Category Archives: Uncategorized

The most pirated movies of 2014

The most pirated movies of 2014


A list of this year’s most pirated movies has been revealed online, with most of 2014’s blockbuster releases featuring.

Director Martin Scorsese’s The Wolf of Wall Street, starring Leonardo DiCaprio, claimed the title of most illegally downloaded film in 2014.

According to piracy-tracking firm Excipio, Disney’s Frozen came a close second, with both movies downloaded approximately 30 million times across torrent sites between 1 January and 23 December.

Robocop was the third-placed film on the list, but its figures did include 1987’s original release alongside this year’s remake, according to The Hollywood Observer. Gravity was close behind with 29.357 million downloads.

The list of most-pirated movies includes a number of Oscar nominated films. Alongside The Wolf of Wall Street, which picked up five nominations including Best Picture, 12 Years a Slave, American Hustle and Captain Phillips were some of the other Academy Award nominees to make the list.

The highest-grossing film of 2014, The Guardians of the Galaxy did not make the top-20 most pirated films of the year, however. The Hollywood Reporter speculates that this may have been because “anyone interested in the film opted to see it in theaters”.

Online piracy experienced a particularly high-profile end to 2014, with Swedish police taking down the notorious file-sharing site The Pirate Bay, albeit only temporarily. The site, which has a cloud-based infrastructure, is virtually impossible to take down permanently and has been revived by rival peer-to-peer website Isohunt.

The full list of 2014’s most pirated films can be found here.

Published under license from, a Net Communities Ltd Publication. All rights reserved.




Popular torrent sites get millions of visitors every day, but what have all of those people been searching for? Today we present the BitTorrent Zeitgeist 2014, a list of the top 50 most searched for phrases and keywords on one of the most-used public BitTorrent indexes during the past year.

2014During December, all self-respecting search engines produce an overview of the most popular search terms of the past year.

These lists give insight into recent trends, and in 2014 Robin Williams, World Cup and Ebola were the top trending searches on Google.

But what about torrent search engines? With billions of searches every year it’s worth taking a look at the most-entered keywords on the dominant file-sharing network.

A few years ago we started the BitTorrent zeitgeist tradition with help from one of the largest torrent sites around. Based on a sample of hundreds of millions of searches, this list should give a decent overview of what people are looking for.

2014’s number one query is the same as last year’s. YIFY is the name of a popular movie release group that many people follow to see what new pirated titles are available.

The term 2014, often used to find recent movies, comes in second place, followed by 1080p in third. Last year “1080p” was in 42nd place suggesting that people were increasingly looking for high definition video. The sixth and eight place for newcomers YIFY 720p and YIFY 1080p confirm this trend.

In fourth place we find NeZu, another popular movie release group that is listed in the top 50 for the first time this year.

The first content related search query is Guardians of The Galaxy in ninth place. Other popular movie searches are Lucy and Dawn of The Planet of The Apestaking the 23rd and 24th spots respectively.

TV content is also popular with Game of Thrones in 12th and The Walking Dead in 16th place. Perhaps surprisingly, there are no searches related to music titles in the top 50. The only music related term is Discography in 11th place.

Finally, a game release group made it into the top 50 this year. The query Nosteam, referring to the ^^nosTEAM^^ group, is one of the highest newcomers and is listed in 15th place.

Below is the full list of the 50 most-entered search queries on one of the most popular torrent sites on the Internet.

1. yify
2. 2014
3. 1080p
4. nezu
5. hindi
6. yify 720p
7. french
8. yify 1080p
9. guardians of the galaxy
10. 3d
11. discography
12. game of thrones
13. movies
14. tamil
15. nosteam
16. the walking dead
17. ita
18. dvdrip
19. telugu
20. android
21. malayalam
22. hindi 2014
23. lucy
24. dawn of the planet of the apes
25. nl
26. apk
27. ps3
28. lynda
29. 720p
30. 2013
31. need for speed
32. arrow
33. +18
34. batman
35. hercules
36. x art
37. pc games
38. how to train your dragon 2
39. 22 jump street
40. divergent
41. teenage mutant ninja turtles
42. edge of tomorrow
43. The fault in our stars
44. godzilla
45. mac
46. wwe
47. the equalizer
48. walking dead
49. maleficent
50. the flash

Iraq vet death, Pirate Bay, WikiLeaks: 14 most-underreported news stories of 2014

Iraq vet death, Pirate Bay, WikiLeaks: 14 most-underreported news stories of 2014

Published time: December 29, 2014 08:11
Edited time: December 29, 2014 12:49

Reuters / David W Cerny

Reuters / David W Cerny

Seven countries bombed in six years, net neutrality remains up in the air, the death of a TV reporter in Turkey, and the unsolved tragedy of the Odessa massacre: just a few of RT’s top 14 underreported stories to slip through the MSM cracks in 2014.

