File sharing: Difference between revisions
Undid revision 222208484 by 70.232.29.127 (talk) vandalism |
added internal links and rewrote copyright and economic impact section |
||
Line 1: | Line 1: | ||
{{Cleanup-laundry|date=January 2008}} |
{{Cleanup-laundry|date=January 2008}} |
||
:''See [[Shared resource]] for the conventional meaning of file sharing'' |
:''See [[Shared resource]] for the conventional meaning of file sharing'' |
||
'''File sharing''' usually follows the [[peer-to-peer]] (P2P) model, where the files are stored on and served by personal computers of the users. |
'''File sharing''' usually follows the [[peer-to-peer]] (P2P) model, where the files are stored on and served by personal computers of the users. Most people who engage in file sharing on the Internet both provide (upload) files and receive files (download). |
||
P2P file sharing is distinct from file trading in that |
P2P file sharing is distinct from file trading in that files from a P2P network does not require , although some networks either provide incentives for uploading such as credits or forcing the sharing of files being currently downloaded. |
||
== First P2P-generation: Server-client == |
== First P2P-generation: Server-client == |
||
The first generation of peer-to-peer file sharing networks had a centralized server system. This system controls traffic amongst the users. The servers store directories of the shared files of the users and are updated when a user logs on. |
The first generation of peer-to-peer file sharing networks had a centralized server system. This system controls traffic amongst the users. The servers store directories of the shared files of the users and are updated when a user logs on. In the centralized peer-to-peer model, a user would send a search to the centralized server of what they were looking for. The server then sends back a list of peers that have the data and facilitates the connection and download. The Server-Client system is quick and efficient because the central directory is constantly being updated and all users had to be registered to use the program. However, there is only a single point of entry, which could result in a collapse of the network. In addition, it is possible to have out of date information or broken links if the server is not refreshed.<ref>[http://www.limewire.com/about/p2p.php Understanding Peer-to-Peer Networking and File-Sharing]</ref> |
||
The first file-sharing programs marked themselves by inquiries to a server, either the data to the download held ready or in appropriate different [[Peer-to-peer|Peer]]s and so-called [[Node (networking)|Node]]s further-obtained, so that one could download there. Two examples were [[Napster]] (today using a pay system) and [[eDonkey2000]] in the server version (today, likewise with [[Overnet]] and [[Kademlia|KAD]] - network decentralized). Another notable instance of peer to peer file sharing, which still has a free version, is [[Limewire]]. |
The first file-sharing programs marked themselves by inquiries to a server, either the data to the download held ready or in appropriate different [[Peer-to-peer|Peer]]s and so-called [[Node (networking)|Node]]s further-obtained, so that one could download there. Two examples were [[Napster]] (today using a pay system) and [[eDonkey2000]] in the server version (today, likewise with [[Overnet]] and [[Kademlia|KAD]] - network decentralized). Another notable instance of peer to peer file sharing, which still has a free version, is [[Limewire]]. |
||
Line 27: | Line 27: | ||
== Second P2P-Generation: Decentralization == |
== Second P2P-Generation: Decentralization == |
||
After Napster encountered legal troubles, [[Justin Frankel]] of Nullsoft set out to create a network without a central index server, and [[Gnutella]] was the result. Unfortunately, the Gnutella model of all nodes being equal quickly died from bottlenecks as the network grew from incoming Napster refugees. [[FastTrack]] solved this problem by having some nodes be 'more equal than others'. |
After Napster encountered legal troubles, [[Justin Frankel]] of Nullsoft set out to create a network without a central index server, and [[Gnutella]] was the result. Unfortunately, the Gnutella model of all nodes being equal quickly died from bottlenecks as the network grew from incoming Napster refugees. [[FastTrack]] solved this problem by having some nodes be 'more equal than others'. |
||
By electing some higher-capacity nodes to be indexing nodes, with lower capacity nodes branching off from them, FastTrack allowed for a network that could scale to a much larger size. Gnutella quickly adopted this model, and most current peer-to-peer networks implement this design, as it allows for large and efficient networks without central servers. |
By electing some higher-capacity nodes to be indexing nodes, with lower capacity nodes branching off from them, FastTrack allowed for a network that could scale to a much larger size. Gnutella quickly adopted this model, and most current peer-to-peer networks implement this design, as it allows for large and efficient networks without central servers. |
