FINDING · DEFENSE

When RIAA filed suit against more than 30,000 individual filesharers, users migrated toward anonymous channels, small-world networks of vetted peers, ephemeral pointers, and user-generated IP blacklists for spoofed-peer detection. The University of Washington demonstrated IP-to-person attribution is unreliable — a networked laser printer received a DMCA takedown notice.

From 2011-seltzer-infrastructuresInfrastructures of Censorship and Lessons from Copyright Resistance · §1.3 · 2011 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
torbridges

Extracted by claude-sonnet-4-6 — review before relying.