The death of Thomas Young

Thomas Young, an Iraq war veteran and outspoken critic of the conflict sacrificed everything for his country. Shot in the neck just days into his tour, he was paralyzed from the neck down. Then, on November 10 – a day before Veteran’s Day – he died at the age of 34. Prominent journalist and activist Christopher Hedges said Young had died knowing “what the masters of war had done to him, how he had been used and turned into human refuse.”


The Odessa massacre

May 2 was the bloodiest day of civil conflict in Odessa, Ukraine in nearly a century, but nearly eight months on, little progress has been made in catching the culprits of who set the city’s landmark Trade Unions House ablaze, killing 43 pro-Russian activists inside.


In September, a parliamentary inquiry member retracted her signature from an allegedly “redacted” Ukrainian government probe, leaving serious doubts that justice for the victims would ever be realized.

Obama bombs 7th country in 6 years

Five years after President Barack Obama nabbed a Nobel Peace Prize, he was also party to a far less prestigious accomplishment; the US Commander in Chief had bombed seven countries in six years. The not-so-lucky number came in September, when the US launched airstrikes against so-called Islamic State (IS) militants in Syria.

READ MORE: 5 not-so-peaceful Obama actions since nabbing Nobel Prize

U.S. President Barack Obama.(Reuters / Larry Downing )

U.S. President Barack Obama.(Reuters / Larry Downing )


Syria joined Iraq, Afghanistan, Yemen, Somalia, Libya and Pakistan among the states to find themselves facing down US air power during the Nobel laureate’s tenure.

Hammond, Anonymous and the FBI

Jailed hacker Jeremy Hammond is one year into a 10-year sentence for hacking into the Stratford intelligence company’s website. Like any idealist, he did it to “expose the truth.” But the truth behind his imprisonment is anything but a simple matter. According to leaked documents, Hammond was one of many hacktivists who had been provided targets by an FBI informer. Not only were hackers like Hammond reportedly instructed to hack sites like Stratford to check for vulnerabilities, but Anonymous and others had been directed to target no fewer than 30 foreign government websites by the FBI collaborator. Hammond’s stiff sentence was a reaction to the “national security threat” he allegedly posed. But what about those who were pulling the strings in the first place?

What is TTIP again?

Privatization, exploitation, and environmental degradation, critics claim the Transatlantic Trade and Investment Partnership (TTIP) is a Trojan horse headed for Europe, and few even know what it is. Whether it brings about great economic growth as promised by its proponents or leaves Europe under the thumb of multi-nationals, if you want to know what TTIP is all about, it’s time to READ MORE.

AFP Photo / Wolfgang Kumm

AFP Photo / Wolfgang Kumm


READ MORE: France will not sign multibillion transatlantic trade deal with US in 2015

READ MORE: #NoToTTIP: 1,000s to march in UK, across Europe against transatlantic trade deal

READ MORE: ‘TTIP will allow private companies to sue govt. for millions’

Third time’s a charm for Million Mask

By this point who could forget the 5th of November, what with the 3rd annual ‘Million Mask March’protest being the largest to date. The Anonymous-organized protest movement claims to be the world’s largest, with austerity, corruption, mass surveillance and war crimes all being among the participants’ grievances. This year saw events organized in 481 cities across the globe.


Sporadic scuffles marked this year’s London event, and an appearance by recent revolution peddler Russell Brand might have raised the movement’s profile ever so slightly. But even with an endorsement from Brand, the global march will likely end up on this list come next year.