||
Line 53: | Line 53: | ||
[[Friend-to-friend]] networks only allow already-known users (also known as "friends") to connect to the user's computer, then each [[node (networking)|node]] can forward requests and files anonymously between its own "friends'" nodes. |
[[Friend-to-friend]] networks only allow already-known users (also known as "friends") to connect to the user's computer, then each [[node (networking)|node]] can forward requests and files anonymously between its own "friends'" nodes. |
||
Third-generation networks have not reached mass usage for file sharing because most current implementations incur too much overhead in their anonymity features, making them slow or hard to use. |
Third-generation networks have not reached mass usage for file sharing because most current implementations incur too much overhead in their anonymity features, making them slow or hard to use. |
||
However, in countries where very fast [[fiber-to-the-home]] [[Internet]] access is commonplace, such as [[Japan]], a number of anonymous file-sharing clients have already reached high popularity. |
|||
An example might be: Petra gives a file to Oliver, then Oliver gives the file to Anna. Petra and Anna thus never become acquainted and thus are protected. Often used virtual IP addresses obfuscate the user's network location because Petra only knows the ''virtual'' IP of Anna. Although real IP's are always necessary to establish a connection between Petra and Oliver, nobody knows if Anna really requested and Petra really send the file or if they just forward it (As long as they won't tell anyone their virtual IP's!). Additionally all transfers are encrypted, so that even the network administrators cannot see ''what'' was sent to whom. Example software includes [[WASTE]], [[JetiANts]], [[Tor (anonymity network)|Tor]] and [[I2P]]. These clients differ greatly in their goals and implementation. WASTE is designed only for small groups and may therefore be considered [[Darknet]]; ANts and I2P are public Peer-to-Peer systems, with anonymization provided exclusively by routing reach. |
An example might be: Petra gives a file to Oliver, then Oliver gives the file to Anna. Petra and Anna thus never become acquainted and thus are protected. Often used virtual IP addresses obfuscate the user's network location because Petra only knows the ''virtual'' IP of Anna. Although real IP's are always necessary to establish a connection between Petra and Oliver, nobody knows if Anna really requested and Petra really send the file or if they just forward it (As long as they won't tell anyone their virtual IP's!). Additionally all transfers are encrypted, so that even the network administrators cannot see ''what'' was sent to whom. Example software includes [[WASTE]], [[JetiANts]], [[Tor (anonymity network)|Tor]] and [[I2P]]. These clients differ greatly in their goals and implementation. WASTE is designed only for small groups and may therefore be considered [[Darknet]]; ANts and I2P are public Peer-to-Peer systems, with anonymization provided exclusively by routing reach. |
||
Line 91: | Line 90: | ||
==The fourth P2P-Generation: Streams over P2P== |
==The fourth P2P-Generation: Streams over P2P== |
||
⚫ | Apart from the traditional file sharing there are services that send streams instead of files over a P2P network. Thus one can hear radio and watch television without any server involved -- the streaming media is distributed over a P2P network. It is important that instead of a treelike network structure, a [[BitTorrent (protocol)#Downloading torrents and sharing files|swarming]] technology known from BitTorrent is used. Best examples are [[Peercast]], [[Miro (software)|Miro]], [[Cybersky-TV|Cybersky]] and [[demo TV]]. |
||
⚫ | Apart from the traditional file sharing there are services that send streams instead of files over a P2P network. Thus one can hear radio and watch television without any server involved -- the streaming media is distributed over a P2P network. It is important that instead of a treelike network structure, a [[BitTorrent (protocol)#Downloading torrents and sharing files|swarming]] technology known from BitTorrent is used. Best examples are [[Peercast]], [[Miro (software)|Miro]], [[Cybersky-TV|Cybersky]] and [[demo TV]]. |
||
'''General''' |
'''General''' |
||
Line 113: | Line 111: | ||
* [[TVUPlayer]] |
* [[TVUPlayer]] |
||
* [[Vuze]] |
* [[Vuze]] |
||
==Copyright issues== |
|||
⚫ | |||
File sharing has grown in popularity with the proliferation of [[high-speed Internet]] connections, and the relatively small [[computer file|file]] size and high-quality [[MP3]] audio format. File sharing is a legal technology with legal uses, however many users use it to [[download]] and [[upload]] [[copyright]]ed materials without permission, which can be [[copyright infringement]] if done without authorization for improper purposes. |
|||
⚫ | Despite the existence of various [[international treaty|international treaties]], there are still sufficient variations between countries to cause significant difficulties in the protection of copyright. file sharing litigation by industry bodies against private individual sharers. The legal issues surrounding file sharing have been the subject of debate and conferences, especially among lawyers in the entertainment industries.<ref>http://westlegaledcenter.com/program_guide/course_detail.jsp?page=prgmgd&classroomCourseId=0&videoCourseId=6605&audioCourseId=6606&textCourseId=0&intCourseId=0</ref> |
||
The challenges facing copyright holders in the face of file sharing systems highlight that current copyright law and enforcement may not be sufficient in dealing with rapidly developing new technologies and uses. Other challenges include ambiguities in the interpretation of copyright law and varying copyright legislations. The high number of individuals engaged in file sharing of copyrighted material means that copyright holders face problems relating to mass litigation and the development of processes for evidence and [[discovery (law)|discovery]]. |
|||
File sharing technology has evolved in response to legal challenges. There is a low technical barriers to entry for would-be sharers, and many file sharing approaches now obfuscate or hide the fact that sharing is happening, or the identities of those involved. For example: [[encryption]] and [[darknet]]s. Furthermore it is contested whether the transfer of [[Segmentation (memory)|segmented]] files constitutes copyright infringement in itself based on existing laws. |
|||
⚫ | |||
⚫ | Further challenges have arisen because of the need to balance self-protection against [[fair use]]. A perceived overbalance towards protection (in the form of media that cannot be backed up, cannot be played on multiple systems by the owner, or contains [[rootkit]]s<ref>See [[2005 Sony BMG CD copy protection scandal]].</ref> or irksome security systems inserted by manufacturers has led to a backlash against protection systems in some quarters. For example, the first crack of [[Advanced Access Content System|AACS]] was inspired by a perceived unfair restriction on owner usage.<ref>By "Muslix64", written on ''[[doom9]]'s'' forum. See [http://forum.doom9.org/showthread.php?p=922059#post922059 original post] and the ensuing [[AACS encryption key controversy]].</ref> |
||
==Economic impact== |
==Economic impact== |
||
As files sharing has spread a debate on how the infringement of copyright (in terms of file sharing copyrighted audio and visual content) impacts on legal distribution of especially music. In a broader context commentators have pointed out that the music industry, along with other types of media such as film and TV are having a difficult time adapting to the digital age.<ref>http://online.wsj.com/article_email/SB117444575607043728-lMyQjAxMDE3NzI0MTQyNDE1Wj.html Wallstreet Journal Website</ref> |
|||
{{Inappropriate tone|date=January 2008}} |
|||
Since downloading files has become more common, there has been much controversy about whether infringement of copyrighted music has either hurt or helped CD sales. |
|||
=== Music Industry === |
|||
studies have found that file sharing has a negative impact on record sales. three papers published in the April 2006 issue of the Journal of Law and Economics (Liebowitz, Rob and Waldfogel, Zentner) |
|||
Alejandro Zentner notes in another paper published in 2005 |
|||
http://www.bepress.com/cgi/viewcontent.cgi?article=1452&context=bejeap Topics in Economic Analysis & Policy, that music sales have globally dropped from approximately $38 billion in 1999 to $32 billion in 2003, and that this downward trend coincides with the advent of Napster in June of 1999. |
|||
Finally, using aggregate data Stan J. Liebowitz argues in a series of papers (2005, 2006) that file sharing had a significant negative impact on record sales. |
|||
However, |
However, widely cited paper concludes that file sharing has no negative effect on CD sales. This paper by Olberholzer-Gee and Strumpf,<ref>[http://www.utdallas.edu/~liebowit/intprop/OS%202006-12-12.pdf The Literature<!-- Bot generated title -->]</ref> was published in the Journal of Political Economy, and is the only paper which analyzes actual on file sharing networks. gathered from tracking downloading on OpenNap servers that most users logged on very rarely and when they did log on they only downloaded a little more than one CD’s worth of songs. To show how these downloads affected album sales they tracked sales and downloads of 500 random albums of varying genres and after doing so found that illegal downloads would only be a small force in the decrease in album sales, possibly even slightly improving album sales of the top albums in stores at the time.<ref>http://www.news.com/2100-1027_3-5181562.html</ref> |
||
Some researchers believe that massive copying has been occurring ever since the invention of [[tape cassette]]s and the increased economic impact of simpler access to copying provided by computer networks does not seem to have been large.{{Fact|date=October 2007}}. |
