Feeds

Survey: Only 1% of Torrents non-infringing

Study reveals uphill struggle for rights holders

Intelligent flash storage arrays

99 per cent of files accessed through a Torrent network are unlicensed copyright material, according to a survey by an American undergraduate.

Only 10 of the 1021 files in the survey could be distributed over the Mainline network without infringing copyright. The ten works licensed for distribution included two Linux distros, game pack add-ons and trial software. Only 1 of the 145 pornographic files was considered non-infringing, student Sauhard Sahi found.

(That must have been a chore to research. Isn't it great when students can set their own work assignments?)

The only surprise is that it's so low - can 1 per cent of Torrent material really be non-infringing? But remember that the survey counted files, not bytes transferred: so the complete works of Led Zepp or a bonus DVD counts as one file, as does one 20kb eBook or a pack of Photoshop plug-ins.

14 per cent of the files were smut, 46 per cent were files were non-pornographic movies and TV, 14 per cent were games and other software applications, and 10 per cent was music.

There are more details at the Centre for Information Technology Policy (CITP) blog, a facility that campaigns to limit and reduce creators rights, at Princeton, an expensive East Coast University.

Unlike other P2P applications, Bittorrent was not designed with copyright infringement in mind - it was written in 2002 as a method of distributing large popular files rapidly and efficiently. It's a pretty inefficient way of distributing less popular works and made no attempt to disguise the seeder or downloader from snoopers. Read our interview with Bram Cohen here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.