The Wiki-Leaks keep on coming, while Assange marks 4 years without freedom

December 7 marked the four-year anniversary WikiLeaks founder Julian Assange was first remanded into custody over sex-crime allegations. After spending nearly two-and-a-half years holed up in the Ecuadorian Embassy in London, his fate seems no less certain. None of that has stopped WikiLeaks, which continues in its quest for transparency, shocking the world with its revelations. US plot to close down a Kurdish TV station to appease Turkey and secure a new NATO chief? Check. The NSA recording and storing all the phone calls in Afghanistan and the Bahamas? Got it. A secretly Trade in Service Agreement covering 68 percent of the world – are you serious? Whether its exposing Google collusion in Afghanistan spying or CIA doubts about backlash from drone strikes and other targetedcounterinsurgency programs, WikiLeaks continues to speak (and leak) truth to power.

READ MORE: Spy Files: WikiLeaks to publish fourth series of leaks – Assange

WikiLeaks founder Julian Assange (Reuters)

WikiLeaks founder Julian Assange (Reuters)


The future of net neutrality

What could bring together President Barack Obama and a group of porn stars? Net neutrality of course! Although a complicated issue, it boils down to whether or not all internet traffic will be treated equally. Critics of net neutrality such as German Chancellor Angela Merkel are against it, arguing a “fast lane” should be created for “special services.” What’s at stake is the nature of the internet as we know it.

READ MORE: Will you listen now? Naked porn stars explain why net neutrality is important (VIDEO)


Pirate Bay walks the plank

In October, Pirate Bay co-founder Gottfrid Svartholm Warg was sentenced to 3.5 years in jail for hacking. November saw the bittorrent site’s third and final co-founder arrested after 4 years on the run. In December, Swedish authorities raided them yet again on alleged copyright violations. The life of a pirate certainly isn’t easy, though those who take to the high seas (or the cloud) have managed to keep themselves a step ahead the authorities, even if all their leaders are behind bars.

Mysterious death of Serena Shim

Serena Shim, a Lebanese-American Press TV reporter who died in a car crash near the Turkish-Syrian border, claims she was being tracked by Turkish security services due to her reporting in the besieged Syrian city of Kobani. One day prior to her death, Turkish intelligence had allegedly accused her of being a “spy.” Family members and Iranian media have speculated about the cause of Shim’s death, while her sister says the US government has offered no support in investigating the matter.

Image from Serena Shim Facebook page

Image from Serena Shim Facebook page


Monsanto beats back GMO labeling

Despite mounting public opposition, Monsanto managed to defeat GMO labeling initiatives in both Colorado and Oregon this year after pouring millions of dollars into its campaign to leave its influence on the US food system invisible to consumers. In Oregon, the initiative failed to pass by a mere 812 votes, although in Colorado, 66 percent voted for the right not to know. In December, activists in Oregon filed suit, claiming 4,600 valid ballots had been erroneously rejected.


Despite the victories stateside, on the other side of the Atlantic, the EU approved a law that will allow the bloc’s 28 member states to restrict the cultivation of genetically modified crops.

Fracking fears

Banned in its Texas birthplace and drastically expanded across the UK, fracking – the oil and gas extraction method – remains as controversial as ever. In October, some 3 billion gallons of fracking wastewater were dumped into central California drinking-water and farm-irrigation aquifers. One recent study found living near a fracking site deteriorates health. Another said it could be as dangerousas asbestos or tobacco. With so much bad press, even 2016 presidential hopeful Hillary Clintonexpressed her concerns over the shale gas boom, though she might change her tune once on the campaign trail.

Anti-Austerity protests hit UK

Sometimes, even starting a march on the doorstep of the BBC won’t get you media coverage, even if Russell Brand does show up. The latest People’s Assembly protest descended on Number 10 Downing Street to throw out a collective voice against austerity. But even so close to the heart of power, it remains to be seen if anyone was listening.

READ MORE: ‘No more austerity:’ Thousands rally in London demanding alternative from govt

Reuters / Suzanne Plunkett

Reuters / Suzanne Plunkett


’F**k the EU’ and more Ukraine tape leaks

Just weeks before former Ukrainian President Viktor Yanukovich was ousted from power, Assistant Secretary of State for Europe Victoria Nuland had a lot of ideas for Ukraine’s future leadership and some choice words for European policy makers approach to the conflict. “F**k the EU,” Nuland allegedly said in a hacked phone call with US ambassador to Ukraine Geoffrey Pyatt. Critics claimed the conversation proved the US was manipulating the pro-EU opposition to help in its efforts to see Yanukovich driven from power.


