Copyright AudioLock.NET © 2015 . 1

Copyright AudioLock.NET © 2015 . 1
Music Anti-Piracy
Best Practice Guidelines
Executive summary
There exists a considerable amount of misinformation about the measures and practices
which constitute effective music anti-piracy. This paper aims to examine this dynamic and
relatively new field with a view to dispelling the misnomers around it. Whilst asserting
measures which can be used to define effective music anti-piracy it also provides
explanations on how piracy works, frequently used terminology with some proven solutions.
By clearly signposting the pathways by which music rights holders can navigate to reach the
optimum level of protection for their music, it is hoped this paper will be useful in helping
further turn the tide on music piracy.
Like the technology discussed herein this document is live and evolving. Updates to the Music
Anti-Piracy Best Practice Guide will be issued in line with new knowledge and changes in this
specialist sphere. AudioLock welcomes all input which may help improve the usefulness and
relevance of this paper.
All rights are reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of
AudioLock.NET ©.
Copyright AudioLock.NET © 2015 . 2
Table of Contents
How Piracy Works
p.4
Tools to Combat Piracy
p.8
Google Transparency Report
p.20
Terminology
p.24
Copyright AudioLock.NET © 2015 . 3
How Piracy Works
Pirates are paid as much as €60 for every 1000 downloads of content they upload. 1
How pirates make big money
Music piracy provides both the uploaders and hosts of pirated content with several different
income streams.
● Advertising
● Cyberlocker pay per download
● Cyberlocker revenue from subscriptions
● Link protectors
● Malware
● Surveys
● Premium funded eg. FTP sites (File Transfer Protocol) or members website
The three main types are Premium Funded, Advertising Funded and Cyberlockers. The most
common way to generate large amounts of money is to use cyberlockers (also known as file
lockers, file sharing sites or hosts).
The process works like this:
1. Obtain a music file/release
2. Upload it to one or more cyberlockers
3. Share the download links by any means (websites, forums, Twitter, Facebook etc.)
4. Receive payments from the cyberlockers for every download or from subscriptions
1
http://www.kwwhosting.com/f95/oboom-com-extra-money-60-eur-1000-downloads-%96pps-mix-ppd-160241/
Copyright AudioLock.NET © 2015 . 4
With a small amount of programming knowledge, and the aforementioned four steps, it is
possible for pirates to write automated scripts to perform all these tasks making it easy for
them to scale and increase their earnings for very little time input.
Cyberlockers make money through displaying adverts to users when they are downloading
from a link. Further income is made through the sale of ‘premium’ accounts whereby the
downloader is not shown adverts and is able to download without any speed or concurrent
download limits. There are hundreds of such sites with new ones being discovered almost
daily. One of the largest payers and therefore very popular with pirates in this field is Oboom.
Website: www.oboom.com
Oboom.com is one of the most popular premium cyberlockers. It pays up to €60 for just 1000
downloads and pays a further 90% of any premium subscription payments to the content
uploader.
Example: A pirate adds 30 tracks per week, getting an average of 250 downloads on each,
which can earn them just over €23,000 per year. It is suspected that this exceeds the income
for many artists and small labels.
Oboom.com is not alone in making such lucrative offers to pirates. Below is a screen grab
from a popular pirate forum showing just some of the headline deals being offered by a
premium cyberlocker. In this highly competitive market pirates are able to pick and choose
the most profitable cyberlockers to ‘work’ with.
Copyright AudioLock.NET © 2015 . 5
Such cyberlockers often initially appear to users to be totally legitimate file storing and sharing
services. However a little digging on forums, such as the one shown above, quickly reveals
that they are being used heavily for the purpose of distributing infringing music content and
are encouraging other people to upload content.
Another reference point to check a cyberlocker’s legitimacy is the Google Transparency
Report. In the case of oboom.com the Google Transparency Report shows nearly 250,000
requests to remove content by everyone from music rights holders and software houses to
book publishers. A large proportion of this is expected to be related to music because the
volume of new releases makes a great opportunity for pirates to access new content.
http://www.google.com/transparencyreport/removals/copyright/domains/oboom.com/
As mentioned there are other types of cyberlockers, categorised by two main groups:
Premium funded
These are sites which charge a subscription or one off payment for access to content. They
often provide unlimited access to the whole archive they have which can be thousands of
GBs of music. They often boast about having the largest ‘0 day’ (music released today) and
Copyright AudioLock.NET © 2015 . 6
promo collection in high quality WAV format. In some cases torrent sites have a private
members area, usually containing exclusive or ‘0 day’ release content, which users can
access with subscriptions or donations.