Some researchers believe that massive copying has been occurring ever since the invention of [[tape cassette]]s and the increased economic impact of simpler access to copying provided by computer networks does not seem to have been large.{{Fact|date=October 2007}}. |
||
⚫ | the Wall Street Journal found that CD sales have dropped 20 year, which the latest sign of the shift in the way people acquire their music. BigChampagne LLC has reported that around one billion songs a month are being traded on illegal file-sharing networks. As a result of this decline in CD sales, a significant amount of record stores are going out of business and “...making it harder for consumers to find and purchase older titles in stores.”<ref>http://online.wsj.com/article_email/SB117444575607043728-lMyQjAxMDE3NzI0MTQyNDE1Wj.html Wallstreet Journal Website</ref> |
||
⚫ | According to an article published by the Almighty Institute of Music Retail, an estimation of 900 independent record stores have closed since 2003, leaving 2,700 |
||
⚫ | According to an article published by the Almighty Institute of Music Retail, an estimation of 900 independent record stores have closed since 2003, leaving 2,700 . Carolyn Draving, the owner of Trac Records is closed after 32 years believes the downfall is a direct result of the illegal internet. She that she lost many long-time consumers to the internet and knows for certain that a few stopped coming in because they just downloaded instead. Another owner, Warren Greene of Spinsters Records claims that nobody buys CD’s anymore and that most of his customers have turned to the internet in order to obtain their music. |
||
In order to keep these smaller record stores alive, owners are having to find alternative means to stay afloat. Greene has saved his store from going under “...by finding a new product to sell: T-shirts emblazoned with digital images.”<ref name="Wilen">By “John Wilen”, See [http://www.almightyretail.com/design/newpress.php?incpage=phillyburbs Almighty Institute of Music Retail]. </ref>He purchased a digital garment printing machine that lets him print any digital photo a customer wants onto a T-shirt. The shirts sell for $20 to $25, and are creating a higher profit margin than the sale of CD’s. |
|||
=== Softwear Industry === |
|||
⚫ | |||
According to [[Moises Naim]] even in countries and regions with high intelectual property enforcement standards, such as the [[US]] or the [[EU]], pirate rates of one-quarter or more for popular [[softwear]] and [[operating system]]s are common. The pirated softwear is distributed through file sharing at unprecedented rates, and according to Naim softwear manufacturers dread the "one disc" effect: a phenomenon in which a single counterfeited copy can propagated until it has taken over an entire country, pushing the legitimate product out of the market.<ref>Moises Naim, Illicit, How smugglers, traffickers and copycats are hijacking the global economy, Arrow Books, London, 2007, pg.15</ref> |
|||
==Legal and copyright issues== |
|||
{{Cleanup-section|date=October 2007}} |
|||
⚫ | |||
⚫ | |||
The challenges facing copyright holders in the face of file-sharing systems are quite novel historically and have highlighted many new challenges in both theory and practice: |
|||
:* Ambiguities in the interpretation of copyright law |
|||
:* The new challenges posed by international communications and varying legislations |
|||
:* Mass litigation and the development of processes for evidence and [[discovery (law)|discovery]] |
|||
:* Rapidly developing new technologies and uses |
|||
:* Low barriers to entry by would-be sharers and the development of a mass usage of the technologies |
|||
:* File-sharing approaches developed in response to litigation against sharers, which obfuscate or hide the fact that sharing is happening, or the identities of those involved. For example: [[encryption]] and [[darknet]]s. |
|||
:* The transfer of [[Segmentation (memory)|segmented]] files that; arguably, by themselves do not constitute a copyright issue. |
|||
⚫ | |||
⚫ | Further challenges have arisen because of the need to balance self-protection against [[fair use]]. A perceived overbalance towards protection (in the form of media that cannot be backed up, cannot be played on multiple systems by the owner, or contains [[rootkit]]s<ref>See [[2005 Sony BMG CD copy protection scandal]].</ref> or irksome security systems inserted by manufacturers |
||
==Public perception== |
==Public perception== |
Revision as of 13:49, 29 June 2008
- See Shared resource for the conventional meaning of file sharing
File sharing usually follows the peer-to-peer (P2P) model, where the files are stored on and served by personal computers of the users. Most people who engage in file sharing on the Internet both provide (upload) files and receive files (download).
P2P file sharing is distinct from file trading in that downloading files from a P2P network does not require uploading, although some networks either provide incentives for uploading such as credits or forcing the sharing of files being currently downloaded.
First P2P-generation: Server-client
The first generation of peer-to-peer file sharing networks had a centralized server system. This system controls traffic amongst the users. The servers store directories of the shared files of the users and are updated when a user logs on. In the centralized peer-to-peer model, a user would send a search to the centralized server of what they were looking for. The server then sends back a list of peers that have the data and facilitates the connection and download. The Server-Client system is quick and efficient because the central directory is constantly being updated and all users had to be registered to use the program. However, there is only a single point of entry, which could result in a collapse of the network. In addition, it is possible to have out of date information or broken links if the server is not refreshed.[1]
The first file-sharing programs marked themselves by inquiries to a server, either the data to the download held ready or in appropriate different Peers and so-called Nodes further-obtained, so that one could download there. Two examples were Napster (today using a pay system) and eDonkey2000 in the server version (today, likewise with Overnet and KAD - network decentralized). Another notable instance of peer to peer file sharing, which still has a free version, is Limewire.
Web-based sharing
Webhosting is also used for file-sharing, since it makes it possible to exchange privately. In small communities popular files can be distributed very quickly and efficiently. Web hosters are independent of each other; therefore contents are not distributed further. Other terms for this are one-click hosting and web-based sharing.
File Sharing On The Social Graph
Recently, Facebook opened up its API to 3rd party developers that has allowed for a new type of file-sharing service to emerge. Box.net and FreeDrive.com[2] are two examples of companies that have specific Facebook Applications that allow file sharing to be easily accomplished between friends.
Server-client-protocols
- Audiogalaxy - Service ended in the middle of 2002.
- Direct Connect
- Napster - Closed in its original form in July 2001, since changed to a fee-based service.
- Scour Exchange - The second exchange network after Napster. No longer exists.
- Soulseek - Still popular today despite being relatively old, with more than 120,000 users online at any time.
- TinyP2P - 15 lines Python - SOURCE code
- WinMX - The original Frontcode servers were switched off in September 2005, but alternate servers can be used by installing a Software Patch.
Second P2P-Generation: Decentralization
After Napster encountered legal troubles, Justin Frankel of Nullsoft set out to create a network without a central index server, and Gnutella was the result. Unfortunately, the Gnutella model of all nodes being equal quickly died from bottlenecks as the network grew from incoming Napster refugees. FastTrack solved this problem by having some nodes be 'more equal than others'.
By electing some higher-capacity nodes to be indexing nodes, with lower capacity nodes branching off from them, FastTrack allowed for a network that could scale to a much larger size. Gnutella quickly adopted this model, and most current peer-to-peer networks implement this design, as it allows for large and efficient networks without central servers.
Also included in the second generation are distributed hash tables (DHTs), which help solve the scalability problem by electing various nodes to index certain hashes (which are used to identify files), allowing for fast and efficient searching for any instances of a file on the network. This is not without drawbacks; perhaps most significantly, DHTs do not directly support keyword searching (as opposed to exact-match searching).
The best examples are Gnutella, Kazaa or eMule with Kademlia, whereby Kazaa has still a central server for logging in. eDonkey2000/Overnet, Gnutella, FastTrack and Ares Galaxy have summed up approx. 10.3 million users (as of April 2006, according to slyck.com). This number does not necessarily correspond to the actual number of persons who use these networks; it must be assumed that some use multiple clients for different networks.
Multi-Network-Clients
Further networks or clients
- See other networks
Third P2P-Generation: indirect and encrypted
This article may be confusing or unclear to readers. (January 2007) |
The third generation of peer-to-peer networks are those that have anonymity features built in. Examples of anonymous networks are ANts P2P, RShare, Freenet, I2P, GNUnet and Entropy.
A degree of anonymity is realized by routing traffic through other users' clients, which have the function of network nodes. This makes it harder for someone to identify who is downloading or who is offering files. Most of these programs also have strong encryption to resist traffic sniffing.
Friend-to-friend networks only allow already-known users (also known as "friends") to connect to the user's computer, then each node can forward requests and files anonymously between its own "friends'" nodes.
Third-generation networks have not reached mass usage for file sharing because most current implementations incur too much overhead in their anonymity features, making them slow or hard to use. However, in countries where very fast fiber-to-the-home Internet access is commonplace, such as Japan, a number of anonymous file-sharing clients have already reached high popularity.
An example might be: Petra gives a file to Oliver, then Oliver gives the file to Anna. Petra and Anna thus never become acquainted and thus are protected. Often used virtual IP addresses obfuscate the user's network location because Petra only knows the virtual IP of Anna. Although real IP's are always necessary to establish a connection between Petra and Oliver, nobody knows if Anna really requested and Petra really send the file or if they just forward it (As long as they won't tell anyone their virtual IP's!). Additionally all transfers are encrypted, so that even the network administrators cannot see what was sent to whom. Example software includes WASTE, JetiANts, Tor and I2P. These clients differ greatly in their goals and implementation. WASTE is designed only for small groups and may therefore be considered Darknet; ANts and I2P are public Peer-to-Peer systems, with anonymization provided exclusively by routing reach.
Ants network
Mute network
I2P network
Retroshare-Network (F2F Instant Messenger)
- Retroshare Instant Messenger - Retroshare Chat Messenger for privacy of filesharing
other networks or clients
The fourth P2P-Generation: Streams over P2P
Apart from the traditional file sharing there are services that send streams instead of files over a P2P network. Thus one can hear radio and watch television without any server involved -- the streaming media is distributed over a P2P network. It is important that instead of a treelike network structure, a swarming technology known from BitTorrent is used. Best examples are Peercast, Miro, Cybersky and demo TV.
General
Tree structure
Swarm structure such as BitTorrent
Copyright issues
File sharing has grown in popularity with the proliferation of high-speed Internet connections, and the relatively small file size and high-quality MP3 audio format. File sharing is a legal technology with legal uses, however many users use it to download and upload copyrighted materials without permission, which can be copyright infringement if done without authorization for improper purposes.
Despite the existence of various international treaties, there are still sufficient variations between countries to cause significant difficulties in the protection of copyright. Recent years have seen copyright owners challenging file sharing networks, leading to litigation by industry bodies against private individual file sharers. The legal issues surrounding file sharing have been the subject of debate and conferences, especially among lawyers in the entertainment industries.[3]
The challenges facing copyright holders in the face of file sharing systems highlight that current copyright law and enforcement may not be sufficient in dealing with rapidly developing new technologies and uses. Other challenges include ambiguities in the interpretation of copyright law and varying copyright legislations. The high number of individuals engaged in file sharing of copyrighted material means that copyright holders face problems relating to mass litigation and the development of processes for evidence and discovery.
File sharing technology has evolved in response to legal challenges. There is a low technical barriers to entry for would-be sharers, and many file sharing approaches now obfuscate or hide the fact that sharing is happening, or the identities of those involved. For example: encryption and darknets. Furthermore it is contested whether the transfer of segmented files constitutes copyright infringement in itself based on existing laws.
Further challenges have arisen because of the need to balance self-protection against fair use. A perceived overbalance towards protection (in the form of media that cannot be backed up, cannot be played on multiple systems by the owner, or contains rootkits[4] or irksome security systems inserted by manufacturers, has led to a backlash against protection systems in some quarters. For example, the first crack of AACS was inspired by a perceived unfair restriction on owner usage.[5]
Economic impact
As files sharing has spread a debate on how the infringement of copyright (in terms of file sharing copyrighted audio and visual content) impacts on legal distribution of especially music. In a broader context commentators have pointed out that the music industry, along with other types of media such as film and TV are having a difficult time adapting to the digital age.[6]
Music Industry
A number of studies have found that file sharing has a negative impact on record sales. Examples of such studies include three papers published in the April 2006 issue of the Journal of Law and Economics (Liebowitz, Rob and Waldfogel, Zentner). Alejandro Zentner notes in another paper published in 2005 [7], that music sales have globally dropped from approximately $38 billion in 1999 to $32 billion in 2003, and that this downward trend coincides with the advent of Napster in June of 1999. Using aggregate data Stan J. Liebowitz argues in a series of papers (2005, 2006) that file sharing had a significant negative impact on record sales.
However, a widely cited paper published in February 2007 concludes that file sharing has no negative effect on CD sales. This paper by Olberholzer-Gee and Strumpf,[8] was published in the Journal of Political Economy, and is the only paper which analyzes actual downloads on file sharing networks. Data gathered from tracking downloading on OpenNap servers indicates that most users logged on very rarely and when they did log on they only downloaded a little more than one CD’s worth of songs. To show how these downloads affected album sales they tracked sales and downloads of 500 random albums of varying genres and after doing so found that illegal downloads would only be a small force in the decrease in album sales, possibly even slightly improving album sales of the top albums in stores at the time.[9]
CNET News.com staff writer John Borland reports, “even high levels of file-swapping seemed to translate into an effect on album sales that was "statistically indistinguishable from zero".[10] Some researchers believe that massive copying has been occurring ever since the invention of tape cassettes and the increased economic impact of simpler access to copying provided by computer networks does not seem to have been large.[citation needed].
