From d9c71cb931d467d5fa86b7ba6200174f66f59ef5 Mon Sep 17 00:00:00 2001 From: dabikers' admin Date: Fri, 31 May 2024 22:49:29 -0500 Subject: Make the top navbar look nicer --- nopiracy.html | 151 +++++++++++++++++++++++++++++----------------------------- 1 file changed, 75 insertions(+), 76 deletions(-) (limited to 'nopiracy.html') diff --git a/nopiracy.html b/nopiracy.html index 4428f8e..4e9765d 100644 --- a/nopiracy.html +++ b/nopiracy.html @@ -17,25 +17,27 @@
-

Preventing Piracy

- +

Da Bikers: Preventing Piracy

+
@@ -55,11 +57,9 @@ I can not STAND pirates, I get physically violent around them, my family has banned any mention of pirates or pirate adjacent activities in my presence! Yet however much I hate pirates, I understand that some people simply do not know better; some are ignorant to the damage they're doing by downloading a game or a book for - free. Seeking to better your knowledge is no excuse, even for those who are trying to learn about the law itself! - Yet again, it is understandable that some people may not truly grasp the gravity of their actions. That's what - this guide is for, for those who don't know how to avoid piracy!
+ free. That's what this guide is for, for those who don't know how to avoid piracy!

- In this guide on avoiding piracy, I endeavor to teach you, the reader, on how to spot piracy in the wild, + In this guide on avoiding piracy, I seek to teach you, the reader, on how to spot piracy in the wild, and the most common / popular services currently used in modern copyright theft so that you may avoid them.


@@ -81,11 +81,11 @@ of piracy is better:

-  Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without - permission for a usage where such permission is required, thereby infringing certain exclusive rights granted - to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, - or to make derivative works. The copyright holder is typically the work's creator, or a publisher or other - business to whom copyright has been assigned. Copyright holders routinely invoke legal and technological +  Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without + permission for a usage where such permission is required, thereby infringing certain exclusive rights granted + to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, + or to make derivative works. The copyright holder is typically the work's creator, or a publisher or other + business to whom copyright has been assigned. Copyright holders routinely invoke legal and technological measures to prevent and penalize copyright infringement

@@ -102,17 +102,17 @@

People pirate for a multitude of reasons, all unacceptable, but some more "valid" than others. Some of these reasons include: -

+

  • Pricing: The pirate may believe the copyrighted work is priced too high, or may be unable to afford a legitimate purchase.

  • "Trials": The pirate may wish to trial the copyrighted work, say in the case of software, to determine its "true" value.

  • -
  • Availability: The pirate may be unable to acquire the copyrighted work through legitimate means, and is +
  • Availability: The pirate may be unable to acquire the copyrighted work through legitimate means, and is forced to pirate as a means to access the content.

  • -
  • DRM Removal: The copyrighted work may employ DRM as a - means to prevent pirates from exploiting their work, which may interfere with the legitimate use of the +
  • DRM Removal: The copyrighted work may employ DRM as a + means to prevent pirates from exploiting their work, which may interfere with the legitimate use of the software/media.

  • Flagrant Disregard: Some people simply disagree with the concept of copyright, and become pirates as they do not respect the law.
  • @@ -122,25 +122,25 @@

    Again, none of these reasons are valid excuses to break the law:

      -
    • Pricing: Many things are unaffordable to the average person, such as a jet carrier. Should I be able to - steal a jet carrier just because I selfishly believe the price I was given is "unrepresentative" of the +
    • Pricing: Many things are unaffordable to the average person, such as a jet carrier. Should I be able to + steal a jet carrier just because I selfishly believe the price I was given is "unrepresentative" of the actual value of the jet carrier? No! That would be completely preposterous.

    • -
    • "Trials": If a company wished to offer a demo of their software for the general public to trial their - software and determine if they should purchase it, then they would simply offer the trial. Furthermore, - acquiring a full copy of a piece of interactive media such as software or a video game is NOWHERE near - a traditional "demo", as the entire content of the media is contained within the pirated copy. If the - pirate didn't wish to pay for the real product, but still wanted to use it, there would be nothing +
    • "Trials": If a company wished to offer a demo of their software for the general public to trial their + software and determine if they should purchase it, then they would simply offer the trial. Furthermore, + acquiring a full copy of a piece of interactive media such as software or a video game is NOWHERE near + a traditional "demo", as the entire content of the media is contained within the pirated copy. If the + pirate didn't wish to pay for the real product, but still wanted to use it, there would be nothing preventing them from simply using the copy they already have.

    • -
    • Availability: This is possibly the most understandable reason as to why someone would intentionally - commit piracy, however it is yet again unacceptable. There is plenty of media that has been rendered - exclusive to a specific piece of hardware, most notably game consoles. A game which is exclusive to Xbox - or Playstation should not be pirated just because it's otherwise exclusive! That's like saying you should +
    • Availability: This is possibly the most understandable reason as to why someone would intentionally + commit piracy, however it is yet again unacceptable. There is plenty of media that has been rendered + exclusive to a specific piece of hardware, most notably game consoles. A game which is exclusive to Xbox + or Playstation should not be pirated just because it's otherwise exclusive! That's like saying you should be able to steal one of the motors out of a Tesla brand car just because it has motors and your car doesn't!

