SlideShare a Scribd company logo
While the battle continues around the Indian
Ocean against Somali Pirates, another group
of ‘pirates’ flying under a different flag fight
for a completely different purpose...
These are the faces of the owners of “The
world’s most resilient BitTorrent site”
Welcome to The Pirate Bay, where the
message is ‘sharing is caring’
BitTorrent is a peer-to-peer file sharing
protocol used for distributing large amounts
of data. BitTorrent is one of the most common
protocols for transferring large files, and it has
been estimated that it accounted for roughly
27–55% of all internet traffic (depending on
geographical location) as of February 2009.
How it works: A user who wishes to distribute
a file first creates a small torrent descriptor file
that is distributed by conventional means
(web, email, etc).
The user then makes the file itself available
through a BitTorrent node acting as a seed.
Those with the torrent descriptor file can give
it to their own BitTorrent nodes which, acting
as peers download it by connecting to the
seed and/or other peers
The file being distributed is divided into
segments called pieces. As each peer receives
a new piece of the file it becomes a source of
that piece to other peers, relieving the seed
from having to send a copy to every peer.
So where does the ‘pirate’ part come in?
While the technology itself is perfectly legal,
and the bittorrent metafiles do not store
copyrighted data, its connection with
copyrighted material or otherwise illegal
material makes the issuer of the bittorent file
liable.
So where to from here?
The report will further explore the legality of
using bittorrent files and the measures taken
by certain government departments and ISP’s
(internet service providers) in both support
and opposition of this protocol.

More Related Content

What's hot

Lec 1 introduction to the internet
Lec 1 introduction to the internetLec 1 introduction to the internet
Lec 1 introduction to the internetKewan Suliman
 
Common Online Terminologies
Common Online TerminologiesCommon Online Terminologies
Common Online Terminologiessabsaguilar
 
Difference between internet and www
Difference between internet and wwwDifference between internet and www
Difference between internet and wwwDevika Rangnekar
 
World wide Web
World wide WebWorld wide Web
World wide Web
MDSHABBIR12
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browserhazirma
 
Activity 9 common online terminologies
Activity 9 common online terminologiesActivity 9 common online terminologies
Activity 9 common online terminologiesjanmarienedilei
 
Common Online Terminologies
 Common Online Terminologies Common Online Terminologies
Common Online Terminologies雅琦 张
 
The Web
The WebThe Web
World Wide Web (WWW)
World Wide Web (WWW)World Wide Web (WWW)
World Wide Web (WWW)
Al Mamun
 
Internet vs. WWW
Internet vs. WWWInternet vs. WWW
Internet vs. WWW
Jason Rhode
 
Internet features (2nd topic)
Internet features (2nd topic)Internet features (2nd topic)
Internet features (2nd topic)
Anish Thomas
 
The Internet Revolution
The Internet RevolutionThe Internet Revolution
The Internet Revolution
hperretta
 
Internet Basics
Internet BasicsInternet Basics
Internet Basicsepaulsen
 
World Wide Web (WWW) Technology
World Wide Web (WWW) TechnologyWorld Wide Web (WWW) Technology
World Wide Web (WWW) Technology
Kamyar Lajani
 
Copy Of Part 2
Copy Of Part 2Copy Of Part 2
Copy Of Part 2
raeshu
 
Web browsing and Internet termenologies
Web browsing and Internet termenologiesWeb browsing and Internet termenologies
Web browsing and Internet termenologies
VTC_NeilaSofien
 
The internet (20112628 jang hee ran)
The internet (20112628 jang hee ran)The internet (20112628 jang hee ran)
The internet (20112628 jang hee ran)Hee Ran Jang
 
Internet Browser, Email, World Wide Web (WWW), Search Engine
Internet Browser, Email, World Wide Web (WWW), Search EngineInternet Browser, Email, World Wide Web (WWW), Search Engine
Internet Browser, Email, World Wide Web (WWW), Search Engine
Sibis369
 
The Internet 2017.
The Internet 2017.The Internet 2017.
The Internet 2017.
ShuvoHossain766
 

What's hot (20)

Lec 1 introduction to the internet
Lec 1 introduction to the internetLec 1 introduction to the internet
Lec 1 introduction to the internet
 
Common Online Terminologies
Common Online TerminologiesCommon Online Terminologies
Common Online Terminologies
 