Examples include: soundeo.com - $29.95 per month for 50
downloads per day htrk.net/membership/ ­ €11 per month unlimited
access to 5TB of music electrobuzz.fm - $26.95 per month with 10GB
added daily essentialhouse.net - $29.95 4GB of fresh content per day
Advertising funded
This includes a range of sites such as torrent sites, Usenet and Click Scam sites. They
generate traffic through offering free downloads of the content and are usually heavily
covered in advertising. They often use ‘Link Protectors’ which when clicked show the user an
advert for a short time before allowing them to click through to the content.
It is not uncommon to see the pirates abusing social media channels such as YouTube,
Facebook and Twitter to market pirate sites to generate traffic and also to directly make
revenue through the use of ‘Link Protectors’. It is important to note that none of these social
media channels are complicit in piracy, merely that they are used as a vehicle by
unscrupulous users to peddle pirate content via legitimate means.
Examples of such sites include:
4shared.im mp3skull.com newalbumreleases.net - this also uses
cyberlocker download links for revenue kickass.to
* Please note that any site which features links to content can also make use of cyberlockers
or link protectors to generate revenue streams. They may not just be advertiser funded or
premium funded. Some sites will also charge premium access to certain areas as can be
seen on some torrent sites.
Tools to Combat Piracy
Copyright AudioLock.NET © 2015 . 7
It is often heard that there is nothing that can be done to fight piracy effectively. This however
is far from the truth. As we have seen piracy is often generated by automated software so the
key to any defence is that it needs to be just as fast, scalable and automated. While any of
the tools below will make an impact in isolation using them together in a holistic approach will
make a significant difference in an integrated campaign.
Over the following pages we will examine the following eleven tools, discussed in order of
effectiveness:
1. Scanning and takedown 2. Search delisting 3. Integration with the music
ecosystem 4. Good naming conventions 5. Careful promotion through stream sites
6. Leak prevention and promotion 7. Make the music easy to identify 8. Social
media 9. Blocking content from being shared 10. Education 11. When to release
1. Scanning and takedown
The detection and removal of links to download/stream the content from infringing sites/hosts
is an essential tool. This aims to discover links being generated and published by pirates and
request their removal usually by issuing a DMCA (Digital Millennium Copyright Act) notice
requesting the link to be disabled. This is a well used process and means that the majority of
links created by pirates can be removed from between instantly to 24 hours, and varies greatly
depending on the site/host. Indeed some do not remove links at all, the most famous being
The Pirate Bay (the best known torrent site in the world) so that they are in continual battles
with content owners and law enforcement.
Due to the volumes and speed of links that can be generated per release by pirates an
effective solution should provide the following:
● Scanning in up to real time (The faster a link is detected after being created the better).
● Automated validation (confirming the link provides access to the content being
protected).
● Automated processing (the vast majority of links should be automatically validated
without the user having to confirm the link is infringing).
Copyright AudioLock.NET © 2015 . 8
● 24/7 automated sending of notices.
● Integration with website and file hosts APIs (ensures instant removal on most sites).
● Linked to search delisting (removes the links and pages linking to the download links
from search engines to reduce traffic to them).
● Scalable (the service must be able to scale limitlessly to avoid delays).
● Downloads the pirate files (used not only for identification but to enable pre-filtering of
content on UGC sites and can have any watermarks decoded to identify the source of
leaks).
2. Search delisting
Search engines and other sites that provide access to content or indexes unfortunately, by
their nature, help to make links to download infringing content easier to find. By removing
links from such services the access to infringing content is reduced and at the same time
access to legitimate content is increased by clearing the results to make room for the
legitimate links.
Example : On page 1 of Google you get 10 results for a search to download a particular
album. If 7 of them are for illegitimate links then only 3 are to the content the label/artist really
wants the user to see. This often means that download stores, the label’s Facebook page,
Twitter and press are on page 2 or 3. With only 6% of users clicking past page 1 of search
results2 this means they are hardly seen. If the 7 pirate links are removed this makes way for
the legitimate links to come onto page 1. This drives traffic not only to the download stores or
2
http://www.gravitateonline.com/google-search/2nd-place-1st-place-loser-seriously
Copyright AudioLock.NET © 2015 . 9
streaming sites for users to buy the content but also can increase traffic to the labels/artist’s
Facebook, Twitter or website which in turn helps market the content.
An effective delisting service would have the following features:
● Remove links from multiple key sites (Not just from Google).
● Offering real time scanning.
● Notify these sites of links before they have been indexed.
● Identify and remove links for proxy services which circumnavigate content blocked by
the country from which the user is accessing it e.g. in the UK kickass.to is blocked but
you can access it easily through a proxy service such as kickass.unblocked.pw which
also is indexed by the search engines.
● Manage domain aliases (pirate sites swap domains frequently to keep them high up
in Google results ­ this is following Google’s change to demote sites which receive
high volume of notices to remove content).
3. Integration with the music ecosystem
With more and more services available to labels and artists a solution that is integrated with
the digital eco system ensures accuracy of data such as the artist and title of releases but
also makes it easier to use. For example being able to deliver data direct from distributors or
asset systems with a single click saves time and money. This also ensures that the details of
the content being protected is accurate and does not allow for human error.
4. Good naming conventions
It may sound obvious that you want a release to be easily found and identified by customers
but this can sometimes be much more difficult if the release name is hard to locate. This can
be for various reasons but most often it is that the title is very similar to something else being
searched for (eg. ‘Ibiza ­ Anthems’ when there are multiple compilations named this every
year). If your product is hard to search for then it makes marketing harder plus it makes it a
lot harder for anti-piracy services that do not use identification methods such as downloading
and fingerprinting to correctly identify and remove infringing content.
Copyright AudioLock.NET © 2015 . 10
5. Careful promotion through stream sites
When tracks are being promoted on services such as YouTube and SoundCloud it is also
very important to title releases clearly identifying that they are just ‘short promo edits’. If you
upload full tracks you can expect them to fill Google and other search engines with ‘download’
(the links often convert a stream or rip a video into a mp3 download or in some cases just
lead to more adverts without delivering the content) links and any hope of many legitimate
links showing on Google page 1 without employing a delisting service are very slim.
Why? Because pirates know that sites like SoundCloud are the first place a label will upload
content to promote a forthcoming release so they use this as a data source to create pages
pretending to be downloads of the release. Sites that do this ‘scraping’ of data from other
sites we call ‘Click Scam’ sites. These sites fill up search engines with links purporting to be
downloads of the content and users click through to them generating advertising revenue for
the pirates while, at the same time, displacing the legitimate links for the release such as
download stores, news and social media.
See this search result (see next page):
Copyright AudioLock.NET © 2015 . 11
The link highlighted is for this page (see grab on next page):
Copyright AudioLock.NET © 2015 . 12
That second download link is this:
http://4shared.im/download.php?name=oliver+heldens+last+all+night+koala+feat+kstewart+e
xtended+mix&url=aHR0cHM6Ly9hcGkuc291bmRjbG91ZC5jb20vdHJhY2tzLzE3NzM1Njg3N
y 9zdHJlYW0/Y2xpZW50X2lkPWFjMDFkYzY3MmU2Yjk4ZjZlNDA1NmQwY2Y5NWIyOTY4
Which is hiding the source link using a technique called base64 encoding. This is a common
technique in coding to convert a string of characters or a file into a list of letters and numbers
like the set you can see on the following page. The technique is reversible and is often used
to
hide
the
true
contents.
aHR0cHM6Ly9hcGkuc291bmRjbG91ZC5jb20vdHJhY2tzLzE3NzM1Njg3Ny9zdHJlYW0/Y2x
p
ZW50X2lkPWFjMDFkYzY3MmU2Yjk4ZjZlNDA1NmQwY2Y5NWIyOTY4
Copyright AudioLock.NET © 2015 . 13
which when decoded is this much more recognisable link:
https://api.SoundCloud.com/tracks/177356877/stream?client_id=ac01dc672e6b98f6e4056d0
c f95b2968
And the download.php page will convert the stream into a nice 128kbps mp3 without you ever
seeing the SoundCloud page.
Copyright AudioLock.NET © 2015 . 14
As you can see the track is for sale and yet through the scraping of SoundCloud into the ‘Click
Scam’ site we have downloaded it for free without any idea it was hosted by SoundCloud.
