|
Hey AK - Just a question,
*Keep in mind I under stand "copyright, and I'm looking for a little more of an answer than "image copyright so webmaster is bad"...
These celeb pic's,
1- Why go after a random site that has 2 links that point to a file locker. Yes it's doing more than that but not much more...
2- Why not go after the file lockers, image hosting sites, etc, that are making money hand over fist from the ad CPM's they are getting with each release. *let alone the stockpile of stolen adult content that can be found on them.
- For that matter the ad networks... Or the 1000000 blogs hosting links to the file lockers and torrents, and hosting the images.
Better yet, the sites people are using to propagate the images on to the internet from, Reddit, 4chan, etc... It's not exactly hard to find sites that could have a meaning full impact on the propagation of these images. Why go after one that does not fit this mold?
3- Why even go after the guy making $5 from a filelocker and showing the content to 10 people, when there are people making $50,000 off of it showing it to 10,000,000 people a day.
4- For that matter; given that you are funded by adult, in an effort to fight file lockers and copyright infringement and not the main stream studios.. Couldn't this be view by some of the people funding you as a misappropriation of time and resources?
- I'll assume that you will reply saying that you fight all copyright etc.. But then the reality is you're not are you.
Because;
I don't see you going after the major offenders stealing adult content.. tube sites, image sites, etc.
I don't see you calling out hosting companies; some with connections to GFY.
I don't see you using your forensics tools to map full hosting companies.
(I'm going to assume you are using Domain Tools API and doing a full history map etc..)
What I do see you doing is calling people out,
In some cases when the people want to work with you, if hey don't do it exactly as you ask you start acting like a child... I mean right down to not using their contact forms/ticking systems they have to deal with copy right, but when they ask to contact you, what do you do.. you ask them to use your contact form/ticketing system..
Oh and please don't ask me who I am, or say that I'm a fake nic, etc...
That would jump us to the deflection portion of the hackers hand book much too soon...
|