reeltoreel
Well-known member
Have you guys caught up on this yet?
From www.publicaddress.net
Meanwhile, geeks are buzzing over an extraordinary leak: six months' worth of internal emails from a company called MediaDefender, running to more than 6000 messages. MediaDefender works for major copyright interests, including the Recording Industry Association of America, providing intelligence on the scale and content of P2P traffic. And, with its black hat on, it creates fake torrent sites and broken torrent files to dissuade and frustrate users.
It appears that one MediaDefender employee created a Gmail account, to which he automatically forwarded all his company email. He then went and signed up to a P2P torrent using that Gmail address and the same password he used for his Gmail. He connected to the forum from an IP address the owners knew was associated with MediaDefender. Shit happened.
This isn't unambiguous. There are, after all, obvious and massive copyright breaches at the centre of this. The leak puts all the company's employees at risk of ill-judged retribution: the emails included spreadsheet attachments that contain personal information.
But the emails are out there now -- available, ironically, as a torrent. They confirm that MediaDefender was in fact carrying out "honeypot" and entrapment activities that it had told journalists it had no part in (link below).
Excerpts in this extensive discussion on Slashdot (link below) will doubtless be of interest to MediaDefender clients who want to know what the company really thinks of them. And, basically, the company's entire strategy is now out in the wild -- someone has even helpfully set up a threaded HTML interface to them. It's all incredibly interesting -- unless, of course, you happen to be involved.
http://arstechnica.com/news.ars/pos...pment-accusations-with-fake-torrent-site.html
http://it.slashdot.org/it/07/09/15/1843234.shtml
Threaded HTML Interface - http://jrwr.hopto.org/
From www.publicaddress.net
Meanwhile, geeks are buzzing over an extraordinary leak: six months' worth of internal emails from a company called MediaDefender, running to more than 6000 messages. MediaDefender works for major copyright interests, including the Recording Industry Association of America, providing intelligence on the scale and content of P2P traffic. And, with its black hat on, it creates fake torrent sites and broken torrent files to dissuade and frustrate users.
It appears that one MediaDefender employee created a Gmail account, to which he automatically forwarded all his company email. He then went and signed up to a P2P torrent using that Gmail address and the same password he used for his Gmail. He connected to the forum from an IP address the owners knew was associated with MediaDefender. Shit happened.
This isn't unambiguous. There are, after all, obvious and massive copyright breaches at the centre of this. The leak puts all the company's employees at risk of ill-judged retribution: the emails included spreadsheet attachments that contain personal information.
But the emails are out there now -- available, ironically, as a torrent. They confirm that MediaDefender was in fact carrying out "honeypot" and entrapment activities that it had told journalists it had no part in (link below).
Excerpts in this extensive discussion on Slashdot (link below) will doubtless be of interest to MediaDefender clients who want to know what the company really thinks of them. And, basically, the company's entire strategy is now out in the wild -- someone has even helpfully set up a threaded HTML interface to them. It's all incredibly interesting -- unless, of course, you happen to be involved.
http://arstechnica.com/news.ars/pos...pment-accusations-with-fake-torrent-site.html
http://it.slashdot.org/it/07/09/15/1843234.shtml
Threaded HTML Interface - http://jrwr.hopto.org/