Nakenprat med pornofilmer, sexleketøy, sexbilder , erotisk chat , norsk porno og erotikk
Viser resultatene 1 til 5 av 5
  1. #1
    Medlem siden
    Jul 2005

    P2P - Antipirat VS Pirat (MediaDefender sakene)

    Har ikke hatt tid til så mye siste dagene, så updates er ikke helt.. eh..up to date..

    Vi kan jo starte med MediaDefender.Mail.200612.200709-MDD som nå er delt med resten av verden av MediaDefender-Defender.(6621 emails)..
    (Alle tinyurl'ene er Piratbukten)

    MediaDefender ProxyMaster

    MediaSentry ChartDirector License File


    Bare en par av 6621 emails...

    "This is really fucked.
    Let’s pull miivi offline."

    "From: Jay Mairs
    Sent: Tue 7/3/2007 9:59 PM
    To: Steve Lyons; Randy Saaf; Octavio Herrera
    Cc: Ty Heath; Dylan Douglas; Ben Grodsky; Ivan Kwok (gmail)
    Subject: Re: MiiVi got Dugg

    Steve, please redirect to point to an ip that’s not one of ours (random ip or whatever)."
    New Staff Reply: Torrents for interdiction uploaded: "Feist - The Reminder

    Torrents have been uploaded to the interdiction system. About 10 torrents were added compared to what was already in there.

    Since another folder was created for the project, dated 52220007, torrents were moved into the original project folder:
    J:\Torrent Testing\UMG Torrents\Feist_-_The_Reminder

    Feist_-_The_Reminder now mimics what is on the FTP

    Thank you,


    Ticket Details Ticket ID: RWS-352163
    Department: QA
    Priority: Low
    Status: Closed
    Link:Click Here

    ---- Original Message -----
    From: Skinner, Andrew (NBC Universal) <Andrew.SENSUR@SENSUR!!!!>
    To: Ben Grodsky
    Sent: Fri Apr 20 17:18:33 2007
    Subject: Ed2k user hash

    Hey Ben,

    How are you guys doing with tracking users by ed2k user hash?

    Sist redigert av Lilith; 18-09-07 kl.20:15.
    Nyttige / viktige linker for brukere på
    Spesifikke regler for Opplastning av Film
    Regler og informasjon!
    Hvordan laste opp bilder
    Vil du ha en avatar på forumet?
    Ofte spurte spørsmål

    "∂α∂∂у, ωну ∂σєšи'т тнιš
    мαğиєт ρι¢к υρ тнιš ƒℓσρρу ∂ιšк؟"

  2. #2
    Medlem siden
    Jul 2005
    MediaDefender leaked mail PART 2 - phonecalls

    UPDATE2: It seems like someone is REALLY pissed off on Media Defenders.Here’s another released material , Gnutella Tracking Database (1.3 GB MySQL database dump) on PirateBay

    UPDATE3: Analysis of Gnutella Tracking Database , also leaked from MediaDefender
    (Se første innlegget mitt)

    Mirrored transcript bellow:

    Certainly not errorfree.


    MD - Hello.

    AT - Yes?

    MD - Hi, this is Ben Grodsky(?), MediaDefender.

    AT - Alright, Mike McCartney, Brett B.(?) and Jim Dummers(?).

    MD - Hi there, guys.

    AT - How are we doin’?

    MD - Alright.

    AT - Alright, uhm..

    MD - I’m sorry, go ahead.

    AT - Well, have you guys had an opportunity to kinda look to see where this may have, uhm, may have stem from?

    MD - Yeah, it seems, I mean, from our telephone call yesterday it seems that, ah, we all pretty much came to the conclusion that it probably was, ah, caught in the email transmission, because the, ah, attacker, I guess we should call the swedish IP the attacker, knew the login and the IP adress and port, but they weren’t able to get in, because we had changed the password on our end, you know, following our normal security protocol, ahm, when we’re making secure transactions like these, on the first login we’ll change the password. So..

    AT - Right.

    MD - Obviously, well, not obviously, but it seems that, ah, the most likely scenario is that at some point that, you know, was, ahm, intercepted, you know, just because there’s probably, it was going through the public internet and there wasn’t any sort of encryption key used to, ahm, protect the data and that email.

    AT - But what kind of, what you guys are saying, on our end, uhm, so, I mean, we have RSA authentication though our Exchange-server, uhm, to get into our stuff.

    MD - Right. But then it’s going from your mail-server to our mail-server, it’s going through all the routers and hubs on the way and we don’t have, we didn’t make any kind of, ah, you know, key between our servers to make sure that the internet(?) would, would, ah, would only be viewable by people with that key.

    AT - Right, no, I understand that, we could certainly add PGP-encryption or some other email-encryption so that it’s encrypted in transit, but what I’m saying is that how comfortable are you guys that your email-server is free of other eyes?

    MD - I’m not sure what you mean, our email-server isn’t free of other eyes. There is nothing to say that this email was intercepted on our end as opposed to it being intercepted on your end.

    AT - That is true. I mean, obviously…

    AT2 - Are you comfortable that it was not intercepted on your ….

    AT - I mean, (?), theoretically, hyperthetically it could be grabbed anywhere along the way as it transmits through routers and different protocols from my end to your end, but I guess we’re asking: are you comfortable that you guys don’t have anybody in your email-server?

    MD - Oh yeah, yeah, we checked out our email-server and our email-server itself is not compromised. I think that was your question.

    AT - Ok, yeah, I guess that wasn’t clear, I just, I mean you guys know as well as we know that you guys are a major target of hackers.

    MD - Right, yeah, we are a major target of hackers, and, you know, you guys are part of the government and the government is always a major target of hackers and people trying to sneak around for information. So I mean both of us are pretty big targets.

    AT - Yeah, yeah, absolutely. And that’s why I guess, you know, and obviously the content of this operation that we’re doing is extremely sensitive and that’s why, you know, we’re, we take very extra caution and security measures when we’re talking about any of these secure inside-networks that we’re dealing with, so we just need, you know, let’s make sure that we add whatever security and functionalty we need to, so not only our data-communications and protocols are secure and maybe we should wrap’em in a PPN-Tunnel, uhm, public private key for the data that is transmitted between us but also for our email-communications, uhm, making sure that, you know, we can talk to each other through email using, uhm, another layer of communication so that, you know, nobody can understand or read what the hell we’re talking about with each other.

    MD - (long silence) Yeah. Yeah, I mean, we can certainly, uhm, setup a PGP-key for the email, uhm, as far as the using of a PPN-Tunnel or something like that, uhm, you know, I can look into that with Jay when he comes back on Tuesday.

    AT - OK. Uhm, I don’t wanna slow down performance either, I mean, if that’s gonna really dog our communication link between each other.

    MD - You know, I think that really right now what we could do if you wanted, is, as we discussed yesterday, we could change the port, that we’re doing things on your server

    AT - (?) a process of that.

    MD - OK, so we can do that, we can change the login, obviously the password, you know, if you guys need to know what password we’re using we could just communicate that by phone, and I think the email isn’t really an issue as long as we don’t really say anything particulary sensitivy in the emails.

    AT - Right.

    MD - You know, and, we’re pretty available by phone, so, if guys are comfortable with just communicating with us by phone and anything that’s really really sensitive we could just communicate in this fashion. I know it’s a little bit cumbersome…

    AT - Yeah, it can be sometimes, I mean, email’s so easy, and (background mumbling) yeah, I mean, this is obviously a very sensitive investigation, as you know, and we, i’m just nervous now going back through old emails and we knowing we didnt really say too much in in our earlier communications but if anybody was successful sniffing out communication between each other over the last month, I mean, that obviously could (?) that you guys were helping the state of New York and the Attorney General’s office in a childporn-investigation of global scale, based on some of the childporn-keyword-list-textfiles we attached and sent back and forth to each other, some of the results that you guys have sent in, the preliminary results of the keyword-crawling…

    MD - Yeah, yeah, but, you know, (?) by the same token obviously people are always aware that childporn is a, is something that they need to be, you know, not transmitting in the first place. So anyone transmitting is, per se, infringing on the wha, committing crimes.

