Quote:
Originally Posted by Catlady
And just who is going to be monitoring every file upload and download and transfer to seek out this deeply embedded identifying information?
|
That's the great thing about computers. No person need do so - create a program and have it snoop across the wire or as a spider in various torrents/download sites. Multiply by hundreds or thousands of instances and you can monitor for such easily.
Of course, it'll find "innocent" postings, such as a public file on dropbox you are sharing with a child across the country, which will look the same as a file you are sharing with the world.
If the RIAA and other "rights holders" had their way, they'd simply monitor your computer from the OS, so any download would trigger a violation report.