09-17-2010, 08:00 AM
|
|
Confirmed User
Industry Role:
Join Date: Dec 2002
Location: Behind the scenes
Posts: 5,190
|
Quote:
Originally Posted by Nathan
Yes, lovely quote, very Pro-Lightspeed, lol...
This is also not bad though:
Although the drug addicts one is clearly the best....
I actually wonder how their "foolproof" software works too... Considering that it is likely not enough in court to actually prove that to ip at some point download a cluster from the torrent, but that it downloaded every single one and did not miss a single one of them, since without all the file is not usable usually. At least if certain parts are missing, like the beginning or end.
I also wonder how they prove that the file called XYZ is actually XYZ...
But then again, who cares.. the point is settlement anyway, this never gets to court, so why bother REALLY collecting all the evidence I guess..
|
Quote:
Originally Posted by DamianJ
That's only the start!
a) How do they prove that the person paying for the IP downloaded the file?
b) How do they prove the file was actually downloaded?
c) How do they prove the file was actually what they claim it is?
d) Have they not heard of IP Spoofing?
e) Have they not heard of unsecured wifi?
Basically, you can't prove it. You would have to go to the guy's house, get all of the computers in there, find the file he allegedly downloaded and show the court that is your copyrighted content.
Far too much trouble. Miles better to just blackmail fans of your work and potential customers and hope to get some hush money out of them.
|
unless downloadable media has member id embedded into it in all or some frames
|
|
|