FINDING · DEFENSE
When RIAA filed suit against more than 30,000 individual filesharers, users migrated toward anonymous channels, small-world networks of vetted peers, ephemeral pointers, and user-generated IP blacklists for spoofed-peer detection. The University of Washington demonstrated IP-to-person attribution is unreliable — a networked laser printer received a DMCA takedown notice.
From 2011-seltzer-infrastructures — Infrastructures of Censorship and Lessons from Copyright Resistance · §1.3 · 2011 · Free and Open Communications on the Internet
Implications
- Incorporate anonymization at the identity layer, not just the transport layer: user-visible identifiers must not map to real-world identity even if the connection is observed.
- Private trust-based overlays (networks of vetted peers) reduce the attack surface for infiltration and spoofed-peer injection compared to open peer lists.
Tags
Extracted by claude-sonnet-4-6 — review before relying.