Feeds

Pirate Bay moves to the cloud to confound copyright cops

Police left with very little to seize

Application security programs and practises

The Pirate Bay went down for about five minutes on Tuesday night as the group retired almost all of its servers and shifted onto the cloud.

"So, first we ditched the trackers. Then we got rid of the torrents. Now? Now we've gotten rid of the servers. Slowly and steadily we are getting rid of our earthly form and ascending into the next stage, the cloud," the group said on its Facebook page.

"The cloud, or Brahman as the Hindus call it, is the All, surrounding everything. It is everywhere; immaterial, yet very real. If there is data, there is The Pirate Bay."

On a more down-to-earth level, the move has been prompted by concerns over recent rumors of another raid on the site's systems, the team told TorrentFreak. But there's also the sheer hassle of running the site's hardware systems. Earlier this month, The Pirate Bay was down for almost two days when a power distribution unit had to be sourced and installed at the site's hosting company.

The service is now hosted on virtual machines in two countries, using separate cloud networks, and it has the ability to switch to a new provider pretty much instantly as needed. Shifting to cloud providers will save time and money, help lock down user privacy, and should make The Pirate Bay pretty much unraidable, since the load balancer and transit routers are the only hardware that can be seized.

"If the police decide to raid us again there are no servers to take, just a transit router. If they follow the trail to the next country and find the load balancer, there is just a disk-less server there. In case they find out where the cloud provider is, all they can get are encrypted disk-images," the crew said.

"They have to be quick about it too, if the servers have been out of communication with the load balancer for 8 hours they automatically shut down. When the servers are booted up, access is only granted to those who have the encryption password."

Cloud providers will not know that they are hosting the site's virtual machines, as all the site's traffic will go through the diskless load balancer in RAM and will be encrypted before transmission. Since the load balancer is never in the same country as the cloud provider, there's no way for the cloud provider to monitor IP addresses or user data without breaking the encryption.

The move may also throw a bit of a wrench in plans by AT&T and other US network operators to implement a "six strikes and you're out" policy on piracy, which is due to take effect by the end of the year. Tracking IP addresses of Pirate Bay users is going to be key to the RIAA and MPAA's enforcement efforts, and that task looks to have become significantly harder with the latest Brahman bootstrapping. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.