Wednesday, February 28, 2024

TorrentFreak's Latest News

 

Video of New 'Masters of the Air' Episode Leaks on Pirate Sites
Ernesto Van der Sar, 28 Feb 12:12 PM

motaOver the years, plenty of TV show episodes have leaked online in advance of their official release.

Game of Thrones had several prominent episodes come out early, sometimes several at once, and successor 'House of the Dragon' saw the season finale debut early.

In most cases, these leaks are broadly advertised by the pirate groups who put them online. Being the first to release a prominent leak, is a key accolade in a business where everything revolves around releasing new content faster than others.

'Masters of the Air' Leak

As one of the hit shows of the year, the Apple TV+ series "Masters of the Air" is a key target of pirate groups. However, the leaked episode that appeared a few hours ago wasn't advertised as such.

Information received by TorrentFreak confirms that pirated copies of the latest episode of Apple's series "The New Look" are not what they seem. Instead, these early pirated copies of 'The New Look S01E05' include the video track of an unreleased episode of another series.

These erroneous releases include video from the eighth episode of "Masters of the Air," which is set to be released on March 8. The audio track, however, is from "The New Look", which likely makes it a confusing watch.

There are rumors that there are also full copies available, including the leaked audio track, but we could not confirm those.

Leaked video (click for unblurred version)

mastblur

It's not clear how this 'mistake' came about, but it seems likely that Apple or another party accidentally put the wrong video online. This error was fixed as soon as the issue was noticed, but not before pirate groups grabbed their copies.

While some pirate release groups are eager to get leaks out to the public, the content of the release amounts to an unintentional Apple mashup and an unwatchable episode. There are subtitles available on some releases, but they're from "The New Look."

Many release groups were swift to fix the unusual error and released "repacks" to fix the earlier mistake. These updated releases include the correct video track, removing the inadvertent "Masters of the Air" leak. Some added comments further corroborate the error.

"Apple fucked up and put up the video for masters of the air episode 8," we read in one of the notes that comes with a repack release.

repack

Even if the leak was a full copy, one can only wonder how welcome it would be. The seventh episode of "Masters of the Air" is scheduled to be released this Friday and true fans typically like to follow the chronological storyline.

We reached out to Apple for a comment on the accidental leak but the company didn't immediately reply.

From: TF, for the latest news on copyright battles, piracy and more.

OpenAI: 'The New York Times Paid Someone to Hack Us'
Ernesto Van der Sar, 27 Feb 04:15 PM

openai logoIn recent months, rightsholders of all ilks have filed lawsuits against companies that develop AI models.

The list includes record labels, individual authors, visual artists, and more recently the New York Times. These rightsholders all object to the presumed use of their work without proper compensation.

A few hours ago, OpenAI responded to The New York Times complaint, asking the federal court to dismiss several key claims. Not just that, the defendants fire back with some rather damning allegations of their own.

OpenAI's motion directly challenges the Times's journalistic values, putting the company's truthfulness in doubt. The notion that ChatGPT can be used as a substitute for a newspaper subscription is overblown, they counter.

"In the real world, people do not use ChatGPT or any other OpenAI product for that purpose. Nor could they. In the ordinary course, one cannot use ChatGPT to serve up Times articles at will," the motion to dismiss reads.

'NYT Paid Someone to Hack OpenAI'?

In its complaint, the Times did show evidence that OpenAI's GPT-4 model was able to supposedly generate several paragraphs that matched content from its articles. However, that is not the full truth, OpenAI notes, suggesting that the newspaper crossed a line by hacking OpenAI products.

"The allegations in the Times's complaint do not meet its famously rigorous journalistic standards. The truth, which will come out in the course of this case, is that the Times paid someone to hack OpenAI's products," the motion to dismiss explains.

nyt hacked

OpenAI believes that it took tens of thousands of attempts to get ChatGPT to produce the controversial output that's the basis of this lawsuit. This is not how normal people interact with its service, it notes.

It also shared some additional details on how this alleged 'hack' was carried out by this third-party.

"They were able to do so only by targeting and exploiting a bug […] by using deceptive prompts that blatantly violate OpenAI's terms of use. And even then, they had to feed the tool portions of the very articles they sought to elicit verbatim passages of, virtually all of which already appear on multiple public websites."

'Hired Guns Don't Stop Evolving Technology'

The OpenAI defendants continue their motion to dismiss by noting that AI is yet another technical evolution that will change the world, including journalism. It points out that several publishers openly support this progress.

For example, OpenAI has signed partnerships with other prominent news industry outlets including the Associated Press and Axel Springer. Smaller journalistic outlets are on board as well, and some plan to use AI-innovations to their benefit.

The Times doesn't have any agreements and uses this lawsuit to get proper compensation for the use of its work. However, OpenAI notes that the suggestion that its activities threaten journalism is overblown, or even fiction.

"The Times's suggestion that the contrived attacks of its hired gun show that the Fourth Estate is somehow imperiled by this technology is pure fiction. So too is its implication that the public en masse might mimic its agent's aberrant activity," the defense writes.

Fair Use

None of the allegations above address the copyright infringement allegations directly. However, OpenAI stresses that its use of third-party texts should fall under fair use. That applies to this case, and also to many other AI-related lawsuits, it argues.

This fair use defense has yet to be tested in court and will in great part determine the future of OpenAI and other AI technologies going forward.

To make its point, OpenAI aptly compares its use of third-party works in the journalistic realm. Newspapers, for example, are allowed to report on stories that are investigated and first reported by other journalists, as the Times regularly does.

