[EMAIL PROTECTED] wrote: > http://edition.cnn.com/2003/TECH/internet/08/28/downloading.music.ap/index.h tm >> >> basically they use md5 hashes and mp3 file tags - not so efficient >> IMHO coz it's easy to have all those modified by a script :-D wonder >> if they'll ever get to Uganda and our KaZAA community? Also, >> obtaining the hashes means *_ILLEAGALLY_* downloading a copy of the >> file doesn't it :-D? >> >> cheers, > > from what i have been told,ie letter of email vis-a-vis word of mouth, > the new cybercrimes task force of the FBI and Secret Service tags > some files with some hashes, then releases them into the wild ie > yega, kazaa, imesh etc. they then track the downloads of these files > to the different computers around usa. this is all theoretical and > its inplementaion is widely disputed by security professionals, so it > possible that they want to scare us into stopping kazaa.
This has some truth. About the US Fed's involvement, I am not sure, but I know record companies now offer a looped version of a single song, and rename it to fit all the songs on a single album. One person grabbing these songs means the Kazaa community will be plagued with fony music for a long long time, forcing irated members to go and buy the CD-ROM instead, and then upload the songs to the Net. The motive; at least sell one CD-ROM than sell none at all. > > by the way, did anyone also find himself or herself blacklisted today > by osirosoft.com? > > > --------------------------------------------- > This service is hosted on the Infocom network http://www.infocom.co.ug Regards, Mark Tinka - CCNP Network Engineer, Africa Online Uganda --------------------------------------------- This service is hosted on the Infocom network http://www.infocom.co.ug