In March 2007 the Wall Street Journal found that CD sales have dropped 20 percent in one year, which the Wall Street Journal interpreted as the latest sign of the shift in the way people acquire their music. BigChampagne LLC has reported that around one billion songs a month are being traded on illegal file-sharing networks. As a result of this decline in CD sales, a significant amount of record stores are going out of business and “...making it harder for consumers to find and purchase older titles in stores.”[11]
The debate on how file sharing has impacted on the legal sale of music, especially CDs, is underlined by figures showing a decline in music or record stores. According to an article published by the Almighty Institute of Music Retail, an estimation of 900 independent record stores have closed since 2003, leaving 2,700 stores in the USA. Carolyn Draving, the owner of the record store Trac Records, which is closed after 32 years, believes the downfall is a direct result of the illegal internet downloads. She explains that she lost many long-time consumers to the internet and knows for certain that a few stopped coming in because they just downloaded instead. Another owner, Warren Greene of Spinsters Records, claims that nobody buys CD’s anymore and that most of his customers have turned to the internet in order to obtain their music.[12]
Softwear Industry
According to Moises Naim even in countries and regions with high intelectual property enforcement standards, such as the US or the EU, pirate rates of one-quarter or more for popular softwear and operating systems are common. The pirated softwear is distributed through file sharing at unprecedented rates, and according to Naim softwear manufacturers dread the "one disc" effect: a phenomenon in which a single counterfeited copy can propagated until it has taken over an entire country, pushing the legitimate product out of the market.[13]
Public perception
This section needs expansion. You can help by adding to it. (June 2008) |
According to a poll, 75% of young voters in Sweden (18-20) support file sharing when presented with the statement:
I think it is OK to download files from the Net, even if it is illegal.
Of the respondents, 38% said they "adamantly agreed" while 39% said they "partly agreed".[14]
In the United States, the Solutions Research Group found that 32 million Americans over the age of 12 have downloaded at least one feature length movie from the Internet, 80 percent of whom have done so exclusively over P2P. Of the population sampled, roughly 40% believed that downloading copyrighted movies and music off the Internet constituted a "very serious offense."[15]
Attacks on peer-to-peer networks
Many peer-to-peer networks are under constant attack by people with a variety of motives.
Examples include:
- Poisoning attacks (e.g. providing files whose contents are different from the description, aka "spoofing")
- Polluting attacks (e.g. inserting "bad" chunks/packets into an otherwise valid file on the network)
- Defection attacks (users or software that make use of the network without contributing resources to it)
- Insertion of viruses to carried data (e.g. downloaded or carried files may be infected with viruses or other malware)
- Malware in the peer-to-peer network software itself (e.g. distributed software may contain spyware)
- Denial of service attacks (attacks that may make the network run very slowly or break completely)
- Filtering (network operators may attempt to prevent peer-to-peer network data from being carried)
- Identity attacks (e.g. tracking down the users of the network and harassing or legally attacking them)
- Spamming (e.g. sending unsolicited information across the network--not necessarily as a denial of service attack)
- Distributed Denial of Service (a denial of service that attacks multiple host computers)
- Man-in-Middle (the attacker intercepts files by obtaining the communication between two different users. Attackers can go on to change the information or simply pass it on untouched. This is all done undetected)
- Sybil attacks (the attacker creates one malicious identity that can be presented as multiple identities allowing the attacker to control a whole portion of the network)
- Eclipse attack (the attacker first obtains creates a large amount of users, allowing him to obtain control over a portion of the network. The attacker is then able to divide the network into different sub-networks. This was if the user wants to communicate with another user, it has to go through one of the attacker's many identities)[16]
Most attacks can be defeated or controlled by careful design of the P2P network and through the use of encryption. P2P network defense is in fact closely related to the "Byzantine Generals Problem". However, almost any network will fail when the majority of the peers are trying to damage it, and many protocols may be rendered impotent by far fewer numbers.
Risks
Eric Johnson, Dan McGuire, and Nicholas D. Willey state some risks in their paper:
- Your specific location does not play a role in Peer-to-Peer networks. It does not matter what country you are in files and threats have the ability to travel throughout the world.
- Personal information is at risk because users expose certain files without knowledge that they are doing so. They main reasons these documents are at risk are due to “misplaced files, confusing interface design, Incentive to share a large number of files, general laziness on the part of the user, wizards designed to determine media folders, and poor organization habits”.
- The growing network will soon make it impossible for users to be in control of security issues and thus the developers will not put an emphasis on it.
- During traffic time on the Internet users tend to have multiple sites open at once, this runs the possibility of forgetting the sites that are up and leaves opportunity for the system to be compromised.
