Feeds

Russian upstart claims BitTorrent-killer

‘Pirate Pay’ names Microsoft as investor

Beginner's guide to SSL certificates

A team of Russian developers is touting a technology it says can kill off BitTorrent-based P2P file sharing – and says it has attracted investment from Microsoft.

According to a story in Russia Beyond the Headlines, the technology developed by Andrei Klimenko, his brother Alexei, and Dmitry Shuvaev has attracted $US100,000 from Microsoft’s seed investment fund, and another $US34,000 from the Bortnik Fund.

The company they have founded, called Pirate Pay, also claims to have conducted successful proof-of-concept tests, blocking “50,000” downloads of the movie Vysotsky: Thanks go God I’m Alive in the month after its release.

What’s not clear, either from the original story or the TorrentFreak follow-up, is exactly how the technology works. From the hints dropped by Andrei Klimenko, Pirate Pay operates what is essentially a BitTorrent-specific, cloud-based denial of service.

“We used a number of servers to make a connection to each and every p2p client that distributed this film,” Klimenko says of the technology test. “Then Pirate Pay sent specific traffic to confuse these clients about the real I.P. addresses of other clients and to make them disconnect from each other.” (Emphasis added).

If El Reg’s understanding of the service is accurate, then it would live in a legal grey area. For example, this explanation from the Australian Federal Police makes it clear that Australian law regards any denial-of-service as illegal, but “for a matter to fall within the jurisdiction of Australian police” both the attacker and target have to be in Australia. Anything else would need to invoke international co-operation, and that would assume that the attacking computer was somewhere amenable to such co-operation.

However, what’s also clear at least under laws familiar to El Reg is that computer crimes legislation doesn’t distinguish between “good” and “evil” DoS. It defines any “impairment of electronic communication to or from a computer” as breaking the law. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.