Can P2P Filter Copyrighted Content? 373
scubacuda writes "DRMwatch reports that technologists acting on behalf of porn publisher Titan Media reported to Congress that P2P networks could (if they wanted to) use "fingerprinting" (aka "hashing") to detect copyrighted works and then filter them with the "spyware" installed on all nodes in the network."
A DRM Parable (Score:5, Funny)
Then they came for the music. And I didn't speak up because I was a leecher and never shared my songs.
Finally, they came for the porn. Nobody touches our porn. And that's when we got REALLY pissed off.
It'll never work (Score:5, Insightful)
Re:It'll never work (Score:3, Insightful)
Re:It'll never work (Score:3, Insightful)
2) When money goes from A to B, B has a greater interest in protecting the financial data after the transaction than A does.
3) Creative works exchanges are rarely done in secret. Especially not on P2P networks. Or on web sites. Even most providers of content take no measures to secure the transfer of said content (i.e. ever heard of an adult site using only HTTPS from the login page on in?)
4)
Re:Victims of porn (Score:5, Funny)
Re:Victims of porn (Score:5, Funny)
But Xsters--wow. It's me, a picture, satan and and a crowd of slathering demons, and god hisself, heavenly nostrils flared in anger, while a chorus fiery-sword-wielding seraphs chorus 'for shame, for shame.'
I just don't get that kind of mileage out of it.
Re:Victims of porn (Score:4, Insightful)
but if you're addicted you'd probably be better off without. It's such a marketting gimic to disregard the posibilities of addiction. Then there's the fact that he posts anonymously, how hard is it to sign up.
** back on topic ** There's no way the porn industry could do anything about "copyrighted" material being distributed cause all it takes is a slight change in the archive to change the hash and blow the system away. The only way it would work is if the porn industry started setting up tons of high traffic nodes distributing all sorts of stuff just to block some porn on some searchs, but they'd just get blocked anyways.
Re:News for Nerds, Stuff that Matters (Score:2)
Tim
Re:News for Nerds, Stuff that Matters (Score:4, Funny)
Your Rectum Online?
Re:A DRM Parable (Score:5, Informative)
First they came for the Jews
And I did not speak out ?
Because I was not a Jew.
Then they came for the communists
And I did not speak out ?
Because I was not a communist.
Then they came for the trade unionists
And I did not speak out ?
Because I was not a trade unionist.
Then they came for me ?
And there was no-one left
To speak out for me.
P.S. It is an important reminder to stand for the rights of others, to stand for the rights of terrorists, murderers, child pornografers, P2P programmers, christian fundamentalists, and for the rights of everyone else. We may disagree with people, but only in a free and tolerant society can we expect to be safe ourselves.
Re:A DRM Parable (Score:3, Funny)
Ok, just don't ask me to stand up for spammers
-
They'd Better Not (Score:2)
Re:They'd Better Not (Score:4, Informative)
But trying to clarify that is like telling an internet user that a "cracker" broke into their computer, not a "hacker." (However, I'll note that the copyright legality clarification is probably more important than that of the cracker/hacker.)
Doomed to fail. (Score:5, Insightful)
Did common sense go on holidays?
Load a fingerprinted file.
Change one bit.
It has a new fingerprint.
The eDonkey/eMule network already identify files by an MD4 hash to ensure you get what you ask for. For instance: if a file has many sources then that means they have the same hash, you can be quite sure that it isn't a bogus loop of a pr0n flick when you really wanted that latest DVD rip.
If this goes through you'll see a new kazaa-compatible P2P client appear that pops a few random bytes into the ID3 tag of an MP3, the comment section of a JPG or in the headers of a video file. Each one will then have a new hash. Oops.
Oh, the new KazaaDRM(tm) ignores comments & tags and only looks at the actual data? OK, the new client toggles a bit that won't cause any visual or audio degradation of the file. Oops.
That all said if 100 people rip an MP3 or DivX file they won't generate the same byte-identical file. This is doomed to fail at the expense of your computer's CPU cycles as it generates these useless hashes.
