Feeds

Russian upstart claims BitTorrent-killer

‘Pirate Pay’ names Microsoft as investor

Using blade systems to cut costs and sharpen efficiencies

A team of Russian developers is touting a technology it says can kill off BitTorrent-based P2P file sharing – and says it has attracted investment from Microsoft.

According to a story in Russia Beyond the Headlines, the technology developed by Andrei Klimenko, his brother Alexei, and Dmitry Shuvaev has attracted $US100,000 from Microsoft’s seed investment fund, and another $US34,000 from the Bortnik Fund.

The company they have founded, called Pirate Pay, also claims to have conducted successful proof-of-concept tests, blocking “50,000” downloads of the movie Vysotsky: Thanks go God I’m Alive in the month after its release.

What’s not clear, either from the original story or the TorrentFreak follow-up, is exactly how the technology works. From the hints dropped by Andrei Klimenko, Pirate Pay operates what is essentially a BitTorrent-specific, cloud-based denial of service.

“We used a number of servers to make a connection to each and every p2p client that distributed this film,” Klimenko says of the technology test. “Then Pirate Pay sent specific traffic to confuse these clients about the real I.P. addresses of other clients and to make them disconnect from each other.” (Emphasis added).

If El Reg’s understanding of the service is accurate, then it would live in a legal grey area. For example, this explanation from the Australian Federal Police makes it clear that Australian law regards any denial-of-service as illegal, but “for a matter to fall within the jurisdiction of Australian police” both the attacker and target have to be in Australia. Anything else would need to invoke international co-operation, and that would assume that the attacking computer was somewhere amenable to such co-operation.

However, what’s also clear at least under laws familiar to El Reg is that computer crimes legislation doesn’t distinguish between “good” and “evil” DoS. It defines any “impairment of electronic communication to or from a computer” as breaking the law. ®

Boost IT visibility and business value

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.