A 30-page document containing the master anti-piracy strategy for IFPI (the umbrella group for all the record labels' national associations, like the RIAA and BPI) has leaked. The document, written by IFPI chief anti-piracy officer Mo Ali, has gotten into the hands of TorrentFreak. TorrentFreak's Enigmax summarizes the document in some detail:
Dealing with Internet service providers
In common with cyberlockers, IFPI have a set of rules they’d like to impose on Internet service providers. According to the industry group, ISPs should not provide Internet access to infringing sites, services or even unidentified customers. Furthermore, ISPs are required to “Implement a system of graduated response for infringing P2P users including warnings to an effective deterrent sanction.”
ISPs are also required by IFPI to block access to infringing sites and services “located outside the local jurisdiction.” The chart below shows where blocking orders have been obtained (prior to April 2012) and how they are carried out.
Surprisingly, despite reports mounting to the contrary, IFPI seems to think that site blocking is an almost perfect solution to counter infringement.
“The effectiveness of such a ‘block’ will depend on the determination of the ISP subscriber
and the content/website provider to maintain access to each other and to use circumvention techniques to bypass blocking techniques,” they write.
“There is evidence to suggest that there is limited (between 3% and 5%) adoption of these circumvention techniques although subscribers with more technical knowledge could look to circumvent ISP controls using virtual private networks (VPN) or anonymous proxies.”
Leaked Report Reveals Music Industry’s Global Anti-Piracy Strategy
CSIR-Tech is the commercial arm of the Indian government’s Council of Scientific and Industrial Research; after spending ₹50 crore (about USD7.6M) pursuing more than 13,000 “bio-data patents” (patents of no real value save burnishing the credentials of the scientists whose names appear on them), they have run out of money and shut down.
Troy Hunt, proprietor of the essential Have I Been Pwned (previously) sets out the hard lessons learned through years of cataloging the human costs of breaches from companies that overcollected their customers’ data; undersecured it; and then failed to warn their customers that they were at risk.
The World Wide Web Consortium has announced that its members have until April 19 to weigh in on whether the organization should publish Encrypted Media Extensions, its DRM standard for web video, despite the fact that this would give corporations the new right to sue people who engaged in legal activity, from security researchers who […]
Custom coffee vessels are the perfect piece of office flair, but it’s just a matter of time before your VOTE FOR PEDRO mug will start to lose its relevant wit. Why not have a new one every day, with whatever silly nonsense you want sticking off the sides? You can save big on your novelty […]
The Lightning port has thus far resisted the cruel fate that befell the headphone jack, and despite rumors that it may be disappearing come iPhone 8, for the present and foreseeable future, Lightning cables are a hot commodity for iPhone users. As such, we must make do in this strange time in which long, glorified […]
All the filters in the world won’t save your smartphone pics from a shaky hand. To really step up your mobile photography game, you’ll need some kind of mount to hold it steady. You could buy a smartphone attachment for a conventional camera tripod, but who wants to carry that kind of gear everywhere they […]