Archive for the ‘BitTorrent’ Category

Bosnian Band Releases Epic Video Song in Support of The Pirate Bay

November 7th, 2015

By Agan Uzunovic

A Bosnian music group has released a song in support

This is a post from Read the original post: Bosnian Band Releases Epic Video Song in Support of The Pirate Bay

Posted in BitTorrent, Bosnia, censorship, Cyber Events, Internet, media, music, privacy, The Pirate Bay, torrent, TPB | Comments (0)

BitTorrent Patch Throttles Reflective DDoS Attacks

August 27th, 2015
BitTorrent today announced that a patch has been rolled out in the libuTP protocol used by many of its clients, fixing a vulnerability that allows attackers to carry out distributed reflective denial of service attacks.

Posted in Amplification attacks, BitTorrent, BitTorrent Sync, DDoS, DDoS amplification attacks, DRDoS, hacks, libuTP, reflective DDoS, Usenix, uTorrent, vulnerabilities, Web Security | Comments (0)

BitTorrent patched against flaw that allowed crippling DoS attacks

August 27th, 2015

The maintainers of the open BitTorrent protocol for file sharing have fixed a vulnerability that allowed lone attackers with only modest resources to take down large sites using a new form of denial-of-service attack.

The technique was disclosed two weeks ago in a research paper submitted to the 9th Usenix Workshop on Offensive Technologies. By sending vulnerable BitTorrent applications maliciously modified data, attackers could force them to flood a third-party target with data that was 50 to 120 times bigger than the original request. By replacing the attacker's IP address in the malicious user datagram protocol request with the spoofed address of the target, the attacker could cause the data flood to hit the victim's computer.

In a blog post published Thursday, BitTorrent engineers said the vulnerability was the result of a flaw in a reference implementation called libuTP. To fix the weakness, the uTorrent, BitTorrent, and BitTorrent Sync apps will require acknowledgments from connection initiators before providing long responses.

Read 3 remaining paragraphs | Comments

Posted in attacks, BitTorrent, distributed denial of service, Risk Assessment, Technology Lab, vulnerabilities | Comments (0)

Popular Download Service μTorrent wants you to pay for its Software

August 25th, 2015
Just to enhance the services being rendered. The popular peer-to-peer file sharing software application is aiming to achieve new heights by making their software be a paid scheme. uTorrent is one of the clients of BitTorrent Inc. (the parent company) which implements a BitTorrent protocol. Where each client is capable of creating, publishing, and transmitting any computer file over a

Posted in BitTorrent, BitTorrent p2p software, download utorrent, illegal file sharing | Comments (0)

Pirate sites ban Windows 10 over privacy worries

August 25th, 2015
Paranoia has spiked over the notion that Microsoft plans to keep people from running software they never bought.

Posted in BitTorrent, Featured, iTS, Microsoft, Operating systems, piracy, privacy, Surveillance, torrent, Windows, Windows 10 | Comments (0)

Using BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks

August 17th, 2015
Researchers warn several BitTorrent protocols can be leveraged to carry out distributed reflective denial of service (DRoS) attacks.

Posted in BitTorrent, DDoS, DOS, DRDoS, vulnerabilities, Web Security | Comments (0)

How BitTorrent could let lone DDoS attackers bring down big sites

August 16th, 2015

Some of the most widely used BitTorrent applications, including uTorrent, Mainline, and Vuze are also the most vulnerable to a newly discovered form of denial of service attack that makes it easy for a single person to bring down large sites.

The distributed reflective DoS (DRDoS) attacks exploit weaknesses found in the open BitTorrent protocol, which millions of people rely on to exchange files over the Internet. But it turns out that features found uTorrent, Mainline, and Vuze make them especially suitable for the technique. DRDoS allows a single BitTorrent user with only modest amounts of bandwidth to send malformed requests to other BitTorrent users.

The BitTorrent applications receiving the request, in turn, flood a third-party target with data that's 50 to 120 times bigger than the original request. Key to making the attack possible is BitTorrent's use of the user datagram protocol, which provides no mechanism to prevent the falsifying of IP addresses. By replacing the attacker's IP address in the malicious request with the spoofed address of the target, the attacker causes the data flood to hit victim's computer.

Read 4 remaining paragraphs | Comments

Posted in amplification, BitTorrent, DDoS, distributed denial of service, DNS, Law & Disorder, NTP, Risk Assessment, Technology Lab | Comments (0)

RIAA says BitTorrent software accounts for 75% of piracy, demands action

August 6th, 2015

In its long fight against Internet piracy, the Recording Industry Association of America is gunning for the technology that enables it: BitTorrent.

Brad Buckles, RIAA's VP for anti-piracy, has told the CEO of BitTorrent he's "very concerned about the overwhelming use of BitTorrent Inc. developed clients" in pirating his members' works. BitTorrent software, including the popular uTorrent client, "facilitated approximately 75% of the over 1.6 million torrent based infringement of our members' works last year in the US," Buckles wrote in a letter dated July 30.

"Like it or not, BitTorrenting products are the premier products used for peer-to-peer infringement today," RIAA deputy general counsel Victoria Sheckler told Mashable, which published the letter yesterday. "In private discussions that various people have had with BitTorrent over the last few years, they've refused to address the elephant in the room, which is the piracy over the BitTorrent protocol."

Read 6 remaining paragraphs | Comments

Posted in BitTorrent, filtering, Law & Disorder, piracy, RIAA | Comments (0)

Computer forensics to examine son’s claims that it was dad’s child porn, not his

June 30th, 2015

Defendant Robert Fenn.
A Virginia man serving 10 years for possessing child pornography says the images found on computer hard drives at the family home were not his and instead belonged to his father, whom he lived with.

The elementary school teacher claims a forensic examination of the computers seized from the Fairfax County home where he lived with his parents and brother will confirm his suspicions, as well as allegations that his defense counsel erred by not demanding an examination of the drives following his 2012 arrest.

US District Judge James Cacheris agreed to a limited degree and said defendant Robert Fenn "shoulders a heavy burden in seeking to vacate his judgment of conviction." Over federal prosecutor's objections, the judge ruled (PDF) that the defendant could have the media drives examined by forensic experts.

Read 4 remaining paragraphs | Comments

Posted in BitTorrent, child pornography, Computer Forensics, Law & Disorder | Comments (0)

The Pirate Bay Co-Founder Released From Swedish Prison

June 3rd, 2015
Fredrik Neij, the third and the last founder of the infamous file-sharing website The Pirate Bay, was released on Monday from a Swedish prison. Neij, who goes by the online moniker "TiAMO", was arrested by Thai immigration authorities at the end of November 2014 while he was trying to cross the border illegally from Laos to Thailand and then extradited to a prison in Skänninge, Sweden.

Posted in BitTorrent, download torrent software, Fredrik Neij, Gottfrid Svartholm Warg, Peter Sunde, Pirate Bay, The Pirate Bay, Torrent website | Comments (0)