AfterDawn: Tech news

The Pirate Bay is developing a new P2P protocol to replace BitTorrent

Written by Rich Fiscus (Google+) @ 08 Nov 2007 0:12 User comments (18)

The Pirate Bay is developing a new P2P protocol to replace BitTorrent Apparently motivated by BitTorrent's high profile dealings with content owners, Peter Sunde, co-founder of The Pirate Bay, says the site is working to develop a new P2P protocol. Sunde said in an interview, "If they go and do something stupid, it will affect a lot of people." The Pirate Bay gets around 1.5 million visitors each day.
For his part, BitTorrent president Ashwin Navin isn't losing any sleep over the site's planned switch. "We are not really disappointed here," he told Reuters. "The pirate community has never paid us a dime." Last month BitTorrent launched a new media distribution service that Navin hopes will increase the overall number of people using the company's self-named P2P protocol by more than 5 times. They already have Brightcove, which distrubutes video for prominent clients including CBS, Fox Entertainment, and Viacom as a client. Deals like those are what worry Sunde.

At least one industry observer, Eric Garland, CEO of BigChampagne, isn't surprised by The Pirate Bay's apparent distrust of BitTorrent's corporate ties. "Future development (of the BitTorrent software) will almost certainly be focused on things that do not benefit or further the aims of the pirate," Garland said.

Source: PC Magazine

Previous Next  

18 user comments

18.11.2007 0:54

I've always disliked BitTorrent, but aside from my personal biased, I am pleased that ThePirateBay is creating an alternative. I do not use ThePirateBay, but I highly respect them. They are about their customers, and because of that, they make a dime. (Actually, they make good money--very good money.)

Quote:
We are not really disappointed here," he told Reuters. "The pirate community has never paid us a dime."
Uhm... okay.

28.11.2007 2:16

I think someone already beat them to the punch.

Its called "Tor".

38.11.2007 4:17

i also hate torrents, and have never used them.

i do think pirate bay is an awesome company though, and they have my support, even though i dont really use their services either.

48.11.2007 6:53

Quote:
We are not really disappointed here," he told Reuters. "The pirate community has never paid us a dime."
Funny I thought the whole point of BT as free distribution of infermation not beg and roll over to the man to get alil money.


windsong
yes but its dosent have alot of files o it yet.

58.11.2007 9:26
ali2007
Inactive

long live the piratebay and all the pirates

68.11.2007 12:52

Bit torrent wasn't designed for pirates. The technology makes it very easy for the m.a.f.i.a.a. to find out who is file sharing. We need a new technology that protects the privacy of it's users.

78.11.2007 13:17

Erm..Tor is not a p2p protocol, it is a form of tunneling.

88.11.2007 13:41
nobrainer
Inactive

Originally posted by svtstang:
Erm..Tor is not a p2p protocol, it is a form of tunneling.
but encryption tunnelling bypasses most isp's traffic management targeted at bittorrent. if they want to block all encrypted traffic it would have a very detrimental effect on the net as we know it!

tor is not the best encryption proxy to use as is very unfair to clog up their network when the service is in place solely to allow people the freedom of speech without fear of persecution from their governments and with the usa rapidly becoming a dictatorship it is a tool to be used daily in the western world!
This message has been edited since its posting. Latest edit was made on 08 Nov 2007 @ 13:42

98.11.2007 14:22

I understand that fully, I was responding to above posts that stated Tor was a replacement of bit torrent and Zippy's comment "but it doesnt have a lot of files yet." It has no files, it is not a p2p protocol!

And yes, you can still be found out even if you are using Tor, nodes does not equal being invisible on the interweb.



108.11.2007 14:41

Originally posted by svtstang:
I understand that fully, I was responding to above posts that stated Tor was a replacement of bit torrent and Zippy's comment "but it doesnt have a lot of files yet." It has no files, it is not a p2p protocol!

And yes, you can still be found out even if you are using Tor, nodes does not equal being invisible on the interweb.
But for in order for it to work it needs to sent on it right? thus "not many files" dose apply :P

then again you need to be fluent in zippy to understand WTF I ment >>

and yes even I can only understand myself to a point :P

Copyright infringement is nothing more than civil disobedience to a bad set of laws. Lets renegotiate them.

---
Check out my crappy creations
http://zippydsmlee.deviantart.com/

118.11.2007 14:44

Sadly I did not take Zippy in college, I think learning German would have been an easier feat! :p



128.11.2007 14:51

Originally posted by svtstang:
Sadly I did not take Zippy in college, I think learning German would have been an easier feat! :p
Dont you mean Chinese..all of it...

:P

Copyright infringement is nothing more than civil disobedience to a bad set of laws. Lets renegotiate them.

---
Check out my crappy creations
http://zippydsmlee.deviantart.com/

138.11.2007 19:53

i nake a differance.........

149.11.2007 19:21
xhardc0re
Inactive

someone needs to develop a protocol that's based on a login name/pass vs. IP addy. The IP addy would be scambled & sent through a decentralized hub of web servers. Kind of like TOR.

I could create the login name of JohnDoe. If i registered that before anyone else, it becomes mine. No other user could access the JohnDoe account. No email would be associated with the account; the person who registered would need to remember it. The pw could only be changed by supplying a passphrase, answering a question, and inputting the exact date the account was originally created. This only requires memmory or a sheet of paper. Each of the sites within the decen server network would allow pw change. The servers would exchange file tables via tunnel encrypted transfer once every 24 hours. The username/pw table would have 1,024 bit encryption.

Unless a hacker broke into the decen servers that each stored the username/password table, no one would know where JohnDoe was. Or what the pw. If the pw was ever lost, JohnDoe would no longer exist within the bounds of the network. Every 12-18 mos, all accounts that hadn't logged in for more than 6 mos would automatically be purged. Several networks could exist, each with their own members, but no two membernames could be the same.

Lastly, if a site was ever busted the site owner could send an SOS to all other servers & let them know NOT to accept any pw changes or updates. The site owner could smash the HDD with a hammer, throw it in a fire, and the data would be safe from the M.A.F.I.A.A. If he/she had time, they could run Gutmann file destruction (35 passes > U.S. DOD level of file deletion)

1510.11.2007 4:13

Originally posted by xhardc0re:
The site owner could smash the HDD with a hammer, throw it in a fire, and the data would be safe from the M.A.F.I.A.A.
This is not the case. That's called destroying potential evidence and they will still proceed with the case. (Happens all the time in P2P cases)

1611.11.2007 15:57

A P2P is not a case unless someone has hacked your computer to capture some damming information which will identify the culprit. They lost cases because some free loader was doing the deed on another's account. Once they have you dead to rights then they can go after you. Claiming some one else was using your net work or swapping out the hard drive doesn't do much good when they have all you account information taken from your computer.

1711.11.2007 17:07

Originally posted by Mez:
A P2P is not a case unless someone has hacked your computer to capture some damming information which will identify the culprit. They lost cases because some free loader was doing the deed on another's account. Once they have you dead to rights then they can go after you. Claiming some one else was using your net work or swapping out the hard drive doesn't do much good when they have all you account information taken from your computer.
Exactly. Many isp's will contact you if your wireless is unprotected, so that argument is moot. Bottom line is that you are responsible for your network. Once they obtain a MAC address from an ISP it is all over, nothing can be said if your address matches the one given by the isp.

And yeah, if you were given notice that you were being sued for p2p usage or the like, destroying evidence would not be too wise. Not only does that prove your guilt, but also adds tampering/impeding with an investigation.


1827.11.2007 15:37

I see this as a wise move by the pirate bay seeing how they want not to be linked to anyone else so they can not be taken down by a long shot. Well done tpb.

Comments have been disabled for this article.

News archive