Some Ukrainian leaders pulled no punches in their phone conversations too. In a leaked Yulia Tymoshenko tape, Ukraine’s former PM called for “grabbing guns and killing damn Russians.” Other private conversations made public allegedly resulted in dozen of deaths. Ukrainian prosecutors havedetained several Berkut riot police officers, saying they may be behind the mass killings by unidentified snipers in Kiev on February 20, killing dozens of people in Ukrainian capital. At the same time, in theleaked conversation between Estonian Foreign Minister Urmas Paet and the EU then foreign policy chief Catherine Ashton, Paet suggested that the snipers who shot at protesters and police in Kiev were allegedly hired by Maidan leaders. Estonian Foreign Ministry later confirmed authenticity of the leaked call.

READ MORE: Five Ukraine war tragedies: Questions unanswered, investigation drawn out

Blogs I Follow —

In early 2013, researchers exposed some unsettling risks stemming from Android-based password managers. In a paper titled “Hey, You, Get Off of My Clipboard,” they documented how passwords managed by 21 of the most popular such apps could be accessed by any other app on an Android device, even those with extremely low-level privileges. They suggested several measures to help fix the problem.

Almost two years later, the threat remains viable in at least some, if not all, of the apps originally analyzed. An app recently made available on Google Play, for instance, has no trouble divining the passwords managed by LastPass, one of the leading managers on the market, as well as the lesser-known KeePassDroid. With additional work, it’s likely that the proof-of-concept ClipCaster app would work seamlessly against many other managers, too, said Xiao Bao Clark, the Australia-based programmer who developed it. While ClipCaster does nothing more than display the plaintext of passwords that LastPass and KeePassDroid funnel through Android handsets, a malicious app with only network privileges could send the credentials to an attacker without the user having any idea what was happening.

“Besides the insecurity of it, what annoyed me was that I was never told any of this while I was signing up or setting up the LastPass app,” Clark wrote in an e-mail. “Instead, I got the strong impression from LastPass that everything was very secure, and I needn’t worry about any of it. If they at least told users the security issues using these features brings, then the users themselves could decide on their own trade-off between usability and security. Not mentioning it at all strikes me as disingenuous.”

Asked if LastPass has ever notified users of the risk, company CEO Joe Siegrist didn’t give a yes or no answer. Instead, he responded, “This is an any clipboard activity problem [his emphasis] and impacts any password manager involving the clipboard (100% of them)—the way all password managers have consistently allowed you to enter your password into other apps since Android has existed. This demonstration is aimed at LastPass, but it’s the whole of Android that must be addressed.”

Clark agreed that any Android-based password manager that uses the OS clipboard is susceptible. He strongly recommends that people stop using any app setup that works this way. Many apps use standalone browsers, browser extensions, or software keyboards to enter credentials into login fields. There is no evidence they are susceptible to sniffing. The reason ClipCaster takes special aim at LastPass, Clark said, is simple. It just happened to be the manager he installed on his phone. There are no reports that password managers running on iOS or Windows Phone are vulnerable. But there can be way to know for sure, since Ars is unaware of the any comprehensive study testing the security of managers on those platforms.

As already alluded, the threat stems from the use of the Android clipboard, which acts as a temporary cache for text that is being copied and pasted, either within the same app or from one app to another. Android has no official programming interface that secures the clipboard. By design, its contents are available to any app installed on the phone, from the highest privileged banking app to one with no privileges at all. (ClipCaster, for instance, requires no permissions.) Siegrist rightly noted that any password manager that makes use of the Android clipboard—and there are plenty, including LastPass—is vulnerable.

LastPass has several different methods for plucking passwords out of their highly fortified vault and plugging them into the password field of a browser or app. Not all of the options are susceptible to sniffing, but notably, the one LastPass recommends that Android users choose leaves them wide open. The option is known as autofill, a feature that seamlessly plugs passwords into apps and the Chrome browser.

Shortly after installing LastPass, Clark came across the 2013 paper that discussed the clipboard vulnerability. It got him wondering about the security of his decision, so he began analyzing the JavaScript autofill uses to populate username and password fields in Chrome. In about an hour, he had a crude but working exploit that monitored the Android clipboard and captured login credentials transported by autofill. His proof-of-concept app works by listening to the notices the clipboard broadcasts to installed apps and looking for a familiar patterns in the code.

