Tag Archives: news

YTS ‘Settles’ Another Movie Piracy Lawsuit, While More Users Get Sued

Post Syndicated from Ernesto original https://torrentfreak.com/yts-settles-another-movie-piracy-lawsuit-while-more-users-get-sued-200127/

With millions of users, torrent site YTS is one of the largest pirate sites on the Internet.

The site is a thorn in the side of many filmmakers, several of which dragged the site’s operator to US courts last year.

These types of lawsuits have proven to be lethal in the past, but not for YTS. We previously reported that YTS settled its dispute with movie outfit Wicked Nevada, and late last week it reached a similar agreement with HB Productions, the makers of the film Hellboy.

A new filing submitted at a federal court in Hawaii shows that both parties agreed to a stipulated consent judgment. The order, signed by US District Court Judge Alan Kay, effectively ends the lawsuit.

Senthil Vijay Segaran, the suspected operator of YTS, denies liability but confirms that he is the ‘John Doe’ described in the complaint and admits that people used YTS to share pirated content.

“Defendant SENTHIL VIJAY SEGARAN denies liability but acknowledges that he is Defendant JOHN DOE dba YTS identified in the original complaint and concedes that one or more third parties uploaded the torrent file of Plaintiff’s motion picture to his website YTS.LT,” it reads.

The agreement also comes at a high price for the operator. Similar to the previous settlement, Segaran agrees to pay $150,000 to compensate for the damages suffered by the makers of Hellboy.

In addition, the consent judgment includes a permanent injunction. This prevents YTS’s operator from distributing and/or promoting torrent files that point to the Hellboy film. Thus far this is indeed the case, as YTS.lt no longer lists the movie.

It is quite unusual for a movie company to resolve a lawsuit against a torrent site in this manner. Like the previous settlement, this case was handled by attorney Kerry Culpepper, who is also behind the one remaining lawsuit against YTS.

The fact that YTS remains online is good news for millions of YTS users but not all will be pleased. Around the same time that the filmmakers and YTS resolved their differences, new copyright infringement lawsuits were filed against YTS users.

These cases partly rely on information that appears to have been obtained from the YTS user database. For example, a lawsuit filed against Hawaii resident Puakailima Davis last week states the following;

“Defendant, from Internet Protocol (‘IP’) address, used a registered account associated with the email address “redactedbyTF@gmail.com” to access torrent files from YTS.

“Defendant went to torrent sites including the website YTS to upload and download Plaintiffs’ copyrighted Works,” the complaints later adds.

The complaint further mentions at what times the defendant “logged into her email address,” although it’s not clear whether that refers to the website login or that of the email provider.

As mentioned previously, an email address itself is not hard evidence. People who register an account with YTS don’t have to confirm their email, so anyone can sign up with a random address, including those of other people.

It’s not stated how all the referenced information was obtained, which leaves us with little more than speculation.

A possible scenario is that the YTS operator gave up the user information as part of the negotiations. This would not be unprecedented, as the developer of the app CotoMovies shared similar information with the film companies in the past.

TorrentFreak contacted Kerry Culpepper, the attorney in charge, but he informed us that he couldn’t comment on the matter at this time.

YTS.lt, meanwhile, remains online.

TorrentFreak obtained a copy of the stipulated consent judgment between HB Productions and Senthil Vijay Segaran, which is available here (pdf). Two new complaints against alleged YTS users are available here (pdf) and here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

South Korea Requests Interpol Red Notice to Track Down Pirate Site Operator

Post Syndicated from Andy original https://torrentfreak.com/south-korea-requests-interpol-red-notice-to-track-down-pirate-site-operator-200127/

For the very first time in a copyright infringement case, South Korea’s Ministry of Culture, Sports and Tourism in conjunction with the National Police Agency has requested a so-called Interpol Red Notice.

Red Notices detail people who are wanted internationally for serious crimes, typically murder, rape, child abuse or armed robbery, according to Interpol. However, South Korean authorities state that since serious copyright infringers can be jailed for significant periods, those with an arrest warrant filed against them can now be pursued internationally.

“Previously, it was not possible to investigate copyright infringers residing abroad, so the investigation would have to be temporarily suspended and only the information notified to immigration,” the Ministry says.

“But now, with a long period of two years in prison or in jail, a copyright infringer with an arrest warrant has been redeemed with the cooperation of the International Criminal Police Agency (Interpol) to arrest the wanted person and lead him to the country.”

The name of the suspect hasn’t been released publicly but the Ministry of Culture states that they want their Interpol partners to apprehend the operator of a torrent site (simply referred to as ‘torrent—‘) that offered around 455,000 titles illegally and generated around 15 million visits per month. The only other detail is that the person is Australian and residing overseas.

In its announcement, the Ministry of Culture revealed recent progress in its battle against large scale copyright infringers who allegedly distribute copyright works using overseas servers. After closing 25 sites in 2018, police say they arrested nine site operators in 2019, arrested a further six, and closed 20 illicit platforms.

Those arrested include three detained for distributing 5,000 comic works and 20,000 pornography titles on sites utilizing overseas servers, plus two who “earned advertising revenues” by posting 100,000 comic works on foreign sites.

In parallel, the Korea Communications Commission and the Korea Copyright Protection Office under the Ministry of Arts and Culture have been working closely to improve the country’s site-blocking mechanism. In common with other regions around the world, alternative domains, proxies and mirrors that quickly spring up after domains are blocked have been receiving special attention.

As part of the overall crackdown, the National Police Agency is reportedly investigating gambling sites that place banner advertising on ‘pirate’ platforms while encouraging international cooperation against infringement, including strengthening ties with service providers and copyright authorities, plus Google.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Indonesia Faces Call for US Trade Sanctions over Online Piracy

Post Syndicated from Ernesto original https://torrentfreak.com/indonesia-faces-call-for-us-trade-sanctions-over-online-piracy/

Indonesia has been very active on the anti-piracy front in recent months, with the government ordering Internet providers to block hundreds of pirate sites.

Despite these enforcement efforts, several high profile US entertainment industry groups see room for improvement in the Asian country.

The International Intellectual Property Alliance (IIPA), which includes a wide range of copyright groups including the MPA, RIAA, and ESA, made this clear in a recent submission to the US Trade Representative.

IIPA advises the U.S. government to suspend Indonesia’s GSP trade benefits if the country fails to do more to protect the interests of US copyright holders. With many millions of dollars at stake, this is a serious threat.

In their submission, IIPA acknowledges that the Indonesian government has recently taken “significant strides” to combat piracy. However, it also adds that “more should be done.”

The group notes that the movie and music industries “worked” with the government to block hundreds of websites. This resulted in some success stories, such as the recent decision by pirate site IndoXXI to voluntarily shut down.

However, blockades are not always effective. In many cases, the initial drops in traffic that occur after a blockade are undone when sites move to new domain names.

“[T]hese drops in traffic are intermittent as most well-known piracy sites employ a strategy of domain hopping—redirecting domains to circumvent the results of site-blocking efforts,” IIPA writes.

The Indonesian government has already responded to this by blocking new domains as well, but IIPA sees room for improvement on this front.

“The government should streamline the process for rights holders to ensure access to infringing sites is disabled and to deal efficiently with the problem of domain hopping,” the group writes.

These demands are clear but it remains odd to see calls for these types of drastic measures from US companies that have yet to take any action to block a single pirate site in the US itself.

IIPA’s demands don’t end there either – the copyright holders have more suggestions. For example, Indonesia should prioritize enforcement efforts against illegal camcording in theaters as well as live streaming piracy.

“The government should issue clear guidelines and regulations on illegal camcording and live streaming piracy, and take the initiative to reduce instances of these illegal activities as a priority,” IIPA writes.

In addition, piracy apps and the distribution points for piracy-enabling set-top boxes should be dealt with as well.

“IIPA encourages the Indonesian Government to take steps to crack down on piracy apps and on device retailers who preload the devices with apps that facilitate infringement, and take action against key distribution points for devices that are being used illegally.”

This is just a small selection of the demands which also include a repeal of certain copyright exceptions and an extension of the copyright term to the life of the author plus 70 years.

According to IIPA, Indonesia was on the right track but in 2019 progress stalled and even regressed. The organization hopes that by listing a wide variety of improvement opportunities, perhaps with a nudge from the US government, progress can continue.

If the US Government doesn’t see any improvement, it should suspend (some of) the existing trade benefits for the country, the rightsholder groups conclude.

“If, at the conclusion of the review, the Government of Indonesia has not made adequate progress remedying the deficiencies outlined above, IIPA requests that the Committee suspend or withdraw Indonesia’s GSP benefits, in whole or in part,” IIPA writes.

This type of pressure is not new. In 2017 the US Government sanctioned Ukraine following a similar referral from the IIPA. This triggered a wave of copyright-related actions in the country, with President Trump deciding to lift the sanctions a few months ago.

IIPA’s full submission to the US Trade Representative is available here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

AWS DataSync Update – Support for Amazon FSx for Windows File Server

Post Syndicated from Jeff Barr original https://aws.amazon.com/blogs/aws/aws-datasync-update-support-for-amazon-fsx-for-windows-file-server/

AWS DataSync helps you to move large amounts of data into and out of the AWS Cloud. As I noted in New – AWS DataSync – Automated and Accelerated Data Transfer, our customers use DataSync for their large-scale migration, upload & process, archiving, and backup/DR use cases.

Amazon FSx for Windows File Server gives you network file storage that is fully compatible with your existing Windows applications and environments (read New – Amazon FSx for Windows File Server – Fast, Fully Managed, and Secure to learn more). It includes a very wide variety of enterprise-ready features including native multi-AZ file systems, support for SQL Server, data deduplication, quotas, and the ability to force the use of in-transit encryption. Our customers use Amazon FSx for Windows File Server to lift-and-shift their Windows workloads to the cloud, where they can benefit from consistent sub-millsecond performance and high throughput.

Inside AWS DataSync
The DataSync agent is deployed as a VM within your existing on-premises or cloud-based environment so that it can access your NAS or file system via NFS or SMB. The agent uses a robust, highly-optimized data transfer protocol to move data back and forth at up to 10 times the speed of open source data transfer solutions.

DataSync can be used for a one-time migration-style transfer, or it can be invoked on a periodic, incremental basis for upload & process, archiving, and backup/DR purposes. Our customers use DataSync for transfer operations that encompass hundreds of terabytes of data and millions of files.

Since the launch of DataSync in November 2018, we have made several important updates and changes to DataSync including:

68% Price Reduction – We reduced the data transfer charge to $0.0125 per gigabyte.

Task Scheduling – We gave you the ability to schedule data transfer tasks using the AWS Management Console or the AWS Command Line Interface (CLI), with hourly, daily, and weekly options:

Additional Region Support – We recently made DataSync available in the Europe (Stockholm), South America (São Paulo), Asia Pacific (Hong Kong), Asia Pacific (Mumbai), and AWS GovCloud (US-East) Regions, bringing the total list of supported regions to 20.

EFS-to-EFS Transfer – We added support for file transfer between a pair of Amazon Elastic File System (EFS) file systems.

Filtering for Data Transfers – We gave you the ability to use file path and object key filters to control the data transfer operation:

SMB File Share Support – We added support for file transfer between a pair of SMB file shares.

S3 Storage Class Support – We gave you the ability to choose the S3 Storage Class when transferring data to an S3 bucket.

FSx for Windows Support
Today I am happy to announce that we are giving you the ability to use DataSync to transfer data to and from Amazon FSx for Windows File Server file systems. You can configure these file systems as DataSync Locations and then reference them in your DataSync Tasks.

After I choose the desired FSx for Windows file system, I supply a user name and password, and enter the name of the Windows domain for authentication:

Then I create a task that uses one of my existing SMB shares as a source, and the FSx for Windows file system as a destination. I give my task a name (MyTask), and configure any desired options:

I can set up filtering and use a schedule:

I have many scheduling options; here are just a few:

If I don’t use a schedule, I can simply click Start to run my task on an as-needed basis:

When I do this, I have the opportunity to review and refine the settings for the task:

The task starts within seconds, and I can watch the data transfer and throughput metrics in the console:

In addition to the console-based access that I just showed you, you can also use the DataSync API and the DataSync CLI to create tasks (CreateTask), start them (StartTaskExecution), check on task status (DescribeTaskExecution) and much more.

Available Now
This important new feature is available now and you can start using it today!


Swedish Court Issues ‘Dynamic’ Pirate Bay Blocking Order

Post Syndicated from Ernesto original https://torrentfreak.com/swedish-court-issues-dynamic-pirate-bay-blocking-order-200124/

In recent years, Swedish movie outfits and Hollywood studios, including Disney, Paramount Pictures and Warner Bros, have been working hard to get local ISPs to block The Pirate Bay.

The first success came a few years ago when a blocking order was issued against local Internet provider Bredbandsbolaget. This was later followed by an interim order against Telia, Sweden’s largest ISP, which was struck down on appeal and sent back to the lower court.

During the second try of the case movie companies again requested a blocking order against The Pirate Bay, as well as three other sites, Dreamfilm, FMovies, and NyaFilmer.

Last month this case was decided in favor of the rightsholders, with the court not only issuing a blocking injunction but also one that can be extended

The Swedish Patent and Market Court ordered Telia to block access to the four pirate sites to prevent these from facilitating further copyright infringement. In addition, the rightsholders are also allowed to add new domain names and IP-addresses going forward.

The movie companies requested this expansion option since blocking orders are often circumvented through new domains and proxy sites. Telia objected to the request for such a “dynamic” blocking order, but the court sided with the copyright holders.

“It is clear that the services change domain names and URLs and that this is a quick, easy and inexpensive way to bypass the effect of a blocking procedure,” the court writes.

“A blocking injunction should, therefore, in order to effectively serve the rights holders’ interest in preventing infringements, not merely target specified domain names and URLs,” the order adds.

This effectively means that Telia must update its blocklist when it’s made aware of changes. Any new URLs and IP-addresses have to provide access to any of the four pirate sites, including The Pirate Bay.

Telia also objected to the general blocking order and questioned whether the rightsholders had shown any proof of infringement. However, the court refuted these arguments and stressed that, under EU law, ISP can be ordered to stop pirating subscribers.

The case resulted in a clash between several rights that are defined in the Charter of Fundamental Rights of the European Union. In this instance, the property rights of the movie companies weigh stronger than Telia’s right to entrepreneurial freedom.

Hans Eriksson, Senior Associate at the law firm  Westerberg & Partners, highlighted the case at IPKat, believes that dynamic injunctions, which can be updated regularly, will become more and more common.

“Dynamic injunctions like this one are likely to be the future for blocking injunctions in Europe,” Eriksson tells TorrentFreak.

The Market Court’s injunction is valid for three years. If Telia fails to properly implement the blockades, it risks a penalty of 500,000 Swedish Krona (€47,500). Telia is not happy with the outcome, however, and has already filed an appeal.

A copy of the Patent and Market Court’s order, in Swedish, is available here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

New – T3 Instances on Dedicated Single-Tenant Hardware

Post Syndicated from Jeff Barr original https://aws.amazon.com/blogs/aws/new-t3-instances-on-dedicated-single-tenant-hardware/

T3 instances use a burst pricing model that allows you to host general purpose workloads at low cost, with access to sustainable, full-core performance when needed. You can choose from seven different sizes and receive an assured baseline amount of processing power, courtesy of custom high frequency Intel® Xeon® Scalable Processors.

