Torrent client whose users cannot be blamed for downloading, storing and distributing content

    We recently announced the ACE Stream project , and the entire Torrent Stream product linewill soon move under this brand. This is not just a change of brand, but also a new vector of development, with new opportunities for the application and operation of P2P technology in various Internet projects. Despite the presence of the commercial vector in the ACE Stream project (solutions / products and services for commercial organizations), the non-profit direction will also develop, and all Torrent Stream features will continue to be available to the user, and besides, they will also be significantly expanded with new ones. opportunities that will not only provide additional amenities, but also will at the software level protect the interests of their users and their peace of mind when using torrents. Here is one of these software methods, the implementation of which will protect our users from downloading charges,

    Perhaps for some our goal will seem trite, but for many Internet users it is very relevant and urgent.

    Purpose: To make online playback through torrents absolutely safe for the user

    For those who do not know: one of the functions of the Torrent Stream (ACE Stream) products allows you to play video and audio content on-line, via torrents, without having to wait to download the entire file. (An example of one of the products that turns almost any torrent tracker into an online movie theater: Extension for the web browser TS Magic Player

    I want to say right away that this will not be about some kind of closed add-on protocol. Full compatibility with any other torrent by customers!


    About the problem and solution



    Before telling about the method we introduced, I would like to touch on the problem itself, from which we want to isolate our users, and superficially consider some legal aspects regarding the following actions: downloading, storage and distribution. For those who are not quite in the subject, this will not be superfluous.

    Actually, these terms and related actions are the basis of debate around the world, personifying the most “global global problem”, namely: “unlicensed distribution of video and audio content on the Internet.” In fact, this problem should be a headache only for content producers and their distributors, who can’t accept the existing realities in any way, continuing to actively defend their outdated distribution schemes, instead of maximizing the huge potential of the Internet by creating and using new distribution models. But, in fact, this was precisely the headache for many Internet users, on whom they fell:

    • Information-psychological intimidation through purchased or incompetent media (which absolutely do not understand and do not want to understand the root of the problem, and even more so do not try to conduct some kind of legal examination of the issue, misleading their readers.)
    • Direct legal intimidation and extortion of money from collectors and law firms (a problem that users in some countries face).
    • The mass struggle against the adoption of senile laws (example: SOPA, PIPA, ASTA, etc.)


    But for us, in the first place, it is interesting that it is the users of bittorrent networks who are threatened, accused and attacked the most, unlike users who download the same content from file storages or play it online on video hosting sites (VKontakte, etc.). o) that from the technical point of view is practically no different from downloading from file storages

    Probably, someone will want to comment on the significant difference, but do not rush, as this is what I propose to understand in order to understand in more detail what are the differences and where is this Achilles heel, which does not allow users to feel calm and confident bittorrent- networks, unlike users of different video hosting sites using the HTTP protocol. Perhaps the matter is still not in the protocol itself, and not even in torrents, namely in the working methods of client applications that use this protocol !?

    So, what are the users of bittorrent networks so loudly accused of?

    The general legal wording of all the charges is “illegal use of copyright objects”, the basis for which are the following user actions: “download”, “storage”, “distribution”. It’s exactly these actions that I’ll try to analyze, comparing different ways and methods to find exactly what will allow the user to feel confident and calm when watching movies and listening to music taken from Internet sources.

    Terms:

    “File” - a block of information (in our case, we mean only video and audio content)
    “Unlicensed file”- a block of information that falls under the definition of objects protected by copyright and protected by such a right, in accordance with the legislation of a particular country, but which is distributed without a proper license.
    "Download" - the process of obtaining the file
    "Storage" or ownership of the file - placing the file on physical media owned by the user.
    “Distribution ” - file transfer process

