Wednesday, January 26, 2011

Who climbs the movies to BitTorrent?

What started as a bar talk has become a university study has attempted to reveal who are the Internet users who upload content to P2P networks, the most popular for downloading movies from the Internet. "These networks are not as altruistic as it first appears. They do not maintain the philosophy of P2P, ie peer file sharing," says project leader, Ruben Cuevas.

During the eight months that lasted the analysis cautioned that 75% of the contents of up to 100 people. Rubén Cuevas, Head of Telematics Engineering, Universidad Carlos III, along with researchers Carmen Guerrero, Ángel Cuevas in collaboration with Michal Kryzcka, IMDEA Networks Institute, Sebastian Kaune, Technical University of Darmstadt (Germany) and Reza Rejai , University of Oregon (USA) have done the job.

The research examines how internet users behave rose more than 55,000 files to two main sites to share content: Mininova and The Pirate Bay. The study used the BitTorrent program for monitoring and sampling. Although they know your IP (internet protocol, the number assigned to each of the points on the network) can not know exactly what people are behind that number.

"An ADSL provider it could know, but we do not, for privacy reasons," explains Rubén Cuevas academic, whose team has developed an IP monitoring tool for this study. These hundred Internet users rose to 75% of the contents have a very specific profile. "These 100 initials are those who take advantage.

When uploading files to Pirate Bay include links to their sites filled with links and advertisements for that profit." In the study include the average amount they earn from the pages of links: $ 300 per day. "While some come to 4,000 a day. It is a great business because the maintenance is minimal but the biggest benefit," said Ruben Cuevas.

Along the same lines is to think about Sinde Law. "It strikes me that want to stem the tide. Studies like this demonstrate that the technology has no limits and there is a business model to be explored. These platforms are an opportunity." In his opinion this law is useless because "the content will be out of Spain.

While attempting to limit entry, Internet users can use programs to misrepresent your IP and surf freely through these services. Before launching laws that would not fit to do an effort to consult experts. " In his research also shows that the most common technique for obtaining releases and not buy a movie ticket and record surreptitiously.

This was creating so-called "screeners." Surveillance of the rooms has meant that, typically, you download the movies in another language and go to the movies with recorder. After editing the sound track to put what has been recorded in Spanish. "This is artisanal," says the professor, "but it is used." Another technique, especially for the classic series, is to convert the DVD content to a format exportable.

This technique is known as 'ripping' English 'rip', scratching. Among Internet users who upload content to the network there are other types: those that put a file name that does not correspond with the content, or just the beginning of what is expected to download. Rubén Cuevas not sure but an insight: "We think it is from the audiovisual industry to protect its contents.

See a picture that appears in a loop or something that is not expected, creates frustration, and discourages those who are discharged without limit . These files affect the system because the percentage of false content moves between 25% and 30%. " In almost all cases only are files with content that does not correspond with the wishes of peícula want to see a concrete, but some is worse.

"We have found malicious software (malware or spyware), are apparently content that makes a decoy but infects the computer." The study provides a conclusion: Although P2P networks are thought to share files without profit, at least in substance, and peer, only 11% of the content is original or created by users, for example, make a short film or music you want to publicize.

No comments:

Post a Comment