Thursday, December 30, 2004

Wired 13.01: The Shadow Internet

Si alguna vez se han preguntado como funciona la piratería... la verdadera piratería en linea. No tiene nada que ver con Kazaa, Edonkey o el golpeado Bitorrent...





Tiene más que ver con camaras de miles de dolares, contactos en plantas de quemado de discos, empresas de mercadotecnia, y los muy secretos "top-sites".

Muy recomendado este artículo de Wired.

Aqui viene un mini esquema de la operación de pirateria:



Call it trickle-down file-sharing. The goods - a game, movie, song, or other piece of copyrighted media fall into an insider's hands. Then it's only a matter of hours before a drop becomes a tidal wave.

- Erik Malinowski

1. THE INSIDER
Industry and theater employees run their own straight-to-video operations. Hackers looking for prerelease videogames target company servers. And before that long-awaited CD hits Amazon.com, moles inside disc-stamping plants have already got a copy.

2. THE PACKAGER
The pirated goods are passed on to a release group. These groups take multi-gigabyte movie files and squeeze them down for easy online trading.

3. THE DISTRIBUTOR

Release groups are known to have exclusive relationships with certain so-called topsites. These are the highly secretive sites at the top of the distribution pyramid. When a topsite operator drops a file, the avalanche begins.

4. THE COURIERS
Alerted by release groups, worker bees spring into action, copying and transferring files from the topsites to lower-level dump sites, and then from there to P2P networks like Kazaa and Morpheus. For the couriers, the payoff is props from their peers and credits redeemable for goods on upper levels of the pyramid.

5. THE PUBLIC
After the file is copied thousands of times the P2P networks saturate, allowing casual file-traders easy access to the newest movies, music, and videogames.


Wired 13.01: The Shadow Internet

|
Weblog Commenting and Trackback by HaloScan.com Listed on BlogShares Listed on BlogShares Who Links Here