Re:Doomed to fail. (Score:5, Funny)
OK, I have a better idea.
In order to check whether any of the porn files on kazaa (or wherever) are identical to copyrighted porn, all we need is someone who watches all the porn on kazaa and then compares is with their library of copyrighted porn.
Can I have the job?
Re:Doomed to fail. (Score:2, Funny)
Can I have the job?
You'll need an assistant...
Re:Doomed to fail. (Score:5, Funny)
Can I have the job?
Yes you are assigned to the scat and watersports division. Enjoy.
Re:Doomed to fail. (Score:5, Funny)
Youre talking about the mass media industry. Common sense retired about 25 years ago.
Re:Doomed to fail. (Score:2)
Hmm.. (Score:4, Informative)
However, for the average Kazaa user, it just might work. Most of them seem to think that if you uninstall kazaa your music is gone...or that you can't play the Kazaa music outside of the Kazaa client.
Keeping this in mind, then, we can give a little bit of credit to these guys in that they may succeed in fooling the idiots who use Kazaa.
Of course, people like that usually aren't the ones to come up with "original" content anyway.
Its actually amusing to think of the cat and mouse game this could develop into
Re:Hmm.. (Score:5, Insightful)
Kazaa is just the current filesharing stepping stone. If you look back you'll see a great deal more stones sunk behind you. And if you look ahead there are a great deal more being built.
Nothing can stop these new stones from bubbling to the surface. They cam destroy old stones, but We will build new ones. And the 'idiots' will just follow the path, as always.
Re:Doomed to fail. (Score:3, Insightful)
Load a fingerprinted file.
Change one bit.
It has a new fingerprint."
Actually, no. Changing one bit should affect a uniqueness hash, but not necessarily so a fingerprint.
As a simple example, think of the little logo that you sometimes see down in the corner of a video as a fingerprint -- changing one bit of that doesn't remove the fingerprint.
Again, you'll change the hash but not necessarily the fingerprint...
Re: (Score:2)
Re:Doomed to fail. (Score:5, Informative)
You've looked at this too naively... Take around a hundred MD5s of nonoverlapping chunks of the file. If 90% of these match, you have near certainty that the files match except for exactly such tampering as you suggest.
For some files, you could get away with that. For others, particularly the highly compressed audio and video files that dominate P2P, breaking such a detection algorithm would, over time, introduce intolerable errors in the file (by the third or fourth copy, I'd say), since such changes would need to occur randomly or risk filtering by the detection algorithm V2.
Not to say we couldn't still get around such attempts to prevent downloading - Until they ban them, simply putting everything in a password-protected zip file (with the password included in a non-passworded file) would suffice for generating effectively random files (to a hash checker, anyway).
My point? Overall, this will just turn into yet another war of escalating circumventions and countermeasures, benefitting neither the content producers nor consumers.
Re:Doomed to fail. (Score:4, Informative)
Of course, you could choose to ignore the low bits, and fingerprint the upper bits, but this requires the software that trades files to be able to decode any type of file going over the network. This isn't feasible because it wouldn't be hard for someone to write a strongly encrypted proprietary wrapper on existing codecs which "garbages" the data, and distribute a free package which ungarbages it. Even if it was simple for Kazaa or other services to break this and include it in the software, it would not be legal for them to distribute the decryption with their software. If somehow it became legal, it would be simple for someone else to release a new one next week. And another new one the week after that.
The point is that this would start a tit-for-tat war. I guarantee any fingerprinting technique someone can think of, someone else can can defeat it with ease, and the concept of wrapping files in another program will put the highest volume copyright traders a few steps ahead of content filtering, ad nauseum.
Re:Doomed to fail. (Score:3, Funny)
How does one slightly change a bit?
Which is totally nuts. (Score:3, Insightful)
So the "content" industry would want operators of P2P software to store 100 MD5 hashes of EVERY PIECE OF COPYRIGHTED WORK IN DIGITAL FORM, and compare EVERY SET OF THEM against EVERY FILE TRANSFERRED.
