The Pirate Bay is developing a new P2P protocol to replace BitTorrent

The Pirate Bay is developing a new P2P protocol to replace BitTorrent
Apparently motivated by BitTorrent's high profile dealings with content owners, Peter Sunde, co-founder of The Pirate Bay, says the site is working to develop a new P2P protocol. Sunde said in an interview, "If they go and do something stupid, it will affect a lot of people." The Pirate Bay gets around 1.5 million visitors each day.

For his part, BitTorrent president Ashwin Navin isn't losing any sleep over the site's planned switch. "We are not really disappointed here," he told Reuters. "The pirate community has never paid us a dime." Last month BitTorrent launched a new media distribution service that Navin hopes will increase the overall number of people using the company's self-named P2P protocol by more than 5 times. They already have Brightcove, which distrubutes video for prominent clients including CBS, Fox Entertainment, and Viacom as a client. Deals like those are what worry Sunde.



At least one industry observer, Eric Garland, CEO of BigChampagne, isn't surprised by The Pirate Bay's apparent distrust of BitTorrent's corporate ties. "Future development (of the BitTorrent software) will almost certainly be focused on things that do not benefit or further the aims of the pirate," Garland said.

Source: PC Magazine

Written by: Rich Fiscus @ 8 Nov 2007 0:12
Advertisement - News comments available below the ad
  • 18 comments
  • ShoeBark

    I've always disliked BitTorrent, but aside from my personal biased, I am pleased that ThePirateBay is creating an alternative. I do not use ThePirateBay, but I highly respect them. They are about their customers, and because of that, they make a dime. (Actually, they make good money--very good money.)

    Quote:We are not really disappointed here," he told Reuters. "The pirate community has never paid us a dime." Uhm... okay.

    8.11.2007 00:54 #1

  • windsong

    I think someone already beat them to the punch.

    Its called "Tor".

    8.11.2007 02:16 #2

  • jetyi83

    i also hate torrents, and have never used them.

    i do think pirate bay is an awesome company though, and they have my support, even though i dont really use their services either.

    8.11.2007 04:17 #3

  • ZippyDSM

    Quote:We are not really disappointed here," he told Reuters. "The pirate community has never paid us a dime."Funny I thought the whole point of BT as free distribution of infermation not beg and roll over to the man to get alil money.


    windsong
    yes but its dosent have alot of files o it yet.

    8.11.2007 06:53 #4

  • ali2007

    long live the piratebay and all the pirates

    8.11.2007 09:26 #5

  • BludRayne

    Bit torrent wasn't designed for pirates. The technology makes it very easy for the m.a.f.i.a.a. to find out who is file sharing. We need a new technology that protects the privacy of it's users.

    8.11.2007 12:52 #6

  • svtstang

    Erm..Tor is not a p2p protocol, it is a form of tunneling.

    8.11.2007 13:17 #7

  • nobrainer

    Originally posted by svtstang: Erm..Tor is not a p2p protocol, it is a form of tunneling.but encryption tunnelling bypasses most isp's traffic management targeted at bittorrent. if they want to block all encrypted traffic it would have a very detrimental effect on the net as we know it!

    tor is not the best encryption proxy to use as is very unfair to clog up their network when the service is in place solely to allow people the freedom of speech without fear of persecution from their governments and with the usa rapidly becoming a dictatorship it is a tool to be used daily in the western world!

    Tor: anonymity online HIDE your IP from the spies, post and browse anonymously! http://www.torproject.org/


    THE RIAA SOUNDEXCHANGE ARE: SONY, UNIVERSAL , WARNER GROUP, EMI.

    THE MPAA ARE: SONY, UNIVERSAL, WARNER GROUP, DISNEY, PARAMOUNT, FOX.

    8.11.2007 13:41 #8

  • svtstang

    I understand that fully, I was responding to above posts that stated Tor was a replacement of bit torrent and Zippy's comment "but it doesnt have a lot of files yet." It has no files, it is not a p2p protocol!

    And yes, you can still be found out even if you are using Tor, nodes does not equal being invisible on the interweb.



    8.11.2007 14:22 #9

  • ZippyDSM

    Originally posted by svtstang: I understand that fully, I was responding to above posts that stated Tor was a replacement of bit torrent and Zippy's comment "but it doesnt have a lot of files yet." It has no files, it is not a p2p protocol!

