This below paper presents a set of exploits an adversary can use to
continuously spy on most BitTorrent users of the Internet from a single
machine and for a long period of time.

http://www.usenix.org/events/leet10/tech/full_papers/LeBlond.pdf

The above full paper is by: Stevens Le Blond, Arnaud Legout, Fabrice
Lefessant, Walid Dabbous, and Mohamed Ali Kaafar, *I.N.R.I.A, France

**Highlights:*

Researchers have devised a way to monitor BitTorrent users over long
stretches of time, a feat that allows them to map the internet addresses of
individuals and track the content they are sending and receiving.

In a paper presented earlier this week at the Usenix Workshop on Large-Scale
Exploits and Emergent Threats, the researchers demonstrated how they used
the technique to continuously spy on BitTorrent users for 103 days. They
collected 148 million IP addresses and identified 2 billion copies of
downloads, many of them copyrighted.

The researchers, from the French National Institute for Research in Computer
Science and Control, also identified the IP addresses where much of the
content originated. They discovered the the vast majority of the material on
BitTorrent started with a relatively small number of individuals.

"We do not claim that it is easy to stop those content providers from
injecting content into BitTorrent," they wrote. "However, it is striking
that such a small number of content providers triggers billions of
downloads. Therefore, it is surprising that the anti-piracy groups try to
stop millions of downloaders instead of a handful of content providers."

The researchers said the information leak is built in to the very core of
most BitTorrent systems, including those used by ThePirateBay and IsoHunt.
They support commands such as "scrape-all" and "announce started/stopped,"
which when used repeatedly can be used to identify the IP addresses where
content originates or is being distributed once it has proliferated.

By collecting more than 1.4 million unique .torrent files, they were able to
identify specific pieces of content being distributed by particular IP
addresses. The results are about 70 percent accurate.

"At any moment in time for 103 days, we were spying on the distribution of
between 500 and 750K contents," they wrote. "In total, we collected 148M IP
addresses distributing 1.2M contents, which represents 2 billion copies of
content."

The insecurities baked into BitTorrent allowed the researchers to discover
IP addresses even when they were hidden behind the Tor anonymity service. It
should be pointed out that this isn't the fault of Tor, which has long urged
people to refrain from using BitTorrent over the virtual privacy tunnels. In
light of the new research, project managers renewed that admonition on
Thursday.

"The BitTorrent protocol is vulnerable to tampering by malicious parties,"
Jacob Appelbaum, a full-time developer for Tor volunteer wrote in an email
to *El Reg*. "This is not so different than when you're using Tor or on any
other internet connection. If someone wants to tamper, there's nothing in
the protocol to stop the tampering."

*
*Regards
Sandeep Thakur

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to