this post was submitted on 05 Nov 2023
48 points (98.0% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54577 readers
248 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
But how easy is it to actually make up what's going through a socket? If my ISP sees 1TB of data being continuously downloaded (from another IP address that they don't already know what its usually involved with) maybe I'm downloading some illegal movies, maybe I'm retrieving a hard drive backup, right?
Torrent traffic that doesn't go through a VPN is probably easy to make up, it's tons of packets from 50+ addresses, but if it's a Usenet download from one address, or SSH traffic from a seedbox, that should be more complicated to figure out right?
It's unlikely anyone is going to do traffic analysis to catch piracy.
Whistle blowing, human rights reporting, political opposition gets the traffic analysis heuristic identification attack.