Cable Blocking!
Moderator: Forum Moderators
-
MORDETH LESTOK
- Ninja Pirate

- Posts: 1651
- Joined: April 10th, 2006, 3:34
- Location: Detroitish
Cable Blocking!
I heard on the radio that "Brighthouse" (US) is blocking bandwidth at homes that are possibly P2P'ing...sorry, no more info...will look into later...
-
Dr. kitteny berk
- Morbo

- Posts: 19676
- Joined: December 10th, 2004, 21:53
- Contact:
-
FatherJack
- Site Owner

- Posts: 9597
- Joined: May 16th, 2005, 15:31
- Location: Coventry, UK
- Contact:
From recent press there seems to be a bit of a war on against P2P and file-sharers, as the recent high-profile cases have been against people who are sharing music, rather than those downloading it.
I guess by scaring everyone into become leechers they will cut the roots of P2P, I've certainly become more careful about using systems that don't anonymise the source.
I guess by scaring everyone into become leechers they will cut the roots of P2P, I've certainly become more careful about using systems that don't anonymise the source.
use this http://www.microsoft.com/technet/sysint ... elete.mspx to hypothetically sweep up after yourself
Hmm, that looks more like something that this hypothetical person may use to delete files that they don't want anyone to know they had, as opposed to something that would prevent people knowing that they had acquired them. I'm thinking along the lines of a person who may want to keep the downloaded stuff on their PC, but not have people see that it was downloaded short of them coming and taking his HDDs. Allegedly.
You can only spoof IPs for one way packets, otherwise the packets don't know where to reply to (or they reply to somewhere else who isn't expecting them and they disregard them)fabyak wrote:I suppose you could hypothetically see if your router can do IP/Mac spoofing
In reality, there is no way of becoming anonymous, every ISP in the country will log you against any IP you have for the duration you have it, and any P2P application will publish your IP address. You can try using anonymous proxies, but for high datarate applications these will suck.
-
cheeseandham
- Shambler In Drag

- Posts: 780
- Joined: March 16th, 2007, 20:22
- Location: on the sofa
- Contact:
Have an Open wireless AP (or WEP). Do the download/encryption*/secure delete thang.
When someone comes knocking on your door you say "Wasn't me.. could someone else be using my connection?"
*Using TrueCrypt with full drive/hidden volume will ensure that even if your "unformatted" drive was identified and found, when pressed/threatened and you decrypt, you open up your bank files and "home <cough> made" videos.
Not that I've thought about this hypothetical scenario or anything...
When someone comes knocking on your door you say "Wasn't me.. could someone else be using my connection?"
*Using TrueCrypt with full drive/hidden volume will ensure that even if your "unformatted" drive was identified and found, when pressed/threatened and you decrypt, you open up your bank files and "home <cough> made" videos.
Not that I've thought about this hypothetical scenario or anything...
Last edited by cheeseandham on October 22nd, 2007, 15:02, edited 1 time in total.
-
FatherJack
- Site Owner

- Posts: 9597
- Joined: May 16th, 2005, 15:31
- Location: Coventry, UK
- Contact:



