Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    There Is No Conspiracy Against BitTorrent

    By
    Steven J. Vaughan-Nichols
    -
    June 23, 2005
    Share
    Facebook
    Twitter
    Linkedin

      John, John, John. John Dvorak, what were you thinking?

      In his recent column, The Scheme to Discredit BitTorrent, Dvorak gets so much wrong about BitTorrent, its security problems, Microsoft and Avalanche thats it hard to know where to begin.

      So, lets just walk down Mr. Dvoraks column, shall we?

      /zimages/4/28571.gifRead more here about file-sharing protocol BitTorrent.

      First, is Microsoft really taking aim at BitTorrent, the justifiably popular peer to peer protocol? Yes, I know that Bram Cohen, BitTorrents inventor, thinks so, but is it really?

      Both Cohen and Dvorak describe Microsofts Avalanche project as vaporware.

      Ah, actually, its not even that. It never was.

      I dont need to explain this, though. Ill let Kevin Schofield, Microsoft Researchs general manager for strategy and communications.

      “Let me get this straight. In six days, a research project went from some algorithms in a paper to Microsofts competitive answer to BitTorrent, to vaporware, to an evil conspiracy,” Schofield said.

      “Weve never claimed that this was anything more than a research project. We released a paper so that everyone—including Microsofts fiercest competitors—knew exactly what we were doing,” Schofield said.

      Now, anyones who ever read more than two of my columns knows Im no Microsoft fan, but sometimes a research project is just a research project, even when Microsoft is paying for it.

      Ive read the technical paper (available here as a PDF.) I know something about how these things work. And, you know what? Avalanche is an early-stage research project. Nothing less, nothing more, and no one who really knew anything about it claimed otherwise.

      Moving on, Dvorak sets up a straw man by saying, “There is no spyware in BitTorrent.” Uh, no one ever said that there was spyware in the BitTorrent clients or in the protocol. Certainly our own Ryan Naraine didnt do so in his coverage of adware being carried over BitTorrent.

      /zimages/4/28571.gifClick here to read Ryan Naraines coverage of adware being introduced through BitTorrent.

      What Naraine, and others, did report was that some files being traded around over the BitTorrent protocol were carrying adware.

      Specifically, two companies, Direct Revenue and Marketing Metrix Group, were deliberately sending out files loaded with programs like the Aurora adware, which has been described, rightly, to my mind, as a “Plague of the Internet.”

      Adware, as you note, is old hat. But what is news here is that someone was deliberately using BitTorrent torrents as an adware delivery service for the first time.

      Now, Dvorak wasnt the only one to misread those BitTorrent stories, but if he and everyone else would RTFA (read the fine article), theyd see that all it says is that Torrent files are being bundled with adware programs.

      If seeing is believing, look at an actual example on Vitalsecurity.com of how the adware is delivered. Notice that youre seeing a RAR (todays hot file compression technology)—not an exe—of an episode of “Family Guy.” When you open it, youre faced with a licensing announcement, which, if you agree to it, will pack your Windows system full of spyware.

      Would this fool someone who knew what they were doing? Nope. Would it fool someone who knew just enough to look for a free video? Oh yeah.

      /zimages/4/28571.gifClick here to read the article: BitTorrent Creator Dismisses Microsoft P2P Project.

      I wouldnt be fooled. Dvorak, and many others who pay attention to technology, wouldnt be fooled, but for those millions of clueless users, yes, oh yes, theyll be fooled into installing the adware.

      Does this make it a real problem? I certainly think so.

      As Dvorak points out, BitTorrent is the largest single protocol. The Webs HTTP barely counts compared to BitTorrent and the other P2P protocols. Thats a heck of a lot of traffic—as any network administrator knows—and having it increased with crapware is not good news.

      In addition, some anti-virus and anti-spyware programs dont look at Torrents for trouble. That means even users who are bright enough to run programs like those are still in danger of having junk delivered to their computer. Thats a problem.

      So, whats really happening here? A conspiracy against BitTorrent? No, not at all. All that has happened is that people got way too excited about Avalanche and way too paranoid about adware being in BitTorrent. The real problem is that now BitTorrent, like e-mail, the Web, and soon, Im sure, IM, is being used to deliver malware.

      The real solution is to stop jumping up and down about Microsoft being out to get anyone, and continue to look for ways to block malware, no matter what path it takes, from getting onto our systems.

      eWEEK.com Senior Editor Steven J. Vaughan-Nichols has been using and writing about operating systems since the late 80s and thinks he may just have learned something about them along the way. He can be reached at sjvn@ziffdavis.com.

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Steven J. Vaughan-Nichols
      I'm editor-at-large for Ziff Davis Enterprise. That's a fancy title that means I write about whatever topic strikes my fancy or needs written about across the Ziff Davis Enterprise family of publications. You'll find most of my stories in Linux-Watch, DesktopLinux and eWEEK. Prior to becoming a technology journalist, I worked at NASA and the Department of Defense on numerous major technological projects.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×