Difference between internet and www
Difference between internet and wwwDifference between internet and www
Difference between internet and www
 
World wide Web
World wide WebWorld wide Web
World wide Web
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browser
 
Activity 9 common online terminologies
Activity 9 common online terminologiesActivity 9 common online terminologies
Activity 9 common online terminologies
 
Common Online Terminologies
 Common Online Terminologies Common Online Terminologies
Common Online Terminologies
 
The Web
The WebThe Web
The Web
 
World Wide Web (WWW)
World Wide Web (WWW)World Wide Web (WWW)
World Wide Web (WWW)
 
Internet vs. WWW
Internet vs. WWWInternet vs. WWW
Internet vs. WWW
 
Internet features (2nd topic)
Internet features (2nd topic)Internet features (2nd topic)
Internet features (2nd topic)
 
Presentation1
Presentation1Presentation1
Presentation1
 
The Internet Revolution
The Internet RevolutionThe Internet Revolution
The Internet Revolution
 
Internet Basics
Internet BasicsInternet Basics
Internet Basics
 
World Wide Web (WWW) Technology
World Wide Web (WWW) TechnologyWorld Wide Web (WWW) Technology
World Wide Web (WWW) Technology
 
Copy Of Part 2
Copy Of Part 2Copy Of Part 2
Copy Of Part 2
 
Web browsing and Internet termenologies
Web browsing and Internet termenologiesWeb browsing and Internet termenologies
Web browsing and Internet termenologies
 
The internet (20112628 jang hee ran)
The internet (20112628 jang hee ran)The internet (20112628 jang hee ran)
The internet (20112628 jang hee ran)
 
Internet Browser, Email, World Wide Web (WWW), Search Engine
Internet Browser, Email, World Wide Web (WWW), Search EngineInternet Browser, Email, World Wide Web (WWW), Search Engine
Internet Browser, Email, World Wide Web (WWW), Search Engine
 
The Internet 2017.
The Internet 2017.The Internet 2017.
The Internet 2017.
 

Similar to BitTorrent Presentation By David Park

Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
Dikshant Patodia
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
raeshu
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RSanjay Ravishankar
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
abhipesit
 
P2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution SystemsP2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution SystemsLorin Olsen
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
Rick Wanner
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
Milan Varia
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
Mayur Kathale
 
Bittorrent
BittorrentBittorrent
Bittorrent
Renuka Raj
 
Bittorrent
BittorrentBittorrent
Bittorrent
Renuka Raj
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
gueste9b89f
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrentSrikanth Vanama
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrentgkmv
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
Mihir Jyoti Chakrabarti
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent ProtocolHarsht2888
 

Similar to BitTorrent Presentation By David Park (20)

Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
P2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution SystemsP2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution Systems
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
Peer to Peer networks and piracy
Peer to Peer networks and piracyPeer to Peer networks and piracy
Peer to Peer networks and piracy
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrent
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

BitTorrent Presentation By David Park

  • 1. While the battle continues around the Indian Ocean against Somali Pirates, another group of ‘pirates’ flying under a different flag fight for a completely different purpose...
  • 2. These are the faces of the owners of “The world’s most resilient BitTorrent site”
  • 3. Welcome to The Pirate Bay, where the message is ‘sharing is caring’
  • 4. BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data. BitTorrent is one of the most common protocols for transferring large files, and it has been estimated that it accounted for roughly 27–55% of all internet traffic (depending on geographical location) as of February 2009.
  • 5. How it works: A user who wishes to distribute a file first creates a small torrent descriptor file that is distributed by conventional means (web, email, etc).
  • 6. The user then makes the file itself available through a BitTorrent node acting as a seed. Those with the torrent descriptor file can give it to their own BitTorrent nodes which, acting as peers download it by connecting to the seed and/or other peers
  • 7. The file being distributed is divided into segments called pieces. As each peer receives a new piece of the file it becomes a source of that piece to other peers, relieving the seed from having to send a copy to every peer.
  • 8. So where does the ‘pirate’ part come in? While the technology itself is perfectly legal, and the bittorrent metafiles do not store copyrighted data, its connection with copyrighted material or otherwise illegal material makes the issuer of the bittorent file liable.
  • 9. So where to from here? The report will further explore the legality of using bittorrent files and the measures taken by certain government departments and ISP’s (internet service providers) in both support and opposition of this protocol.