Our customers use them to host many different types of production and development workloads including microservices, small and medium databases, and virtual desktops. Some of our customers launch large fleets of T3 instances and use them to test applications in a wide range of conditions, environments, and configurations.

We launched the first EC2 Dedicated Instances way back in 2011. Dedicated Instances run on single-tenant hardware, providing physical isolation from instances that belong to other AWS accounts. Our customers use Dedicated Instances to further their compliance goals (PCI, SOX, FISMA, and so forth), and also use them to run software that is subject to license or tenancy restrictions.

Dedicated T3
Today I am pleased to announce that we are now making all seven sizes (t3.nano through t3.2xlarge) of T3 instances available in dedicated form, in 14 regions.You can now save money by using T3 instances to run workloads that require the use of dedicated hardware, while benefiting from access to the AVX-512 instructions and other advanced features of the latest generation of Intel® Xeon® Scalable Processors.

Just like the existing T3 instances, the dedicated T3 instances are powered by the Nitro system, and launch with Unlimited bursting enabled. They use ENA networking and offer up to 5 Gbps of network bandwidth.

You can launch dedicated T3 instances using the EC2 API, the AWS Management Console:

The AWS Command Line Interface (CLI):

$ aws ec2 run-instances --placement Tenancy=dedicated ...

or via a CloudFormation template (set tenancy to dedicated in your Launch Template).

Now Available
Dedicated T3 instances are available in the US East (N. Virginia), US East (Ohio), US West (N. California), South America (São Paulo), Canada (Central), US West (Oregon), Europe (Ireland), Europe (Frankfurt), Europe (London), Asia Pacific (Singapore), Asia Pacific (Sydney), Asia Pacific (Tokyo), Asia Pacific (Mumbai), and Asia Pacific (Seoul) Regions.

You can purchase the instances in On-Demand or Reserved Instance form. There is an additional fee of $2 per hour when at least one Dedicated Instance of any type is running in a region, and $0.05 per hour when you you burst above the baseline performance for an extended period of time.


Russia’s Anti-Piracy Deal to Delete Content From Search Engines Extended Until 2021

Post Syndicated from Andy original https://torrentfreak.com/russia-anti-piracy-deal-to-delete-content-from-search-engines-extended-until-2021-200124/

When leading content companies and distributors plus Yandex, Rambler Group, Mail.Ru Group, vKontakte, and RuTube signed up to a landmark anti-piracy memorandum in 2018, new ground was broken in Russia.

Assisted by the creation of a centralized database of allegedly-infringing content, Internet platforms agreed to voluntarily query the resource in near real-time before deleting content from their search indexes. The plan was to make pirated content harder for users to find and within months, hundreds of thousands of links were being purged.

The end-game was to have the terms of the agreement written into local law but as some expected, things didn’t run entirely to plan. Early October 2019, with the memorandum a year old, it effectively timed out. Negotiations ensued and a short extension was agreed but a deadline of end October came and went without a draft being presented to parliament.

With another deadline missed, an automatic extension to end December 2019 came into play but it’s now clear that the plan to formalize the agreement in law is still a very long way off.

During a meeting at the Media and Communications Union, the industry association formed by the largest media companies and telecom industry players, the parties – with assistance from telecoms watchdog Roscomnadzor – have now agreed to another extension. The voluntary agreement will now continue for at least another year, the clearest indication yet that this isn’t a straightforward matter.

According to industry sources cited by Vedomosti (paywall), the decision not to push ahead now towards legislation was taken jointly by the signatories and Roscomnadzor.

While many specifics aren’t being made public, sources indicate that the mechanism for resolving disputes between the copyright holders and Internet platforms has proven complex. Another area of disagreement centers around demands from rightsholders and content companies to have sites delisted on a permanent basis, if they are repeatedly flagged as offering links to infringing content.

Another key issue is that under the current system there is a clear bias towards video content and the largest copyright holders, while others have to take a back seat or are left out altogether. It will take a considerable period of time to overcome these hurdles, a situation that isn’t helped by a reported lack of time in the State Duma to deal with the legislation.

As a result, the memorandum will now be extended to the end of January 2021, to allow the parties and the government to come up with a credible framework before writing it into law.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Amazon EKS Price Reduction

Post Syndicated from Martin Beeby original https://aws.amazon.com/blogs/aws/eks-price-reduction/

Since it launched 18 months ago, Amazon Elastic Kubernetes Service has released a staggering 62 features, 14 regions, and 4 Kubernetes versions. While developers, like me, are loving the speed of innovation and the incredible new features, today, we have an announcement that is going to bring a smile to the people in your finance department. We are reducing the price by 50%.

As of the 21st of January, the price will reduce from $0.20 per hour for each Amazon EKS cluster to $0.10 per hour. This new price is for all new and existing Amazon EKS clusters.

Incredible Momentum
Last year, I wrote about a few of those 62 Amazon EKS features. Features such as Amazon EKS on AWS Fargate, EKS Windows Containers support, and Managed Node Groups for Amazon Elastic Kubernetes Service. It has been a pleasure to hear customers in the comments, in meetings, and at events tell me that features like these are enabling them to run different kinds of applications more reliably and more efficiently than ever before. I also have enjoyed watching customer feedback come in via the public containers roadmap and see the Amazon EKS team deliver requested features at a constant rate.

Customers are Flourishing on Amazon Elastic Kubernetes Service
Amazon EKS is used by big and small customers to run everything from simple websites to mission-critical systems and large scale machine learning jobs. Below are three examples from the many customers that are seeing tremendous value from Amazon EKS.

Snap runs 100% on K8s in the cloud and, in the last year, moved multiple parts of their app, including the core messaging architecture to Amazon EKS as part of their move from a monolithic service-oriented architecture to microservices. In their words, “Undifferentiated Heavy Lifting is work that we have to do that doesn’t directly benefit our customers. It’s just work. Amazon EKS frees us up to worry about delivering customer value and allows developers without operational experience to innovate without having to know where their code runs.” You can learn more about Snap’s journey in this video recorded at the AWS New York Summit.

HSBC runs mission-critical, highly secure banking infrastructure on Amazon EKS and joined us on stage at AWS re:Invent 2019 to talk about why they bank on Amazon EKS.

Advalo is a predictive marketing platform company, reaching customers during the most influential moments in their purchase decision. – Edouard Devouge, Lead SRE at Advalo says “We are running our applications on Amazon EKS, launching up to 2,000 nodes per day and running up to 75,000 pods for microservices and Machine Learning apps, allowing us to detect purchase intent through individualized Marketing in the website and shops of our customers.”

With today’s announcement, all the benefits that these customers describe are now available at a great new price, ensuring that AWS remains the best place in the world to run your Kubernetes clusters.

Amazon Elastic Kubernetes Service Resources
Here are some resources to help you to learn how to make great use of Amazon EKS in your organization:

Effective Immediately
The 50% price reduction is available in all regions effective immediately, and you do not have to do anything to take advantage of the new price. From today onwards, you will be charged the new lower price for the Amazon Elastic Kubernetes Service service. So sit back, relax, and enjoy the savings.

— Martin

Registrar Suspends Popcorn Time Domain Name Following Complaint

Post Syndicated from Ernesto original https://torrentfreak.com/registrar-suspends-popcorn-time-domain-name-following-complaint-200121/

Half a decade ago, Popcorn Time was the first application to bridge the gap between torrenting and streaming.

The software amassed millions of users by offering an easy-to-use Netflix-style interface, providing access to the latest pirated movies and TV-shows.

In recent years many other pirate streaming alternatives have outgrown Popcorn Time in terms of popularity. However, the various forks of the app still have a significant user base.

