Feeds

BitTorrent embeds download manager

P2P that bypasses the PC

HP ProLiant Gen8: Integrated lifecycle automation

There are a lot of assumptions that have to be made about the news that BitTorrent has cut deals with three consumer electronic companies that will embed the BitTorrent download manager client directly into their devices. The devices include home routers and networked attached storage farms.

We assume that the old BitTorrent and the new BitTorrent don't speak to one another? Or do they? If they did, existing illegal BitTorrent tracker sites would still allow these new CE devices to work with illegal copying sites, even though BitTorrent the company would not be endorsing that.

When BitTorrent author Bram Cohen went legit last September and raised $8.75m in venture funding to develop commercial distribution tools for media companies, he foreswore the promotion of piracy, but by not articulating the detailed manner in which the company will block piracy using these devices, it suggests the door is half open at least.

It could be that these devices will only be set up to hit specific remote web locations to get information about where the "legal" swarms of data for copyrighted material live. But we're pretty sure that it would be easy to subvert that and use this version for piracy.

If the system now came with a filter, a piece of software that took a fingerprint of video and compared it with a database of signatures to establish that where it was copyrighted, a legitimate transaction took place to acquire it, then that might get around the problem.

The fact that the three CE firms are companies we've never heard of in Asus, Planex and QNAP, makes us worry that bigger companies are steering clear to ensure they are not tainted with even the faintest whiff of piracy, even if it is by people subverting the way these new devices are supposed to work.

But that doesn't stop the idea from being a good idea, bypassing the PC and going straight to a DVR or storage device with P2P. We'd just want to ensure that all CE equipment was a) set up with the same P2P system, and b) that it was one that had never been used to support piracy, for instance the system favoured by the BBC, AOL and BSkyB called Kontikki.

Cohen has been in several negotiations with studios to makes films available through his new service, and has had some success and announced a few deals, but more than a year since forming his venture, Cohen does not yet have a live film service. Can't say we're surprised.

Copyright © 2006, Faultline

Faultline is published by Rethink Research, a London-based publishing and consulting firm. This weekly newsletter is an assessment of the impact of the week's events in the world of digital media. Faultline is where media meets technology. Subscription details here.

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.