Feeds

The Pirate Bay cries foul over Pirate Bay copycats

Leeching proxies face leechers' wrath

Choosing a cloud hosting partner with confidence

Beware of unauthorised copies of The Pirate Bay, comes a warning from, er… The Pirate Bay. The Swedish site notorious for indexing unauthorised copies of music, films and books has found itself being copied, and it doesn't like it one bit.

On its blog, The Pirate Bay advises fans to use the authentic, original ThePirateBay and not some crummy rip-off.

What's happened is that several proxy sites have sprung up – in some cases using pirate bay domains – leeching off the original. Several of the copycats, including a proxy operating at thepiratebay.ee, inserted requests for payments into the unlicensed material indexed by TPB, which particularly enraged the Swedish Pirates.

"This site is a bad copy of other sites, like TPB, and it’s totally meaningless," The Pirate Bay told the blog TorrentFreak.

Supporters voiced their support of the great Swedish web innovators in their battle against the leechers:

"lats stick it to the man," urges one commenter, called 'Moooog'.

The proxies do indeed violate TPB's intellectual property in several ways. Passing off is a trademark violation, even if a trademark hasn't been registered. Using The Pirate Bay logo or font is a trademark violation, as is using the piratebay.ee domain. TPB hasn't called in the intellectual property lawyers – although it could clearly benefit from the strong legal protections available to it.

This isn't the first time that activists who campaign against strong intellectual property protection have discovered that strong intellectual property protection can actually be quite handy. Here's one marvellous example perpetrated by "a hateful right-wing tabloid that keeps finding new bottoms to scrape," in the inimitable prose of Cory Doctorow.

You could call it an education. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.