![]() 38 In Australia, this focus is modified to try to have ISPs made liable for acts of copyright infringements by their subscribers. ![]() In France, the UK and New Zealand there is legislation to cut off access to the internet for households that are accused of violating copyright three times. 37 This new mode of control is taking a number of forms. The holders of copyrighted materials have, for the time being, changed tack and are now applying pressure to the next easily identifiable level of a file sharing network in the form of the internet service providers (ISPs) that deliver an internet connection to people in the swarm. The sense of community and an individual’s own identity within that community is still important. Yet people continue to take risks to support the rest of the community. ![]() 36 However, despite these moves to further decentralise the process, people using Bit Torrent are still largely vulnerable to being identified, mostly through their Internet Protocol (IP) address that identifies the computer device they are using on the network. Having bypassed the need for central torrent trackers, some swarms are now moving discussions to Twitter, with the hash tag for the discussion determined by each individual torrent’s own infohash. While these websites help to maintain a community, Bit Torrent is moving to a further decentralised network. Mike Kent, in Digital Dialogues and Community 2.0, 2012 The future ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |