$30 off During Our Annual Pro Sale. View Details »

Buying Digital Content Through Bit Torrent

Buying Digital Content Through Bit Torrent

Presentation given in the Second Year! #BitTorrent#TSEC

chinmay_dota

June 24, 2012
Tweet

Other Decks in Technology

Transcript

  1. 2

  2. Presented By: • Sagar Mistry • Chinmay Rane • Ravi

    Kumar • Kishan Mehta • Priya Purushan • Priya Purushan • Dhiraj Purswani • Vandana Parmeswaran • Rohit Panjwani • Dhruv Pandey
  3. Contents • Digital Content Online • BitTorrent Protocol • Components

    Of BitTorrent • How does it work? • How does it work? • Setting up a BitTorrent network • Disadvantages Of BitTorrent • Copyright Infringement • Impact Of BitTorrent
  4. Distribution of Digital content Legal Methods • Dvds • Vcds

    • Vcds • Atrac/Music Cds • Mp3/Wma Cds • Blu-ray discs • HD Dvds
  5. Illegal Methods • Pirated DVDs,Cds,games,etc • Direct uploading and downloading

    from websites hosting pirated content • Hosting on webservers like Rapidshare,Megaupload,etc • Sharing on the various P2P networks with clients like Ares,Limewire,Kazaa.
  6. Upsurge in illegal methods Why do people resort to illegal

    methods? • Easy Availability • Easy Availability • Ease of use • Better user-friendly formats • Cheaper pricing • Content is DRM-free
  7. BitTorrent Inc. • Established by Bram Cohen in 2004. •

    Established by Bram Cohen in 2004. • Bram designed BitTorrent peer-to-peer file sharing protocol. • The BitTorrent protocol • Widespread use to distribute and share copyrighted materials.
  8. What does it have to offer? • Complelety safe,legal and

    legitimate • Fastest way of transferring media. • Ease of use • Ease of use • Wide array of content available • Major studio and label participation
  9. Provides total control • Different formats available-SD,HD • Pre-converted formats

    for portable devices • Superb Integration for advanced users • Superb Integration for advanced users Select your own -Codec -Container
  10. Resonable pricing • BitTorrent’s 135 million userdatabase • Movies for

    US$3.99 for newer releases -Fps -Resolution -Video and Audio Bitrate. • Movies for US$3.99 for newer releases and $2.99 for older titles. • Television shows and music videos $1.99 • Softwares according to Developer • Games $11.99
  11. Bit Torrent Protocol • Peer to Peer File Sharing Protocol

    • Distributing Large Amount of Data • Many Small Data Requests • Many Small Data Requests • Different TCP Connections to Different Machines • Downloads in a Rarest First • Ensuring High Availability 18
  12. File Sharing (Contd) • Large files are broken into pieces

    of size between 64 KB and 1 MB 19 1 2 3 4 5 6 7 8
  13. • Written in Python Programming Language • Many Bit Torrent

    Clients Are Made Open Source • Some of the clients are uTorrent Azereus(Now Vuze) Bit Comet Transmission • Techniques Implemented to Improve The Peer to Peer File Sharing Speed • Similarity Enhanced Transfer (SET) Which Help the Not So Popular Files 20
  14. 21

  15. Peer to Peer Networks Node Node Node Internet Node Node

    • Decentralized and distributed system • Nodes are equivalent (Peers) • Data could be at ANY node on the network • Nodes leave and join the network • Network is resilient • Avoid dependence on central resources 23
  16. Unstructured Blind - Gnutella = forward query = source Breadth-First

    Search (BFS) query = processed query = found result = forward response
  17. Overview • What is a Peer to Peer Network? •

    Centralized – Napster • Decentralized • Decentralized – Unstructured • Blind • Informed – Structured • Dynamic Hash Tables • Benefits of Peer to Peer Networks 25
  18. • Distributed Hash Tables • Any Node Can Retrieve Value

    Associated With Given Key • Efficient Resource Discovery • Grid Computing • Scheduling Of Applications P2P Based Networks Applications • Very Beneficial For Structured P2P Networks 27 P2P Based Networks Server Based Network Distributed Hash Table
  19. 28