- Second generation Peer-to-Peer file sharing networks now have the ability to search indexes using file names and information that is associated with the files. Thus, people can search files with search terms like “credit card” or other important information. This information can be taken easily and money could be stolen.[17]
Some file-sharing software comes bundled with malware such as spyware, viruses, adware, or otherwise privacy-invasive software. Sometimes this unwanted software remains installed on the system even if the original file-sharing software is removed, and can be very difficult to eliminate. In many cases such malware can interfere with the correct operation of web browsers, anti-virus software, anti-spyware and software firewalls; can cause degraded performance on affected systems; and in some cases may secretly compromise a user's privacy or security. Malware is typically bundled with proprietary software, and not those in open source. In most cases it is possible to remove adware and spyware by running spyware removal programs. Such programs can often remove malware without influencing the functionality of the file-sharing software.
Some are also concerned about the use of file-sharing systems to distribute adult pornography to children, child pornography to anyone, inflammatory literature, and illegal or "unpopular" material. Novice users may find it difficult to obtain information about which networks, if any, are "safe" for them to use. With experience, users can reduce their exposure to offensive material by structuring their searches carefully (for example, a search limited to audio file types avoids exposure to video and image files).[18]
See also
- BitTorrent
- Comparison of file sharing applications
- Compulsory license
- Disk sharing
- Ethics of file sharing
- FairShare
- File sharing in Canada
- File sharing timeline
- File-sharing program
- MP3 Newswire
- Open Music Model
- Phynd
- Privacy in file sharing networks
- Spyware
- Warez
- www.Shareonthe.net
References
- ^ Understanding Peer-to-Peer Networking and File-Sharing
- ^ http://apps.facebook.com/freedrive
- ^ http://westlegaledcenter.com/program_guide/course_detail.jsp?page=prgmgd&classroomCourseId=0&videoCourseId=6605&audioCourseId=6606&textCourseId=0&intCourseId=0
- ^ See 2005 Sony BMG CD copy protection scandal.
- ^ By "Muslix64", written on doom9's forum. See original post and the ensuing AACS encryption key controversy.
- ^ http://online.wsj.com/article_email/SB117444575607043728-lMyQjAxMDE3NzI0MTQyNDE1Wj.html Wallstreet Journal Website
- ^ http://www.bepress.com/cgi/viewcontent.cgi?article=1452&context=bejeap Topics in Economic Analysis & Policy
- ^ The Literature
- ^ http://www.news.com/2100-1027_3-5181562.html
- ^ http://www.news.com/2100-1027_3-5181562.html
- ^ http://online.wsj.com/article_email/SB117444575607043728-lMyQjAxMDE3NzI0MTQyNDE1Wj.html Wallstreet Journal Website
- ^ ref needed
- ^ Moises Naim, Illicit, How smugglers, traffickers and copycats are hijacking the global economy, Arrow Books, London, 2007, pg.15
- ^ The Local - Young voters back file sharing
- ^ Solutions Research Group - Movie File-Sharing Booming: Study
- ^ By Baptiste Pretre Attacks on Peer-to-Peer Networking
- ^ By M. Eric Johnson, Dan McGuire, Nicholas D. Willey The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users
- ^ Morris, Alan (2003-08-22). "Testimony of Mr. Alan Morris about Pornography, Technology and Process: Problems and Solutions on Peer-to-Peer Networks". United States Senate, Committee on the Judiciary, Washington, DC. Retrieved 2006-11-20.
shareonthe.net
Further reading
- Ghosemajumder, Shuman. Advanced Peer-Based Technology Business Models. MIT Sloan School of Management, 2002.
- Steve Kelly. File Sharing in Vista?
- Silverthorne, Sean. Music Downloads: Pirates- or Customers?. Harvard Business School Working Knowledge, 2004.
- Ralf Steinmetz, Klaus Wehrle (Eds). Peer-to-Peer Systems and Applications. ISBN 3-540-29192-X, Lecture Notes in Computer Science, Volume 3485, September 2005
- Stephanos Androutsellis-Theotokis and Diomidis Spinellis. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36(4):335–371, December 2004. doi:10.1145/1041680.1041681.
- Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble. A Measurement Study of Peer-to-Peer File Sharing Systems. Technical Report # UW-CSE-01-06-02. Department of Computer Science & Engineering. University of Washington. Seattle, WA, USA.
- Selected Papers — A collection of academic papers
- Kamil Dada. The College Opportunity And Affordability Act of 2007 Stanford University's Kamil Dada quizzes the MPAA over illegal file sharing