One of the most popular ones is Popcorntime.sh. Like all other forks, it’s not linked to the original developers, who have long moved on. However, that doesn’t mean it’s spared from legal issues.

Several movie companies previously targeted the app by obtaining a subpoena which directed Cloudflare to reveal the identity of the operator. The same companies also targeted alleged Popcorn Time users in court.

A few hours ago another problem emerged. Without prior warning, the Popcorntime.sh domain name was suspended by its registrar. A quick Whois search shows the associated “clienthold” status.

This clienthold status is set by the domain registrar, 101domain in this case, and informs the registry not to activate the DNS. As a result, the website had been rendered inaccessible to the public at large.

A spokesperson from Popcorntime.sh confirmed the problems and informs TorrentFreak that they were not warned in advance about the issue. Nor was it made clear by the registrar what the precise reason for this suspension is.

“They have sent zero notice before the suspension, neither did they explain why it’s suspended,” Popcorn Time’s spokesperson says.

The 101domain support team did inform Popcorn Time that a complaint had been received, the spokesperson says. However, who this complaint is from and what it’s about remains a guess.

This isn’t the first time that the registrar has taken action. Last November a similar problem occurred. However, according to Popcorn Time, this was the result of a payment issue. This time it appears to be an external complaint.

Given the nature of the Popcorn Time application and repeated complaints from rightsholders in the past about this type of software, it’s likely that a movie or TV outfit sent a complaint.

We reached out to 101domains with a request for further information but, at the time of writing, we have yet to hear back.

The Popcorn Time spokesperson says that they have switched to Popcorntime.app for the time being.
If they are unable to resolve the domain issue this change could become permanent.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Italian Court Orders ISPs to Block IPTV Sites Over Serie A Piracy

Post Syndicated from Andy original https://torrentfreak.com/italian-court-orders-isps-to-block-iptv-sites-over-serie-a-piracy-200121/

In common with several top football leagues around Europe, Italy’s Serie A has an ongoing problem with piracy of its live broadcasts.

Sites with embedded streaming players regularly show Serie A matches but perhaps the biggest threat is posed by unlicensed IPTV services. These offer subscription packages that closely mimic and can even outdo those delivered by Serie A’s official broadcasting partners.

This has provoked a range of anti-piracy actions, such as the one now being reported by anti-piracy group FAPAV (Federazione Anti-Pirateria Audiovisiva). Following a complaint by Serie A and a request from the public prosecutor’s office, the Court of Rome has handed down a preventative ruling that requires 15 websites offering ‘pirate’ IPTV services to be blocked in Italy.

“Among the methods of access to pirated content, illegal IPTVs are a phenomenon of great importance and with a growing incidence linked not only to audiovisual content but also to live sporting events,” says FAPAV Secretary-General, Federico Bagnoli Rossi.

“According to FAPAV / Ipsos research, five million people use this method to watch movies, series and TV shows. As regards sports content in particular, 4.7 million people watched live sports events in a non-legal manner, a figure that has increased compared to 2017.”

FAPAV says that these types of pirate services not only cause damage to the entertainment industries but also to the economy as a whole. As a result, those affected cannot wait any longer before taking action to stem the tide.

While the ruling from the Court of Rome is yet to be published, the big question here is how effective these types of blockades can be, given the way that IPTV services are set up.

As previously reported, Sky has been working hard to have IPTV service management platform URLs removed from Google search. However, other than a reduction in search traffic, the tactic does little if anything to affect the underlying IPTV services which are generally not run from the domains in question.

Furthermore, the effect of blocking sales portal domains does nothing to counter the thousands of resellers funneling customers to the platforms either. It’s an important point that FAPAV appears to recognize, even going as far as suggesting that customers themselves could become part of their inquiries.

“The ongoing investigations have as a main objective the identification of the complex structure of the organization made up of dozens of ‘resellers’ as well as the hundreds of customers who, by purchasing the subscriptions, not only illegally take advantage of the vision of sporting events and pay-per-view television schedules, but also feed the criminal circuit,” the group says.

“The piracy market represents a very thriving business that rests on a large number of customers who feed it, probably unaware of the consequences to which they expose themselves and of the economic damage to the rights holders when compared to citizens who honestly buy regular products.”

It’s clear that no single aspect of anti-piracy activity, whether that’s sales site blocking or targeting some resellers, will bring all pirate IPTV services to their knees. Instead, groups like FAPAV are deploying a multi-pronged strategy that attempts to disrupt activity wherever it can, thus making life more difficult for pirates and their customers.

Blocking of IPTV services has been taking place in Italy since at least 2017 and in the summer of 2019, a “high-level” provider was taken down after providing Sky programming to the public.

Italian authorities were also heavily involved in the raids that targeted Xtream-Codes and others last year, an operation that caused the most disruption the IPTV scene has ever seen, even if it did eventually recover.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

UFC 246 Twitch Piracy Fail Raises Questions For Amateur Pirates & UFC Alike

Post Syndicated from Andy original https://torrentfreak.com/ufc-246-twitch-piracy-fail-raises-questions-for-amateur-pirates-ufc-alike-200120/

Conor McGregor is without doubt the biggest star the world of mixed martial arts has ever seen. Often controversial but always entertaining, the Irishman’s name on a pay-per-view event represents a financial windfall for everyone involved.

As a result, any card displaying McGregor’s name as one half of the main event attracts huge attention and last Saturday’s UFC 246 was no different. Taking place in a sold-out T-Mobile Arena in Las Vegas and broadcast live on PPV, millions of people parted with money to enjoy the extravaganza. Of course, countless thousands didn’t pay a penny to the UFC or its official broadcasting partners.

UFC 246 was widely available on ‘pirate’ IPTV services and unlicensed sports streaming sites over the weekend. However, it was also broadcast on platforms that have less of a bad reputation for piracy such as Twitch, for example, with one particular instance ending in disaster for the person behind the illicit stream.

On Saturday night and for reasons best known to him, Twitch user SkarrsWorld streamed the UFC 246 PPV on his channel to what appears to have been a fairly limited audience. However, during a promo section of the event featuring UFC light heavyweight champion Jon Jones, a personal message notification popped up on screen and was immediately broadcast along with the pirated PPV.

While the text in the message raises all sorts of questions, this disaster had the potential to go unnoticed to the wider public. However, an eagle-eyed viewer of the stream noticed the error and turned the section into a clip which was then shared around on social media.

Just a few hours ago it had already been seen at least 100,000 times and at the time of writing, more than 146,000 views are being reported. That’s a huge audience for what was originally a niche broadcast and while amusing for some, undoubtedly represents a serious breach for the streamer. Having private matters paraded in public is undesirable but in combination with intentional piracy of a PPV event, the gravity increases.

This rookie mistake raises questions of how easy it has become for Joe Public to get into live pirate streaming and the possible consequences for those who get into the game without considering their own security. This type of online infringement has traditionally been carried out by ‘professionals’ with experience of obtaining streams and broadcasting them securely but this Twitch debacle is miles apart. But the issues go deeper than that.

The clip featuring the private message is obviously terribly embarrassing but due to the manner in which the fight played out, the implications of streaming the Conor McGregor vs Donald Cerrone main event on a platform like Twitch are an even bigger cause for concern for the UFC.

From the moment the bell rang to the moment referee Herb Dean called off the fight following a McGregor onslaught, just 40 seconds had passed. To put that into perspective, a fight that had been hyped for weeks (and had dozens of hours of official broadcasting dedicated to it in the lead-up) was over in the space of a GIF. Or, more conveniently, in the Twitch clips that immediately spread like wildfire, even before McGregor could make his victory speech.

