Jump to content

Marwan's Content - Page 11 - InviteHawk - Your Only Source for Free Torrent Invites

Buy, Sell, Trade or Find Free Torrent Invites for Private Torrent Trackers Such As redacted, blutopia, losslessclub, femdomcult, filelist, Chdbits, Uhdbits, empornium, iptorrents, hdbits, gazellegames, animebytes, privatehd, myspleen, torrentleech, morethantv, bibliotik, alpharatio, blady, passthepopcorn, brokenstones, pornbay, cgpeers, cinemageddon, broadcasthenet, learnbits, torrentseeds, beyondhd, cinemaz, u2.dmhy, Karagarga, PTerclub, Nyaa.si, Polishtracker etc.

Marwan

Advanced Members
  • Posts

    5,779
  • Joined

  • Last visited

  • Days Won

    1
  • Feedback

    100%
  • Points

    501,240 [ Donate ]

Everything posted by Marwan

  1. As the first of its kind, the spot Ethereum and Bitcoin ETFs by China AMC offer a new investment pathway for Chinese RMB holders and potential mainland investors.
  2. Bitcoin has experienced its most challenging month since the collapse of Sam Bankman-Fried's FTX empire, as the excitement surrounding US spot Bitcoin ETFs continues to wane.
  3. Amidst speculation over the Federal Reserve's stance, Bitcoin faces a 7% drop to $56,500, echoing broader market turmoil and investor apprehension.
  4. The Bitcoin (BTC) price is consolidating in the mid-$57,000s, down roughly 5% on the day, though up around 1.5% or $1,000 from earlier session lows as traders weigh the outlook for Fed rate cuts this year in wake of the latest policy announcement from the US central bank.
  5. Passed by Congress late December 2020, the Protecting Lawful Streaming Act (PLSA) was crafted to urgently close a loophole in copyright law that treated unlicensed reproduction and distribution as a felony, but unlicensed streaming as a misdemeanor. This week, well over three years later, a 40-year-old former operator of an illicit IPTV service became the first person to be convicted under the PLSA. While a win is a win, the case wasn't entirely straightforward. iptv2-sCopyright law crafted decades ago to prevent infringement in an analog world has in many cases held up remarkably well in the digital age. Copying or reproduction remains relevant, as does the concept of distribution. In the United States, the existence of a loophole in copyright law had been an open secret for some time. One way or another, file-hosting and BitTorrent sites could be linked to the unlicensed reproduction and distribution of copyright works, both of which carry felony charges. However, a newer breed of streaming sites were seen as engaging in unlicensed public performances of copyrighted works; a misdemeanor offense under a law that failed to anticipate streaming, let alone its meteoric rise to piracy dominance. The Protecting Lawful Streaming Act (PLSA) closed the loophole late December 2020 with the creation of a new felony offense (18 U.S.C. § 2319C) for those who, willfully and for commercial advantage or private financial gain, offer or provide to the public a digital service that illegally streams copyrighted material. A Brand New Start or Just Hype After taking so long to arrive, expectations were high. The return of “billions of dollars in stolen revenue” may have been optimistic, but after all the talk and calls for urgency, it was suddenly up for debate whether the PLSA would be used at all. Keen to get on with the fight against piracy, Senators Patrick Leahy and Thom Tillis urged Attorney General Merrick Garland to make prosecutions under the PLSA a priority. But then, several months later in 2021, something caught our attention. The instantly recognizable term “illicit digital transmission” had appeared in a criminal complaint for the first time. The case ultimately went in a different direction and the charge was shelved, but it was a sign of intent, if nothing else. First Conviction Under PLSA – How it Started Seemingly out of nowhere, the PLSA claimed its first conviction this week. Landmark events like this are usually seen as an opportunity to celebrate the hard work of everyone involved, while sending a deterrent message to would-be pirates. But in this case, apparently not. According to a grand jury indictment, from December 11, 2017, until September 7, 2021, Franklyn Valverde owned and operated an IPTV and VOD service marketed as ‘Fenix’. In South Carolina and elsewhere, it’s claimed that Valverde knowingly and intentionally conspired to commit offenses against the United States, “to wit: the illicit digital transmission of services, in violation of Title 18, United States Code, Section 2319C.” DISH Network Mentioned Early A prosecution under the PLSA shouldn’t be much different from any other but in this matter, an oddity raises its head right at the start. The indictment claims that Valverde’s streaming service operated by way of a “copyright infringing connection to DISH Network.” DISH is extremely well-known for filing its own lawsuits because, at least on paper, most years they generate damages awards that can reach hundreds of millions of dollars. Why DISH suddenly found itself in the middle of a criminal case isn’t revealed in the indictment; what does seem clear is that others also had ‘copyright-infringing connections’ to DISH. “M.D., a person known to the Grand Jury, owned, and operated ‘Cord Cutters’ and ‘Olympus TV,’ IPTV and VOD services that sold access to copyrighted movies and television programs by way of an unauthorized and copyright infringing connection to Dish Network,” the indictment reads. Valverde’s Operation Subscribers to the Fenix service were able to access infringing content through various web-based applications for use on various platforms, including smart TVs, computers, set-top boxes, cellphones, and tablet devices. According to the indictment, Valverde marketed Fenix and attracted subscribers through a network of resellers, each of whom sold monthly subscriptions via so-called reseller credits. One credit equals one month of access; profit is generated by buying credits at a discount and selling them on at a higher price to customers. “Typically, [Valverde] sold access to Fenix streams of content to resellers using a unique access code. The reseller would then provide the code to the customers at an upcharge; Customers would then have access to the copyrighted materials for a specified period, typically one month.” fenix While the ‘publicly performed’ aspect clearly relates to the PLSA, all other aspects from reproduction to secondary infringement could’ve been handled under existing law. Nevertheless, the indictment covers other matters too. Overt Acts In furtherance of the conspiracy, it’s alleged that Valverde committed the following acts: 1. Between 2017 and July 2021, Valverde sold reseller credits to ‘J.R.D’, a person known to the Grand Jury, for between $9 and $15 per credit. J.R.D resold the credits to customers for $25, enabling them to view the “publicly performed” works. 2. Between 2018 and May 2020, Valverde sold reseller credits to ‘M.D’, a person known to the Gran Jury, for between $7 and $15 per credit. M.D resold the credits to customers for $25, enabling them to view the “publicly performed” works. “All in violation of Title 18, United States Code, Section 371,” the indictment adds. (18 U.S.C. § 371, Conspiracy to Defraud the United States) Count Two In essence, count two in the indictment repeats the allegation that Valverde operated a digital transmission service, contrary to the PLSA. Here, however, it’s alleged that on an unknown date, his Fenix service transmitted “one or more works being prepared for commercial public performance,” and where the defendant “knew or should have known that the work was being prepared for commercial public performance.” Under the PLSA these violations can dramatically increase the maximum penalties available to the court. plsa-works The indictment doesn’t reveal which rightsholders’ content was infringed via the service, i.e which TV shows or movies were publicly performed. The other question involves the content allegedly obtained from DISH. If the content was obtained from DISH at the time it was broadcast to the public by DISH, as is usually the case, it raises the question of how it was still being prepared for broadcast. Court filings offer no explanation. Valverde Enters Plea On June 9, 2023, at a district court in South Carolina, Valverde entered a plea of not guilty. He was subsequently given additional time to “review discovery, discuss the case, and negotiate further with the Government in an effort to resolve the case short of trial.” With a full trial looming, a plea agreement dated November 23 reveals that Valverde had agreed to plead guilty to Count 2 of the indictment. This count covers the provision of the illicit digital service and the works being prepared for commercial public performance; as such the potential penalties are significantly increased. count2-plsa In a judgment published Tuesday, District Judge Mary Geiger Lewis sentenced Valverde to twelve months and one day in federal prison followed by three years of supervised release. The financial components of Valverde’s sentence include a $250,000 fine plus $22,639.27 in restitution. That amount is payable to NagraStar, the anti-piracy company partially owned by DISH that seems to have carried out the investigation against Valverde, in part at least.
  6. Peter Schiff thinks $60,000 could be Bitcoin's final line of price support before imminent collapse.
  7. The SEC has initiated a new phase of discussions regarding a proposed rule alteration for the trading of options on Bitcoin exchange-traded funds (ETFs) while also inviting public input on the matter.
  8. As BlackRock's ETF inflows streak ends, Bitcoin faces volatility, testing critical resistance levels and potentially reshaping market dynamics.
  9. The infamous "Buy Bitcoin" sign held up by Christian Langalis during Federal Reserve Chair Janet Yellen’s Congressional testimony in 2017 has been sold for a staggering $1 million.
  10. Late January, the U.S. Department of Commerce published a notice of proposed rulemaking for establishing new requirements for Infrastructure as a Service providers (IaaS) . The proposal boils down to a 'Know Your Customer' regime for companies operating cloud services, with the goal of countering the activities of "foreign malicious actors." Yet, despite an overseas focus, Americans won't be able to avoid the proposal's requirements, which covers CDNs, virtual private servers, proxies, and domain name resolution services, among others. identity-sIt’s long been the case that access to certain services, whether on or offline, will only be granted when customers prove their identity. Often linked to financial products but in many cases basic money/goods transactions carried out online, handing over a name, address, date of birth and similar details, can increase confidence that a deal will more likely than not go according to plan. In some cases, especially when buying restricted products, proving identity can be a condition of sale. Yet, for many years, companies operating in the online space have been happy to do business with customers without knowing very much about them at