|reply to gatorkram |
Re: Oh boy...
said by gatorkram:They hop on a torrent swarm, and then monitor what IP connect, and take a "snapshot" of the IP downloading something. A judge just ruled that their "evidence" is not even admissible in court, since it only shows the suspected criminal downloading a piece of the file(which is covered under creative use), and it does not reasonably identify the downloader, just the subscriber household.
Do they host the files themselves like a honeypot, and wait for people to connect, download and share, or do they just randomly look for files with particular names, and then join those swarms, and start collecting IPs, etc.