    And yes, you can still be found out even if you are using Tor, nodes does not equal being invisible on the interweb.
    But for in order for it to work it needs to sent on it right? thus "not many files" dose apply :P

    then again you need to be fluent in zippy to understand WTF I ment >>

    and yes even I can only understand myself to a point :P

    For all the console/game fanboys out their.
    http://www.escapistmagazine.com/articles...Console-Rundown
    Oh god I can't stop laughing!!!

    8.11.2007 14:41 #10

  • svtstang

    Sadly I did not take Zippy in college, I think learning German would have been an easier feat! :p



    8.11.2007 14:44 #11

  • ZippyDSM

    Originally posted by svtstang: Sadly I did not take Zippy in college, I think learning German would have been an easier feat! :pDont you mean Chinese..all of it...

    :P

    For all the console/game fanboys out their.
    http://www.escapistmagazine.com/articles...Console-Rundown
    Oh god I can't stop laughing!!!

    8.11.2007 14:51 #12

  • maxsixer

    i nake a differance.........

    8.11.2007 19:53 #13

  • xhardc0re

    someone needs to develop a protocol that's based on a login name/pass vs. IP addy. The IP addy would be scambled & sent through a decentralized hub of web servers. Kind of like TOR.

    I could create the login name of JohnDoe. If i registered that before anyone else, it becomes mine. No other user could access the JohnDoe account. No email would be associated with the account; the person who registered would need to remember it. The pw could only be changed by supplying a passphrase, answering a question, and inputting the exact date the account was originally created. This only requires memmory or a sheet of paper. Each of the sites within the decen server network would allow pw change. The servers would exchange file tables via tunnel encrypted transfer once every 24 hours. The username/pw table would have 1,024 bit encryption.

    Unless a hacker broke into the decen servers that each stored the username/password table, no one would know where JohnDoe was. Or what the pw. If the pw was ever lost, JohnDoe would no longer exist within the bounds of the network. Every 12-18 mos, all accounts that hadn't logged in for more than 6 mos would automatically be purged. Several networks could exist, each with their own members, but no two membernames could be the same.

    Lastly, if a site was ever busted the site owner could send an SOS to all other servers & let them know NOT to accept any pw changes or updates. The site owner could smash the HDD with a hammer, throw it in a fire, and the data would be safe from the M.A.F.I.A.A. If he/she had time, they could run Gutmann file destruction (35 passes > U.S. DOD level of file deletion)

    9.11.2007 19:21 #14

  • ShoeBark

    Originally posted by xhardc0re: The site owner could smash the HDD with a hammer, throw it in a fire, and the data would be safe from the M.A.F.I.A.A.This is not the case. That's called destroying potential evidence and they will still proceed with the case. (Happens all the time in P2P cases)

    10.11.2007 04:13 #15

  • Mez

    A P2P is not a case unless someone has hacked your computer to capture some damming information which will identify the culprit. They lost cases because some free loader was doing the deed on another's account. Once they have you dead to rights then they can go after you. Claiming some one else was using your net work or swapping out the hard drive doesn't do much good when they have all you account information taken from your computer.

    11.11.2007 15:57 #16

  • svtstang

    Originally posted by Mez: A P2P is not a case unless someone has hacked your computer to capture some damming information which will identify the culprit. They lost cases because some free loader was doing the deed on another's account. Once they have you dead to rights then they can go after you. Claiming some one else was using your net work or swapping out the hard drive doesn't do much good when they have all you account information taken from your computer.Exactly. Many isp's will contact you if your wireless is unprotected, so that argument is moot. Bottom line is that you are responsible for your network. Once they obtain a MAC address from an ISP it is all over, nothing can be said if your address matches the one given by the isp.

    And yeah, if you were given notice that you were being sued for p2p usage or the like, destroying evidence would not be too wise. Not only does that prove your guilt, but also adds tampering/impeding with an investigation.



    11.11.2007 17:07 #17

  • borhan9

    I see this as a wise move by the pirate bay seeing how they want not to be linked to anyone else so they can not be taken down by a long shot. Well done tpb.

    27.11.2007 15:37 #18

© 2024 AfterDawn Oy

Hosted by
Powered by UpCloud