<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[USE A BLOCKLIST or you will be tracked… 100% of the time]]></title><description><![CDATA[<p dir="auto"><strong>P2P researchers: use a blocklist or you will be tracked… 100% of the time</strong><br />
By Nate Anderson | Published: October 10, 2007 - 11:42PM CT</p>
<p dir="auto">The old cliché "You're not paranoid if they really are out to get you" turns out to apply quite nicely to the world of P2P file-sharing.<br />
A trio of intrepid researchers from the University of California-Riverside decided to see just how often a P2P user might be tracked by<br />
content owners. Their startling conclusion: "naive" users will exchange data with such "fake users" 100 percent of the time.</p>
<p dir="auto">Anirban Banerjee, Michalis Faloutsos, and Laxmi Bhuyan collected more than 100GB of TCP header information from P2P networks<br />
back in early 2006 using a specially-doctored client. The goal of the research was a simple one: to determine "how likely is it that a<br />
user will run into such a 'fake user' and thus run the risk of a lawsuit?"… "P2P: Is Big Brother Watching You?"<br />
For years, P2P communities have suspected that affiliates of the RIAA, the MPAA, and others have been haunting P2P networks to<br />
look for those who might be swapping copyrighted files. It's more than a hunch; it's well documented that companies like SafeNet<br />
(formerly Media Sentry) engage in this sort of work, and that their testimony is routinely produced at trials. It helped to bring down Jammie<br />
Thomas, in fact. But identifying these organizations is hard. The nature of their business is to remain shadowy, but P2P advocates have<br />
spent years compiling "blocklists" of IP ranges that are suspected of belonging to such companies. Connect to a "user" who has an IP<br />
address in one of the blocklists and bam: you've just been tracked swapping a file.</p>
<p dir="auto">By parsing all of the TCP headers that they collected over the course of 90 days, the UC-Riverside researchers came to several conclusions:</p>
<p dir="auto">If you don't use a blocklist, you will be tracked. Every one of the researchers' test clients that did not use a blocklist soon connected to an IP<br />
address found within those lists. It turns out that 12 to 17 percent of all IP addresses on the network belonged to these blocklisted ranges.<br />
Trackers aren't that hard to avoid. While "naive" clients may all connect to blocklisted users, it wasn't that hard to stay away from the vast majority<br />
of such "fake users." Researchers found that "avoiding just the top 5 blocklisted IPs reduces the chance of being tracked to about 1 percent."<br />
Content owners hide their tracks. Much of this tracking work is farmed out from content owners to companies like SafeNet and BayTSP,<br />
and these companies in turn take care to hide their tracks. When the researchers ran reverse DNS lookups on the blocklisted ranges, they found<br />
that only 0.5 percent of those addresses resolved back to media companies in an obvious way.<br />
Meet the BOGONS. One of the strategies for remaining anonymous is to operate from BOGON IP ranges. These ranges are unallocated blocks<br />
of addresses that should ordinarily not be used on the public Internet. Of the top fifteen blocklist entities that were discovered during testing,<br />
12 were in BOGON ranges. The researchers note that "these sources deliberately wish to conceal their identities while serving files on P2P<br />
networks," and reverse DNS queries on these addresses produce little useful information.</p>
<p dir="auto">The takeaway here is simple: P2P users who don't utilize the blocklists are just about guaranteed to be tracked by "fake users" operating out of<br />
those ranges, and thus seem to open the door to possible litigation should the dice be rolled against them.<br />
The study does have one major caveat, however; it does not attempt to determine if the blocklists actually correspond to tracking organizations<br />
like SafeNet. The researchers note that "this would be interesting and challenging future work." While using a blocklist makes it easy to avoid<br />
connecting to IP addresses found on that list, it's not clear that every range on the lists is really a tracker. Conversely, there's no way to know<br />
if addresses not on the list might in fact be tracking users.</p>
