Feeds

EMusic to track Napster music swaps

Not a big deal now, but is the way of the future digital music biz

  • alert
  • submit to reddit

Security for virtualized datacentres

Internet music company EMusic has developed what it claims is a solution to the 'Napster problem' - the availability of unauthorised copies of songs on the MP3 sharing software companies' service.

EMusic's system monitors Napster traffic and if it detects one of the company's tracks - indicated by a watermark it is now stamping into all its downloads - sends a message to the user making the track(s) available. The message basically tells them to stop sharing the song or face being blocked by Napster.

Of course, the lynchpin here is Napster itself. It may well choose not to block the users at EMusic's request. Right now, the MP3 sharing company maintains its users are not infringing copyrights - it argues that by doing so without commercial motives, its users' actions are legal under US law. That said, if EMusic got stroppy and started firing off lawsuits, Napster might change its mind, as it did with Metallica.

In any case, there's nothing to stop alleged infringers logging on again under multiple user IDs. And it only applies to music offered by EMusic. The online distributor has some big names on its roster, but they all also offer music on CD, so there's nothing here to prevent discs being ripped and shared.

However, EMusic's system highlights one way music companies can monitor Napster usage and build up a record of their tracks' distribution for the purpose of collecting royalties. As such it provides an indication of the how music sharing systems, whether they're free to the user or subscription based may eventually work.

Once labels get out of their retail business model and into a rental or radio mind-set, you can imagine vast numbers of tracks being shared across Napster-style networks, all monitored by the labels who bill the sharing companies accordingly. That cost will be passed on to the user as a subscription fee, covered by advertising sales or both. Sharing services might even cut their costs by doing bulk distribution deals with specific labels. They might even bill downloading users directly on a 'buck a track' model.

In such a system, it makes no odds whether a track is legitimate or not - the labels and the artists still take their cut, the sharing companies have a viable business model, and users get access to all the music they want for little or no cost.

Once all this is ticking over nicely, everyone's happen and they'll all wonder why such a fuss was made over Napster back in 2000. ®

Related Stories

Full coverage: The Napster Controversy

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.