Monday, April 16, 2007
Methods of collecting evidence revealed.
This article explains how a German company has been collecting user information in peer-to-peer networks such as Gnutella and eDonkey as well as bittorrent. Other companies in the United States are likely to use this sort of technology as well, but the question is whether this is enough to reasonably prove that a file has been shared by the defendant. The main argument here is how can you tell who is responsible for sharing a file? Many people have unsecured wireless networks still, and in the legal documents contained here [pdf] (thanks to torrent freak), it is left to the individual to make sure that no one else uses their network for illegal purposes.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment