Download now Free registration required
In an effort to prosecute P2P users, RIAA and MPAA have reportedly started to create decoy users: they participate in P2P networks in order to identify illegal sharing of content. This has reportedly scared some users who are afraid of being caught. The question the authors attempt to answer is how prevalent is this phenomenon: how likely is it that a user will run into such a "Fake User" and thus run the risk of a lawsuit? The first challenge is identifying these "Fake Users". The authors collect this information from a number of free open source software projects which are trying to identify such IP address ranges by forming the so-called blocklists. The second challenge is running a large scale experiment in order to obtain reliable and diverse statistics.
- Format: PDF
- Size: 160.4 KB