While those 40 seconds were just a small part of the pay-per-view, the rest of the card was relatively weak, especially for the casual fans the UFC hopes to scoop up every time McGregor fights. So, when viewed through the prism of considerable dollar costs to view, particularly in the United States, value for money probably wasn’t on the lips of many paying fans at the end of Saturday night.

A pirate Twitch stream or clip, on the other hand, is likely to have proven more than adequate for the passer-by looking for 40 seconds of pure mixed martial arts excitement. In a world where revenue is king, that’s not what the UFC ever wants to hear.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

CloudEndure Highly Automated Disaster Recovery – 80% Price Reduction

Post Syndicated from Jeff Barr original https://aws.amazon.com/blogs/aws/cloudendure-highly-automated-disaster-recovery-80-price-reduction/

AWS acquired CloudEndure last year. After the acquisition we began working with our new colleagues to integrate their products into the AWS product portfolio.

CloudEndure Disaster Recovery is designed to help you minimize downtime and data loss. It continuously replicates the contents of your on-premises, virtual, or cloud-based systems to a low-cost staging area in the AWS region of your choice, within the confines of your AWS account:

The block-level replication encompasses essentially every aspect of the protected system including the operating system, configuration files, databases, applications, and data files. CloudEndure Disaster Recovery can replicate any database or application that runs on supported versions of Linux or Windows, and is commonly used with Oracle and SQL Server, as well as enterprise applications such as SAP. If you do an AWS-to-AWS replication, the AWS environment within a specified VPC is replicated; this includes the VPC itself, subnets, security groups, routes, ACLs, Internet Gateways, and other items.

Here are some of the most popular and interesting use cases for CloudEndure Disaster Recovery:

On-Premises to Cloud Disaster Recovery -This model moves your secondary data center to the AWS Cloud without downtime or performance impact. You can improve your reliability, availability, and security without having to invest in duplicate hardware, networking, or software.

Cross-Region Disaster Recovery – If your application is already on AWS, you can add an additional layer of cost-effective protection and improve your business continuity by setting up cross-region disaster recovery. You can set up continuous replication between regions or Availability Zones and meet stringent RPO (Recovery Point Objective) or RTO (Recovery Time Objective) requirements.

Cross-Cloud Disaster Recovery – If you run workloads on other clouds, you can increase your overall resilience and meet compliance requirements by using AWS as your DR site. CloudEndure Disaster Recovery will replicate and recover your workloads, including automatic conversion of your source machines so that they boot and run natively on AWS.

80% Price Reduction
Recovery is quick and robust, yet cost-effective. In fact, we are reducing the price for CloudEndure Disaster Recovery by about 80% today, making it more cost-effective than ever: $0.028 per hour, or about $20 per month per server.

If you have tried to implement a DR solution in the traditional way, you know that it requires a costly set of duplicate IT resources (storage, compute, and networking) and software licenses. By replicating your workloads into a low-cost staging area in your preferred AWS Region, CloudEndure Disaster Recovery reduces compute costs by 95% and eliminates the need to pay for duplicate OS and third-party application licenses.

To learn more, watch the Disaster Recovery to AWS Demo Video:

After that, be sure to visit the new CloudEndure Disaster Recovery page!


New Pirate Sites Line Up to Fill IndoXXI’s Shoes

Post Syndicated from Ernesto original https://torrentfreak.com/new-pirate-sites-line-u-190120/

According to a recent survey, nearly a third of all Indonesians have accessed streaming piracy websites or torrent sites.

In recent months, Indonesia’s Information and Communications Ministry has worked hard to address the country’s piracy problem. Among other things, the Government has ordered ISPs to block more than 1,000 domain names.

The main target of these efforts was streaming giant ‘IndoXXI.’ With millions of daily visitors, it was listed among the 25 most-visited sites in the country up until last month.

Initially, the notorious streaming site evaded the blocks by switching to new domains. However, after a new round of blockades just before the new year, it decided to throw in the towel.

“Happy New Year 2020. As of today our site is no longer accessible, as is the case with the IndoXXI lite application,” the operators wrote at the site.

This news was welcomed by the local movie industry as well as Hollywood, which had previously complained about IndoXXI as well. However, the site’s demise doesn’t mean that the piracy problem is over now.

According to the Asia Video Industry Association (AVIA), hundreds of other sites stepped up to fill the gap left by IndoXXI. Some of these mimic the look and feel of the closed site, hoping to draw in visitors.

“[S]ince this announced closure, many other piracy sites, including some obvious copycat clones of IndoXXI, have become available,” AVIA notes.

One of the many clones

In response, copyright holders have stepped up again demanding that more domain names be blocked. AVIA notes that more than 200 new sites have been reported to the government during the past week alone.

Although website blockades may have some short-term effects, the Video Coalition of Indonesia (VCI) believes that the government can do more. Ideally, the group would like the culprits behind these sites to be criminally prosecuted.

Neil Gane, General Manager of AVIA’s Coalition Against Piracy, believes that the people running pirate sites are often involved in other crimes as well, which may in part be financed by piracy revenue.

“Many syndicates and individuals associated with the piracy ecosystem are involved in other criminal endeavors including illicit online gambling, and there is a likelihood that part of the illegal proceeds are used to finance these other crimes,” Gane says.

The call for criminal prosecutions is supported by prominent Indonesian film director Mira Lesmana, who wants the site operators to be brought to justice.

“We need to be able to recoup our financial investments to fund new creative content. We encourage the government to track down and prosecute those Indonesian-based operators who are behind these networks of piracy sites,” Lesmana says.

The question remains whether criminal prosecutions will do much to stop the flood of pirate sites. In recent years there have been various criminal piracy cases around the world. Despite these efforts, there has been no shortage of pirate sites.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

In the Works – AWS Osaka Local Region Expansion to Full Region

Post Syndicated from Harunobu Kameda original https://aws.amazon.com/blogs/aws/in-the-works-aws-osaka-local-region-expansion-to-full-region/

Today, we are excited to announce that, due to high customer demand for additional services in Osaka, the Osaka Local Region will be expanded into a full AWS Region with three Availability Zones by early 2021. Like all AWS Regions, each Availability Zone will be isolated with its own power source, cooling system, and physical security, and be located far enough apart to significantly reduce the risk of a single event impacting availability, yet near enough to provide low latency for high availability applications.

We are constantly expanding our infrastructure to provide customers with sufficient capacity to grow and the necessary tools to architect a variety of system designs for higher availability and robustness. AWS now operates 22 regions and 69 Availability Zones globally.

In March 2011, we launched the AWS Tokyo Region as our fifth AWS Region with two Availability Zones. After that, we launched a third Tokyo Availability Zone in 2012 and a fourth in 2018.

In February 2018, we launched the Osaka Local Region as a new region construct that comprises an isolated, fault-tolerant infrastructure design contained in a single data center and complements an existing AWS Region. Located 400km from the Tokyo Region, the Osaka Local Region has supported customers with applications that require in-country, geographic diversity for disaster recovery purposes that could not be served with the Tokyo Region alone.

Osaka Local Region in the Future
When launched, the Osaka Region will provide the same broad range of services as other AWS Regions and will be available to all AWS customers. Customers will be capable of deploying multi-region systems within Japan, and those users located in western Japan will enjoy even lower latency than what they have today.

If you are interested in how AWS Global Infrastructure is designed and built to deliver the most flexible, reliable, scalable and secure cloud computing environment with the highest global network performance then check out our Global Infrastructure site which explains and visualizes it all.

Stay Tuned
I’ll be sure to share additional news about this and other upcoming AWS Regions as soon as I have it, so stay tuned! We are working on 4 more regions (Indonesia, Italy, South Africa, and Spain), and 13 more Availability Zones globally.