More importantly without any interaction with the label or artist so they are unable to contact
the user or market to the user in future. This is hugely damaging.
6. Leak prevention and promotion
Because marketing campaigns build up the excitement of a forthcoming release they create
a vacuum of desire and a volume of people using search engines to find out information about
the upcoming release and to listen to previews.
This is the ultimate fertile ground for a pirate, because the money has been spent to create
such a vacuum, with the intention that the release will then rapidly fill this, making the sales
Copyright AudioLock.NET © 2015 . 15
jump and the release soar up the chart. This is the goal of a successful marketing campaign.
If the pirate is able to get there first by leaking the release just before the real release date
then they will receive huge numbers of downloads and a maximum amount of revenue from
the traffic generated.
The biggest and most obvious impact is that users who originally intended to buy the release
are presented with only a free download option because the legitimate download is not yet
available. These lost sales for a release can be extremely costly. This is made worse if there
is no legitimate place to purchase the release, because peers are downloading and listening
to the release - so if you want to be part of that then you must download illegally.
The key ways for pirates to get the content early are through promo lists, promo pools,
careless employees within the distribution chain or ‘Release Groups’.
To minimise the risk we recommend that you carefully check any recipients on promo lists to
ensure that they really should be there. It is much better to have a smaller list of key people
than a big list of unknown people who could easily be pretending to be worthwhile music
journalists or radio jocks to get access to your releases. Also check promo pools to make
sure your music is not ending up there without your approval. Often music is submitted from
unofficial sources and then quickly distributed to their network. Where possible use promo
services that are secure and use watermarking to uniquely identify any streams or downloads
which would allow you to identify a leak and remove the person that leaked it. Be sure that
the watermarking is capable of surviving being converted to different formats (many don't and
pirates know this so they can strip watermarks easily).
If your release does leak then it is best to have a plan in place with the various partners in the
distribution chain, allowing you to instantly bring forward the release date. This makes the
legitimate version available to mitigate the loss from such a leak. This should include pre
prepared email shots, social media posts and paid for search listings to ensure that people
tempted to download the leak have a choice to instead buy the legitimate release.
Copyright AudioLock.NET © 2015 . 16
7. Make the music easy to identify
Part of the battle against piracy is ensuring that your release can not only be found easily by
users but also identified easily by automated systems. Technology provides a great way to
identify music through a technique called ‘Fingerprinting’. This technique actually listens to
the sound of the track and matches it to a ‘Fingerprint’. Submitting the music to such
databases allows automated systems to identify the music.
This is important not only for your customers to be able to identify a track they like that they
hear (eg. using Shazam in a club) but also allows other systems to quickly identify your music.
Why? Because these types of systems are used to allocate royalty payments for TV and radio
plus many sites including SoundCloud3 are reported to use them to block the uploading of
copyrighted content without the authorisation of the content owner.
8. Social media
Taking control of your social media helps to minimise piracy. This is most obvious on
YouTube and SoundCloud. Some labels are happy for their content to be reuploaded in order
to get extra royalty payments. However by removing all uploads, except the official ones, will
still mean the release can be found and played but most importantly it means that the
descriptions, quality and what is shown on the video are also all within the control of the label.
This stops instances like this occurring (see next page):
3
http://www.hypebot.com/hypebot/2011/01/SoundCloud-partners-with-audible-magic-gets-content-id-tech.html
Copyright AudioLock.NET © 2015 . 17
YouTube and SoundCloud are key tools used in promotion so to help identify unwanted
content on these platforms it can be easier to find a service which is able to find and help
manage through use of whitelisting channels etc.
Copyright AudioLock.NET © 2015 . 18
9. Blocking content from being shared
A number of file hosting sites and UGC sites use upload filters to block files from their systems
which they know to be infringing. To help stop your release from being published on such
sites you can use a service which will send fingerprints of the pirate files as soon as they are
discovered to such sites. This is usually an extra service beyond sending the release to
‘Fingerprint’ services such as Shazam because it is a different type of identification using the
actual unique hash (also known as a fingerprint) of the digital file. To do this effectively this
needs to be connected to a scanning and takedown system that downloads the files allowing
them to be fingerprinted and this data sent to such sites.
10. Education
Educating everyone who is involved with a release is essential making sure that care is taken
at each stage to avoid the pitfalls and ensure the release gets the legitimate exposure it
deserves. This, in turn, funds the supply chain from the artist right through to the intern making
coffee in the office.
11. When to release
There have been a lot of discussions about the best time to release which usually hinge
around maximising chart positions. One thing to remember though is that many of the smaller
cyberlockers use manual validation to remove content after they have received takedown
notices. So it comes as no surprise that we have seen evidence in the response times which
indicate they don't all work at the weekend. So if you release on a Friday links found might
not get removed until Monday.
Google Transparency Report
“ We disclose the number of requests we receive from copyright owners and governments
to remove information from our services. We hope these steps toward greater transparency
Copyright AudioLock.NET © 2015 . 19
will help inform ongoing discussions about the appropriate scope and authority of content
regulation online. ” ­ Google4
The Google Transparency Report5 is the empirical reference point of this paper. The Google
Transparency Report is a public service provided by Google and is in no way influenced by
AudioLock; so statistics quoted from it may be seen as not being biased to any one copyright
reporter.
Google received more than 345 million requests to remove supposedly infringing links in
2014, according to TorrentFreak .6 A considerable number of these requests were made by
music rights holders.
Google’s Transparency Report is a useful online reference for the creative industries into the
extent of piracy across the search giant’s pages. It gives music rights holders an overview of
the extent to which piracy affects their content. Moreover it provides details of which entities
4
http://www.google.com/transparencyreport/removals/
http://www.google.com/transparencyreport/removals/copyright/
6 Music Week,
5
http://www.musicweek.com/news/read/google-received-345m-takedown-requests-in-2014-report/060464
Copyright AudioLock.NET © 2015 . 20
are responsible for purveying music piracy and which services are principally responsible for
protecting music content.
Google ranks AudioLock as removing infringing content from more specified domains (unique
websites) than any other independent music specific anti-piracy service in the world.
Every link removed from Google search by music anti-piracy services such as AudioLock, on
behalf of the music rights holders whose content they represent, is reported as statistics on
the Google Transparency Report. This makes it a useful source of empirical data on how
many sites an anti-piracy service is scanning and removing from, and how much infringing
music content has actually been removed from Google search.
The more infringing content which is removed from Google Search for a rights holder the less
opportunities there are to download it for free. Removing these infringing links helps drive
sales and chart positions for the music rights holder.
Number of URLs removed
Content specific - does a given anti-piracy service just protect music content? If not the figures
they report on the Google Transparency Report for Specified Domains and URLs removed
will be a mix of other media often encompassing film, adult content, photo’s, ebooks etc,
URL removal accuracy ( “% of URLs not removed” from Google, by Google )
Removal accuracy is important because poor accuracy is a reputational risk. Large reporting
volume to Google doesn't necessarily equal accuracy. As the percentage of URL’s not
Copyright AudioLock.NET © 2015 . 21
removed decreases, the chance of a counter notice from a website where a link/page has
been inadvertently removed increases. Poor accuracy exposes rights holders and their
anti-piracy services to criticism from sites like torrentfreak.com, which can cause harm to their
reputation. A scan of the first ten pages quickly reveals how accurate an anti-piracy service
is on behalf of it’s rights holders e.g. AudioLock figures 05/02/15.
Specified Domains are vitally important as it defines the width of the ‘net’ that a given entity
has to detect piracy. The wider this net the more piracy can be found and removed for rights
holders’ content. AudioLock is a music specialist so this figure only includes music related
Copyright AudioLock.NET © 2015 . 22
websites. For other companies who cover all types of content from ebooks through to
software only part of the figure would represent music websites.
Terminology
Click Scam Site
A Click Scam site, in basic terms, is a site that uses artists' work to generate ad impressions
and clicks in order to generate revenue income for the site owner. Generally the music is
comprised of rips from YouTube, SoundCloud and other social media sites. The site looks
like a search engine which will present the user with a list of mp3 files that match their search,
and when a user clicks on the page you will usually find ads popping up all over the place. In
some cases, Click Scam sites will not even offer the download of the mp3 at all, even though
you see the 'play' and 'download' buttons next to each item.
Examples:
http://www.myfreemp3x.com/
http://mp3.pm/
http://mp3vip.eu/
http://mp3finder.me/
Copyright AudioLock.NET © 2015 . 23
Fingerprinting
This is a technique used to automatically identify a track through the analysis of the actual
sound. A well known system that uses such a technique is Shazam. In this case, using your
phone, with just a short sample, Shazam can identify the track you are searching for with a
good degree of accuracy, even with background noise .