    AT - And as such they go through extra ways to try make and find out what law enforcement is doing so they can avoid being caught.

    MD - Right. One thing to keep in mind, is, you know, Peer-to-Peer-networks are global and for this particular initiative we have decided, just from a techical standpoint on our end, we have just decided to use a particular Peer-to-Peer-network, we could always switch to a different Peer-to-Peer-network if that became an issue in the future, but, you know, we are still seeing that there would be a good amounts of data coming through to you, so I don’t think this is going to have the effect of, you know, somehow squashing all the data that you would even be able to collect from us.

    AT - No, I don’t think so either. I think that the Peer-to-Peer-network as a whole is a target-rich enviroment, but I also know through 15 years of doing this, is that if a pedophile is in the Peer-to-Peer-network, he’s in newsgroups, he’s on websites, he’s in chatrooms, he’s everwhere else, I mean, they’re not generally isolated to one technology and they also go to great lengths to try to proxy and cover themselves and, you know, view hacker-blogs and logs, looking for what law enforcement’s doing and it wouldn’t be outside the realm of a hacker-group, many of which we’ve taken down in the past, big organized crime-groups of pedophiles, to pay hackers for information about what law enforcement is doing.

    MD - Yeah.

    AT - And then, that’s all, I’m not saying that this particular small little piece of a global childporn investigation is compromised, we will get lots and lots of bad guys in this, I’m convinced, and I don’t have any concern of that.

    MD - Ok.

    AT - (?) all scheme of being able to keep, you know, what we do in law enforcement a secret and protected as special we can, so we that can continue to being successful.

    MD - Right.

    AT - So, ok, uhm, more thought on exactly what we’re going institute as far as communication-protocols here

    AT2 - Yeah, at this point, what I’ve done is, I’ve change the port for access on that, I haven’t opened it up yet, so what I want to do is, I’d like to setup a password authentication initially, give you guys a chance(?) of a public key authentication mechanism on that.

    MD - So, ok, you’ve already changed the port and you’re gonna setup, you already have or you are about to setup authentication for the password?

    AT2 - No, I’ve already setup a new username and password (?) that you can use for general access to the server itself, and what I’d like to do is probably (?) disable password authentication on that server all together and exclusivly reserve it the public key.
    Nyttige / viktige linker for brukere på
    Spesifikke regler for Opplastning av Film
    Regler og informasjon!
    Hvordan laste opp bilder
    Vil du ha en avatar på forumet?
    Ofte spurte spørsmål

    "∂α∂∂у, ωну ∂σєšи'т тнιš
    мαğиєт ρι¢к υρ тнιš ƒℓσρρу ∂ιšк؟"

  3. #3
    Medlem siden
    Jul 2005

    MD - Ok, so you’re gonna disable password authentication and enable a public key

    AT2 - Yeah.

    MD - Ok.

    AT2 - And, ah, from there we can we can communicate so we (?)

    AT - Here’s the problem, a potention problem, and again, from the law-enforcement-perspective: The intelligence information that you guys are gathering, that’s being sent to our systems and then our evidence-collection-process here, it needs to be able to stand up in court, and in order for us, I think, to do that from a legal standpoint, we have to be able to get on a stand and say that the data that we get from you, is, pristine, it’s validated, it’s verified, there’s no chance that, or there’s a very limited chance that the data that came from you to us, was in any way compromised, edited, modified, or goofed with, so that the information that we get from you, that we rely upon, we can go out and connect to the IP-machine, the IPs and the machines in New York that have the contraband files that we’re pulling down, are all wrapped together in one nice little bundle,

    MD - That part has not been compromised in any way, I mean, the communication between our offices in Santa Monica and datacenters in Los Angeles and Alsagundo(?) have not been compromised in any way and all those communications to New York, to your offices, are secured. The only part, that was in any way compromised was the email-communications about these things. But…

    AT - We are not exactly sure, exactly, where this breakdown was, as of yet, right?