  20. Torrent • Small metadata file you receive from web the

    one that ends in .torrent • Metadata is a file which contains the information of the data you want to information of the data you want to download,not the data itself.
  21. Peer • Peer is another computer on the internet that

    you connect to and transfer data. • A peer does not have the • A peer does not have the complete file. • A peer shares the small pieces of the complete data which it has, with other peers.
  22. Seed • A computer that has a complete copy of

    torrent. • Once your client finishes downloading, it will remain open until you remain open until you click the Finish button. This is known as being a seed or seeding. • It's considered good manners to continue seeding (uploading) a file.
  23. Tracker • A server on the Internet that acts to

    coordinate the action of BitTorrent clients. • Periodically throughout • Periodically throughout the transfer, your machine will check in with the tracker, telling it how much you've downloaded and uploaded.
  24. Open Tracker Not abundant due to legal issues. Costs of

    running the servers. Eg: Eg: 1.Pirate eBay 2.Open BitTorrent 3.Public BitTorrent.
  25. Private Tracker Use can be restricted. Requires registration of a

    user account. Invitation system is used. Active & contributing members grants permission.
  26. Invitations are sent via emails also. Upload or download is

    monitered. A minimum upload-to-download ratio is enforced.
  27. Faster speed,Closer Community,Safer downloads. Bad users are quickly blacklisted. Passkey

    system. Some sites have higher level of security. Eg: 1.Oink’s palace. 2.Demonoid.
  28. Multi-Tracker Torrent Multiple Trackers in one tracker. If one fails

    then other tracker continues If one fails then other tracker continues transfer.
  29. TrackerLess Torrents Decentralized,distributed tracking using DHT. Makes torrents more independent

    from trackers. Supports DHT implementation. Bit torrents clients are required for downloading files. Vuze,µTorrent use this system.
  30. 1. DOWNLOAD THE TORRENT FILE Web server Web page TRACKER

    .Torrent Peer(Leech) Peer(Leech) Peer(seed) page A B C
  31. 1.DOWNLOAD THE TORRENT FILE • The torrent is a metafile

    containing information. • It contains information about the location of the tracker and hashes for pieces of file. • Hosted by many popular websites.
  32. 2.CONTACT THE TRACKER Web server Web page Tracker get announce

    Peer (Leech) Peer(Leech) Peer(Seed) page A B C
  33. 2.CONTACT THE TRACKER • A HTTP request is sent to

    the tracker. • Tracker is a servsr that accepts requests • Tracker is a servsr that accepts requests for information about the other peers. • The GET request advertises the peers information.
  34. 3.TRACKER RESPONSE Web server Web page Tracker Response peer list

    Peer (Leech) Peer(Leech) Peer(Seed) page A B C
  35. 3.TRACKER RESPONSE • The tracker responds with a list of

    peers who are currently downloading or uploading the file. uploading the file. • The tracker sends a response list.
  36. 4.PEER CONNECTION Web server Web page Tracker Shake hand Peer

    (Leech) Peer(Leech) Peer(Seed) page A B C
  37. 4.PEER CONNECTION • Peer A then initiates TCP connections with

    the peers in the peer list. • Since B and C are on the list peer A connects to both. • They form a 3 way Bittorrent handshake.
  38. 5.PEER A DOWNLOADS A PIECE FROM THE NETWORK. Web server

    Web page Tracker Peer (Leech) Peer(Leech) Peer(Seed) • pieces A B C
  39. 5.PEER A DOWNLOADS A PIECE FROM THE NETWORK. • Once

    the connection has been established peers B and C advertise what pieces they already have. already have. • Peer expresses interest since it does not have any pieces. • Peer A then downloads it.
  40. 6.PIECE EXCHANGE STARTS • When peer A successfully downloads a

    piece it broadcasts a have message. • If other peers are interested they can obtain it from A.
  41. 7.PEERS PERIODICALLY CONTACT THE TRACKER. Web server get announce Web