That is just wacko.
For starters you'd requre every peer machine to have a copy of all tho
And it's doubly nuts because it won't work. (Score:3, Interesting)
Re:Doomed to fail. (Score:2, Informative)
No, it didn't. There are "hashing techniques" specially made for audio - "audio fingerprinting" so to speak, like Relatable [relatable.com]'s TRM [relatable.com] and Gracenote [gracenote.com]'s MusicID [gracenote.com] which do a great job of it. They identify the file correctly no matter what the source is - lossless audio CD, or even 128kbps MP3, you get the same fingerprint.
I've tried TRM personally through MusicBrainz [musicbrainz.org], and ran it on around 1000 of my MP3s, some of them really horrible quality, and it managed to identify 99% of them
so true (Score:2)
Yep you're right. Nothing.
Will this people get a clue some day?
Didn't AudioGalaxy try this? (Score:5, Informative)
Re:Didn't AudioGalaxy try this? (Score:3, Interesting)
This seems to open a possibility. Note I'm not saying this is a good idea, just that it seems like it might be a more workable system than most proposals:
Set up a public/private key infrastructure. If the content producers are losing as much as they claim they should be more than willing to pay. Anyone can have a key if they verify who they are to a reasonable level (eg by supplying a credit card number).
Now, we can have a rule that a client must o
Re:Didn't AudioGalaxy try this? (Score:2)
Nothing I described in any way limited what you could do with your computer. That was the whole point. What I described was a system where other people could refuse to listen when you decided to make your computer broadcast things you weren't prepared to claim you had a right to broadcast. The right to speak is not the right to have anyone listen to you.
It is interesting to see how many even here make the implici
Fuzzy Fingerprinting? (Score:3, Insightful)
Re:Fuzzy Fingerprinting? (Score:2)
And in fact, those two P2P networks - whi
Doubt it. (Score:4, Interesting)
It is possible only according to the suits in the government. The p2p traffic accounts for ~2/3rds of the internet traffic nowadays, so unless you have an echelon-type system good luck!
(and that is not counting all the anonimity-protecting nets such as freenet [freenetproject.org], MUTE [sf.net], and the new i2p (don't remember link, sorry).
Re:Doubt it. (Score:2)
Currently, I'm looking for about half a dozen network savvy BSD or linux people outside the USA (who would be free to invite other users or router admins after a probationary period). I also have a few slots open for users (any OS) who would like to build some kind of content (ranging from opening an IRC channel, to websites, or even help writing custom software). Domain names are free, static IPs, no restrictions of any kind.
Wait, wait...GOT IT! (Score:2)
P2P, hashing, DRM, fingerprinting and spyware, diagonally from top right! Yay! What do I win?
GTRacer
- Oh yeah, more crap on my PC
New terminology for porn purveyors (Score:3, Funny)
That ain't all they wanna make grow
If it was truly peer-to-peer... (Score:2, Interesting)
Just like with Napster, there's a core that they can shutdown and be done with it. Are any of the popular P2P networks truly independent?
Re:If it was truly peer-to-peer... (Score:5, Insightful)
I do that very same thing here. The internet connection comes in, goes through a firewall and then to snort both of which squeeze off peer to peer connections. This is to reduce bandwidth consumption and to make the boys over in legal happy.
The software might be independent but the pipes it travels across are not. Lessig's book goes into this in great detail.
Do you really mean what you wrote? (Score:5, Insightful)
Your company is free to establish whatever policies it chooses on your internal network. But I think it is very dangerous to suggest that we create laws that require the providers of public networks to filter content. Have you really considered the implications for free speech and privacy? Who controls the list of banned materials? Who controls the controllers?
Re:If it was truly peer-to-peer... (Score:3, Interesting)
Re:If it was truly peer-to-peer... (Score:2)
It's entirely possible to shutdown a gnutella network of thousands while many tens of thousands operate. well, that's my understanding any how.
I Don't think so. (Score:2)
I think the hash will simply suffer the same fate of being broken up and reassembled in the wrong way, rendering it useless.
won't work (Score:2, Interesting)
Considering the vast amounts involved... (Score:5, Insightful)
Nice try- better than most, actually... But it still doesn't resolve the real problem which is that most of what the labels are selling is crap and grotesquely overpriced at that. People swapping all of that music is more a response to that than anything else.
Re:Considering the vast amounts involved... (Score:2)
Re:Considering the vast amounts involved... (Score:3, Insightful)
Re:Considering the vast amounts involved... (Score:2)
If the stuff is crap why are people swapping it? Clearly the labels are doing a good job at creating what lots of people want. And if it is over priced, it would be being undercut - the technologies which make swapping easy also make legitimate distribution easy.
IIRC, there was a 7% increase in album sales in the UK last year. Maybe the RIAA are
Re:Considering the vast amounts involved... (Score:2)
I don't like half the crap I download, I merely download it to see what it is, then leave i there for others to download, should they desire.
The majority of the music on my hard drive that I actually listen to is from times gone by. the recent stuff is all cover versions of that anyhow.
too easy to defeat (Score:5, Insightful)
Yeah, they could try.... (Score:5, Insightful)
So, watermarking? Well, so far all watermarks that have been tried have been broken, and it would be much easier to figure out how the watermark worked if you had a binary file sitting on your computer that checked it. Just disassemble to find out how it's checked (and once one person does, this everyone will be able to). Plus, you could always just zip+password any file anyway, to prevent watermark checking.
Of course, that doesn't mean they wouldn't try to include this stuff, but why would anyone ever download something so restrictive in the first place?
Hashes aren't unique (Score:2)
I can't imagine the amount of fun when people start harrassing companies by generating files with the same hashes.
Re:Yeah, they could try.... (Score:2)
I was pretty much thinking like you until I started thinking about it. Let me outline the scenario as I see it.
Another ridiculous measure (Score:5, Interesting)
I mean seriously, how much money is Blockbuster making right now renting movies (some of which get ripped by the Divx kiddies 'cause they have way too much time on their hands) while the music industry bemoans their inability to sell records like they did in the late 90's?
Re:Another ridiculous measure (Score:2)
Well since every ripper uses a different bitrate, different cropping, different codec and other differences, (almost) each rip is different in the first place.
The pure amount of "forbidden" hashes that have to be stored would be prohibitive and it also is impossible to automate the process (somebody has to watch each file and tell the program which are illegal and which are legal. There is
Yay. (Score:3, Interesting)
This *is* possible... (Score:5, Informative)
I used to work for a small company called Relatable (http://relatable.com/), which was working with Napster back in the day to identify the music being traded over the network.
Relatable's technology recognizes music by the acoustic properties of the audio itself regardless of how it was recorded, encoded, etc.
Obviously there are still ways around this, but it is a fairly solid solution.
It is important to recognize that "fingerprinting" does not equal "hashing". We all know that hashing will *not* work. But there are other techniques, at least for audio, that can work.
Josh
Re:This *is* possible... (Score:2)
Re:This *is* possible... (Score:3, Interesting)
1) Rename the file from
2) Put the file in an archive of some kind (.zip, etc)
3) Encrypt the file.
So the more sophisticated your scanner might be (e.g. checking file type is trivial, extracting files from an archive is easy, breaking encryption is hard), the more sophisticated the workaround becomes. Eventually the only way to break t
Re:This *is* possible... (Score:3, Interesting)
Napster only ran the search servers. Files were still transferred peer2peer. So how could this technology "recognizes music by the acoustic properties of the audio itself regardless of how it was recorded, encoded" when the actual music is never seen by the servers, only the filenames? (Which was exactly how napster actually filtered.. by filename, the only information they actually had on the file, other then size).