Clark concocted a dummy account containing the username “” and the password “s4f3p4assw0rd,” and observed the way the credentials were funneled through the clipboard. Autofill wrote a blob of code to the clipboard and then pasted it into the address bar of Chrome. The code contained the following telltale lines:

if (l_bte) {
                l_sfv(l_bte, decodeURIComponent(escape(atob('ai5kb2VAYWN0aXNlYy5jb20='))));
            l_sfv(l_bpe, decodeURIComponent(escape(atob('czRmZXBhc3N3MHJk'))));

An image of ClipCaster sniffing the password “s4f3p4assw0rd” as a user logs in to Facebook.
Xiao Bao Clark

“atob” is a JavaScript function for decoding strings that have been converted into base64-encoded representations. Presumably, LastPass developers chose the encoding to make it less obvious to other apps what the clipboard contents are. But to anyone with a modest amount of training, the measure is little more than an exercise in the largely discredited protection known as “security through obscurity.” ClipCaster monitors the clipboard for the patterns, decodes the base64 strings and, as illustrated in the image to the right, displays them.

In e-mails sent to Ars, Siegrist, the LastPass CEO, rightly noted that the vulnerability isn’t unique to his company’s product, or even to Android devices.

“This is an OS-level issue that impacts everything running on Android,” he said. “If you use the clipboard to copy any data, a malicious app could obtain it—like installing a clipboard monitoring software on Windows or a keylogger on Windows. You can compromise your security by installing bad software.”

Siegrist also noted that attacks like the one carried out by ClipCaster work only when LastPass or another password manager runs on an Android device that has a malicious app installed, and then only when the manager uses the device’s clipboard. The CEO said that LastPass users should run only “trusted” apps, meaning those distributed over Google Play by a trusted company and widely used and reviewed.

Still, his statements omit some important distinctions. First, LastPass on Windows doesn’t use the clipboard to pass login credentials to Chrome, and presumably other browsers, Clark’s research found. And second, most Windows users—and a growing number of Mac users as well—use antivirus protection to detect such threats. Android antivirus apps exist, but there’s little evidence that most users install one. Third, his advice about installing only trusted apps is sound, but given the regular occurrence of malicious apps that slip through Google defenses and are hosted in the company’s official Play Store, it’s unrealistic to expect end users to always spot rogue titles.

One of the key defenses of Android is its application sandbox, which prevents one app from accessing sensitive data belonging to another app, presumably under the premise that not all apps will be trustworthy. When an app as sensitive as a password manager doesn’t enjoy a protection as crucial as this, the companies should make this limitation explicit. LastPass and the developers of other vulnerable managers should be forthright about the risks and tell users what they can do to protect themselves. In the case of LastPass, the threat can be eliminated simply by opting out of the recommended autofill option and instead using the LastPass browser or LastPass keyboard. Many users may decide the convenience of autofill is worth the added risk, but at least they will be making an informed choice.

Dashboard ‹ The Network News — WordPress

Summery: On Nov 14, 2014, the online hacktivist Anonymous released a YouTube video announcing a cyber attack on Ku Klux Klan, (a White supremacist Christian group) due to its threats to use lethal force at the Ferguson protest. As a result, Anonymous has hacked the official Twitter account of KKK USA ().

After taking over the KKK’s twitter account, Anonymous made some tweets; bashing the group for ignoring previous warnings to stop interfering in Ferguson protest.

Here are some of the screenshots of some tweets posted by Anonymous from KKK’s twitter account.



This tweet was posted by KKK itself but that was just few hours before getting hacked by what they thought is ” a bunch of wannabes”. 

At the time of publishing this article, the KKK’s twitter account was hacked and still under the control of Anonymous. 

More about Operation KKK: 

Here is a press released sent by Anonymous to different media sources: 

KKK it has came to our unfortunate attention that you have been interfering with Anonymous. We are not attacking you because of what you believe in as we fight for freedom of speech… We are attacking you because of what you did to our brothers and sisters at the Ferguson protest on the 12th of November. Due to your actions we have started Operation KKK. The aim of our operation is nothing more than Cyber Warfare. Anything you upload will be taken down, anything you use to promote the KKK will beshut down. 
DDos attacks have already been sent and have infiltrated your servers over the past 2 days… d0x's have also been launched on leaders of the KKK. All information retrieved will be given to the public. You messed with our family and now we will mess with yours… Let the cyber war begin. We are legion. We do not forgive. We do not forget Ku Klux Klan you should haveexpect us.