    page Tracker get announce Peer (Leech) Peer(Leech) Peer(Seed) • pieces A B C
  42. 7.PEERS PERIODICALLY CONTACT THE TRACKER. • The peers periodically contact

    the tracker discover more peers. • Finally peer A completes downloading the • Finally peer A completes downloading the file,it disconnects from other seeds and becomes a seed .
  43. BitTorrent SDK Devices •It embed’s technologies into their products for

    easy application. •The BitTorrent SDK is a full implementation of the official BitTorrent protocol •Compatible with all standard PC clients as it is portable.
  44. Features include •It is a portable software. •Platform independent. •Economic

    and Efficient for Downloading. •Low CPU, memory and ROM footprints . •Certification and support from BitTorrent experts .
  45. • Automatic bandwidth management . • Fast resume . •

    Multi-tracker extension support. • BitTorrent DNA compatible.
  46. How to Install and use BitTorrent? Download and install BitTorrent.

    Purchase from the DGM Live Library Visit the MyDownloads page Visit the MyDownloads page Begin `Download’link for conformation click on the Torrent file which will belink kc19720312-mp3.torrent Clicking on this file will save your bittorrent file on your computer
  47. It is a file that BitTorrent will use to download

    the actual MP3 or FLAC files. Open the Torrent file with BitTorrent, either by double- clicking on the Torrent file Bit torrent will ask you where you would like to save the flac or mp3files, and will begin downloading the file. clicking on the Torrent file The Download of the file you selected should begin. If the download does not begin, click the start arrow.
  48. BitTorrent Errors “Error: The device is not ready” “Error opening

    Windows Firewall” “NAT-PMP: Unable to map port with NAT-PMP” “UPnP: Unable to map UPnP port” “Disk Overloaded”
  49. “Error: Access Denied” and BitTorrent Mainline halts the torrent job.

    “Error: Data Error (cyclic redundancy check)” and BitTorrent Mainline halts check)” and BitTorrent Mainline halts the torrent job. “Error: Element not found” “Error: Not enough free space on disk” Encountered a dead network.
  50. The Leech Problem • A BitTorrent user leaves the swarm

    as soon as they have downloaded. • Thus, torrent swarms gradually die out. • BitTorrent websites have attempted to • BitTorrent websites have attempted to address this by recording each user's download and upload ratio.
  51. • BitTorrent system gives a reliable download environment. • A

    disfunctional BitTorrent tracker is not scalable because of its centralized design. Centralized Tracker scalable because of its centralized design. • Thus, in future building a reliable centralized tracker will be undoable or at least very expensive.
  52. • Easy target for an attack at the BitTorrent system.

    • A simple distributed denial of service (DOS) attack can stop a tracker and with it thousands attack can stop a tracker and with it thousands of users.
  53. Piracy • The best way to download movies and music

    is through BitTorrent. • The easiest way to pirate something is also through BitTorrent using torrent files. also through BitTorrent using torrent files. • We can download files from other people using a tracker.
  54. • Download from a public one such as Mininova or

    Hunt you may find yourself getting sued by the MPAA or RIAA down the road. the road. • Grab the torrent and download it. • You need to use public trackers when all else falls.
  55. • Private trackers are a part of invite-only or closed

    community BitTorrent sites. • You are expected to keep a certain ratio. • This allows for superfast, safe downloads • This allows for superfast, safe downloads of content.
  56. LawSuits Against BitTorrent • Hollywood movie studios launched new legal

    action against operators of sites that help connect people to movies. • The MPAA is trying to cripple BitTorrent and its peers by suing people who host the and its peers by suing people who host the tracker servers. • Because of its efficiency in helping users handle very large files such as digital copies of feature length films .
  57. BitTorrent DNA What is DNA? BitTorrent DNA™ is a service

    that enables faster, more reliable, more efficient access to rich media content online.
  58. Why is DNA used? • Faster – provides downloads from

    multiple, nearby sources in parallel. • Reliable – it flexibly delivers content to you from a variety of sources. from a variety of sources. • Efficient - it delivers rich content from a vast, global resource of user-contributed bandwidth, selecting from the best sources, without overloading any. • Enables richer content.
  59. Advantages of BitTorrent DNA • DNA uses the BitTorrent protocol

    to automatically accelerates your favorite web sites and software by downloading in parallel from multiple sources. • DNA contains no spyware, adware, or malware of any sort. • Privacy – no other activity or content on your computer is monitored. • Courteous - DNA will never slow down your computer or Internet connection.
  60. Necessity for Copyright Infringement • Controversy over the use of