    About Download

    Frankly, I don’t know of any country where there is a direct ban on downloading unlicensed files at the legislative level (I don’t take into account media headlines like “ban on downloading movies and music,” since they have no legal justification, and as a rule it is all set forth by some abstract concepts). The absence of such a ban is primarily due to the fact that it is practically impossible to create any centralized content identification system, which, for example, when a user tries to download a file, notifies / informs him of the status of the file (licensed or unlicensed). Without such a notification system, any download cannot be classified as “intentional downloading of an unlicensed file”, and besides that, “unlicensed” does not mean “illegal”, and accordingly, there will be no grounds for accusation. To make it clear what this is about, please answer one question: For example, did you find the Avatar movie uploaded by a user from Antigua and Barbuda on some torrent tracker, is this content legal? Most will probably answer “no” and be surprised to learn that this is absolutely legal content, albeit unlicensed. (Info: at the end of 2007, the World Trade Organization officially allowed Antigua and Barbuda to violate intellectual property rights owned by US companies). Well, and considering that in P2P it’s almost impossible to determine the source (who originally posted the content on the network), it’s also almost impossible to determine the status of content legality! Anyway, it’s not up to the user to think and argue about the status of the content presented on the sites (Sites are not an underground hangout and it’s not about a closed network, such as i2P. The site’s administration is responsible for the legality of the content on the site, and the domain manager is responsible for the legality of the sites themselves Well, the relevant authorities that should exercise such control, therefore, if the site is up and running, it means it is legal and all the information on it is legal! It should be so !?), so let those who care about the status of the content think about it, who on e th earns or loses, and who gets the money for it. But regardless of this, it still makes sense to make comparisons and determine which download method protects the interests of the user as much as possible, since it is not known what the lawmakers of your country will think of, considering

    Compare the methods:

    • Download via a direct http-link (for example: from a file hosting service, such as Rapidshare, ex.ua, etc.) An
      open http request is made to transfer a file, which in its parameters can be an object protected by copyright. The file is transmitted in clear form, which allows a third party (for example: a provider) to identify the file taught by the user on its side.

      Conclusion: This method does not protect the user from charges, if there is a direct ban on downloading an unlicensed file.

    • Online playback via Unicast / HTTP (for example YouTube or video / music on the Vkontakte website).

      Conclusion: A complete analogy to downloading via a direct http link.

    • Downloading via BitTorrent protocol

      To download a file, the user uses a torrent file or a magnet link, or other transport files and protocols that are not protected by copyright. In principle, torrent files can be made / classified as derivatives of copyrighted files, so url schemes have begun to become popular, where there is no need to store and transfer torrent files.

      The user receives the file directly through its specialized client application (torrent client), which actually collects this file from pieces / segments received from different sources from the network. Moreover, a complete file may not exist at all on any of the sources. Thus, the user receives data in the form of abstract blocks (16 kb each), which cannot be considered as objects protected by copyright! In addition, without the availability of a hash code, it is almost impossible to identify such a piece / segment and its belonging to any file, although in this case it is not so important, just a pleasant trifle.

      Conclusion: This method protects the user as much as possible, if there is a direct ban on downloading an unlicensed file.


    About Storage

    Very important action. As the saying goes: "no body - no business!"

    Compare the methods:


    • Storage, after downloading via a direct http-link
      Naturally, after downloading, the user saves the file on his device. An important point is the method of its further storage (in open form, in encrypted or on a USB flash drive, it was buried and buried in the ground, well, or after viewing it, I simply deleted the file), but this does not directly relate to the essence of the issue under consideration.

      Conclusion: User protection depends only from himself and the file storage method he uses.


    • Storage, when playing online (Unicast / http)
      Many users think that when watching videos online, on the same YouTube, they don’t have anything stored. In view of our topic, I want to disappoint such users, since when playing online, files are saved in the so-called “cache” (in a hidden folder on your device / disk). The benefit is that this daddy stores files temporarily and deletes them as necessary.