Checking (Score:2, Insightful)
P2P (Score:2, Funny)
Easily Defeated (Score:3, Insightful)
It's also predicated on the idea that the hashes exist. Taking the first example of encoding at different bit rates and using different formats. Who's responsible for providing a reasonably exhaustive and authoritative list of the hashes? If Sharman et al. implement these schemes do they get bullet-proof immunity from criminal and civil liabilities?
Also, who says users will continue to use these "spyware" enabled P2P products once it becomes widely known that blocking has been enabled?
There are just too many excpetions to this idea to be really workable.
Typical slashdot anti-DRM article.. (Score:2)
Two "Duh" Fallacies (Score:5, Insightful)
There are two fallacies with the proposal:
Spyware on the nodes? Even if you could somehow ensure that all compatible clients comply with the spying requirements, how long will those clients be left unmolested? Any P2P "server" is really just a client of many other "servers."
This depends on a mathematical hash performed on a given rendering of a copyrighted sample. Resample and the hash is broken. Hell, even a second-rate email spammer knows how to avoid hash detection: just tweak an unused ID3 field.
This... (Score:4, Insightful)
That is to say, not effective at all.
Re:This... (Score:3, Insightful)
Shutting down napster was very effective. It was effctive in turning in a hard to control problem into an uncontrolable one...
Let's say you install the spyware... (Score:3, Interesting)
But I can change my ID3 tags all day. Can they match me (hypothetically, of course ;)) md5sum to ID3? I highly doubt it.
User hostile software... (Score:5, Insightful)
Peer to peer networks that control what people communicate are possible. As are ones that control who talks to whoom, that people really allow the uploads they purport to, etc etc. As is any software that acts against, rather than for, the person that is running it. We just need to get Palladium in place first. What are you waiting for Microsoft!!!
Re:User hostile software... (Score:2, Funny)
Dude, seriously, if that is your definition of anybody, then... you've been reading slashdot too much
People have been fighting over microsoft using IE as default online shopping link browser and you are talking recompiling to remove controls?
Re:User hostile software... (Score:3, Funny)
This won't work (Score:2, Interesting)
There are systems by which the network cannot possibly detect whether material travelling over it is under copyright or not. Freenet is an example. Everything that goes over the network is encrypted. Nodes may not necessarily have decryption keys. There is then no way for a node to recognize a particular work.
Filter? Of course (Score:2)
More to the point - a ripped file probably wouldn't match the officially distributed checksum anyway, and if you use some kind of "more or less matches" algorithm in the file deletion robot/spyware, someone will eventually lose something vita
Hmm (Score:4, Insightful)
one byte (Score:2)
Sure, you might lose a couple of frames (at worst), but who cares ?
Re:one byte (Score:2)
This sounds like the start of a great idea, but I'd say we should add more than one byte - 1024 bytes should be effective enough, and if my math is correct, we'd have 1.1e2466 different possible checksums for that file. It will be tough to filter out a file that has that many permutations, each one being invisible to the human eye.
Will AD-Aware become a circumvention device? (Score:4, Interesting)
So under the DMCA AD-Aware and all other spyware removal tools will be illegal as they could be used to circumvent DRM.
Sounds like a ploy by the pr0n industry to install more crapware on our pc's.
Come to think of it *nix will be illegal too as their spyware will only run under wind0ze.
Problem. (Score:2)
Maybe a good idea! (for them) (Score:2)
- Make a master list of hashes
- Before downloading or sharing, a p2p app has to check against this list (send the hash, get back response).
All p2p apps should be required by law (in their view) to include this check code. At this point, p2p distribution of 1:1 copies of their wor
Spyware (Score:5, Informative)
Personally, I've done 4 in 2 days. And I can tell you I'm so sick of it it's not even funny.
One was so screwed up the HOSTS file was infected with encrypted javascript. Took me 3 hours just to knock that bastard down to the point I could get explorer open in under 10 minutes.
Special thanks to everyone that fights it by writing those removers... god they are a lifesaver.