File Locker / Cyberlocker / Filehost
A cyberlocker, or file locker, is a site where users can upload their files and have them stored
on the cloud. They come in two variants, usually the legitimate variation (dropbox and
wetransfer are good examples) which do not offer payment to users uploading content.
The other variation of cyberlockers use ads to generate revenue and subscription charges.
Although they operate very much the same as legitimate varieties, they are more commonly
used for piracy because the locker will offer money to users depending on the number of
downloads and a share of the revenue generated from premium subscriptions. Oboom.com
is a prime example, which will pay the user $60 for every 1000 downloads of a file. These
sites also have premium options as well in order to generate more money. The most notable
examples are uploaded.net, rapidgator.net and novafile.com
File search engines
File search engines are used in order to provide quick access to locker links, which are usually
not found in search giants such as Google and Yahoo. Before Google adjusted it’s search
rankings, the most well known one was filestube.com (the site has though changed in 2014
to only link to reportedly legitimate content).
Some of these sites accept DMCA notices, but as with link sites it is better to send notices
directly to the lockers which actually host the download.
UGC
User generated content sites are where users are able to upload their own content. This can
be any content and well known examples include SoundCloud and YouTube.
Copyright AudioLock.NET © 2015 . 24
Linking sites
Linking sites are used to 'direct' users to downloads of content from cyberlockers (and torrents
in rare cases). A lot of them are laid out like a typical blog, displaying the latest downloads;
forums are also used as linking sites due to their categorical nature.
These sites are set up in conjunction with lockers or torrent links, so that the site owner can
provide the downloads to users in a categorised list thus allowing the owner to generate
revenue via the lockers. Some linking sites also have link protectors (eg adfly) between the
download page and the locker page to give extra revenue.
Release Groups or Warez Groups
These are groups of pirates who usually identify themselves on the more hidden parts of the
web by a single name. For example ‘AciDToX8’ which is a notable name tagged onto dance
music releases found on many torrent sites.
Release groups usually have a collection of members who are able through various means
to get access to releases before their release date. These groups make themselves known
with the tagging of the files by changing the name to include their release group name and
often to add details of how they can be contacted by anyone wanting to supply content to
them within an .nfo file. This is essentially just a text file within the downloaded zip archive
that is the release.
Usenet
Usenet is a distributed network, which means that it is not controlled by any single source.
The function of Usenet is to provide a network where any user can freely post information
which is then rapidly distributed, allowing any other user to access such information as easily
as possible. Usenet though has been hijacked for the purpose of piracy with tools that can
join news posts together allowing large files to be distributed through them such as pirated
releases. This is though a less common way for piracy to occur.
Copyright AudioLock.NET © 2015 . 25
Link Protectors
These are tools which are used to mask the destination link (usually to a download link such
as a cyberlocker) which show the user and advert for a short time before allowing them to
continue to the destination link. These types of protector usually feature adverts that
encourage users to install software they shouldn't or to call scam phone lines to remove
viruses on their computer that they actually don't have.
Examples include:
adf.ly
linkbucks.com
Torrent sites
Torrent sites are usually viewed as illegal because piracy groups have used them to great
effect for sharing torrent files of copyrighted material. The most notable example of a torrent
site is thepiratebay, which went down in December 2014.
Torrent sites are distinguishable from a regular piracy linking site by their 'magnet' downloads,
hashes, and trackers. Other things to look for on these sites are 'seeds', 'leeches' and 'peers'
which show how many people are seeding the torrent files and how many have downloaded
them. Torrent sites are popular among pirates because the only way to truly kill a torrent is
by removing the trackers, which is a very difficult process (especially non-public ones).
However a lot of the larger torrent sites are DMCA compliant which means that the torrent
content can be removed from their databases (although due to the trackers the torrent could
be found on others).
Due to high numbers of blockades being introduced by courts and ISPs, we see a lot of torrent
sites multiplying by the use of proxy domains to get around blocks - basically where a user
will set up a domain and create a clone of the original torrent site. This means that torrent
files are very easily spread and can be seen in search engines often. However, removing the
original torrent files from the main site will cause all the clones to fail, and will eventually be
wiped from search engines.
Copyright AudioLock.NET © 2015 . 26
All rights are reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of
AudioLock.NET ©.
Copyright AudioLock.NET © 2015 . 27