Watch you YouTube video uploaded by Anonymous below: 

What is the Ferguson protest for?

On 9th August, 2014, a 17 yr old teen Mike Brown was shot dead by one of the officers from Ferguson Police Department. Anonymous conducted cyber attacks and on ground protests against the Ferguson Police Department under the banner of #OpFerguson. 

The grand jury investigation into the August 9 shooting of 18-year-old Michael Brown and Ferguson police officer Darren Wilson is expected to return a verdict in the next few days and according to the New York Times, protesters are already preparing for the decision.

This is not the first time when Anonymous has hacked a white supremacist group. In past, a Mississippi-based white supremacist organization The Nationalist Movement ( its website hacked by Anons for #OpAntifa. › Anmelden

Pirate Bay Is Still Online, Even Though All of Its Founders Are in Custody

November 7, 2014

The men behind the internet’s most popular piracy hub, the Pirate Bay, have had a particularly bad week, which is not too out of the ordinary for a group of hackers  who are acutely aware of law enforcement troubles, international manhunts, prison time, solitary confinement, and telling Hollywood to go fuck itself.

First there was the  ​Halloween sentencing of one of the Pirate Bay’s co-founders, 30 year-old Gottfrid Svartholm-Warg. He was sentenced to three-and-a-half years behind bars in Denmark. He was found guilty of hacking into the Danish wing of a company called the Computer Sciences Corporation. CSC is also in the news right now for allegedly developing billing fraud schemes, alongside the City of New York itself, that may have defrauded New York State’s Me​dicaid system. Across the pond, Svartholm was accused of hacking into CSC’s Danish databases, which a court in Copenhagen found to have included “criminal records and drive​rs’ license records.”

Svartholm-Warg had been previously hiding out in Cambodia, but was extradited to Sweden, where he was held in solitary confin​ement before facing trial in Denmark. Svartholm-Warg was running from a one-year prison sentence the Swedes hammered down on him for his role in founding the Pirate Bay. Those original Pirate Bay-related charges sparked a massive protest movement in Sweden.

I spoke to Rickard Falkvinge, the founder of the Pirate Party, about the legal nightmare of the Pirate Bay crew. On the subject of Svartholm-Warg’s extradition from Cambodia, he told me, “For some reason [the authorities] were throwing everything they had at a computer repair guy out in the rural parts of Cambodia, and it certainly had nothing to do with an extra 59.4 million US dollars in foreign aid from Sweden to Cambodia that was handed over at the same time.”

At the time, his extradition to Sweden caused plenty of undesirable attention for both the Swedes and the Cambodians. Within Wikileaks’ extensive documentation pertaining to Svartholm-Warg’s case, the Swedish Foreign Ministry’s press director is quoted as writ​ing: “We are getting a lot of questions from all four corners of the Earth regarding [Svartholm-Warg]. Many journalists are personally involved, is my impression. I think the pressure on the embassy [in Cambodia] will diminish now that he’s coming to Sweden.”

In Sweden, Svartholm-Warg faced similar hacking charges to the ones he was recently convicted for in Denmark. He was accused of both hacking into Nordea, a Swedish bank, and Logica, an IT firm. Only the charges pertaining to Logica stuck, but Svartholm-Warg has maintained his innocence throughout, stating that someone nefarious had accessed his computer remotely to carry out the hacks. Svartholm-Warg was then deported to Denmark, despite his b​es​t efforts, arguing that he was being tried for the same crimes twice. This is a perplexing argument given that the Danish charges pertained to his alleged hack of CSC, not Logica or Nordea, for which the Swedes went after him.

In Denmark, Svartholm-Warg used the same defense, namely that he was framed and his computer was hacked. The prosecution dismissed this argument, but Svartholm-Warg’s legal team called in Jacob Applebaum, noted computer security researcher and Tor developer who testified to the contrary. His ​lawyers also presented “an antivirus scan of his computer showing that 545 threats had been found on it, some of which were capable of providing a hacker with remote control of the computer.”