They'll put spyware in my computer... (Score:3, Funny)
Not that I watch porn of course. Not me, nope, not one bit. None.
Dumb idea (Score:2, Informative)
Altnet Patent (Score:2)
And what if it _is_ possible in one scenario ? (Score:5, Insightful)
Would that then ruin the argument that "P2P should not be shut down because there are plenty of legitimate uses" by countering with "there is an equally efficient P2P architecture that brings all the same functionality to legitimate uses without hurting copyright law" ?
By doing that, wouldn't they change the issue of whether or not to allow P2P into one of which P2P can be allowed ? (or what is required of a legal P2P ?).
Just wondering...
Technically... (Score:2)
A better idea (Score:2)
When I find something I like, I could find more items with the same "actress" and perhaps make a purchase. Hell, I already know some places that put their logo on small clips for distribution... I'm guess the reason that pr0n isn't so bashed by industry as movies/music is that they probably do noticed they are pulling in some profit from it (site subscriptions, etc).
And the false assumption is... (Score:3, Insightful)
Haven't we seen a plethora of P2P protocols developed precisely because someone we don't trust controls the older protocol? The reality check on this clearly bounces. Even if Microsoft, er, someone did manage to grab a monopoly on the US network's P2P population, which is VERY unlikely, the REST of the world would definitely not play along with those American imperialists. Scheme fails, game over.
So... (Score:2)
BringBackThePorn.com (Score:3, Funny)
-"Scrubs"
Filter Away! (Score:3, Insightful)
Besides, P2P users will just scramble the content in some ridiculously simple way that will invalidate the filters and they'll have to go back to square one. Ig-pay atin-lay anyone?
Xesdeeni
packing? (Score:2)
First of all, I don't think this is necessarly true. They never say how they will hash the file... for all we know the hash could be based on every 100th byte in the file.
Secondly, how many KaZzA users know how to change bytes in a file using a hexeditor? How many KaZzA users know what a hexeditor is?
I think that packing is the best way of getting around hashing. Zip, Rar, Ace etc etc
censorship as damage (Score:3, Insightful)
Lots of MP3s were shared via FTP in the past, until the RIAA began a campaign to root out and shut down pirate MP3 servers. Then people jumped to Napster, but were eventually frustrated first by the forced filtering of some searches and then the service's discontinuation. Now supernode-based P2P networks like Kazaa are being used, and the central company can't be sued Napster-style because they never see any search data. When they are forced to change their code to allow searches and data to be filtered, users will jump to another service designed to avoid the law.
I've said it before and I'll say it again. Short of locking down every computer in the world, there is no way of preventing the digital trading of copies of information. Entities like the RIAA, MPAA and MPA know this. They may try having everything locked down via Palladium or something similar, but knowing they may not succeed, they are trying to fight a holding action, to keep the cash flowing in as long as is possible.
The music and movie industries didn't exist a hundred years ago; I sincerely doubt they'll exist a hundred years from now, no matter how hard they try.
There's an Easier Way (Score:3, Interesting)
A big job? Yes. But so is the "fingerprint database".
And this way, they'd be responsible for their own content, instead of requiring Big Daddy Government do it all for them.
Since they claim to be losing billions of dollars to "piracy", it should certainly be worth their while to charge a few bucks more for each video in order to increase their sales by (according to some numbers I've seen) an order of magnitude.
THe Obvious Question (Score:3, Insightful)
Re:This is the future of P2P (Score:2)
Dude, people haven't done that since Napster started filtering.
Searching for music is easier than you make out. If it ain't spelt correctly then it ain't worth getting.
Re:How stupid are they? (Score:2, Funny)
2 sell to many suck^H^H^H^H costumers.
3 have it cracked
4 goto 1
Re:Another anti piracy method (Score:2)
Re:If you install the spyware, sure (Score:2)
Hey, now there's a good way to get people to switch to Linux. We should all lobby to get this "spyware" as part of windows, then advertise that Linux does not have this P2P limitation. Most P2P users would switch, if they already haven't.