all. In some cases, where companies understand that a lack of friction is valuable to the customer, an email address has long been considered sufficient. If the credit or pre-payment card eventually used to pay for a product has enough credit and isn’t stolen, there seems very little to be concerned about. For many governments, however, any level of anonymity has the capacity to cause concern, and if that means unmasking everyone to identify a few bad actors, so be it. Improving Detection and Prevention of Foreign Malicious Cyber Activity Perceived and actual threats from shadowy overseas actors are something few countries can avoid. Whether in the West or the East, reports of relatively low-key meddling through to seriously malicious hacks, even attacks on key infrastructure, are becoming a fact of modern life. After being under discussion for years, late January the U.S. Department of Commerce published a notice of proposed rulemaking hoping to reduce threats to the United States. If adopted, the proposal will establish a new set of requirements for Infrastructure as a Service providers (IaaS), often known as cloud infrastructure providers, to deny access to foreign adversaries. The premise is relatively simple. By having a more rigorous sign-up procedure for platforms such as Amazon’s AWS, for example, the risk of malicious actors using U.S. cloud services to attack U.S. critical infrastructure, or undermine national security in other ways, can be reduced. The Bureau of Industry and Security noted the following in its announcement late January. The proposed rule introduces potential regulations that require U.S. cloud infrastructure providers and their foreign resellers to implement and maintain Customer Identification Programs (CIPs), which would include the collection of “Know Your Customer” (KYC) information. Similar KYC requirements already exist in other industries and seek to assist service providers in identifying and addressing potential risks posed by providing services to certain customers. Such risks include fraud, theft, facilitation of terrorism, and other activities contrary to U.S. national security interests. While supposedly aimed at external threats, only positive identification of all customers can eliminate the possibility that an ‘innocent’ domestic user isn’t actually a foreign threat actor. Or, according to the proposal, anyone (or all people) from a specified jurisdiction at the government’s discretion. Upon notification by IaaS providers, that could include foreign persons training large artificial intelligence models “with potential capabilities that could be used in malicious cyber-enabled activity.” Scope of IaaS and Customer Identification Programs Under the proposed rule, Customer Identification Programs (CIPs) operated by IaaS providers must collect information from both existing and prospective customers, i.e. those at the application stage of opening an account. The bare minimum includes the following data: a customer’s name, address, the means and source of payment for each customer’s account, email addresses and telephone numbers, and IP addresses used for access or administration of the account. What qualifies as an IaaS is surprisingly broad: Any product or service offered to a consumer, including complimentary or “trial” offerings, that provides processing, storage, networks, or other fundamental computing resources, and with which the consumer is able to deploy and run software that is not predefined, including operating systems and applications. The consumer typically does not manage or control most of the underlying hardware but has control over the operating systems, storage, and any deployed applications. The term is inclusive of “managed” products or services, in which the provider is responsible for some aspects of system configuration or maintenance, and “unmanaged” products or services, in which the provider is only responsible for ensuring that the product is available to the consumer. And it doesn’t stop there. The term IaaS includes all ‘virtualized’ products and services where the computing resources of a physical machine are shared, such as Virtual Private Servers (VPS). It even covers ‘baremetal’ servers allocated to a single person. The definition also extends to any service where the consumer does not manage or control the underlying hardware but contracts with a third party for access. “This definition would capture services such as content delivery networks, proxy services, and domain name resolution services,” the proposal reads. The proposed rule, National Emergency with Respect to Significant Malicious Cyber-Enabled Activities, will stop accepting comments from interested parties on April 30, 2024. Given the implications for regular citizens, many of whom are already hanging on to what remains of their privacy, the prospect of handing over highly sensitive information just to obtain a product trial is a real concern. The potential for leaks grows with each disclosure, as does the possibility of personal information ending up for sale on the dark web. Which is where the threat actors will obtain other people’s credentials to masquerade as regular users when subjected to a Know Your Customer process. For IaaS services themselves, the largest will have few problems implementing customer identification programs and may even consider them useful. On one hand, they can help to stop threat actors and on the other, take the opportunity to build a database containing the personal details of every single customer.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.