      Conclusion:The user is absolutely not protected from the charge of storing the file, since in fact this is the storage! The negative point is that the user may be completely unaware that he has an unlicensed / illegal file, and worst of all, if he finds out this unpleasant news only after the screening of his device by forensics. But, there is one and huge plus, since this file is located in a folder with a specific technical purpose, although this plus will only be for users of those countries where there is a legal definition / interpretation of the caching system (“System Caching”), which marks the charge of intentional storage . Well, for users of most countries of the former USSR, this will most likely be interpreted as “temporary storage, which in the context is no different from ordinary storage.

      Note: Caching is good, but not enough for peace of mind.


    • Storage after downloading via BitTorrent protocol
      Similarly, after downloading via a direct http-link. The only difference is that the user is limited in the methods of protecting the received content, because if after downloading everyone starts encrypting or hiding the file, changing its original save path, then the whole P2P will be covered with a copper basin. But of course, there are harmless protection methods for P2P, for example, initially specifying the save path to a protected partition on the disk (there are enough programs creating such partitions)

      Conclusion: Similarly, after downloading via a direct link, there are even fewer ways to apply additional protection measures.


    About distribution

    Considering that we are considering methods that protect only law-abiding users whose purpose is exclusively to watch or listen to video or audio found on the Internet, there’s no point in considering different ways of uploading content to the network or organizing live broadcasts in this topic, so we’ll go straight to bittorrent, since it is here that the fact of transferring data to other users during download and storage is present, which does not happen when using HTTP.

    As previously noted:

    1. Users exchange data in the form of abstract blocks that cannot be considered objects protected by copyright!
    2. The user can participate in peering without having an integral file, which can be considered an object protected by copyright!

      Conclusion: Based only on the fact of seeding (sending pieces / segments), the user of the torrent client cannot be accused of distributing content / unlicensed files!


    Conclusion:
    It turns out that the only problem lies in the data storage method used in existing torrent clients, and not in P2P and / or torrents themselves. Moreover, using the bittorrent protocol is not only much more effective than downloading via a direct http link or than playing online via unicast, but also much safer!
    It is this gap (storage) that enables various bad organizations to cast fishing rods in the bittorrent swarm, with baits in the form of torrents or magnet links in order to catch the user in storage and, accordingly, in the acquisition and distribution of unlicensed files. The basis for the charges is the technical information received on such a fake torrent client from a user application, namely: the user's IP address, the presence of segments / pieces of a file protected by copyright, the name of the user torrent client (application identification). If we assume that this application is utorrent, then such an accuser draws the following picture: “Given the operation of the utorrent application, the user, in order to return segments / pieces of the file, committed intentional actions related to the acquisition and storage of the file, as evidenced by the need in this application (utorrent) to carry out a series of deliberate and deliberate actions related to the choice of location for storing the file. The file stored by the user can be identified with respect to the object protected by copyright, since the storage method used in this application, for participation in seeding (transferring segments / pieces of the file - in which the user was exposed), means storing the file in clear form , with the possibility of full user access to the information contained in it. Given the conscious and deliberate actions of the user associated with the storage / possession of an unlicensed file, as well as with the user’s ability to control the transfer of pieces / segments of this file provided in the utorrent application, we can conclude that the user also consciously and deliberately participated in the distribution of this file, as well as in storage. And so on and so on. ” As a result, an accusation arises of the acquisition, storage and distribution of an unlicensed file. Of course, a competent lawyer will split such a charge into two accounts if your device with the stored file does not fall into the evidence base or 100% of the pieces of this file do not leave you on such a dummy client, which is almost impossible, unless of course you are sitting alone. Although 100% file transfer should not really scare the user if the fact of storage is not revealed. In addition, for example, if we take the legislation of Russia, then to fall under Art. 146 of the Criminal Code, such 100% of transfers must be collected for the amount of damage of at least 50 thousand rubles, and of course also find these files on the user's device, since without this all the accusation could fall to the root (suddenly a user has a virus on a machine that drives other people's files through it through the Internet without his knowledge !!!) But, I remind you, our main goal was to make it for the user Online playback through torrents is absolutely safe, and so that our user feels confident and calm when watching movies or listening to music from the Internet. Well, to think about a lawyer before launching a film, instead of beer or tea and cake, this is not what we want for our users, so we tried to close the identified existing holes. to make online playback through torrents absolutely safe for the user, and to make our user feel confident and calm when watching movies or listening to music from the Internet. Well, to think about a lawyer before launching a film, instead of beer or tea and cake, this is not what we want for our users, so we tried to close the identified existing holes. to make online playback through torrents absolutely safe for the user, and to make our user feel confident and calm when watching movies or listening to music from the Internet. Well, to think about a lawyer before launching a film, instead of beer or tea and cake, this is not what we want for our users, so we tried to close the identified existing holes.