– Kame, Sr. Product Marketing Manager / Sr. Evangelist Amazon Web Services Japan


‘Casting Couch’ Movie Company Orders Cloudflare to Unmask Tube Site Pirates

Post Syndicated from Andy original https://torrentfreak.com/casting-couch-movie-company-orders-cloudflare-to-unmask-tube-site-pirates-200118/

Before taking direct legal action against alleged copyright infringers, it helps if the identities of those people are known to the potential plaintiff. One method to obtain this information is to file an application for a DMCA subpoena.

Commonly filed against domain registries and Cloudflare, DMCA subpoenas can require such companies to give up the names of their allegedly-infringing customers, who are often the operators of ‘pirate’ sites. The process of obtaining a subpoena is attractive and relatively easy since the applications are rarely subjected to much scrutiny and can yield useful results.

Last week adult company AMA Multimedia (better known for its Casting Couch X and various other brands) filed an application at a Washington court demanding that Cloudflare provide identifying information of customers said to have infringed the company’s copyrights.

According to AMA, it previously asked Cloudflare to remove or disable access to around three dozen URLs, mostly JPG images and direct content links, on domains including the 12 million visits per month Pornmilo.com and the 15 million visits per month HLSMP4.com. With that content apparently still intact, AMA asked the court for permission to demand information from Cloudflare to identify the alleged infringers.

“For the period January 1, 2016 through the present, produce all documents and account records that identify the person(s) or entities that caused the infringement of the material described in the attached Exhibit B DMCA notifications to the DMCA Agent for Cloudflare, Inc. and/or who unlawfully uploaded AMA Multimedia LLC’s copyrighted works at the URLs listed in the notifications, including but not limited to identification by names, email addresses, IP addresses, user history, posting history, physical addresses, telephone numbers, and any other identifying information,” the subpoena to Cloudflare reads.

In respect of the phrase “person(s) or entities that caused the infringement”, that could mean the operators of the various listed domains – pornmilo.com, javbeautiful.com, 3fu.xyz, 4fu.xyz, hlsmp4.com, o0-1.com, o0-2.com, o0-3.com, o0-4.com, and o0-5.com. However, when it comes to identifying the underlying infringers, that could be more tricky.

When one visits Pornmilo.com, the platform gives the initial impression of being a YouTube-like site, presumably one that hosts its own content. On closer inspection, however, the site claims not to host any video content at all.

Indeed, it appears that the videos are embedded having been supplied by Fembed, a service that advertises itself as an “All-in-one Video Platform Designed by webmasters, for webmasters.” Essentially, people can host their video files on Fembed and serve them on another site, with or without revenue-generating advertising.

Fembed.com isn’t mentioned in the DMCA subpoena but it appears to be connected to HLSMP4.com, which is mentioned multiple times. Furthermore, javbeautiful.com, 3fu.xyz, 4fu.xyz and indeed all the other domains redirect to Fembed.com, so it’s possible that they have the same owners. AMA seem pretty keen to find out exactly who they are.

That being said, it is far from clear how Cloudflare itself can establish who uploaded the infringing content on HLSMP4, Fembed, and the other sites so it can hand that information to AMA. At this early stage that may not concern AMA too much and it’s possible that outcome is already being anticipated. Nevertheless, the DMCA subpoena has the ability to get closer to the targets in a cheap and relatively easy fashion.

The DMCA subpoena documents can be found here and here (pdf, NSFW)

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

RomUniverse’s Request to Dismiss Nintendo Piracy Lawsuit Fails

Post Syndicated from Ernesto original https://torrentfreak.com/romuniverses-request-to-dismiss-nintendo-piracy-lawsuit-fails200116/

Last year, Nintendo filed a lawsuit against the game download portal RomUniverse.

The website, which also allows users to download movies and books, was accused of massive copyright infringement, including that relating to many Nintendo titles.

“The Website contains and offers to the public an immense library of unauthorized copies of video games, primarily Nintendo video games designed for nearly every video game system Nintendo has ever produced,” the complaint read.

The game company argued that the site’s users downloaded hundreds of thousands of copyrighted works. RomUniverse profited from these infringements by offering premium accounts that allow users to download as many games as they want, Nintendo further alleged.

Despite these harsh allegations the site’s operator, California resident Matthew Storman, wasn’t giving up. He decided to defend himself in court and responded to Nintendo’s claims last October through a detailed motion to dismiss.

Storman didn’t deny that he is involved in the operation of RomUniverse. However, he sees himself as a Service Provider, who is not part of the ‘forum’ itself. On the contrary, the admin argued that he’s protected by the DMCA’s safe harbor provisions.

Nintendo disregarded this defense as improper, untimely, and wholly inadequate. In a detailed response, the game company requested the court to deny Storman’s motion to dismiss the case.

After considering the arguments from both sides, US District Court Judge Consuelo B. Marshall has sided with Nintendo. In a ruling released yesterday, she denies the various arguments presented by Storman.

RomUniverse’s operator wanted the case dismissed based on failure to state a claim, lack of jurisdiction, improper venue, insufficient service of process, and failure to join a party. None of these arguments convinced the court.

Storman, for example, argued that Nintendo is not the owner of previously purchased games because consumers have the right to sell, destroy, or give them away. The Judge didn’t address this in detail but concluded that Nintendo’s copyright registrations are sufficient at this stage.

Many of the defenses were linked to Storman’s notion that he is shielded by the DMCA’s safe harbor protections. Nintendo previously said that a motion to dismiss isn’t the proper stage to invoke this defense and the court agrees.

‘The Court cannot determine whether the DMCA’s safe harbor provisions apply to Defendant at this stage because there is no evidence before the Court regarding whether Defendant is a service provider who satisfies the statutory requirements for protection pursuant to the DMCA’s safe harbors,” Judge Marshall writes.

Even if Storman has the right to safe harbor under the DMCA, that wouldn’t make the trademark infringement and unfair competition claims go away.

“Even assuming the DMCA’s safe harbor provisions apply to Defendant, those safe harbors would not protect Defendant from liability as to Plaintiff’s trademark infringement and unfair competition claims,” Judge Marshall adds.

All in all, the court denied RomUniverse’s motion to dismiss. Judge Marshall further requests the site’s operator to file a formal response to the complaint, which is due in two weeks. Whether Storman will continue this fight on his own or will retain an attorney is unknown.

A copy of US District Court Judge Consuelo B. Marshall’s order is available here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Number of Pirated Screener Leaks Already Higher Than Last Year

Post Syndicated from Ernesto original https://torrentfreak.com/number-of-pirated-screener-leaks-already-higher-than-last-year-200114/

Yesterday the contenders for the 2020 Oscars were announced.

‘Joker’ emerged as the main favorite with eleven nominations, closely followed by ‘1917’ and ‘Once Upon a Time in Hollywood’ with ten each.

While Hollywood was buzzing with excitement over the news, a screener copy of another Oscar favorite – ‘Little Women’ – began spreading across pirate sites.

Pirated screeners are nothing new. Every year copies of popular films that are solely intended for private awards screenings end up in public. These releases are typically well secured, but release groups such as EVO and Hive-CM8 find their way around the protections.

One trend that we observed over recent years, however, is that fewer screener leaks were being posted online. Back in 2007, 29 screeners of nominees (81%) had leaked when the winners were announced. In 2019, this number was down to seven (23%).

Last year was an all-time low, which appeared to be good news for Hollywood. However, the downward trend hasn’t continued. During the current season, ten screener copies have already made their way onto pirate sites, of which eight received an Oscar nomination.

With several weeks still to go until the awards ceremony, this number will likely go up. To give an indication, in both 2018 and 2019 three pirated screeners came out after mid-January.

It’s worth noting though that the number of screener leaks itself doesn’t say much about security or enforcement efforts. In fact, the changing movie industry, where online streaming platforms are gaining dominance, could be the prime reason for a decline in these leaks.