]]></description><link>https://community.gaytor.rent/topic/700/use-a-blocklist-or-you-will-be-tracked-100-of-the-time</link><generator>RSS for Node</generator><lastBuildDate>Wed, 08 Apr 2026 11:03:12 GMT</lastBuildDate><atom:link href="https://community.gaytor.rent/topic/700.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 26 Apr 2008 16:10:11 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to USE A BLOCKLIST or you will be tracked… 100% of the time on Tue, 13 Jan 2009 18:54:03 GMT]]></title><description><![CDATA[<p dir="auto">humm this is scary.. i was introduced to Tor about a month ago.. and i have been using it sometimes, would anyone know whether it helps to protect my identity?<br />
i turn it off because (must be my settings..) it prevents me from downloading, could only upload…<br />
thanks<br />
Whitney</p>
]]></description><link>https://community.gaytor.rent/post/56753</link><guid isPermaLink="true">https://community.gaytor.rent/post/56753</guid><dc:creator><![CDATA[Whits]]></dc:creator><pubDate>Tue, 13 Jan 2009 18:54:03 GMT</pubDate></item><item><title><![CDATA[Reply to USE A BLOCKLIST or you will be tracked… 100% of the time on Fri, 02 Jan 2009 21:11:08 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/aaliass" aria-label="Profile: aaliass">@<bdi>aaliass</bdi></a>:</p>
<blockquote>
<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/twjt3nec" aria-label="Profile: TwjT3NEc">@<bdi>TwjT3NEc</bdi></a>:</p>
<blockquote>
<p dir="auto">For those interested, you can get various of blocklists from Blue Attack Internet Security Solutions (BISS)</p>
</blockquote>
<p dir="auto">i downloaded and installed Bluetack…..i enable the "Level 1" list....my question : which other list do you advise to enable apart from the Level 1  ???</p>
</blockquote>
<p dir="auto">Sorry for late reply. I forgot about this thread.</p>
<p dir="auto">Since I'm the paranoid one, I use most of them.</p>
<p dir="auto">There's also been some pre-compiled lists specifically for P2P on their site. I'm not sure if they removed it because of the server problems or not.</p>
]]></description><link>https://community.gaytor.rent/post/56628</link><guid isPermaLink="true">https://community.gaytor.rent/post/56628</guid><dc:creator><![CDATA[TwjT3NEc]]></dc:creator><pubDate>Fri, 02 Jan 2009 21:11:08 GMT</pubDate></item><item><title><![CDATA[Reply to USE A BLOCKLIST or you will be tracked… 100% of the time on Wed, 22 Oct 2008 23:03:48 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/twjt3nec" aria-label="Profile: TwjT3NEc">@<bdi>TwjT3NEc</bdi></a>:</p>
<blockquote>
<p dir="auto">For those interested, you can get various of blocklists from Blue Attack Internet Security Solutions (BISS)</p>
</blockquote>
<p dir="auto">i downloaded and installed Bluetack…..i enable the "Level 1" list....my question : which other list do you advise to enable apart from the Level 1  ???</p>
]]></description><link>https://community.gaytor.rent/post/56181</link><guid isPermaLink="true">https://community.gaytor.rent/post/56181</guid><dc:creator><![CDATA[aaliass]]></dc:creator><pubDate>Wed, 22 Oct 2008 23:03:48 GMT</pubDate></item><item><title><![CDATA[Reply to USE A BLOCKLIST or you will be tracked… 100% of the time on Wed, 14 May 2008 14:56:17 GMT]]></title><description><![CDATA[<p dir="auto">I use PeerGuardian on all my computers\servers, and disconnect the internet if for some reason PG isn't running.</p>
]]></description><link>https://community.gaytor.rent/post/54365</link><guid isPermaLink="true">https://community.gaytor.rent/post/54365</guid><dc:creator><![CDATA[dmcuk]]></dc:creator><pubDate>Wed, 14 May 2008 14:56:17 GMT</pubDate></item><item><title><![CDATA[Reply to USE A BLOCKLIST or you will be tracked… 100% of the time on Sat, 26 Apr 2008 17:24:45 GMT]]></title><description><![CDATA[<p dir="auto">For those interested, you can get various of blocklists from Blue Attack Internet Security Solutions (BISS) website.</p>
<p dir="auto">You can also get their IP blocker Protowall and Blocklist Manager for managing your lists. They are both free and work nicely on XP. <img src="https://community.gaytor.rent/assets/plugins/nodebb-plugin-emoji/emoji/apple/1f642.png?v=57695cee877" class="not-responsive emoji emoji-apple emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
]]></description><link>https://community.gaytor.rent/post/54290</link><guid isPermaLink="true">https://community.gaytor.rent/post/54290</guid><dc:creator><![CDATA[TwjT3NEc]]></dc:creator><pubDate>Sat, 26 Apr 2008 17:24:45 GMT</pubDate></item></channel></rss>