Feeds

Russian upstart claims BitTorrent-killer

‘Pirate Pay’ names Microsoft as investor

Choosing a cloud hosting partner with confidence

A team of Russian developers is touting a technology it says can kill off BitTorrent-based P2P file sharing – and says it has attracted investment from Microsoft.

According to a story in Russia Beyond the Headlines, the technology developed by Andrei Klimenko, his brother Alexei, and Dmitry Shuvaev has attracted $US100,000 from Microsoft’s seed investment fund, and another $US34,000 from the Bortnik Fund.

The company they have founded, called Pirate Pay, also claims to have conducted successful proof-of-concept tests, blocking “50,000” downloads of the movie Vysotsky: Thanks go God I’m Alive in the month after its release.

What’s not clear, either from the original story or the TorrentFreak follow-up, is exactly how the technology works. From the hints dropped by Andrei Klimenko, Pirate Pay operates what is essentially a BitTorrent-specific, cloud-based denial of service.

“We used a number of servers to make a connection to each and every p2p client that distributed this film,” Klimenko says of the technology test. “Then Pirate Pay sent specific traffic to confuse these clients about the real I.P. addresses of other clients and to make them disconnect from each other.” (Emphasis added).

If El Reg’s understanding of the service is accurate, then it would live in a legal grey area. For example, this explanation from the Australian Federal Police makes it clear that Australian law regards any denial-of-service as illegal, but “for a matter to fall within the jurisdiction of Australian police” both the attacker and target have to be in Australia. Anything else would need to invoke international co-operation, and that would assume that the attacking computer was somewhere amenable to such co-operation.

However, what’s also clear at least under laws familiar to El Reg is that computer crimes legislation doesn’t distinguish between “good” and “evil” DoS. It defines any “impairment of electronic communication to or from a computer” as breaking the law. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.