Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.

Interception of torrent traffic BalCCon2k14

66.362 Aufrufe

Veröffentlicht am

Balkan Computer Congress is an international hacker conference organized by LUGoNS – Linux Users Group of Novi Sad and Wau Holland Foundation from Hamburg and Berlin. It is the second conference taking place on the Balkan, where some 20 years ago people were at war with each other. Now the BalCCon brings together hackers, hacktivists and computer enthusiasts from this area and they are joined by fellow hackers from all over the world. This event emphasizes the role of hacking as a mean of peaceful cooperation and international understanding. The program consist of numerous presentations, workshops and lectures about information, privacy, technology, programming, free software and socio-political issues. One part of the congress will be dedicated to hacking, project and hacks.

https://2k14.balccon.org/

Veröffentlicht in: Technologie
  • Loggen Sie sich ein, um Kommentare anzuzeigen.

Interception of torrent traffic BalCCon2k14

  1. 1. Case Study: interception of torrent traffic and what should we do about it Jelena Jovanović
  2. 2. Right to share and seek culture and knowledge “Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers.” (European Convention of Human Rights, article 10)
  3. 3. File-sharing is state of mind! Filesharing is not a side-effect of internet It changed the way we communicate NOT a crime!
  4. 4. Copyright regime
  5. 5. 5 scenarios of obtaining user’s data
  6. 6. 1. server seizure by the FBI
  7. 7. 2. DMCA or LAW Agency sets up own torrent server and monitors who downloads content
  8. 8. 3. They track our IP adresses
  9. 9. 4. Providers on behalf of copyright holders perform continuous interception of user data
  10. 10. 5. The execution of court decisions
  11. 11. Say no to copyright trolling!

×