Feeds

TorrentSpy filters pirated videos

Makes a hash of it

Security for virtualized datacentres

As TorrentSpy continues to fight a lawsuit by the Motion Picture Association of America (MPAA), founders of the popular video download site have announced a new filtering system that allows content owners to remove pirated material from the site’s search results.

The new filtering system, known as FileRights, automatically removes offending search links using a database of copyrighted works, CNET reports. Though the database is maintained by FileRights, the onus is on the content owners to keep it updated. Video search engine isoHunt, a TorrentSpy competitor, will also use the system.

”No longer will site by site DMCA affidavits be required for copyright owners to remove links to allegedly infringing files,” reads a statement from Justin Bunnell, a TorrentSpy founder and chief executive officer of FileRights. “ With FileRights, we used the community networking power of the web to automate and aggregate the entire copyright filtration process."

The MPAA filed suit against TorrentSpy in February of 2006, accusing the BitTorrent-based site of facilitating downloads of copyrighted material. The introduction of FileRights comes in the wake of a federal court ruling that ordered TorrentSpy to begin tracking its own users as a way of collecting evidence in the suit.

The court has since issued a stay of the order, and TorrentSpy plans to appeal. Yesterday, the Electronic Frontier Foundation, a privacy watchdog, filed an amicus brief with the court in support of the company.

According to the FileRights site, the new filtering service gives content owners the ability to upload “hash marks” that identify copyrighted works. The hashes are then used to automatically remove links to pirated material from video sites like TorrentSpy and isoHunt. It should be noted, however, that video files can be altered to avoid identification by hash marks.

The hope is that the filtering service will win TorrentSpy a few points with the court. But, considering that content owners must update the FileRights database and that the hash set-up is less-than-foolproof, it may not have much effect.

"It is difficult to evaluate from press reports if the filter is going to be effective or if it is merely a cosmetic gesture," says Ian Ballon, a California intellectual property lawyer and the author of Ecommerce and Internet Law: Treatise With Forms.

Napster tried a similar trick as it battled a lawsuit from the Recording Industry Association of American (RIAA), but the service was shut down by the courts until it could prove that it had removed all copyrighted material.®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
Keep that consumer browser tat away from our software says Oracle
Big Red decides it will only support Firefox's Extended Support Releases
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
TIBCO ponders new 'financial options', including sale or merger
Your challenge: find ways to satisfy shareholders of mid-sized enterprise software outfit
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.