Filtering out some of those "echo everything" malicious sources.
It's quite simple to do manually: enter your search keywords, and then add one long random keyword that is not likely to be found on the network.
Then you can ignore any query hit that show your lang random keyword in their "results".
One problem however: you'll get less results, because your random keyword will try to be matched in addition to the keywords you search. To paliate this problem, add not only 1 random long keyword but also a significant good keyword for the results you want.
Now RIAA financed networks that pollute P2P networks with these auto-responder robots are smarter: they send you results with accurate titles and artist names.
You can effectively download from them, but you'll get a file that will start with a small fragment of the music you search, followed by a message against illegal file trading.
But if the RIAA financed network wants to identify senders of files too much present on the network, they will send you a copy of the title you want, you can look at it and iyou can't see that the file is specially marked with the IP of the first downloader of this file. If that user reshares this file on the P2P network, and that copy is found again on the network, then they know that this user is sharing illegal material.
They have hidden digital signatures within those files, and they don't need to download ALL the file to determine if a shared file contains the digital rights signature (they know exactly, where precisely in these copies, the signatures are present, and will only download that very small fragment from anyone that shares a suspect file that matches some DRM-protection associated keywords).
They won't send you an alert immediately. Instead they will try to identify you precisely with your ISP, then they will try to look which kind of content you trade on the network. They create a more and more precise profile of your download habits, and which files you share, and they collect some proofs, until they are convinced that you are the good one to send to courts. With all these proofs (digital signatures found in files are legally recognized proofs in most countries today) they create lists of people against which action is needed.
They get the collaboration of their ISP, and all their Internet activity is then monitored by some police or judiciary departments, that will then call the police to your home to get the final proofs they need directly on your hard disk, and on all your storage medias.
Finally they count all the medias for which you have no proof of purchase, and they will multiply that by a very expensive fee per title (MUCH more than if they had bought it regularly, because you have not only downloaded it, but because you have distributed it illegally), after getting confirmation by the copyright owners that the titles are protected.
You go to some court and you may have to pay for the rest of your life if the police has found enough materials at your home! (Some young people have been required to sell their home, car, and have their work incomes fined for many years, because they don't have that much money...).
All this procedure is expensive even for copyright holders, so they will first prosecute those that SHARE illegal content, before those that DOWNLOAD content, because they can't claim for the same damages face to a court. They want efficiency and minimize the costs of such actions, and this means economical efficiency of such procedures... They can increase the impact of these actions by communicating about those that have been caught and condemned...
Those that are caught can have their fees much reduced after negociation, if they accept to communicate publicly about what they did and how they must indemnify the copyright owners (in that case they may not go face to a court, but will sign a contract where they plaid guilty and accept to pay).
However this negociation is not possible in all countries (some governments may still prosecute people to create "examples", or because there may be other plaintiffs which have not been indemnified or bound to the terms of the private contract. |