Saturday, July 25, 2020

TorrentFreak's Latest News

 

How 'Anonymous' is a Seedbox Provider?
Ernesto Van der Sar, 25 Jul 11:01 PM

anonymous cardBitTorrent is a public file-sharing protocol, which broadcasts IP-addresses of up- and downloaders to the public at large.

For some, this is a problem, so to prevent this from happening, people turn to third-party services such as VPNs, proxies, or cloud torrent downloaders.

While these services add an extra layer of protection, not all are anonymous. Many cloud torrent downloaders, for example, can still connect an IP-address and timestamp to a specific user or their service.

With this in mind, we wondered how this applies to seedboxes. While these services are not predominantly used as an anonymity tool, some believe that they are.

To find out whether this is indeed the case, we reached out to several of the largest seedbox providers with a set of relevant questions. The questions cover logging practices, responses to DMCA notices, and legal requests, among other things. The full set of questions is as follows:

1. Does your service collect any temporary or permanent data that can link a seedbox IP-address to a specific user on your service? If so, what information do you collect and how long is that stored?

2. Does your service store any personally identifiable information of users (including IP-addresses)? If so, what information do you store, and for how long?

3. Does your service store the names/hashes or other identifying information of (previously) downloaded content (stored on your servers) that can be connected with a specific user? If so, for how long?

4. Do you offer dedicated and/or shared IP addresses? When IP addresses are shared and you get a 'live' complaint from a third-party, is it possible for you to link an IP address to a 'live' torrent and related user account?

5. How does your service respond to DMCA notices or similar takedown requests?

6. Do you have a repeat infringer policy? If so, what does it entail?

7. Have you ever had a request to provide information on a specific user from a third-party and been able to do so?

8. In what circumstances do you comply with legal requests and what are you able to hand over?

While we contacted nearly a dozen seedbox providers, only two replied. This is rather disappointing, especially from companies that sometimes serve tens of thousands of customers.

Below are the responses from the two providers who were kind enough to answer: SonicBit and Rapidseedbox.

SonicBit

sonicbit1. We do store user IP addresses for any user using our seedbox to keep our service clean from dupe/ fake email accounts, invalid referral activity, etc. Information will be removed when a user requests to remove their account.

2. We do store user IPs when a user logs in and logs out, for user account security to check any invalid activity in their account. Information will be removed when a user requests to remove their account.

3. We do not store downloaded hashes.

4. We only offer shared seedbox IP address, but different seedbox instances. We can check the specific user for any torrent downloaded in their account even with a shared seedbox IP address.

5. We will respond to it promptly and seriously, check if the takedown request is valid, and then forward the DMCA notice to the user. If there is no response in three days, we will remove the content manually.

6. No.

7. Never.

8. We do comply with the legal requests and do our best to resolve any legal requests to keep our service clean.

RapidSeedbox

rapidseedbox1. A user is linked to a seedbox IP, at the time of usage. When the subscription is terminated, the whole seedbox is terminated as well.

2. We store the email, transaction history, last logged time and IP address in the client area. Users can request account/data deletion at any time. At times, we clear up dormant accounts to save resources.

3. No. On five out of six plans, the user gets a VPS with root access and has full control over the seedbox.

4. Each seedbox has a dedicated IP address. "Live" complaints are linked to an IP address/user.

5. Locating and deleting the data proactively, informing the user, and asking to not repeat.

6. Repeat infringers will get their services suspended and eventually terminated.

7. We refer people to our Terms of Service and encourage them to take responsibility for the activity and the content on their allocated seedbox.

8. See the answer to question 7.

—-

As the answers above show, seedboxes can be very useful. However, they are certainly not (always) anonymous.

If your seedbox provider isn't listed here we would encourage you to reach out to support, asking these same questions. We are happy to add responses to this article going forward if any more come in.

From: TF, for the latest news on copyright battles, piracy and more.

What is the Most Dangerous Pirate Content to Download?
Andy Maxwell, 25 Jul 12:59 PM

DangerOver the past couple of years, anti-piracy strategies have taken an interesting turn.

Where once people were asked to "think of the creators", they're now more likely to be told that visiting a pirate site is akin to Russian roulette and just a step away from digital doomsday.

If that strategy had worked, piracy would be a thing of the past. As things stand, most people simply ignore the scaremongering, instead preferring to employ a more measured response.

The concerning thing about these campaigns is that while anti-piracy groups have a job to do, they should consider how insincere the messages sound. Genuine concern would be accompanied by helpful advice to avoid trouble but that's never going to happen because user safety isn't the big issue here, reducing piracy is.

Not to say that any of this is fundamentally wrong. Business is business after all. But what is really interesting is that the companies making the most noise about supposed malware don't have a product through which it is easily spread.