Screeners are generally only released if there is no higher quality leak out already. Since pirated WEBRips and WEB-DLs generally come out soon after a movie premieres on a streaming service, screeners are less relevant.

To give an example, ‘The Irishman’ was widely available on pirate sites just hours after it premiered on Netflix. This trend is also what we see in the data from pirate screener watcher Andy Baio.

Of all the major Oscar contenders, only four are not yet available in high-quality formats on pirate sites. These are ‘1917,’ ‘Just Mercy,’ ‘Richard Jewell,’ and ‘Star Wars: The Rise of Skywalker’.

As in previous years, release group Hive-CM8 is responsible for the bulk of the leaked screeners. And if we believe their latest release notes, they are not done yet. The group is openly calling for sources who have access to more screeners, including the latest Star Wars film.

A complete list of the screeners that have leaked thus far:

– Uncut Gems (12/16/2019) by EVO
– Portrait of a Lady on Fire (12/16/2019) by EVO
– Jojo Rabbit (12/21/2019) by Hive-CM8
– A Beautiful Day in the Neighborhood (12/23/2019) by Hive-CM8
– Knives Out (12/25/2019) by Hive-CM8
– Ford v Ferrari (12/29/2019) by Hive-CM8
– Frozen 2 (01/02/2019) by Hive-CM8
– Harriet (01/04/2019) by Hive-CM8
– Bombshell (01/09/2019) by Hive-CM8
– Little Woman (01/13/2019) by Hive-CM8

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

TV Channel Owner Arrested For Airing ‘Pirate’ Movie Days After Theatrical Release

Post Syndicated from Andy original https://torrentfreak.com/tv-channel-owner-arrested-for-airing-pirate-movie-days-after-theatrical-release-200114/

Shivaji Rao Gaekwad, better known as Rajinikanth, is a superstar of Indian cinema, having been active in the industry for decades.

During his time on the silver screen, piracy has been running rampant across India but even he will have been taken by surprise following the events of the past few days.

Rajinikanth’s latest movie, action thriller Darbar, was released theatrically on January 9, 2020, quickly recovering around 75% of its costs during its first weekend alone.

However, on January 12, just three days after its official release, local cable channel Saranya TV took the decision to broadcast a pirated copy of the movie, as illustrated in the image below obtained by Galatta.com.

In common with many local movies, infamous torrent site TamilRockers reportedly leaked Darbar online shortly after its release but subsequent ‘pirate’ broadcasting on cable TV is unusual, particularly during a theatrical window. This has caused outrage at Lyca Productions, the production company behind the movie, which responded by filing a complaint with local police.

“The movie has been receiving good response from the public and it is running successfully in all centers all over the world, in the meantime we are astounded and distressed to know, that the movie was telecasted illegally in a local TV Channel called Saranya TV at Madurai on 12.01.2020 evening,” a statement from Lyca reads.

“Having come to know this, we have officially filed a complaint against the said local TV Channel at The Commissioner Office, Law & Order, Madurai.”

According to the local distributor for the movie, police were swift to act against the operators of Saranya TV. After initial reports that the channel had been closed and its operators had gone on the run, it now appears arrests have been made.

“It is true that the offenders have been arrested, but FIR [First information report] is yet to be registered as the investigation is still in progress,” a statement obtained by Behindwoods reads.

“It appears that they have used 2-3 relay points for broadcasting the film. While a computer system [has] already been seized, the police are now in the process of probing and confiscating other types of equipment, including CPUs, relay hubs and other systems that they were using to telecast the movie.”

In addition to the action against the cable TV company, a Galatta source reports that after the movie was widely shared on Whatsapp, a complaint was filed by Lyca in that direction too.

No official announcement on that front has been made by Lyca but an anti-piracy company is working on its behalf to prevent piracy on the messenger application.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

AWS Backup: EC2 Instances, EFS Single File Restore, and Cross-Region Backup

Post Syndicated from Sébastien Stormacq original https://aws.amazon.com/blogs/aws/aws-backup-ec2-instances-efs-single-file-restore-and-cross-region-backup/

Since we launched AWS Backup last year, over 20,000 AWS customers are protecting petabytes of data every day. AWS Backup is a fully managed, centralized backup service simplifying the management of your backups for your Amazon Elastic Block Store (EBS) volumes, your databases (Amazon Relational Database Service (RDS) or Amazon DynamoDB), AWS Storage Gateway and your Amazon Elastic File System (EFS) filesystems.

We continuously listen to your feedback and today, we are bringing additional enterprise data capabilities to AWS Backup :

Here are the details.

EC2 Instance Backup
Backing up and restoring an EC2 instance requires additional protection than just the instance’s individual EBS volumes. To restore an instance, you’ll need to restore all EBS volumes but also recreate an identical instance: instance type, VPC, Security Group, IAM role etc.

Today, we are adding the ability to perform backup and recovery tasks on whole EC2 instances. When you back up an EC2 instance, AWS Backup will protect all EBS volumes attached to the instance, and it will attach them to an AMI that stores all parameters from the original EC2 instance except for two (Elastic Inference Accelerator and user data script).

Once the backup is complete, you can easily restore the full instance using the console, API, or AWS Command Line Interface (CLI). You will be able to restore and edit all parameters using the API or AWS Command Line Interface (CLI), and in the console, you will be able to restore and edit 16 parameters from your original EC2 instance.

To get started, open the Backup console and select either a backup plan or an on-demand backup. For this example, I chose On-Demand backup. I select EC2 from the list of services and select the ID of the instance I want to backup.

Note that you need to stop write activity and flush filesystem caches in case you’re using RAID volumes or any other type of technique to group your volumes.

After a while, I see the backup available in my vault. To restore the backup, I select the backup and click Restore.

Before actually starting the restore, I can see the EC2 configuration options that have been backed up and I have the opportunity to modify any value listed before re-creating the instance.

After a few seconds, my restored instance starts and is available in the EC2 console.

Single File Restore for EFS
Often AWS Backup customers would like to restore an accidentally deleted or corrupted file or folder. Before today, you would need to perform a full restore of the entire filesystem, which makes it difficult to meet your strict RTO objectives.

Starting today, you can restore a single file or directory from your Elastic File System filesystem. You select the backup, type the relative path of the file or directory to restore, and AWS Backup will create a new Elastic File System recovery directory at the root of your filesystem, preserving the original path hierarchy. You can restore your files to an existing filesystem or to a new filesystem.

To restore a single file from an Elastic File System backup, I choose the backup from the vault and I click Restore. On the Restore backup window, I choose between restoring the full filesystem or individual items. I enter the path relative to the root of the filesystem (not including the mount point) for the files and directories I want to restore. I also choose if I want to restore the items in the existing filesystem or in a new filesystem. Finally, I click Restore backup to start the restore job.

Cross-region Backup
Many enterprise AWS customers have strict business continuity policies requiring a minimum distance between two copies of their backup. To help enterprises to meet this requirement, we’re adding the capability to copy a backup to another Region, either on-demand when you need it or automatically, as part of a backup plan.

To initiate an on-demand copy of my backup to another Region, I use the console to browse my vaults, select the backup I want to copy and click Copy. I chose the destination Region, the destination vault, and keep the default value for other options. I click Copy on the bottom of the page.

The time to make the copy depends on the size of the backup. I monitor the status on the new Copy Jobs tab of the Job section:

Once the copy is finished, I switch my console to the target Region, I see the backup in the target vault and I can initiate a restore operation, just like usual.

I also can use the AWS Command Line Interface (CLI) or one of our AWS SDKs to automate or to integrate any of these processes in other applications.

Pricing depends on the type of backup:

  • there is no additional charge for EC2 instance backup, you will be charged for the storage used by all EBS volumes attached to your instance,
  • for Elastic File System single file restore, you will be charged a fixed fee per restore and for the number of bytes you restore,
  • and for cross-region backup, you will be charged for the cross-region data transfer bandwidth and for the new warm storage space in the target Region.