"Established copyright doctrine will dictate that the Times cannot prevent AI models from acquiring knowledge about facts, any more than another news organization can prevent the Times itself from re-reporting stories it had no role in investigating," OpenAI writes.

The fair use defense will eventually be argued in detail when the case is heard on its merits. With the current motion to dismiss, OpenAI merely aims to limit the scope of the case.

Among other things, the defense argues that several of the copyright allegations are time-barred. In addition, the DMCA claim, the misappropriation claim, and the contributory infringement claim either fail or fall short.

Note: An earlier version of the article mistakenly mentioned Microsoft in relation to this motion. While the company is a defendant together with OpenAI, it is NOT part of this motion to dismiss.

A copy of OpenAI's motion to dismiss is available here (pdf). TorrentFreak broke this story, but other journalists are welcome to use it. A link would be much appreciated, of course, but we won't sue anyone over it

TorrentFreak asked the Times for a response to the 'hack' allegations but the company didn't immediately respond.

From: TF, for the latest news on copyright battles, piracy and more.

ISPs Request Records to Show How Piracy Fight Blocked Legitimate Sites
Andy Maxwell, 27 Feb 01:13 PM

italy-blackoutWhen attempting to block pirated content online, there is always a significant risk that legitimate content will be blocked too.

Proponents of a tough new law in Italy that granted significant powers to rapidly block sites, waved away such concerns last year. However, after less than a month in full operation, the Piracy Shield system made its biggest blunder thus far last Saturday. Rather than opt for a surgical strike, someone rolled out a blunderbuss.

It Could Never Happen…

IP address 188.114.97.7 belongs to Cloudflare and is used by many sites, including legitimate ones, so shouldn't have been targeted at all. However, when that IP was blocked by Italy's ISPs, under orders of telecoms regulator AGCOM, just 15 minutes later the effect was significant.

RIP-188.114.97.7

From people whose innocent sites were rendered inaccessible, to networking experts, ISPs, and regular Italian internet users, all want to know why this happened, why it was allowed to happen, and how something similar will be prevented moving forward.

As far as we're aware, no official comments from AGCOM, rightsholders, or indeed anyone responsible for the blunder have even mentioned it in public, let alone that they provided an explanation.

ASSOProvider Files Access to Information Request

In a letter dated Monday seen by TorrentFreak, independent ISP association ASSOProvider calls on AGCOM to grant access to information under relevant law.

"According to these resolutions, anyone with a personal and concrete interest in the protection of legally relevant situations may exercise the right of access to documents held by the Authority by sending a written and reasoned request. The person in charge of the procedure shall do so within 30 days and inform the Council," the letter reads.

To illustrate the association's legitimate interest, the letter lays out ASSOProvider's participation in working groups related to the law introduced last year, and the legal appeal it subsequently filed to protest its site-blocking provisions. The association further notes that its own members are impacted by the actions of the Piracy Shield system since they're required to use it.

"As of February 1, 2024, the Piracy Shield platform for combating piracy is active. Moreover, among ASSOprovider's Associates, there are providers affected by the activities put in place by the Piracy Shield platform as they are members of the same platform, and also in this way the Association makes this petition," the letter continues.

Legitimate Request For Data Relating to Two Events

ASSOProvider's request seeks data connected to two reported overblocking events. The first, against IP addresses belonging to Zenlayer CDN, with the second relating to last weekend's blocking of the Cloudflare IP address. Since there have been suggestions that ISPs could find themselves targeted with legal claims related to unlawful blocking, having AGCOM hand over relevant records is a reasonable request.

"It is therefore in the interest of the Association, engaged on the judicial front and for its own and its members' protection, to know the acts and documents that gave rise to these inhibitions," the letter continues.

Information Requested

ASSOProvider requests access to the following documents:

• The list of FQDN domain names and IP addresses submitted to Piracy Shield from February 1, 2024, to date.
• Specifically, all documents related to IP blocking issued, communicated and implemented, on Feb. 14, 15 and 24.
• The reports and all documents received from rights holders that resulted in blocking tickets on the same dates.
• The notice sent by AGCOM to the owner of the officially targeted site.
• Copies of blocking tickets sent to the Piracy Shield platform on Feb. 14, 15 and 24.
• Copies of blocking revocation tickets sent on the same days.

Given that AGCOM hasn't yet released domain and IP address information on its website to allow relevant parties to appeal against blocking instructions, it will be interesting to see its response to this official request. The request seeks significantly more information than AGCOM has provided thus far, including that which AGCOM is required to publish.

Official Declarations Fail to Indicate Scale of Blocking

The table below shows the bare details of information released thus far, plus information that should be declared relating to post-order blocking, but to date has not. AGCOM may provide additional details at a later date but since that information is available the moment domains and IP addresses are blocked, providing them quickly shouldn't be an issue.

AGCOM-Blocking to 240221-image

The big question is how the above table translates to the actual number of domains and IP addresses blocked.

Information made available to TorrentFreak shows that from February 1 to last week (not including events last weekend), over 1,200 IP addresses have been blocked by Piracy Shield. The volume of domain names, which includes subdomains, is considerably larger, well over 1,600.

We understand that the law does not specify or recognize unblocking of domains or IP addresses and no system is in place to remove blocks that are out of date. Cursory tests show that some IP addresses on the list no longer facilitate access to pirate services, assuming that was initially the case.

From: TF, for the latest news on copyright battles, piracy and more.

270x90-blue

Are you looking for a VPN service? TorrentFreak sponsor NordVPN has some excellent offers.

 
 
Powered by Mad Mimi®A GoDaddy® company

No comments: