Yeah, I remember the days of renting VCR players and acting like we didn’t already own one so we could play on one and record off the other. I think a lot of this is due to the rise in Internet infrastructure. 15 years ago streaming services wouldn’t have been doable. There was no licensing, just files to download. You’d even get Digital Download codes in your DVD case when buying a movie, so you had multiple copies. Really sad how things are consolidating.
I’m guessing you are extremely young as that is not how digital purchases have historically worked. The concept of “you bought a license to use it” hasn’t been around long. Before that, you would be given an access code to go to a publisher’s website like Disney and download a copy of the content you purchased. It wasn’t tied to any licensing server or authentication system past that point, you just had a digital copy of your purchase.
This is exactly what happened actually in one of Valve’s court cases. It wasn’t that Steam went down, but rather the user was permabanned. When that ban happened he lost access to his game library. However, he had purchased those games so he argued successfully that he had a right to download what he purchased. Valve attempted to argue that they were a subscription service so that they would not have to provide anything to him. In the end since he won the case, he was allowed to download what he purchased. I’m sure that created a weird situation for those publishers and I’m not sure whether or not Steam had to remove the Steam DRM prior to allowing him to download.
That’s not really true. I still have physical media that I’ve purchased as a teenager. That’s not a license key that I own that’s physical media. It was independent of any licensing servers or anything like that. Digital media licensing didn’t really start taking effect until about 2010ish en masse. Prior to that most streaming services like Netflix weren’t really streaming services as internet infrastructure didn’t quite exist to that degree yet.
Bare in mind what OP posted was from 4 months ago, but one of the mods mentions it here: https://www.reddit.com/r/PiratedGames/comments/14qvyi3/some_controversy_going_on_at_this_sub/
They acknowledge changes were made, so I would take that as confirmation, but that whole group/sub kind of cringey. Posts do get deleted by mods but users also make a lot of claims without any evidence. I get that most of those people don’t have a technical background so its hard to find evidence, but that also maybe is a good reason to make a claim.
EDIT: When I wrote my original comment, I used “Apparently” and “Allegedly” synonymously. I understand if anyone wants to call me out on that, but doesn’t seem right changing what I wrote (seems like that would be covering).
I think the OP’s question is better worded on the second point as “What is preventing a copyright holder from joining a private tracker?” The answer to that is nothing. In theory, invites would only be handed out to trusted individuals, but the reality is you can just ask for invites and people will give you them.
Why install the app when all the same features work in browser?
This is a pretty fair argument. It reminds me of the early 2010s when the sentiment everyone had was “we have an app for that”. We don’t need more specialized apps (which really aren’t that specialized - most of these do exactly the same thing), we just need intelligent solutions using what we have. Back in the day that was responsive layouts, today it’s browser extensions.
While an interesting idea, there is no evidence that supports that Ad Nauseum adversely impacts reporting metrics. This is due to ad servers all determining click by different methods. It rarely ever aligns. It likely doesn’t impact user targeting either as your behavior still hasn’t really changed and clicks aren’t typically used for that purpose.
You’re better off just running UBlock Origin. Punishing advertisers doesn’t really make any sense anyway. The blame is really on publisher groups and their rampant greed. Auto-clicks just further that.
Here’s my take on it. Things like Radarr, Sonarr, Jackett, etc offer a better service then Disney+, Netflix, Hulu, etc. Devs could charge for the *arrs and a lot of people would pay. Why? Because it’s completely a la carte. Right now if there are say three shows I’m interested in then I could have to pay for three different streaming services. But not only that, I would also have to be concerned with whether or not that show is leaving the platform anytime soon. In the case of Hulu, not only do I have to worry about paying them but I also have to worry about paying them enough that I don’t have to watch ads after paying them.
Likewise with video games, there are games that have DLCs that require previous DLCs to fully unlock what they include. In other words, it is paywalling already paywalled content. I don’t have a problem with the content, I have a problem with the way they present the content.
Pretty much in any case, PII is sent but what exactly gets sent may differ. For example, Revanced I believe just acts as a wrapper for the YouTube platform. YouTube is still collecting information it’s still just you interacting with it just minus the ads. For something like Invidious, YouTube would still be getting information in regards to your IP address in the case of self-hosting or if the connection’s proxied that information, but not the same amount or type of information is being collected.
Sounds like you’ve already maybe ruled out some things, but as far as the port exhaustion question people had, you could prove that with “netstat -s” to see total number of active connections. You might also look in the qbittorrent log file for anything stands out. You might also check your router to make sure you’re not doing some weird port forward or something of that nature.
Those hits relate to DLL injection which would be required for Green Luma to interact with Steam the way it does. Looking at a generic online guide to using GL, the second step even states “Open DLLinjector.exe”, so I’m thinking you’re probably ok. With everything though, take that with a big helping of skepticism. How GL works is sketchy, but that doesn’t mean its not “good” sketchy.