    MD - Right. And you might not ever know. I mean, all we can say for sure, MediaDefender’s mailserver has not been hacked or compromised, and you guys are basically reporting the same on your side. So, then there’s just the public internet between.

    AT - Yeah, yeah, I mean, what kind of IDS are you guys running?

    MD - Ah, I don’t know. let me look into that.

    AT - Because, you know, when was the last update, when was the last time you guys checked any alerts, I mean, I have our people already working on it on our end. We’re looking that our mail and our mailserver is all encrypted. Our entire authentication process is RSA. But you’re right if plain text comes from us to you

    MD - Hello, are you guys still on the call?

    AT - Are you there?

    MD - Yeah I’m here, can you hear me? - Can you hear me? - Are you on a cell phone? - Should we try restarting the phone call? - Is it possible for you to call from a landline?

    AT - Can you hear on what they’re doing? Yeah are you there?

    MD - Yeah I’m here. - Can you hear me? - Hey bladder_mike, can you hear me?

    AT - Yeah we can hear you, can you hear us?

    MD - Yeah occasionally. - Hello?

    AT - How about now?

    MD - Now I can hear you. Now it’s totally silent I don’t hear anything.

    AT - Are there any connections or something, check your processor.

    MD - I can hear a little bit of the chatter between you guys, but I can’t make out anything that you’re saying.

    AT - Here’s the deal can you hear me now?

    MD - Yes.

    AT - Problem of it is, we’re on a VoIP connection, a VoIP phone.

    MD - All I got was you guys were on a voip phone.

    AT - Right and I think at this moment, you’re application is calling you’re machine back in California and it’s chewing up our bandwith.

    MD - Got it. Ok. At least now I understand what the phone situation is. Now I understand a little better the limitations of voip.

    AT - Yeah it’s eh, we’re only on a cable right now, we’ve got two T1’s coming in, once they are in we should be able to turn spend bandwith om a little better. Is it better now?

    MD - Yeah. It’s better. Well, it was for a moment.

    AT - How about now, it’s probably going to be better now.

    MD - Yeah I can.. Yeah.

    AT - We’ll talk about, we’ll keep our e-mail content to a dull roar.

    MD - Yeah.

    AT - We’ll talk by phone unless we can share some PGP-keys for email and if you can check on your end again. Just, I’m checking on my end too, I’m not accusing you guys. But I think we need to, under the sensitivity of this thing, we both need to make sure that both of our systems are secure on both ends. Both our mail servers and our networks to make sure that, you know, whoever saw that email didn’t see it on either of our mail servers or on the inside of either of our networks.

    MD - Right.

    AT - You know, if somebody got acces to the mailserver, they might have got acces to other machines on the network. And the argument goes that, you know, even though the data that has been send from us to you in a secure fashion is secure, if there’s somebody sniffing around on your network or on our network it’s not secure on either end. Before it gets into the tunnel.

    MD - Okay.

    AT - So, em, I think we’re good. Some public private key authentication, right and set a password, right, so that we’ve got a whitelist of IPs that are going to be only allowed acces.

    MD - Yeah we already (sent) you that whitelist

    AT - Exactly, so we’ll go from there. Then, going forward, how much more testing do you guys need to do, and can we set up a *beep* early next week when we can, can go over exactly what this thing is doing.

    MD - Yeah, we can go over things as soon as you like next week. Tuesday, Wednesday, whenever you’d want. We’re basicly done testing, we deployed, I guess yesterday or the day before, to your system.

    AT - Right.

    MD - So at this point, you know, it’s just, if you want to review how the data is appearing on your end, there is one thing that Brad has brought up yesterday as far as making the actual mediafiles more easily viewable and more easily connecting them to the database.

    AT - Yes exactly we’re going to need to do that.

    MD - Right, well the easiest thing for us to do. and, let me know your thoughts about this, how about if we prepend to the filenames, where they are currently just hash in whatever the extension of the filename should be. How about we prepend to the filename, the real filename from our database?

    AT - I mean, that’s ok, I guess, at the end of the day what we’re going to need to know is, other than the nuts and bolts of it exactly, what data we’re getting from you, what data we have on our end, what your application’s doing on our end do with your data. To then go out and connect to the suspect IPs to pull down the suspect file. I need to be able to testify that in court so I’m going to have to go over that with one of you guys, or all of you. Almost line by line to say "Here’s what happenend, this is how we get it, this is the structure we get the data in, this is what the application is doing on your end, this is what it’s trying to do, this is how it’s making it’s connections."

    MD - Yeah, all of that is really straightforward and Jake can go over all of that with you on Tuesday.

    AT - Ok, that’s easy. Then what we’re gonna need to do is once we get the file

    MD - Right

    AT - We have to be able to link them back to the suspect IP along with all your metadata in your database that’s associated with that IP. So we get an IP in Ney York that’s got, according to you guys, a hundred and twenty-seven suspect files that you saw while you were crawling. We (?) connect to them on our end using your application. It goes out, it connects, it pulls a file or multiple files presumably - hopefully. Gets all of the file or part of the file and it saves it out to our directory here on our evidence collection array. We then need to look at it - you know - computers are great but they can’t tell me what is and what isn’t childporn and illegal sex.

    MD - Right

    AT - So we need some sort of a viewer or review-viewer that could be web-based - that basically goes back - we can then make a selection whether or not it is or it is not childporn that gets entered into the database of being childporn or not childporn. And then the dataase is updated to reflect the fact that from this IP we got this picture, it is childporn. From these two IPs we got these two pictures, they are not childporn. From this IP we got these 4 pictures, 3 of them are childporn and one is not. So we can begin to make an investigative decisions as to who we’re gonna subpoena and who we’re gonna make as a target and what evidence we have against this individual target.

    MD - Ok.

    AT - The thing we are working on that he maybe could give you some structure and (?) but we don’t know the structure of the data in your database for him to try to reverse-engineer those calls to the data in your database to put it into a viewer on our end. But he’s done it before in other things so he could probably help you at least with the web-based HTML template and sort out how the structure seems to work and what we’re doing and what we’ve done in other things and it’s just a matter of, you know, working together on the backend data structure so that it’s calling the right stuff and keeping tracking the right stuff statistically.

    MD - Ok.

    AT - And what is not done — same database structure that your data is coming to us in.

    MD - Yeah.

    AT - — you could just browse it on a webbrowser on a internal network and look at the data across our internal network in the actual, you know, image files locally and do the review. So that it’s nothing internet-powered, it’s all internal, to us here. Yes, we can deal with that next week, I think that will be good. So we are ready to go other than being able to view the images, make a determination at the what is, what isn’t childporn and then keeps statistical counts and records and entries as to what IPs are associated with those contraband files and what IPs and metadata are associated with the non-contraband files. You know, globally.

    MD - Right.

    AT - (?) IP adresses and then hopefully we’ll have a warm breathing body behind the keyboard of these IP adresses. But that’s up to our … that’s our work.

    MD - Yeah, that’s on you guys.

    AT - Yeah, I’m impressed. I think we’ll, I think this will be very good. Alright, I’ll tell Jay, we set it all, adn why don’t we plan something for Tuesday afternoon or something?

    MD - Ok, Tuesday afternoon your time?

    AT - — and we can try to finalize basically what this app is doing and we can finalize the last little pieces, some sort of a viewer and Brad can work with you guys on the structure of the template, the frontend application of that and you guys can help him with the backend and together, I think we can put the data and the pieces together cause like I say a lot of it has already been sort of been done. Knowing your dataset, where all your stuff is in your database.


    MD - Alright, sounds very good. Alright, so we’ll setup a call for Tuesday afternoon your time.

    AT - Sounds like a plan. Thank you very much and have a good long weekend.

    MD - Thanks a lot and have a good weekend yourselves. Bye.

    Note: Thanks to MediaDefender-Defenders, #mediadefender and the people working on this, you know who you are.
    Nyttige / viktige linker for brukere på
    Spesifikke regler for Opplastning av Film
    Regler og informasjon!
    Hvordan laste opp bilder
    Vil du ha en avatar på forumet?
    Ofte spurte spørsmål

    "∂α∂∂у, ωну ∂σєšи'т тнιš
    мαğиєт ρι¢к υρ тнιš ƒℓσρρу ∂ιšк؟"

  4. #4
    Medlem siden
    Jul 2005

    MediaDefender prøver seg nok en gang... :P

    P2P sites ridicule MediaDefender takedown notices in wake of e-mail leak
    September 19th, 2007 — webmaster

    Peer-to-peer (P2P) poisoning company MediaDefender has sent a flurry of takedown notices and legal threats to P2P web sites that are facilitating the propagation of a 700MB archive of internal MediaDefender e-mail that was leaked onto the Internet this week. The e-mails, which were obtained by a group that calls itself MediaDefender-Defenders, reveal that the company attempted to deceive the public after the disclosure of its affiliation with the MiiVi site and was providing information about file-sharing network users to the New York State Attorney General’s office.

    MediaDefender is now in damage control mode and hopes to slow the spread of the e-mails by intimidating P2P site operators. MediaDefender is represented by Sheppard, Mullin, Richter & Hampton (SMR&H), which is recognized one of the top law firms in the United States. The P2P sites are unimpressed with the empty threats.

    Although MediaDefender president Randy Saaf was eager to tell us a fabricated cover story after the MiiVi incident, MediaDefender has not responded to our numerous requests for comment this week. Similarly, the New York General Attorney’s office has declined to provide a response to our inquiries. MediaDefender has, however, contacted several popular P2P sites, including isoHunt, which provided us with a complete record.

    Despite security precautions by our client, a person or persons illegally accessed MediaDefender’s email and other files,” says a cease and desist notice sent to isoHunt and seen by Ars. In the notice—which cites various sections of the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, and the California Computer Data Access and Fraud Act—SMR&H attorney Robert S. Gerber requests that isoHunt “immediately and permanently cease and desist from posting, distributing or otherwise making available MediaDefender’s trade secrets and confidential information.”

    The popular P2P site’s formal response to SMR&H is filled with caustic wit and considerable legal expertise. “If Mr. Gerber is truly as experienced in IP law as his bio claims he is,” asks the isoHunt administrator in his response, “why is it that he is incapable of composing a DMCA takedown notice as per USC Title 17 Section 512?” The isoHunt administrator explains that Gerber failed to adequately specify the allegedly infringing content as required by law. The administrator also helpfully provides a link to a valid sample complaint so that SMR&H will be less likely to send the improper information in their second attempt. The following is an excerpt of the isoHunt administrator’s response:

    This e-mail serves as a counter notification under USC Title 17 Section 512 (c)(3)(A)(iii) that you have failed to properly identifying links to content that allegedly infringes your copyright/trademark/rights (or, in this case, has something to do with really embarrassing trade secrets *and* employee social security numbers) AND you have failed to address your e-mail to the appropriate agent, namely, so I invite you and your clients to take a long walk off a short pier, since you and/or your clients might actually manage to NOT get something that simple wrong.”

    In closing, the isoHunt administrator says that the he will comply with the request if it is properly submitted. “Despite us being located in Canada, if you do actually figure out how to compose a valid DMCA notice, we will honor it,” he concedes, “just as soon as we’re done laughing at you.

    Torrent site Meganova received an identical letter from SMR&H, but responded publicly and with a bit less civility. “Dearest little asstunnels, Let me start off by thanking you for your pitiful attempt to have your e-mails removed from the entire internet,” Meganova’s response says. “In case you haven’t noticed, this site is located in Europe (I hope you can point it out on a map) where your stupid copyright claims have no base. But fair is fair you guys did suffer over the past week so here’s bit of advice to you guys: F*** you! F*** you again! F*** you again and again and again!” (I’m guessing that an “asstunnel” is what you get when a European whose first language isn’t English tries to say “asshole.” It seemed awkward when I first read the response, but the expression has since grown on me.)

