http://edition.cnn.com/2003/TECH/internet/08/28/downloading.music.ap/index.htm
> 
> basically they use md5 hashes and mp3 file tags - not so efficient IMHO
> coz it's easy to have all those modified by a script :-D wonder if
> they'll ever get to Uganda and our KaZAA community? Also, obtaining the
> hashes means *_ILLEAGALLY_* downloading a copy of the file doesn't it
> :-D?
> 
> cheers,

from what i have been told,ie letter of email vis-a-vis word of mouth, 
the new cybercrimes task force of the FBI and Secret Service tags some files 
with some hashes, then releases them into the wild ie yega, kazaa, imesh etc. 
they then track the downloads of these files to the different computers 
around usa. this is all theoretical and its inplementaion is widely disputed 
by security professionals, so it possible that they want to scare us into 
stopping kazaa.

by the way, did anyone also find himself or herself blacklisted today by 
osirosoft.com?


---------------------------------------------
This service is hosted on the Infocom network
http://www.infocom.co.ug

Reply via email to