    BitTorrent trackers. BitTorrent trackers. • Piracy of Movies and other data. • Business losses and closing of many original websites.
  61. DMCA Notice of Alleged Infringement (“Notice”) • It is a

    notice by the owner of the infringed matter. • Notice includes the survey of the link that has been used in infringing. has been used in infringing. • It also includes all other information regarding the infringed material. • The notice should include the names of infringing web pages & • Mailing address, tel. no of the owner.
  62. DMCA Notice of Alleged Infringement (“Notice”)-(cont.) • Full legal name

    and the electronic or physical signature of the owner. • This Notice should be delivered, with all items completed, to BitTorrent’s Designated Copyright completed, to BitTorrent’s Designated Copyright Agent: Ron Gross, Copyright Agent BitTorrent, Inc. 201 Mission St. Suite 900 San Francisco, California 94105 [email protected]
  63. Repeat Infringers • Not all BitTorrent services limit their usage

    to registered users or other account holders. holders. • For services that do, BitTorrent will terminate registered users or other account holders whom it determines to be repeat infringers.
  64. Subpoenas • BitTorrent may be required to disclose information to

    individuals asserting rights under the Digital Millennium Copyright Act or other intellectual property laws. or other intellectual property laws. • You authorize BitTorrent to release information about you if required by law or subpoena without notice to you.
  65. BITTORRENT COMPARED TO OTHER FORMS OF FILE TRANSFER • Simple

    to set up and all the files are easily available. • Servers dedicated to the task of serving and are always on and connected to the internet. • Problems with files that are large and popular. • Problems with files that are large and popular. • Another method of transferring files – peer to peer networks systems such as Kazaa, eDonkey. • Files can be shared without having access to a proper server. • These networks tend to be very popular for illicit files such as music, movies, pirated software, etc.
  66. • BitTorrent networking is NOT a publish-subscribe model like Kazaa;

    instead, BitTorrent is true Peer-Peer networking where the users do the actual file serving. • Torrents enforce 99% quality control by filtering out corrupted and dummy files, ensuring that downloads contain only what they claim to contain. • BitTorrent code is open-source, advertising-free, and • BitTorrent code is open-source, advertising-free, and adware/spyware-free. This means that no single person profits from BitTorrent's success • BitTorrent can achieve download speeds over 1.5 megabits per second.
  67. ADOPTION • A growing number of individuals and organizations are

    using BitTorrent to distribute their own or licensed material. • BitTorrent Inc. has amassed a number of licenses from Hollywood studios for distributing popular content from Hollywood studios for distributing popular content from their websites. • There are many broadcasters and softwares that have started using bittorrents to expand their software. • Network impact - BitTorrent represents 18% of all broadband traffic. • Indexing-The Bit Torrent protocol provides no way to index torrent files.
  68. LIMITATIONS OF BITTORRENT • Lack of anonymity - Bit Torrent

    does not offer its users anonymity. • The leech problem. • The cheater problem - There are "cheating" clients like BitThief which claim to be able to download without BitThief which claim to be able to download without uploading. • Speed - Average Bit Torrent download speed is limited by the combined average upload speed of "peers" and "seeds" .
  69. AMEIBO – BUYING AND SHARING OF MEDIA MADE LEGAL •

    Users go to Ameibo.com, and have the choice of either renting or purchasing movies from a growing database that are provided directly by legal distributors. • Ameibo is the only website in the world that pays you hard cold cash when you legally share the movies you hard cold cash when you legally share the movies you legally Buy or Rent from them. • Film industries can make money while embracing the internet as an ideal form of distribution. • TuneMiser.com - Get All The Digital Music You Want.