Video formats used to shift movies, TV shows and live sports aren't known for delivering malware – software is – and software companies rarely if ever issue stark warnings about malicious payloads. All things considered, perhaps they should.

Downloading Software is Indeed Russian Roulette

While there are sites and forums containing curated material that has a much lower chance of infecting the user, the same cannot be said about many public torrent sites and similar platforms. If a site allows users to upload files and doesn't moderate uploads 24/7/365, there is a not insignificant chance that there will be viruses and malware ready to pounce.

The screenshot below was taken on The Pirate Bay on Wednesday. To novice users, there's little to arouse suspicion but for those who have been around for a while, this is a disaster zone.

TPB Virus

What we have here is a range of software and games that would've ordinarily appeared in isolation, scattered around TPB indexes. The reason they're here in one list is that they were all uploaded by the same user so, for illustration purposes, we grouped them together. They are not so easily noticed on the site itself when unsorted.

The Signs Aren't Hard to Spot – At Least With a Little Patience

There are many observations one can make just from the list above. The most obvious is that the uploads are all exactly the same size, meaning that whatever malware lies beneath is identical for all files. This is a big red flag that can be easily spotted by checking other uploads made by the same user as they tend to upload in bulk.

The second is the filesizes themselves. People who spread malware often like to get their poison out there as quickly as possible so the smaller the download, the more likely it is that inexperienced users will download the file. What is needed here, however, is a little bit of common sense and a pause for thought.

In the screenshot above, Song of Horror Complete Edition and Trine 4: The Nightmare Prince are not going to arrive in tiny 14MB packages. However, despite that obvious issue, more than 350 people had downloaded each 'game' at the time of checking. That's certainly not good for the users but it's fair to say that other problems are less easily spotted using the filesize rule.

Even in its official form, WinRAR is a very small download of just 3MB so given that the package being offered above supposedly contains a key generator too, a few extra megabytes isn't particularly shocking. However, the ridiculous thing here is that not only is it the most popular download on the list, but WinRAR is essentially free forever, downloadable from the official platform. And that version doesn't come with a virus either.

Downloads Don't Have to Be Small to Be Dangerous

One of the attractions for downloaders is that they can get expensive software for free. This includes copies of Windows, Microsoft Office and various top-tier Adobe products, to name a few. In many cases it's possible to seek out 'safe' copies of these tools on pirate sites but in reality, this is a game for the experienced – or the lucky.

Novice pirates can often download exactly what they wanted with little trouble but there are always risks and with limited knowledge to fall back on, they are not always apparent.

This problem is amplified among the often younger audiences seeking out pirated games and the associated cracks. With tunnel vision at the prospect of getting the latest AAA title for free, people take risks fueled by emotion and after a 50GB download, security isn't as high on the agenda as it should be.

Software and Games Are the Riskiest Content, Period

Unlike formats such as MP4 and MP3, which are widely used to distribute video and audio via pirate sites and require a third-party player to consume, executable files (.exe, for example) gain direct access to a user's computer. While this might take place to install a game or software application, it is trivial for this process to install viruses and malware.

Sure, users can take defensive measures such as having a decent up-to-date anti-virus and/or anti-malware tool activated but in some cases, pirate downloads actually instruct users to turn off their protection if the game/software doesn't install properly. This is often due to anti-virus tools detecting cracks as PUPs (Potentially Unwanted Program), thereby preventing them from running.

Fairly obviously, this also provides the perfect free-for-all environment to install something nasty as well or instead, turning the dream of expensive software or gaming heaven into an immediate security nightmare, thanks to the overly-trusting nature of the user.

It's Really a Question of Trade-Offs

There will be no shortage of readers who have never had a problem with pirated software/games and also some who simply believe they haven't. That being said, software and videogame piracy has always been a trade-off between saving money, avoiding DRM and, at least potentially, facing the prospect of machine that won't boot or worse still, stubbornly boots every time while doing its evil work.

Personally speaking, I'd rather use Open Office and GIMP than pirate copies of MS Office and Photoshop. When it comes to games, waiting a few months for a significantly cheaper price isn't a problem since there's no craving for the latest titles on launch. And for me, a free copy of Z-Zip is always preferred to a suspect copy of WinRAR downloaded from anywhere.

Then again, I absolutely must have my PC in perfect working order every single day and the risk of malware or viruses never trumps that. The bottom line is that if anyone needs a completely stress-free and risk-averse computing life, installing software from unvetted sources always has the potential to undermine that.

Of course, the technically skilled out there will be shouting that it's all really quite simple and malware is mostly easy to avoid and they would be right. However, balance that confidence against the years it's taken to amass the relevant knowledge and it's clear that a significant investment is involved.

For novices that don't have that time, open-source software and paying for something every now and again can be the cheaper and safer option.

From: TF, for the latest news on copyright battles, piracy and more.

 
 
Powered by Mad Mimi®A GoDaddy® company

No comments: