Jump to content

Invite Scene - #1 to Buy, Sell, Trade or Find Free Torrent Invites

#1 TorrentInvites Community. Buy, Sell, Trade or Find Free Torrent Invites for Every Private Torrent Trackers. HDB, BTN, AOM, DB9, PTP, RED, MTV, EXIGO, FL, IPT, TVBZ, AB, BIB, TIK, EMP, FSC, GGN, KG, MTTP, TL, TTG, 32P, AHD, CHD, CG, OPS, TT, WIHD, BHD, U2 etc.

LOOKING FOR HIGH QUALITY SEEDBOX? EVOSEEDBOX.COM PROVIDES YOU BLAZING FAST & HIGH END SEEDBOXES | STARTING AT $5.00/MONTH!

Bitcoin Bounties to Sniff Out Online Pirates


Len

Recommended Posts

Bitcoin is often seen as the currency of online pirates. But content producers and rights holders may soon be embedding hidden Bitcoin bounties on to their work to help lead authorities to the pirates spreading it illegally.

Anonymously claiming a hidden Bitcoin wallet embedded on a piece of media will firstly reward the so-called snitch, but also send an alert that information has been pirated and illegally shared.

Claim the bounty, report the pirate

It is a constant battle for right holders to maintain the control of their work, as blocking and closing down illegal websites is becoming more and more futile.

It has seen a tech company based in South Africa called Custos Media Technologies take a different approach.

Their idea is that a hidden watermark, which contains a small amount of Bitcoin, can be placed on media files like movies or ebooks. If you’re the first person to find the watermark, you can claim the Bitcoin prize and in doing so will alert Custos.

“Each watermark contains a Bitcoin wallet, with a reward for anyone who anonymously claims it once the media has passed out of the control of the original recipient,” the company says.
 

“Media downloaders who want to search for such rewards can do so anonymously, from anywhere in the world. The moment a bounty is claimed — and by the nature of cryptocurrencies, this can only happen once — the transaction reflects on the Blockchain, and Custos notifies the media provider of the incident.”

Blockchain bounties make the system work

This idea set out by Custos again shows how Blockchain technology’s scope is increasing and finding more and more uses.

In this case, as a bounty, the Blockchain is effective in delivering the bounty as the pirated software is found and reported.

The system relies on a peer-to-peer architecture which allows users to transact directly without needing an intermediary and all transactions are recorded in a digital ledger that can’t be altered.

Of course, the system also allows those doing the reporting to remain anonymous.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Check out what our members are saying

  • Our picks

×
×
  • Create New...