On Fri, Aug 26, 2011 at 9:29 AM, David Barrett <dbarr...@quinthar.com>wrote:

> Would you and your 7 friends be equally enthusiastic early adopters if the
> 9th member of your node was the RIAA/MPAA/etc?
>

The RIAA/MPAA could join our cluster, however the design properties of Tahoe
would prevent them from accessing our data.


> In these digital inquisition times, where your entire net worth can be
> vaporized at a whim, how do you convince people that it's safe to share your
> data even if it has a normal amount of pirated content?  (After all,
> everybody has *some*, and probably enough to trigger catastropic
> consequences if noticed by the right party.)
>

Again, the design properties of Tahoe blur the concept of whose data is
actually on the cluster. From the outside looking in, the contents of data
you provide to the cluster is cryptographically opaque. Unless they can
prove you have the cryptographic keys to access a particular piece of
content, you can make the argument that you literally had no way of knowing
that the encrypted data you are storing was in fact pirated content.


> With this in mind, ask your testers to participate in a challenge: they use
> it as normal, but offer to pay $100/instance to anyone who can prove a given
> IP address pirated something -- a crowdsourced RIAA simulator.  If there are
> no takers, try $1000.  Once you've got it to a point when nobody can tell
> who has what (yet the system continues to work and provide real value),
> you're onto something that might get widespread appeal.  If it's usable,
> that is.


In the type of system I'm envisioning, it would by design allow you to
easily discover which node IDs had chunks of a given file. However, that
file is encrypted. Provided you can obtain the encryption keys, you may be
able to prove that a particular file is, in fact, infringing on a copyright.
However in order to prove that participants in the network actually engaged
in an act of piracy as opposed to merely providing nodes which engage in the
free exchange of encrypted data, you would also have to prove that a
particular user also has the encryption keys needed to access a particular
piece of content. I think this would complicate prosecuting users for
copyright infringement, however IANAL.

-- 
Tony Arcieri
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to