Feeds

BitTorrent to block links to pirate flicks

Deal with MPAA shows carrot works better than stick?

High performance access to file storage

BitTorrent creator Bram Cohen has agreed to strip links to pirate movies out of his bittorrent.com search engine - the outcome of talks between his company and the Motion Picture Ass. of America (MPAA).

"BitTorrent Inc. discourages the use of its technology for distributing films without a licence to do so," Cohen said in a statement. "As such, we are pleased to work with the film industry to remove unauthorised content from bittorrent.com's search engine."

The agreement is limited. It only applies to content owned by the MPAA's seven members, and clearly can't extend to any other search engine capable of listing BitTorrent files. It's also up to the MPAA's members to spot links to illegal copies of material they own, and to report the breach to BitTorrent.

Still, the move helps to distance BitTorrent the company and BitTorrent the software from the actions of its users. Cohen can always claim, should Hollywood ever raise the spectre of legal action against him, that his code has legitimate uses, and is thus protected by legal precedent from any illegal uses it may be put to.

Of course, P2P software companies Grokster and Streamcast used that same argument and were able to defeat the MPAA at both the District and the appeal court level in the US. The Supreme Court, however, ruled that they could be successfully sued if it could be shown they had promoted illegal usages.

Cohen's move makes it much harder to make such a claim against BitTorrent, and with the emphasis of the deal on movie industry being pro-active rather than BitTorrent policing its own network, it could be argued he's done very nicely out of the negotiations.

The deal also shows the MPAA in a better light, being apparently now more willing to work with technology companies than to simply sue first and ask questions later. ®

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Intel sees 'signs of improvement in the PC business' but earnings remain 'Meh...'
Prospects for the future, however, please Wall Street money men
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.