    The organization behind the leak, MediaDefender-Defenders, has set up a web site with an HTML archive that includes all of the e-mails, largely uncensored, but with minor modifications to protect MediaDefender employees from identity theft. The site also published an e-mail allegedly sent by Saaf himself. “I am the CEO of MediaDefender,” the message says. “We have begun our civil and criminal investigations into the stolen e-mails from our company. We are meeting with the FBI on monday. Your IP address has been logged. I hope it was worth the thrill.”

    The site has been running intermittently since its launch, and the disruptions are thought to be the result of massive traffic coupled with a denial of service attack apparently launched by MediaDefender.

    Attempting to stop the spread of the e-mails is an exercise in futility at this point. MediaDefender’s entire business model has been based on recognition of the inescapable fact that litigation cannot stop the spread of content on the Internet, so it is ironic that the company has turned to legal threats. In the past, we have seen attempts to stifle the dissemination of information on the Internet backfire and compel activists to promote broader distribution. Given that reality, MediaDefender might want to lay off of the threats for the time being.

    Created Using MS Community Post Editor - Courtesy Of Team FOFF
    Nyttige / viktige linker for brukere på
    Spesifikke regler for Opplastning av Film
    Regler og informasjon!
    Hvordan laste opp bilder
    Vil du ha en avatar på forumet?
    Ofte spurte spørsmål

    "∂α∂∂у, ωну ∂σєšи'т тнιš
    мαğиєт ρι¢к υρ тнιš ƒℓσρρу ∂ιšк؟"

  5. #5
    Medlem siden
    Jul 2005

    Post Anti-Piracy Tools Leaked

    MediaDefender Anti-Piracy Tools Leaked
    Posted on 21.09.2007 at 03:50 in Tech News by Mr. X

    The MediaDefender-Defenders have released the source code for the “trapping” and decoy software that MediaDefender uses to spread fake files on P2P networks.

    Similar to the previously released e-mails, tracking database and phone call this leak is also spread by the group that goes by the name “MediaDefender-Defenders“. In the .nfo that was posted with the torrent we read:

    The source is complete for their operations regarding Kazaa, bittorrent, gnutella etc. This system is now released for the public in order to identify the decoys they set up. A special thanks to the MD employee that gave this to us.

    It appears that this leak was not collected from the e-mails. The MD-Defenders themselves claim that a MD employee handed over the files to them, but this hasn’t be verified by other sources at this point.

    This leak contains a wealth of information and seriously harm MediaDefender’s future operations. BitTorrent tracker owners and other admins who are involved in managing P2P networks can utilize the leaked information to brace themselves against companies like MediaDefender, who try to pollute their networks with fake files.

    From the leak it seems that MediaDefender is active on virtually every P2P network, including Usenet.

    Not surprisingly, most applications are dedicated to BitTorrent, which is probably their main target because of its popularity. Application names BTPoster, BTSeedInflator, BTDecoyClient and BTInterdictor make it quite obvious what they are supposed to do.

    At this point it is still unclear who the MediaDefender-Defenders are and how they got their hands on all this information. MediaDefender has announced that the FBI will be investigating the source of the leaks.

    To be continued?

