Illegal downloads
Thread Starter
I've found that life I needed.. It's HERE!!
iTrader: (1)
Joined: Nov 2004
Posts: 1,057
Likes: 0
From: Kent
Can the ISP's actually figure out what your downloading?
Say for example you download or upload a lot of freeware or non copyright files can they tell the diff between that and copyrighted stuff?
Say for example you download or upload a lot of freeware or non copyright files can they tell the diff between that and copyrighted stuff?
unrealistic in most cases as it will slow your connection or system to a crawl if its doing on the fly encryption, decryption.
If you are being prosecuted you legally are required under UK law to provide the encryption keys.
This is without mentioning that unless you have a high level of encryption of your hard disk when your computer is seized they will know what you have anyway
Lets face it as well the vast majority of windows uses do not understand the os itself let alone something such as blowfish encryption
If you are being prosecuted you legally are required under UK law to provide the encryption keys.
This is without mentioning that unless you have a high level of encryption of your hard disk when your computer is seized they will know what you have anyway

Lets face it as well the vast majority of windows uses do not understand the os itself let alone something such as blowfish encryption
Last edited by Turbocabbie; Jul 24, 2008 at 11:12 AM.
Thread Starter
I've found that life I needed.. It's HERE!!
iTrader: (1)
Joined: Nov 2004
Posts: 1,057
Likes: 0
From: Kent
So what yor really saying is no matter what you do if they want to snoop on what your online activities are they can and there is bugger all anyone can do about it
Trending Topics
its simply a secure proxy server service that redirects traffic and nothing more, its not new technology.Not only does it simply not work on a packet level, but SecureTunnel also log usage information and provide it when required to do so by Law as stated on the website
why do you think spammers do not use services such as these 
This means than when you do something illegal, such as download copyright music they get SecureTunnels ip address, they check the logs and provide information about your use of the service.
SecureTunnel reserves the right to disclose Customer information in the following cases:
When required by law or by order of a court.
When required by law or by order of a court.
Last edited by Turbocabbie; Jul 25, 2008 at 09:52 AM.
Its strange however that most people in the UK actually get prosecuted for the distribution of copyright material as many popular file sharing systems such as bittorrent send and receive at the same time, rather than for just downloading
As a matter of interest on the subject, it is not even legal in the UK to ripp songs from a CD to put on your iPod you are actually breaking the law.
http://www.telegraph.co.uk/news/ukne...your-iPod.html
shows you how far behind the times, uk copyright law is
Do you think an application that is so secure that it can be cracked is not capable of being traffic sniffed
its simply a secure proxy server service that redirects traffic and nothing more, its not new technology.
Not only does it simply not work on a packet level, but SecureTunnel also log usage information and provide it when required to do so by Law as stated on the website
why do you think spammers do not use services such as these 
This means than when you do something illegal, such as download copyright music they get SecureTunnels ip address, they check the logs and provide information about your use of the service.
The fact of the matter is that viral writers and people running large bot nets through anonymous proxys and zombie machines get caught even when running systems more secure than windows and more advanced software than a cracked version of a widely available windows application. If these people can be traced then you will be easy !
its simply a secure proxy server service that redirects traffic and nothing more, its not new technology.Not only does it simply not work on a packet level, but SecureTunnel also log usage information and provide it when required to do so by Law as stated on the website
why do you think spammers do not use services such as these 
This means than when you do something illegal, such as download copyright music they get SecureTunnels ip address, they check the logs and provide information about your use of the service.
The fact of the matter is that viral writers and people running large bot nets through anonymous proxys and zombie machines get caught even when running systems more secure than windows and more advanced software than a cracked version of a widely available windows application. If these people can be traced then you will be easy !
and when i use it i dont even use my internet connection so it isnt my IP using the proxy anyway so yes i agree everybody can be traced but any letter about downloading illegal shit certainly wont be coming to me

If your are using someone else's internet connection, their router will have a log of the MAC Adressess that have pinged it. If they get raided and subsequently are cleared, then they will open the router up and check the logs, then probably do a door to door search for the machine with that mac address.
Advanced PassionFord User
iTrader: (1)
Joined: Jun 2006
Posts: 1,612
Likes: 8
From: Scunthorpe North Lincolnshire
If your are using someone else's internet connection, their router will have a log of the MAC Adressess that have pinged it. If they get raided and subsequently are cleared, then they will open the router up and check the logs, then probably do a door to door search for the machine with that mac address.
surley they arent going to do all that for a few cd's downloaded once in a while......
would I be correct in thinking that the letters etc that will be sent are probably more for people who are properly taking the piss with the level of downloads? It would seem like a massive task for isp's to seperate legal from illigal downloads on a small scale, but quite easy to look at people with large download usage and see what they are up to?
cannot discuss this here not the thing to do-
To say you can not discuss knife crime on this forum because stabbing people is illegal is simply incorrect and likewise we CAN legally discuss, hacking, viruses, piracy and modem technology and supposed flaws as long as no information is provided on how to break the law.
There are so many historic things regarding cable modems and surfboards in particular such as being able to uncap them and spoof your IP Address among other things, these used to work and are tricks from the past and remain there.
Do you mean firmware flashing, the application called Sigma or un-registering the modem to try and obtain free service ?
These hacks do not work on DOCSIS 1.1 and 2.0 modems which only accept firmware digitally signed by the ISP
A simple question here, do you believe that an admin of a network such as your ISP can not sniff your traffic or tell when your packet shaping ?
Like I have always said, the guys who write viral applications like Melissa and others running bot nets are clued up more than most people, often running multiple proxys with operating systems more secure than Microsoft Windows yet they can not effectively hide themselves and always get caught.
Im always happy to discuss technology? - would you like to discuss the manner is which the ISP mentioned assigns IP Addresses, how long they keep a log of who has them for and the policy on port throttling and which ports are throttled, not only do I know this information but I can support it because I used to work for them.
Presently however I am uninformed regarding specifics about what you are suggesting because at this time no information or evidence which validates a discussion has been presented, you have not even named the exploit or modification being suggested.
As such I do not know if this is a discussion regarding the architecture of the modem or the way in which the ISP assigns IP Addresses and bandwidth.
If your are using someone else's internet connection, their router will have a log of the MAC Adressess that have pinged it. If they get raided and subsequently are cleared, then they will open the router up and check the logs, then probably do a door to door search for the machine with that mac address.

Thread
Thread Starter
Forum
Replies
Last Post
keithG666
General Car Related Discussion.
4
Jul 29, 2004 07:43 AM
Little Joe
General Car Related Discussion.
5
Jul 26, 2004 11:40 AM
apples24
General Car Related Discussion.
17
Jun 19, 2004 03:29 PM
Andy_R
Pictures, video & Photoshop Forum
26
Jun 2, 2004 04:01 PM








