on journalism and development FoM...
Hype or Hope?  The impact of digital media on journalism and development  FoM...Hype or Hope?  The impact of digital media on journalism and development  FoM...
Hype or Hope? The impact of digital media on journalism and development FoM...
 
ABC New Media Summit 28. October 2011
ABC New Media Summit 28. October 2011ABC New Media Summit 28. October 2011
ABC New Media Summit 28. October 2011
 
Isporuči vrednost - Web Strategija 9
Isporuči vrednost - Web Strategija 9Isporuči vrednost - Web Strategija 9
Isporuči vrednost - Web Strategija 9
 
BizBuzz: eShopovi dobre i loše prakse
BizBuzz: eShopovi dobre i loše prakse BizBuzz: eShopovi dobre i loše prakse
BizBuzz: eShopovi dobre i loše prakse
 
Ars Electronica
Ars ElectronicaArs Electronica
Ars Electronica
 
Na dorucku sa Silikonskom dolinom 2
Na dorucku sa Silikonskom dolinom 2Na dorucku sa Silikonskom dolinom 2
Na dorucku sa Silikonskom dolinom 2
 
Na dorucku sa Silikonskom 1
Na dorucku sa Silikonskom 1Na dorucku sa Silikonskom 1
Na dorucku sa Silikonskom 1
 
Internet advertising je stanje svesti
Internet advertising je stanje svesti Internet advertising je stanje svesti
Internet advertising je stanje svesti
 
Kako Etarget pomaže PR menadžerima (PR 2.0)
Kako Etarget pomaže PR menadžerima (PR 2.0)Kako Etarget pomaže PR menadžerima (PR 2.0)
Kako Etarget pomaže PR menadžerima (PR 2.0)
 
Hakovanje Demokratije u XXX koraka
Hakovanje Demokratije u XXX korakaHakovanje Demokratije u XXX koraka
Hakovanje Demokratije u XXX koraka
 
Blogeri u potrazi za Svetim Gralom - BLOGOPEN 2009
Blogeri u potrazi za Svetim Gralom - BLOGOPEN 2009Blogeri u potrazi za Svetim Gralom - BLOGOPEN 2009
Blogeri u potrazi za Svetim Gralom - BLOGOPEN 2009
 
New Challenges For Journalists
New Challenges For JournalistsNew Challenges For Journalists
New Challenges For Journalists
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Interception of torrent traffic BalCCon2k14

  • 1. Case Study: interception of torrent traffic and what should we do about it Jelena Jovanović
  • 2. Right to share and seek culture and knowledge “Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers.” (European Convention of Human Rights, article 10)
  • 3. File-sharing is state of mind! Filesharing is not a side-effect of internet It changed the way we communicate NOT a crime!
  • 5. 5 scenarios of obtaining user’s data
  • 6. 1. server seizure by the FBI
  • 7. 2. DMCA or LAW Agency sets up own torrent server and monitors who downloads content
  • 8. 3. They track our IP adresses
  • 9. 4. Providers on behalf of copyright holders perform continuous interception of user data
  • 10. 5. The execution of court decisions
  • 11.
  • 12.
  • 13. Say no to copyright trolling!

Editor's Notes

  1. Same as tracking! This has already been explained in previous published text as completely illegal behavior that constituted a number of criminal acts by the ISP Jeva, and copyright holders. Violation of Terms of Service, user’s privacy, and last, but not the least, what torrent companies can gain? SOME THINGS CANT BE UNBROKEN. The only stake holder that matters on the Internet is the people who use it. Other ways - new letter asking for movie on smartphone DLed 12 months before. Deep packet inspection or what? You tell me.
  2. 5 The execution of court decisions This is the only fully legal way to get the information about users. The Court, on the basis of its authority and discretionary assessment, requires the collection of evidence in criminal and civil proceedings. However, to obtain a court decision at the request of the copyright holder, the previously (or within 30 days of the issuance of the order) must file a lawsuit and sue the user for copyright infringement (Articles 211 and 212 of the Law on Copyright and related Rights). . Izvršenjem odluke suda Ovo je jedini potpuno legalan način da se dođe do podataka o korisnicima. Sud, na osnovu svojih ovlašćenja i diskrecione procene, nalaže prikupljanje dokaza u krivičnom ali i parničnom postupku. Međutim, da bi se dobila odluka suda na zahtev nosioca autorskog prava, ovaj prethodno (ili najkasnije u roku od 30 dana od izdavanja naloga) mora pokrenuti parnicu, odnosno tužiti korisnika zbog kršenja autorskih prava (članovi 211. i 212. Zakona o autorskom i srodnim pravima).
  3. The case sparked aninvestigation into how ISPs are handling our private data!!! The Commissioner for Information of Public Importance and Personal Data Protection plans on monitoring the implementation of the provisions of the Law on Personal Data Protection among electronic communications operators, especially the mobile telephony operators and internet providers. http://www.poverenik.rs/en/activities/1550-uskoro-nadzor-nad-operatorima.html
  4. The company recently demanded a 600 euros settlement from a Finnish Tor exit-node operator, who also happens to be the Vice-President of a local Pirate Party branch. Faced with the growing threat of online file-sharing, Hustler committed to “turning piracy into profit” several years ago. The company has not been very active on this front in the United States, but more so in Europe. In Finland for example Hustler is sending out settlement demands for hundreds of euros to alleged pirates. A few days ago one of these letters arrived at the doorstep of Sebastian Mäki, identifying the IP-address through which he offers a Tor exit-node. The letter is sent by lawfirm Hedman Partners who urge Mäki to pay 600 euros ($800) in damages or face worse. However, Mäki has no intention to pay up. Besides running a Tor exit-node and an open wireless network through the connection, he also happens to be Vice-President of a local Pirate Party branch. As such, he has a decent knowledge of how to counter these threats. link: http://semantics.sebastianmaki.fi/2014/08/an-open-letter-is-copyright-trolling.html
  5. link: http://semantics.sebastianmaki.fi/2014/08/an-open-letter-is-copyright-trolling.html