I’m terribly sorry for your loss. Here is some music to help. https://www.youtube.com/watch?v=cJWYTetgsns
Windows being easy to pirate wasnt the reason for it’s popularity. It had market share because they allowed for it to be preinstalled on machines for virtually nothing. They allowed it to be preinstalled on machines for virtually nothing because the OS wasn’t the flagship product.
MS Office has always been the major flagship product for the company. This was true in 1994 and still is today. Office is so important to their revenue streams that it’s fairly common knowledge and has been mentioned by former employees that OS development would focus on compatibility with Office programs, not the other way around.
Specifically if you look at the years around Office XP and 2003, that suite is used very much as a CVS. They deprecate their operating systems using Office.
On an unrooted phone, you would have to use block connections without VPN. That’s the only way you can tell for certain that traffic is going over the VPN and that the VPN torrenting connection is not intermittently dropping.
If the device is rooted, then you could do actual packet analysis via tools like tcpdump to actively check the traffic is routed to the tunnel.
Even if it is not being done for a malicious reason, it is still a malicious practice. Websites can help prevent this by adopting wildcard Subject Alternate Names in their certificates thereby making the redirection much less likely to succeed, but you shouldn’t have to view your own ISP as a threat actor.
The DNS modification is slightly off. Some ISPs check UDP packets since they are insecure and will modify query results regardless of the DNS server you are sending to. Mediacom is known to do this for their billing and DMCA systems. They use DNS redirection to assist in MITMing the connection to load their own certificate to your browser. With that done, they can prepend their own Javascript to the response they receive from whatever web server you are trying to contact. That’s how they get their data usage and DMCA popups loaded when you load up whatever site.
How does a private tracker ensure that it hasn’t been compromised though? From my understanding they largely disallow the use of VPNs, although perhaps that isn’t true of all private trackers. Still, this user for example could be a bad actor and he was just given an invite code without any sort of check being done.
I think the issue with what you’re saying here is that you’re assuming an ISP is going to pay the same amount that residential customers pay. They will ultimately pay several times more than what would the same amount of residential customers of your own pay. There is a general rule that you do not build fiber where fiber already exists. It is just that expensive. So if a city’s fiber network is laid down first, ISPs typically will not cross those boundaries. They would rather pay for hand off as that is actually cheaper than building and maintaining the infrastructure.
One of the big differences between backhaul carriers and ISPs is the amount of actual personnel required as well. Backall carriers don’t need giant call centers filled with customer service reps and residential techs. They don’t need an army of field services to go out and install local services for residents.
Final point I can make to that is that regardless if it’s an ISP or it’s a city-based service, nobody builds fiber networks with residential in mind. When you build a fiber network you build it to businesses because the same service that you could sell to a residential customer you could sell to a business customer with a 10x multiplier on it. After you establish business services, you backfill residential. I worked accounts where one business client equaled 10,000 residential.
In the end, cities that establish themselves as backhaul carriers make more money for the city because they will cost less to build, less to maintain, and have the advantage of business billing.
I spent many years working building and maintaining fiber networks, and I can unequivocally tell you that the answer to this is maybe. Normally you can treat city fiber just as any other ISP. A lot of them have different rules and different thresholds on what they allow and what they do not allow. Fiber networks are extremely expensive to build. So while you definitely need to protect the multi-million dollar investment you’ve made, depending on how you’ve built it it can be a little tricky to police what everyone is doing.
What’s interesting is just because you are not receiving notice of a DMCA infraction, that does not mean that your ISP has not received a notice. There is this idea that if you are not set up for it it is difficult to track out what account held what IP 30 days prior or 60 days prior. That is kind of a BS excuse, but I have been at companies that did not have logging because they did not want to have logging.
We did collect email notices and pass them around though weekly to see who could find the most absurd DMCA takedown. So I will say, if you were pirating some weird ass mommy fetish furry porn everyone in that call center knows it and is laughing about it.
While I understand the sentiment, I kind of disagree with this. Cities implement fiber in different ways. Not all of them focus or care about residential service. In my city, they essentially set themselves up as a backhaul carrier. So when ISPs move into town rather than building out large infrastructure they connect into the city’s and pay the city for interconnect. That money then goes to city services which is why we have so many parks and different programs.
Usually resellers are allowed to use it. It might be prohibitively expensive for them, but there is availability. Again that depends on how the city has it set up, but typically you as a citizen are getting a return on that investment either way.
It’s been a while since I’ve ever ripped a DVD, but I’m pretty sure Handbrake still does that and that has automatic naming for output: https://handbrake.fr/docs/en/latest/technical/automatic-file-naming.html
If you really want to kick mpv up a notch you should check out the uosc UI for mpv: https://github.com/tomasklaen/uosc
Every day is a pirate party in the US.