    Problem Solving and Implementation


    A good example of a storage system are: Wuala, FreeNet, etc. The user of such an application allocates part of his disk space to the general pool of a system. To store data, a caching system is used, where all data is encrypted and automatically deleted as the cache is filled and / or files are in demand by users of the system. An important factor is that the user cannot identify the data stored in the cache on his device. With such a storage system, it is impossible to accuse the user of storing the content, and, accordingly, of distributing it (the user cannot distribute what he never owned)!

    Taking into account all the above, we actually made the implementation of a new data storage method for our application. Now we call it: “Distributed storage and delivery of data” The

    user provides part of his disk space and part of his Internet channel to the common pool of the ACE Stream system.

    About Implementation

    Cache

    • The user selects the drive on which the cache folder will be created. At any time, the user can reassign / change the drive for the cache folder.
    • The cache folder does not have a fixed size and does not reserve disk space. The user can set the maximum cache size on his own or use automatic mode (in automatic mode, the program will use no more than 70% of free disk space for the cache)
    • All data in the cache is encrypted and not identified. Neither the user himself nor anyone else can play the files in the cache.
    • Data in the cache is deleted automatically (without user intervention) as it is populated. Take into account: date and demand for data (based on the number of data requests)
    • The user can independently perform a complete cleaning of the entire cache (delete all data manually or through the option "clear the cache folder")


    Receive and transmit data

    • The user can independently limit the bandwidth of his Internet channel dedicated to ACE Stream, indicating the maximum download / upload speed, or enable automatic mode.
    • The seeding system works autonomously and only with cache data, without user intervention
    • When downloading data via a torrent file, segments / chunks received by the client application are automatically encrypted and stored in the cache folder
    • When seeding / data transfer, all segments / pieces are automatically decrypted and transmitted in their original form (in the form in which they were received by the client)


    Generalized: According to the specification of our client software, the user cannot access the information contained in the cache data and cannot control the process of data seeding / transfer, except for the general speed limit of the Internet channel that he allocates for ACE Stream. In addition, the user cannot transfer content that he owns (through the content of which he has access) through our software.

    In conclusion: This system allows the ACE Stream client application to fully exchange data with any other torrent clients, but does not grounds for accusing the user of the acquisition, storage and distribution of content.

    I also want to note that the user will have the opportunity to save the file being played in the clear and in a convenient place for him. To save the file, the user will be able to use the “Save” button, which will be displayed on the player’s control panel through which playback will be performed. The user can use this function at his own risk, or, of course, if there is absolute certainty that the content is licensed and / or distributed legitimately and there is a desire to save it in his collection.

    PSFor those who are not convinced by all the above arguments and justifications, or for those who are panicky afraid of P2P (bittorrent), as well as for those whose devices do not allow us to use our software, we will prepare a cloud service that will allow you to start playing torrents online, without the need of installing a P2P client, on my

    PPS device I apologize in advance to the Geeks whom I got tired of chewing for a long time, but I hope that this helped convey to many the essence and meaning of the method we introduced. Well, I hope that someone in my chewing found for themselves at least something useful, and perhaps learned something new for themselves.

    Also popular now: