Most active commenters
  • TZubiri(12)
  • ranger_danger(6)
  • defrost(5)
  • AlienRobot(4)
  • card_zero(3)
  • tourmalinetaco(3)
  • master-lincoln(3)

←back to thread

492 points vladyslavfox | 54 comments | | HN request time: 0.002s | source | bottom
Show context
trompetenaccoun ◴[] No.41895988[source]
We need archives built on decentralized storage. Don't get me wrong, I really like and support the work Internet Archive is doing, but preserving history is too important to entrust it solely to singular entities, which means singular points of failure.
replies(19): >>41896170 #>>41896389 #>>41896411 #>>41896420 #>>41897459 #>>41897680 #>>41897913 #>>41898320 #>>41898841 #>>41899160 #>>41899729 #>>41899779 #>>41899999 #>>41900368 #>>41901199 #>>41902340 #>>41904676 #>>41905019 #>>41907926 #
jdiff ◴[] No.41896411[source]
This seems to get brought at least once in the comments for every one of these articles that pops up.

The IA has tried distributing their stores, but nowhere near enough people actually put their storage where their mouths are.

replies(6): >>41896653 #>>41897206 #>>41897450 #>>41897685 #>>41900958 #>>41905113 #
WarOnPrivacy ◴[] No.41897206[source]
> nowhere near enough people actually put their storage where their mouths are.

Typically because most people who have the upload, don't know that they can. And if they come to the notion on their own, they won't know how.

If they put the notion to a search engine, the keywords they come up with probably don't return the needed ELI5 page.

As in: How do I [?] for the Internet Archive?, most folks won't know what [?] needs to be.

replies(1): >>41897342 #
1. TZubiri ◴[] No.41897342[source]
This is literally torrents. Just give up
replies(2): >>41897746 #>>41898888 #
2. briandear ◴[] No.41897746[source]
The problem with torrents is they have a bad reputation since people use it to steal and redistribute other people’s content without their consent.
replies(6): >>41897984 #>>41898015 #>>41898634 #>>41898817 #>>41898984 #>>41899563 #
3. card_zero ◴[] No.41897984[source]
Is there any form of torrent where you can do a full text search? That, to me, is the more important problem with torrents.
replies(1): >>41898641 #
4. AlienRobot ◴[] No.41898015[source]
Give it a good reputation then.

What are some legal torrent trackers?

replies(3): >>41898194 #>>41898642 #>>41898870 #
5. unleaded ◴[] No.41898194{3}[source]
archive.org to name one
replies(1): >>41898369 #
6. boomboomsubban ◴[] No.41898369{4}[source]
That's debatable. Most of their torrents are for things under copyright, though any other decentralized archive would have the same problem.
replies(1): >>41899007 #
7. ranger_danger ◴[] No.41898634[source]
To me this is like saying you shouldn't use a knife because they are also used by criminals.
replies(1): >>41898690 #
8. TZubiri ◴[] No.41898641{3}[source]
But internet archive doesn't do this? It's a key based search (url keys)
replies(1): >>41900551 #
9. ranger_danger ◴[] No.41898642{3}[source]
What is your definition of a legal torrent tracker? I was not aware there were even any illegal ones.
replies(2): >>41898680 #>>41898792 #
10. AlienRobot ◴[] No.41898680{4}[source]
A tracker that only tracks legal torrents, e.g. free software, OCRemix content, etc.
replies(3): >>41898730 #>>41898765 #>>41899921 #
11. John_Cena ◴[] No.41898690{3}[source]
This kind of talk is simply modern politik-speak. I can't stand it and the people who fall for their deception. Stretch the truth to disarm the constituents
replies(1): >>41899501 #
12. TZubiri ◴[] No.41898730{5}[source]
How would you keep the definition of legality without a centralizing authority?
replies(1): >>41899432 #
13. boomboomsubban ◴[] No.41898765{5}[source]
https://linuxtracker.org/ http://www.publicdomaintorrents.info/ https://ocremix.org/torrents
14. mikae1 ◴[] No.41898792{4}[source]
> I was not aware there were even any illegal ones.

Depends on the jurisdiction. Remember what happened in the The Pirate Bay trial?

replies(1): >>41899902 #
15. thwarted ◴[] No.41898817[source]
The problem with file transfer is they have a bad reputation since people use it to [insert illegal or immoral activity here].

Then rename it from "torrent" to something else.

replies(1): >>41899049 #
16. seam_carver ◴[] No.41898870{3}[source]
Humble Bundle. Various Linux iso
17. WarOnPrivacy ◴[] No.41898888[source]
> This is literally torrents. Just give up

Most casual visitors to IA don't know that. Which is the point.

Giving up is for others.

18. tourmalinetaco ◴[] No.41898984[source]
Torrents have a bad reputation due to malicious executables, I have never met someone who genuinely saw piracy as stealing, only as dangerous. In fact, stealing as a definition cannot cover digital piracy, as stealing is to take something away, and to take is to possess something physically. The correct term is copying, because you are duplicating files. And that’s not even getting into the cultural protection piracy affords in today’s DRM and license-filled world.
replies(1): >>41903131 #
19. tourmalinetaco ◴[] No.41899007{5}[source]
That’s a copyright problem. 99% of things made in the last 100 years fall under copyright.
replies(2): >>41899874 #>>41899925 #
20. TZubiri ◴[] No.41899049{3}[source]
I'm not sure what the argumentative line is here. But file uploading and downloading needs to have accountability for hosting, which p2p obscures.

The bad reputation is inherent to the tech, not a random quirk.

replies(1): >>41900495 #
21. AlienRobot ◴[] No.41899432{6}[source]
A tracker is a centralized authority.
replies(1): >>41903150 #
22. jonhohle ◴[] No.41899501{4}[source]
In what way? Torrents are used all over for content delivery. Battle.net uses a proprietary version of BitTorrent. It’s now owned by Microsoft. There’s many more legitimate uses as commented by many others.

Criminals using tools does not make the tools criminal.

replies(1): >>41900052 #
23. ycombinatrix ◴[] No.41899563[source]
The problem with websites is they have a bad reputation since people use it to steal and redistribute other people’s content without their consent.
24. trod123 ◴[] No.41899874{6}[source]
and a good number of things that were going to pass into copyright were further extended to 2053.
25. ranger_danger ◴[] No.41899902{5}[source]
My understanding is that that court case did not show that operating a torrent tracker is illegal, but specifically operating a (any) service with the explicit intent of violating copyright... huge difference IMO.

To me that's not even related to it being a torrent tracker, just that they were "aiding and abetting" copyright infringement.

replies(1): >>41900035 #
26. ranger_danger ◴[] No.41899921{5}[source]
I don't see how that would be enforceable. Policy perhaps, but it would be impossible to absolutely prevent it from being used for that purpose IMO.
27. ranger_danger ◴[] No.41899925{6}[source]
Except when their own employees publicly tell people not to worry about copyright and just upload stuff anyway, they make it their own problem.
28. TZubiri ◴[] No.41900035{6}[source]
Ok. But what is the case law in hosting illegal content? Sure you may operate a torrent, but if your client is distributing child porn, in my view, you bear responsibility.
replies(2): >>41900161 #>>41900224 #
29. TZubiri ◴[] No.41900052{5}[source]
It's a matter of numbers, if tens of thousands of criminals use tech X, and it has few genuine uses, it's going to be restricted.

This has precedent in illegal drug categorization, it's not just about the damage, but its ratio of noxious to helpful use.

replies(3): >>41900213 #>>41903245 #>>41909475 #
30. ranger_danger ◴[] No.41900161{7}[source]
I don't think TPB ever hosted any copyrighted content, even indirectly by its users. Torrent peers do not ever send any file contents through the tracker.
31. Kerb_ ◴[] No.41900213{6}[source]
That precedent was and still is legally used to federally regulate marijuana harsher than fentanyl, a precedent I strongly disagree with, so you'll have to forgive me for believing that the degree to which something causes harm matters more than the amount of misuse
replies(1): >>41904339 #
32. defrost ◴[] No.41900224{7}[source]
I'm backing ranger_danger here.

In Law the technicalities matter.

Trackers generally do not host any content, just hashcodes and (sometimes) meta data descriptions of content.

If "your" (ie let's say _you_ TZubiri) client is distributing child pornography content because you have a partially downloaded CP file then that's on _you_ and not on the tracker.

The "tracker" has unique hashcode signatures of tens of millions of torrents - it literaly just puts clients (such as the one that you might be running yourself on your machine in the example above) in touch with other clients who are "just asking" about the same unique hashcode signature.

Some tracker affiliated websites (eg: TPB) might host searchable indexes of metadata associated with specific torrents (and still not host the torrents themselves) but "pure" trackers can literally operate with zero knowledge of any content - just arrange handshakes between clients looking for matching hashes - whether that's UbuntuLatest or DonkeyNotKong

replies(1): >>41900486 #
33. TZubiri ◴[] No.41900486{8}[source]
We agree in that if my client distributes illegal content, I am responsible, at least in part.

On the other hand I also believe that a tracker that hosts hashes of illegal content, provides search facilities for and facilitates their download, is responsible, in a big way. That's my personal opinion and I think it's backed in cases like the pirate bay and sci hub.

That 0 knowledge tracker is interesting, my first reaction is that it's going to end up in very nasty places like Tor, onion, etc..

replies(1): >>41900676 #
34. komali2 ◴[] No.41900495{4}[source]
It doesn't really, you can host a server off a raw IP.

Downloading from example.com is just peer to peer with someone big. There's lots of hosting providers and DNS providers that are happy to host illegal-in-some-places content.

replies(1): >>41904327 #
35. card_zero ◴[] No.41900551{4}[source]
Internet archive allows full text search of books, newspapers, etc.. Or anyway it did, before being breached.
replies(1): >>41906380 #
36. defrost ◴[] No.41900676{9}[source]
> That 0 knowledge tracker is interesting,

Most actual trackers are zero knowledge.

A tracker (bit of central software that handles 100+ thousand connections/second) is not a "torrent site" such as TPB, EZTV, etc.

A tracker handshakes torrent clients and introduces peers to each other, it has no idea nor needs an idea that "SomeName 1080p DSPN" maps to D23F5C5AAE3D5C361476108C97557F200327718A

All it needs is to store IP addresses that are interested in that hash and to pass handfuls of interested IP addresses to other interested parties (and some other bookkeeping).

From an actual tracker PoV the content is irrelevant and there's no means of telling one thing from another other than size - it's how trackers have operated for 20+ years now.

Here are some actual tracker addresses and ports

    udp://tracker.opentrackr.org:1337/announce
    udp://p4p.arenabg.com:1337/announce
    udp://tracker.torrent.eu.org:451/announce
    udp://tracker.dler.org:6969/announce
    udp://open.stealth.si:80/announce
    udp://ipv4.tracker.harry.lu:80/announce
    https://opentracker.i2p.rocks:443/announce
Here's the bittorrent protocol: http://bittorrent.org/beps/bep_0052.html

Trackers can hand out .torrent files if asked (bencoded dictionaries that describe filenames, sizes, checksums, directory structures of a torrents contents) but they don't have to; mostly they hand out peer lists of other clients .. peers can also answer requests for .torrent files.

A .torrent file isn't enough to determine illegal content.

Pornography can be contained in files labelled "BeautifulSunset.mkv" and Rick Astley parody videos can frequently be found in files labelled "DirtyFilthyRepubicanFootTappingNudeAfrica.avi"

Given that it's not clear how trackers could effectively filter by content that never actually traverses their servers.

replies(2): >>41900814 #>>41906150 #
37. TZubiri ◴[] No.41900814{10}[source]
Oh ok, it seems to be a misconception of mine then.

Mathematically a tracker would offer a function that given a hash, it returns you a list of peers with that file.

While a "torrent site" like TPB or SH, would offer a search mechanism, whereby they would host an index, content hashes and english descriptors, along with a search engine.

A user would then need to first use the "torrent site" to enter their search terms, and find the hash, then they would need to give the hash to a tracker, which would return the list of peers?

Is that right?

In any case, each party in the transaction shares liability. If we were analyzing a drug case or a people trafficking case, each distributor, wholesaler or retailer would bear liability and face criminal charges. A legal defense of the type "I just connected buyers with sellers I never exchanged the drug" would not have much chance of succeding, although it is a common method to obstruct justice by complicating evidence gathering. (One member collects the money, the other gives the drugs.)

replies(1): >>41900954 #
38. defrost ◴[] No.41900954{11}[source]
> A user would then need to first use the "torrent site" to enter their search terms, and find the hash, then they would need to give the hash to a tracker, which would return the list of peers?

> Is that right?

More or less.

> In any case, each party in the transaction shares liability.

That's exactly right Bob. Just as a telephone exchange shares liability for connecting drug sellers to drug buyers when given a phone number.

Clearly the telephone exchange should know by the number that the parties intend to discuss sharing child pornography rather than public access to free to air documentaries.

How do you propose that a telephone exchange vet phone numbers to ensure drugs are not discussed?

Bear in mind that in the case of a tracker the 'call' is NOT routed through the exchange.

With a proper telephone exchange the call data (voices) pass through the exchange equipment, with a tracker no actual file content passes through the trackers hardware.

The tracker, given a number, tells interested parties about each other .. they then talk directly to each other; be it about The Sky at Night -s2024e07- 2024-10-07 Question Time or about Debbie Does Donkeys.

Also keep in mind that trackers juggle a vast volume of connections of which a very small amount would be (say) child abuse related.

replies(1): >>41905303 #
39. master-lincoln ◴[] No.41903131{3}[source]
What does this have to do with torrents? If you get an executable from the internet it is widely known not to execute it if not trusted. You can get malicious executables from websites too.

If this is what people think we need to work on education...

replies(1): >>41906742 #
40. master-lincoln ◴[] No.41903150{7}[source]
But legality doesn't have a central authority. What is illegal in one jurisdiction is ok in another
replies(1): >>41906044 #
41. master-lincoln ◴[] No.41903245{6}[source]
This precedent is problematic I think. It seems like the populist way of addressing issues. Always just following the biggest outcry instead of the symptoms. Just because there are currently more illegitimate users for a a thing we shouldn't prevent legitimate uses I think. The ratio might just be skewed because in the legitimate world you grow your audience with marketing investing tons of capital, while for illegitimate use cases, the marketing is often just word of mouth because of features.
replies(1): >>41903814 #
42. MichaelZuo ◴[] No.41903814{7}[source]
That's how most countries work, if enough people raise a big enough fuss, it's restricted like dangerous drugs.
43. TZubiri ◴[] No.41904327{5}[source]
Incorrect.

The protocols for downloading from example.com are assymettrical client server architectures, not symmetrical decentralized peer to peer.

44. TZubiri ◴[] No.41904339{7}[source]
Marihuana ruins millions of young minds.
replies(1): >>41905775 #
45. TZubiri ◴[] No.41905303{12}[source]
Interesting. That's a good point.

I'll restate the principle of good usage to bad usage ratio, telephone providers are a well established service with millions of legitimate users and uses. Furthermore they are a recognized service in law, they are regulated, and they can comply with law enforcement.

They are closer to the ISP, which according to my theory has some liability as well.

It's just a matter of the liability being small and the service to society being useful and necessary.

To take a spin to a similar but newer tech, consider crypto. My position is that its legality and liability for illegal usage of users (considering that of exchanges and online wallets, since the network is often not a legal entity) will depend on the ratio of legitimate to ilegitimate use that will be given to it.

There's definitely a second system effect, were undesirables go to the second system, so it might be a semantical difference unrelated to the technical protocols. Maybe if one system came first, or if by chance it were the most popular, the tables would be turned.

But I feel more strongly that there's design features that make law compliance, traceability and accountability difficult. In the case of trackers perhaps the microservice/object is a simple key-value store, but it is semantically associated with other protocols which have 'noxious' features described above AND are semantically associates with illegal material.

replies(1): >>41910135 #
46. ◴[] No.41905775{8}[source]
47. AlienRobot ◴[] No.41906044{8}[source]
Just track things that are legal everywhere or in most jurisdictions then.
48. GoblinSlayer ◴[] No.41906150{10}[source]
Are you sure open.stealth.si is a zero knowledge tracker? Some trackers reject unregistered torrents.
replies(1): >>41910175 #
49. TZubiri ◴[] No.41906380{5}[source]
It does transcribe books (through imperfect OCR) so I guess that's possible. Never relied on it as I search by title and author.

But anyways not the case for the wayback product which is the unique core to IA.

replies(1): >>41907315 #
50. tourmalinetaco ◴[] No.41906742{4}[source]
Piracy also is not unique to torrents, and yet that was what GP used.

The average person, in my experience, can barely work a non-cellphone filesystem and actively stresses when a terminal is in front of them, especially for a brief moment. Education went out the window a decade ago.

51. card_zero ◴[] No.41907315{6}[source]
That's not unique, not a product, and not the part I use most.

Well, OK, maybe other webpage archives don't work as well, I haven't tried them, but there are others. And they're newer, so don't have such extensive historical pages.

Large numbers of Wikipedia references (which relied on IA to prevent link rot) must be completely broken now.

52. jonhohle ◴[] No.41909475{6}[source]
Literally millions of people use it (whether they know it or not).

Societies should criminalize behavior and then (shocker!) enforce the laws! Let tools be tools.

53. defrost ◴[] No.41910135{13}[source]
> I'll restate the principle of good usage to bad usage ratio, telephone providers are a well established service with millions of legitimate users and uses

Ditto trackers.

Have a look at the graphs here: https://opentrackr.org/

Over 10 million torrents tracked daily, on the order of 300 thousand connections per second, handshaking between some 200 million peers per week.

That's material from the Internet Archive, software releases, pooled filesharing, legitimate content sharing via embedded clients that use torrents to share load, and a lot of TV and movies that have variable copyright status

( One of the largest TV|Movie sharing sites for decades recent closed down after the sole operator stopped bearing the cost and didn't want to take on dubious revenue sources; that was housed in a country that had no copyright agreements with the US or UK and was entirely legal on its home soil.

Another "club" MVGroup only rip documentaries that are "free to air" in the US, the UK, Japan, Australia, etc. and in 20 years of publicaly sharing publicaly funded content haven't had any real issues )

> the ISP, which according to my theory has some liability as well.

The world's a big place.

The US MPA (Motion Picture Association - the big five) backed an Australian mini-me group AFACT (Australian Federation Against Copyright Theft) to establish ISP liability in a G20 country as a beach head bit of legislation.

That did not go well: Roadshow Films Pty Ltd v iiNet Ltd decided in the High Court of Australia (2012) https://en.wikipedia.org/wiki/Roadshow_Films_Pty_Ltd_v_iiNet...

    The alliance of 34 companies unsuccessfully claimed that iiNet authorised primary copyright infringement by failing to take reasonable steps to prevent its customers from downloading and sharing infringing copies of films and television programs using BitTorrent.
That was a three strikes total face plant:

    The trial court delivered judgment on 4 February 2010, dismissing the application and awarding costs to iiNet.

    An appeal to the Full Court of the Federal Court was dismissed.

    A subsequent appeal to the High Court was unanimously dismissed on 20 April 2012.
It set a legal precedent:

    This case is important in copyright law of Australia because it tests copyright law changes required in the Australia–United States Free Trade Agreement, and set a precedent for future law suits about the responsibility of Australian Internet service providers with regards to copyright infringement via their services.
It's also now part of Crown Law .. ie. not directly part of the core British Law body, but a recognised bit of Commonwealth High Court Law that can be referenced for consideration in the UK, Canada, etc.

> but it is semantically associated with other protocols which have 'noxious' features described above AND are semantically associates with illegal material.

Gosh, semantics hey. Some people feel in their waters that this is a protocol used by criminals and must therefore by banned or policed into non existance?

Is that a legal argument?

54. defrost ◴[] No.41910175{11}[source]
The list I gave was of some public trackers, I made no claim that they were zero knowledge trackers, I simply made a statement that trackers needn't be aware of .torrent file manifests in order to share peer lists.

I also indicated above that having knowledge of .torrent manifests is problematic as that doesn't provide real actual knowledge of file contents just knowledge of file names ... LatestActionMovie.mkv might be a rootkit virus and HappyBunnyRabbits.avi might be the worst most exploitative underage pornography you can think of.

Some trackers are also private and require membership keys to access.

I was skating a lot as TZubiri seems unaware of many of the actual details and legitimate use cases, existing law, etc.