Quote:
Originally Posted by DamianJ
Yes, similar to the technique Davenport Lyons used here in the UK. Get some IP addresses of people that may or may not have downloaded something that claims to be a copyrighted file. Send them blackmail letters. Some pay up.
No need for something as silly as PROOF that the person paying for the IP actually committed any crime is there? No need for evidence. No need to understand unencrypted connections, IP spoofing or even grandchildren visiting. Just send them a letter demanding 10 grand and some will pay.
Brilliant money maker.
|
Are we being naive to think they can't prove the cases though?
I mean, every server request goes through multiple relays carrying headers that
can have any kind of data in it for tracking.
Hypothetical Scenario :
I make a popular browser and when ever my browser is installed on a computer
the computer configuration is scanned and my browser produces a snapshot(fingerprint) of
this configuration. Given the fact that everybody sets up different combinations on
the computer and install programs in different orders and, have different hardware
etc...this can be a unique identifier of that computer that is put into a request header
and sent by the browser. So forget IP, you can change but the "fingerprint" is
the same.
Now search the backed up data(if it existed) on the relay servers for the fingerprint
and find everywhere the surfer ever went. Including his bank where he is easily identified.
Now match the times of the access with the times that person is able to use the
computer. So the person is home at this time, no one else is there and no other computer
fingerprint is there except his. The open connection excuse would be busted.
I said HYPOTHETICAL!
In no way am I suggesting that this is happening.
