Justin Slayer Takes Aim at 1,254 BitTorrent Users
Tuesday, January 18, 2011
Justin Slayer International Inc. filed suit on Monday against 1,254 John Doe defendants, alleging they uploaded and downloaded "Sara Jay in Heat."
The suit seeks to identify the Does through their IP addresses by subpoenaing their ISPs. The IP addresses provided to the court show that the file sharers targeted are from all corners of the nation, including Georgia, North Carolina, New York and California. They are alleged to have traded the video through BitTorrent sites in October and November.
The video, released last summer, was self-produced by Sara Jay, who stars in the film along with Lucas Stone, Angelina Castro, Lexi Lockhart, Asante Stone and Jay.
The suit was filed at U.S. District Court in Dallas by attorney Evan Stone.
- It should be noted that at the time of print on this story JSI and it's owners had not responded to this story and are currently out of the country on undisclosed business of some sort in South Africa.... It almost seems as if they aren't even aware of the story being published at all......
YouPorn.com at Top of History-Sniffing List
Thursday, December 2, 2010
Computer science researchers surveyed 50,000 of the web's most-visited sites and found 485 sites using a history-tracking bug. In all, 63 sites were copying the data it reveals and 46 were found to be hijacking a user's history.
"We also found that many of these websites make use of a handful of third-party history-sniffing libraries."
The researchers also looked at other popular techniques that sites use to map and monitor what visitors do.
In the case of YouPorn, operators run scripts that track the trail a user's mouse pointer takes on and across pages.
Operators of YouPorn.com, which is owned by Curacao-based Midstream Media International N.V., did not respond by post time to XBIZ for comment on the findings.
YouPorn operators also own YouPornGay.com and YouPornCocks, which also were on the UC San Diego study's history-sniffing list.
The study also revealed YouPorn's attack code.
Chrome and Safari, researchers said, are not vulnerable to history hijacking and that the most recent version of Firefox has closed loopholes. Internet Explorer users can turn on "private browsing" to stop the flaw from divulging histories.
"Our study shows that popular Web 2.0 applications like mashups, aggregators, and sophisticated ad targeting are rife with different kinds of privacy-violating flows," the researchers wrote.
Here are a few more stories about it:
VB: "Remember if it's free to watch or download chances are that free video isn't the only thing that's downloading onto your computer! Your computers internet access works a bit like a door and if you open it up to let in the free porn then surely it's just as easy for your personal info to be going outbound to the mother-ship server. That open door can also allow multiple items to download/upload/install/takeover at the same time too."
Criminals lie in wait behind hundreds of thousands of porn sites, web security firm Symantec warned.
It said 44 per cent of search terms which led internet users to malicious websites were for adult entertainment.
The company said it detected more than 4.4million malicious web pages per month last year after observing more than 310,000 web domains found to be harmful.
Symantec also warned that a large recruitment drive for cyber criminals takes place on underground internet forums, where step-by-step attack kits are being sold for as little as £10.
Such kits are becoming easier to use, meaning cyber crime is no longer limited to those with advanced programming skills. 'In the past, hackers had to create their own threats from scratch, limiting the number of attackers to a small pool of highly skilled cyber criminals,' said Stephen Trilling, senior vice-president at Symantec.
'Today's attack toolkits make it relatively easy for even a malicious novice to launch a cyber attack.
'As a result, we expect to see even more criminal activity in this area and a higher likelihood that the average user will be victimised.'
The kits are software programs that can be used to help launch widespread attacks on networked computers.
Symantec said 61 per cent of malicious web attacks can be attributed to these types of kits. It said the Zeus kit posed a serious threat to small businesses, which have fewer safeguards, by stealing bank account details.
VB: Yep, those sticky good tube sites can and possibly have been doing all sorts of cool stuff to your computer and your information like giving you free Spyware, Keyloggers, Trojans, or the unexpected Virus Du Jour....It's a tasty good time for the bad cookies doing the dirt but it could leave a terrible taste in your mouth for a long time.
Oh those "free" tube sites... They've been jerking you off since the beginning.Why? Free goodies to you = Traffic. Traffic = Heavy Bandwidth Usage + Better Monitoring & Infiltration Capabilities. Monitoring + bandwidth = Internet Access Control X Hidden End User Software Integration and Experimentation. All of that stuff = Money+Control to the power of 1 or 2 very rich people. Poor math? Yes! What do you expect, I'm a pornstar, not Einstein?!
I suppose even a half-assed decent crack dealer asks for some type of payment once he's certain your hooked on the free dope he's been giving you....But if this dealer is GIVING away the drugs how does he stay in business? How do the tube sites cover their expenses?
They're not free. It's more like trading orgasms for secrets....The traffic and computer details you provide simply by surfing to their site is more than payment enough for them!
Don't ya think it's a bit weird how anti-virus software needs more $$updates that still don't work! And for some reason our once durable computers/laptops/phones need major repair or replacement within the first 2 years of ownership? Nasa can build a Space Station on the moon and design machines to explore Mars but my iPhone seems to die like clockwork when the contract is up for renewal....along with the lure of a new phone and at a discounted price.
And just why is it that MACs aren't susceptible to most PC viruses?
Why can't Microsoft find a cure for the PC infections the way MAC has?
Why is it that a kid can hack into his schools computer system but the grownups who made the damn things are still playing catchup?
But then again, I could be wrong about it all. Perhaps it's just a news story. Perhaps its a cautionary tale for 2011.
Stay tuned for a few links and stories about what the tubes have been doing to our backsides when we're not looking....