Private, Encrypted P2P Solutions Gaining Popularity Amongst File - Exchangers
All of this, though, has resulted in swift protest by armies of lawyers representing both music interests (the RIAA most notably) as well as Hollywood's top movie studios. Individual consumers, "downloaders" of illegal (free) content, have been hit with lawsuits, and have been resigned to pay significant fines as a result of their use of peer-to-peer. Many of these claims have been as high as $5,000.
Now, though, the cat and mouse game appears to be headed for a dead halt as consumers have discovered a new breed of peer-to-peer systems that encrypt all exchanges. This means that not even an ISP can identify the content that's being exchanged, and so intellectual property owners will be unable to enforce the laws that protect copyright owners.
An example of such an application, GigaTribe, has taken Europe by storm and is now poised to become one of the most common P2P solutions in the US. Unlike other software applications, with GigaTribe users don't exchange files with millions, they exchange and share files with small communities of friends and family. However, this new application lets users select specific folders on their harddrives that they want to share, and friends in the network can browse through these folders, and download large files (even entire folders) with ease. Also enticing, is the fact that members of a private network, where people more or less know each other, are unlikely to be sharing corrupted, or "fake" files, such as those injected into file sharing networks by record companies. A number of other companies have followed suit, and have launched similar offerings.
This sort of private P2P business is also redefining the way individuals communicate, as it eliminates the need for complicated FTP applications when users need to send someone a large file. Chat features are also common, and allow users to describe where to find certain files, as well as what files are available on a user's harddrive. Users can also set up these applications to access their own computers from remote locations.
Amidst all of these developments, it is unclear how the record companies and movie studios will respond. It is especially unclear whether they can respond at all, considering that it is technically impossible to "crack" encrypted exchanges and that any attempt to invade the privacy of small communities will be met with vehement protests, and possible boycotts of cultural products. Perhaps these new (and private) peer to peer systems will become as acceptable as, say, lending a CD to a friend down the street.
Related Tags: internet, internet tools, p2p, file sharing, peer to peer, gigatribe, onshare, qnext
John Fruttero is an expert in home computing and an avid guitar player
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Free Internet Security Software from Google
Selecting the internet security software for your computer can be a daunting task for most home user - Home Key Logger - Track Computer Activity
What goes through your mind when you think about a home key logger? Do you think about a rogue progr - Computers and Electronics Have Changed The Way We Live
You push the on button and your monitor screen springs to life. Next, you use your mouse to bring up - What PacketShaper Can Do For You?
What is PacketShaper?It is an application-intelligent traffic management system which delivers predi - Key Logger Software for Your Computer
One thing that many of us are concerned about is the safety of our children and what happens when th - Keep Your PC Healthy With Computer Tips & Tricks
Everybody just has to have a computer these days. Life without a computer is unimaginable. I am sure - Antivirus - What is a Computer Virus?
Before understanding what a computer virus is, it is necessary to understand what a virus in when it - Gibberish Spam Email - Why Do Spammers Send It?
We have all seen many spam emails that just make no sense. They contain pure gibberish in the subjec - Your Children And The Internet - 5 Tips To Keep Your Children Safe While They Are Online
If your children are on the Internet you may be concerned about their safety. We hear stories regula - Advantages and Disadvantages of Broadband Phone Service
Broadband phones, also known as “VOIP†are catching on faster than ever. And no wonder,
Most viewed articles in this category:
- Experience the new Microsoft Zune and Future Technology with Bill Gates at CES Keynote
After the demonstration of Windows Vista by Bill Gates at the CES keynote, Robbie Bach, President of - Internet Connection Sharing in Windows XP
This articles explains in detail how to set up a small network at home so you can share your Interne - Nortel VPN Client Overview
The Nortel VPN Client creates the secure connection for VPN users into a private network. Once you l - Computer Phobias
Years ago around the end of January I would develop Chinophobia (fear of snow). Maybe it was becaus - iPod Stuff: How To Set Your iPod's Alarm Clock
The good thing about the iPod alarm clock feature is that you can wake up with the tune of your favo - CCTV: the story continues
CCTV – Closed Circuit Television – for some time at least has been used by various gover - Why Someone Stole My Mobile Phone
Not so long ago my mobile phone was stolen. I kept asking why I was the one who got targeted, especi - Office printers: introduction to technology and types
With every bit of information transfer and manipulation going digital these days, almost the entire - Computer hardware simplified
Computer Hardware is a comprehensive term which refers to all the physical parts of a computer inclu - Cordless phone technology: a brief history
Cordless Phones – as the term suggests – is a phone sans any cord. Instead the handset c