These three new features are available today in all commercial AWS Regions where AWS Backup is available (you can verify services availability per Region on this web page).

As it is usual with any backup system, it is best practice to regularly perform backups and backup testing. Restore-able backups are the best kind of backups.

— seb

New for Amazon EFS – IAM Authorization and Access Points

Post Syndicated from Danilo Poccia original https://aws.amazon.com/blogs/aws/new-for-amazon-efs-iam-authorization-and-access-points/

When building or migrating applications, we often need to share data across multiple compute nodes. Many applications use file APIs and Amazon Elastic File System (EFS) makes it easy to use those applications on AWS, providing a scalable, fully managed Network File System (NFS) that you can access from other AWS services and on-premises resources.

EFS scales on demand from zero to petabytes with no disruptions, growing and shrinking automatically as you add and remove files, eliminating the need to provision and manage capacity. By using it, you get strong file system consistency across 3 Availability Zones. EFS performance scales with the amount of data stored, with the option to provision the throughput you need.

Last year, the EFS team focused on optimizing costs with the introduction of the EFS Infrequent Access (IA) storage class, with storage prices up to 92% lower compared to EFS Standard. You can quickly start reducing your costs by setting a Lifecycle Management policy to move to EFS IA the files that haven’t been accessed for a certain amount of days.

Today, we are introducing two new features that simplify managing access, sharing data sets, and protecting your EFS file systems:

  • IAM authentication and authorization for NFS Clients, to identify clients and use IAM policies to manage client-specific permissions.
  • EFS access points, to enforce the use of an operating system user and group, optionally restricting access to a directory in the file system.

Using IAM Authentication and Authorization
In the EFS console, when creating or updating an EFS file system, I can now set up a file system policy. This is an IAM resource policy, similar to bucket policies for Amazon Simple Storage Service (S3), and can be used, for example, to disable root access, enforce read-only access, or enforce in-transit encryption for all clients.

Identity-based policies, such as those used by IAM users, groups, or roles, can override these default permissions. These new features work on top of EFS’s current network-based access using security groups.

I select the option to disable root access by default, click on Set policy, and then select the JSON tab. Here, I can review the policy generated based on my settings, or create a more advanced policy, for example to grant permissions to a different AWS account or a specific IAM role.

The following actions can be used in IAM policies to manage access permissions for NFS clients:

  • ClientMount to give permission to mount a file system with read-only access
  • ClientWrite to be able to write to the file system
  • ClientRootAccess to access files as root

I look at the policy JSON. I see that I can mount and read (ClientMount) the file system, and I can write (ClientWrite) in the file system, but since I selected the option to disable root access, I don’t have ClientRootAccess permissions.

Similarly, I can attach a policy to an IAM user or role to give specific permissions. For example, I create a IAM role to give full access to this file system (including root access) with this policy:

    "Version": "2012-10-17",
    "Statement": [
            "Effect": "Allow",
            "Action": [
            "Resource": "arn:aws:elasticfilesystem:us-east-2:123412341234:file-system/fs-d1188b58"

I start an Amazon Elastic Compute Cloud (EC2) instance in the same Amazon Virtual Private Cloud as the EFS file system, using Amazon Linux 2 and a security group that can connect to the file system. The EC2 instance is using the IAM role I just created.

The open source efs-utils are required to connect a client using IAM authentication, in-transit encryption, or both. Normally, on Amazon Linux 2, I would install efs-utils using yum, but the new version is still rolling out, so I am following the instructions to build the package from source in this repository. I’ll update this blog post when the updated package is available.

To mount the EFS file system, I use the mount command. To leverage in-transit encryption, I add the tls option. I am not using IAM authentication here, so the permissions I specified for the “*” principal in my file system policy apply to this connection.

$ sudo mkdir /mnt/shared
$ sudo mount -t efs -o tls fs-d1188b58 /mnt/shared

My file system policy disables root access by default, so I can’t create a new file as root.

$ sudo touch /mnt/shared/newfile
touch: cannot touch ‘/mnt/shared/newfile’: Permission denied

I now use IAM authentication adding the iam option to the mount command (tls is required for IAM authentication to work).

$ sudo mount -t efs -o iam,tls fs-d1188b58 /mnt/shared

When I use this mount option, the IAM role from my EC2 instance profile is used to connect, along with the permissions attached to that role, including root access:

$ sudo touch /mnt/shared/newfile
$ ls -la /mnt/shared/newfile
-rw-r--r-- 1 root root 0 Jan  8 09:52 /mnt/shared/newfile

Here I used the IAM role to have root access. Other common use cases are to enforce in-transit encryption (using the aws:SecureTransport condition key) or create different roles for clients needing write or read-only access.

EFS IAM permission checks are logged by AWS CloudTrail to audit client access to your file system. For example, when a client mounts a file system, a NewClientConnection event is shown in my CloudTrail console.

Using EFS Access Points
EFS access points allow you to easily manage application access to NFS environments, specifying a POSIX user and group to use when accessing the file system, and restricting access to a directory within a file system.

Use cases that can benefit from EFS access points include:

  • Container-based environments, where developers build and deploy their own containers (you can also see this blog post for using EFS for container storage).
  • Data science applications, that require read-only access to production data.
  • Sharing a specific directory in your file system with other AWS accounts.

In the EFS console, I create two access points for my file system, each using a different POSIX user and group:

  • /data – where I am sharing some data that must be read and updated by multiple clients.
  • /config – where I share some configuration files that must not be updated by clients using the /data access point.

I used file permissions 755 for both access points. That means that I am giving read and execute access to everyone and write access to the owner of the directory only. Permissions here are used when creating the directory. Within the directory, permissions are under full control of the user.

I mount the /data access point adding the accesspoint option to the mount command:

$ sudo mount -t efs -o tls,accesspoint=fsap-0204ce67a2208742e fs-d1188b58 /mnt/shared

I can now create a file, because I am not doing that as root, but I am automatically using the user and group ID of the access point:

$ sudo touch /mnt/shared/datafile
$ ls -la /mnt/shared/datafile
-rw-r--r-- 1 1001 1001 0 Jan  8 09:58 /mnt/shared/datafile

I mount the file system again, without specifying an access point. I see that datafile was created in the /data directory, as expected considering the access point configuration. When using the access point, I was unable to access any files that were in the root or other directories of my EFS file system.

$ sudo mount -t efs -o tls /mnt/shared/
$ ls -la /mnt/shared/data/datafile 
-rw-r--r-- 1 1001 1001 0 Jan  8 09:58 /mnt/shared/data/datafile

To use IAM authentication with access points, I add the iam option:

$ sudo mount -t efs -o iam,tls,accesspoint=fsap-0204ce67a2208742e fs-d1188b58 /mnt/shared

I can restrict a IAM role to use only a specific access point adding a Condition on the AccessPointArn to the policy:

"Condition": {
    "StringEquals": {
        "elasticfilesystem:AccessPointArn" : "arn:aws:elasticfilesystem:us-east-2:123412341234:access-point/fsap-0204ce67a2208742e"

Using IAM authentication and EFS access points together simplifies securely sharing data for container-based architectures and multi-tenant-applications, because it ensures that every application automatically gets the right operating system user and group assigned to it, optionally limiting access to a specific directory, enforcing in-transit encryption, or giving read-only access to the file system.

Available Now
IAM authorization for NFS clients and EFS access points are available in all regions where EFS is offered, as described in the AWS Region Table. There is no additional cost for using them. You can learn more about using EFS with IAM and access points in the documentation.

It’s now easier to create scalable architectures sharing data and configurations. Let me know what you are going use these new features for!