Svartholm-Warg’s argument is plausible, in that he has certainly made plenty of powerful enemies simply from running the Pirate Bay. Wikileaks has also pointed out that he played a role in the infamous “Collateral Murder” project, wherein Wikileaks released previously classified video footage of an American Apache helicopter mistakenly bombing ​jo​urnalists.

As if Svartholm-Warg’s multinational, convoluted legal woes weren’t enough, one of the other Pirate Bay founders, Fredrik Neij, who had fled to Asia after being charged in Sweden, was arrested in Thailand earlier th​is week. According to Falkvinge, “Fredrik had been one of the tech guys running the site, and according to clips from the movie TP​B AFK, he was basically planning to wait out the statute of limitations in the wonderful climate.”

Neij had been living in Laos, and reportedly was a frequent tra​veler to Thailand. While he has not yet been sent to Sweden to serve time for his copyright infringement charges, it’s expected that will be happening sooner than later. Neij was the last remaining Pirate Bay founder to evade incarceration.

The third founder of the Pirate Bay is Peter Sunde, a man Rickard Falkvinge describes as “mediagenic.” Sunde expects to be released from prison this month. Falkvinge told me Sunde’s role in the Pirate Bay was very minor, in a length​y statement written for Falkvinge’s blog published after his plea, he states his conviction came about after “having sent an invoice for advertising on the Pirate Bay once in April 2006 (almost a year after the events on trial started).”

He also claims he was advised by police to get a cheap lawyer, discusses how Stockholm Police’s “lead interrogator” on his case took a job with Warner Brothers during the trial, and how he once felt as if he were “the most hated person in the power corridors of Hollywood.”

Sunde is likely to take on new entrepreneurial projects upon his release. I spoke to him in July 2013, about an enc​rypted message app he was working on before being imprisoned that would combine the security of encryption with the beautiful graphic interface of, say, the iPhone.

The Guardian caught up​ with Sunde recently, where he discussed his newfound friendship with a cocaine smuggler who bakes vegan muffins, the poor treatment he receives in jail outside of said muffins, and how he was able to encrypt all of his computer systems through a keystroke on his smartphone at the moment of his arrest, which understandably infuriated his arresting officer.

Despite having its three most prominent organizers in custody (along with a fourth man—the supposed financier Carl Lundström, who currently sports an electronic ankle bracelet in Switzerland) the Pirate Bay is alive and well.

Yesterday, according to the Pirate Bay’s own statistics—which are published on its homepage—the torrent tracker had over 48 million connected users, sharing nearly 7 million torrents. In his post-plea statement from 2012, Sunde bragged that “The Pirate Bay was back online [immediately after the initial raid]. It’s an easy service to copy, and with no advanced functionality. That was one of the major features with the underlying technology, being smart and easily maintained to that level. It was so easy to maintain, nobody had practically touched it for a year at the time of the raid.”

According to Falkvinge, the four men’s “real crime was talking back at Hollywood monopolists, which embarrassed the Swedish establishment.”

In the face of international pressure, the Pirate Bay is infamous for its clever maneuvers that keep it online. At one point, the site’s administrators were considering placing its servers onto drones that would floa​t above international waters to curve anti-copyright legislation written in pesky landlocked nations. And, just recently, the site began using its a​dvertising space to promote a free VPN, which allow users in countries like Iceland (which have recently banned access to the Pirate Bay outright) to access the site safely.

​Follow Patrick on ​Twitter.

Cool HTML to BBCode Converter v. 1.32


Most people are aware that they need to have some form of protection on their PC if it’s attached to the internet. Yet it seems that a lot of users still don’t know how to properly protect themselves.

Many believe that the security software that comes with their PC is enough to protect them. Security company Check Point ZoneAlarm has released an infographic which shows that 71 percent don’t have both a firewall and antivirus solution on their PCs.

It also shows that 32 percent of PCs in the world have a malware infection and that unprotected machines are 5.5 times more likely to get infected. The graphic compares protecting your PC to defending a medieval castle, but don’t go heating the boiling oil just yet.

ZoneAlarm has also released a blog post on the results of the recent AV-TEST research which shows that its premium product out performs free offerings from Avast and AVG. The message being that relying on free solutions may not protect you as much as you think it does.

The key thing though is that whatever you use you need to have both a firewall and antivirus to provide protection. Otherwise it’s back to the drawbridge and the suit of armor. More details in the infographic scroll below.