    Update: A list of leaked utilities is now available:

    AresDataCollector, AresLauncher, AresProtector, AresSupernode, AresUDPDataCollector, AutoUpdater, AutoUpdaterSource, BTClient, BTDataCollector, BTDecoyClient, BTInflationDest, BTInterdictor, BTIPGatherer, BTPoster, BTRemover, BTScraper, BTScraperDLL, BTSearcher, BTSeedInflator, BTTorrentGenerator, BTTorrentSource, BTTracker, BTTrackerChecker, CVS, DCMaster, DCScanner, DCSupply, DistributedKazaaCollector, DllLoader, ED2KSupplyProcessor, EdonkeyIpBanner, FastTrackGift, FastTrackGiftDecoyer, GnutellaDecoyer, GnutellaFileDownloader, GnutellaProtector, GnutellaSupply, KademliaProtector, KazaaDBManager, KazaaLauncher, KazaaSupplyProcessor, KazaaSupplyTaker, KazaaSwarmerDest, KazaaSwarmerDistributedSource, KazaaSwarmerDownloader, KazaaSwarmerSource, MediaMaker, MediaSwarmerDest, MediaSwarmerSource, MetaMachine, MetaMachineHashSetCollector, MetaMachineSpoofer, MI-GnutellaSupply, MovieMaker, NameServer, NetworkMonitor, OverNetLauncher, OvernetProtector, OvernetSpoofer, P2PFileIndexer, PioletDC, PioletPoisoner, PioletSpoofer, SamplePlugIn, SLSKSpooferDLL, SoulSeekClient, StatusDest, StatusSource, SupernodeCollector, SupernodeController, SupernodeDistributer, SupplyProcessor, TKCom, TKFileTransfer, TKLauncher, TKProjectManager, TKSyncher, UsenetPoster, UsenetSearcher, WatchDogControllerDestination, WatchDogControllerSource, WinMxDC, WinMxLauncher, WinMxProtector, wma generator

    source: Ernesto,

    Release name: MediaDefender.Source.TrapperKeeper-MDD
    Size: 54.6 MiB (57248108 Bytes)
    Genre: comedy
    Protection: media-defenderezrom
    File names: mediadefender.source.trapperkeeper
    Torrent: TPB

    Edit: Her er orginal NFO fra arkivet

    -={ MediaDefender-Defenders }=-
    Date: 2007-09-20

    MediaDefender-Defenders proudly presents the source code
    that MediaDefender use.

    The source is complete for their operations regarding
    Kazaa, bittorrent, gnutella etc. This system is now
    released for the public in order to identify the decoys
    they set up.
    A special thanks to the MD employee that gave this to us.

    -={ MediaDefender-Defenders }=-

    Created Using MS Community Post Editor - Courtesy Of Team FOFF
    Nyttige / viktige linker for brukere på
    Spesifikke regler for Opplastning av Film
    Regler og informasjon!
    Hvordan laste opp bilder
    Vil du ha en avatar på forumet?
    Ofte spurte spørsmål

    "∂α∂∂у, ωну ∂σєšи'т тнιš
    мαğиєт ρι¢к υρ тнιš ƒℓσρρу ∂ιšк؟"


Users Browsing this Thread

Det er for øyeblikket 1 brukere som leser denne tråden. (0 medlemmer og 1 gjester)

Lignende Tråder

  1. størrelse (Slått sammen tråder med samme saken)
    Av herrukjent i forumet Generell prat
    Svar: 60
    Nyeste innlegg: 24-01-07, 22:03
  2. Jenna Haze vs Krystal Steal - Four Finger Club 19
    Av diablo i forumet Utenlandsk erotikk
    Svar: 19
    Nyeste innlegg: 21-11-06, 21:49
  3. Ass off(Jessica Alba vs Eva Longwhoria)
    Av Lilith i forumet Utenlandsk erotikk
    Svar: 9
    Nyeste innlegg: 26-10-06, 07:31
  4. Pirates
    Av dunderdag i forumet Generell prat
    Svar: 4
    Nyeste innlegg: 24-09-06, 11:14
  5. Europa vs USA
    Av stg i forumet Humor og moro
    Svar: 2
    Nyeste innlegg: 02-06-06, 06:58

Regler for innlegg

  • Du kan ikke starte nye tråder
  • Du kan ikke svare på innlegg / tråder
  • Du kan ikke laste opp vedlegg
  • Du kan ikke redigere innleggene dine

P2P - Antipirat VS Pirat (MediaDefender sakene)