    • -
    • DRM Removal: DRM, or Digital Rights Management, is implemented in a piece of software or media as a - way to prevent pirates from stealing their product. However, sometimes the measures taken impact user +
    • DRM Removal: DRM, or Digital Rights Management, is implemented in a piece of software or media as a + way to prevent pirates from stealing their product. However, sometimes the measures taken impact user experience and simultaneously fail to prevent pirates from stealing. This is unfortunate, yes, but wouldn't be necessary if it weren't for pirates in the first place! You can't seriously blame the inventor of barbed wire for the injuries of criminals who can obviously see the danger and still cut themselves on it. It's an @@ -177,14 +177,14 @@
    • Interacting with a copyrighted work through its intended means

    - Piracy in most daily scenarios boils down to the dissemination of material through improper channels and - without permission of the copyright holder. This means most interactions with pirates will take place at - the point of distribution. This may happen online or offline, in-person or from half-way across the world. + Piracy in most daily scenarios boils down to the dissemination of material through improper channels and + without permission of the copyright holder. This means most interactions with pirates will take place at + the point of distribution. This may happen online or offline, in-person or from half-way across the world. One easy way to tell if something is piracy or not is to ask yourself it it seems sketchy. If you have second thoughts about if this is what the owner would want, or if your safety is put at risk through the - activity, it's probably piracy. If someone offers you a magazine for significantly cheaper than you'd - expect, they're probably pirating the magazine. If you're offered cheap software through some sketchy - website, it's probably piracy. Really, just use common sense and stay away from those weird dark corners + activity, it's probably piracy. If someone offers you a magazine for significantly cheaper than you'd + expect, they're probably pirating the magazine. If you're offered cheap software through some sketchy + website, it's probably piracy. Really, just use common sense and stay away from those weird dark corners of the internet. Here are some examples of what piracy IS:

      @@ -201,10 +201,9 @@

      Despite my best efforts, there will inevitably be people who will end up as pirates if not given EXPLICIT - instructions on what to avoid, so that is what I endeavor to do here. I repeat, this section is intended - to be a list of things to AVOID, NOT THINGS TO USE! I do NOT endorse piracy in any way, if I haven't made - that obviously clear so far. Do NOT use these "services" (crime facilitators) to subvert the copyright - protections of others. This is simply a list of things to AVOID!!!!
      + instructions on what to avoid.This section is intended to be a list of things to AVOID, NOT THINGS TO USE! + I do NOT endorse piracy in any way, if I haven't made that obviously clear so far. Do NOT use these "services" + (crime facilitators) to subvert the copyright protections of others. This is simply a list of things to AVOID!!!!


      Torrenting

      @@ -221,23 +220,23 @@ Some examples of illegal torrenting sites / trackers include:

      @@ -268,14 +267,14 @@

    • Meshnets: A special form of internet that requires special software to access. Meshnets tend to bounce internet traffic between multiple different computers in an attempt to make it nigh-impossible to track any individual user. Again, these services in and of themselves are not illegal, but people tend to - do illegal things while on them. Some of these services include: Tor, - I2P, + do illegal things while on them. Some of these services include: Tor, + I2P, and Tribler.

    The earlier links that ended in ".onion" are links to Onion Sites, special sites hosted using Tor. To access an Onion Site, one must use the Tor Browser Bundle / Tor Browser. More tech savvy readers may know that sites hosted - using Tor are on the Dark Web; By the way, I2P counts as the Dark Web too! + using Tor are on the Dark Web; By the way, I2P counts as the Dark Web too! If that's not enough of a reason to avoid them, I don't know what is!


    @@ -286,21 +285,21 @@ while others use other technologies to disseminate their illegitimate copies. Some of these sites include:

      -
    • Scihub sci-hub.st: Scihub mainly - provides access to research papers, regardless of the copyright or licensing agreements held by - the paper's authors. Papers require DOIs to +
    • Scihub sci-hub.st: Scihub mainly + provides access to research papers, regardless of the copyright or licensing agreements held by + the paper's authors. Papers require DOIs to access. I have personal experience with this site, as a (now fired, lol!) college professor recommended it to me (disgusting!).

    • Library Genesis libgen.is: Another shadow library in the vein of Scihub, but this one offers books instead of research papers. LibGen is one of the more popular shadow libraries, as it - has been around since 2008 and sports a very large catalog of pirated material. LibGen is unique from the other libraries - in that it offers downloads using the IPFS - protocol, another filesharing protocol similar to BitTorrent. Another funny fact is that LibGen came from the Soviet Union; only + has been around since 2008 and sports a very large catalog of pirated material. LibGen is unique from the other libraries + in that it offers downloads using the IPFS + protocol, another filesharing protocol similar to BitTorrent. Another funny fact is that LibGen came from the Soviet Union; only commies could bear such a terrible disregard of copyright law!

    • -
    • Z-Library loginzlib2vrak5zzpcocc3ouizykn6k5qecgj2tzlnab5wcbqhembyd.onion zlib24th6ptyb4ibzn3tj2cndqafs6rhm4ed4gruxztaaco35lka.b32.i2p: - yet again another shadow library, but this one has been fully kicked off the clearnet and into the Dark - Web. Currently only accessible through either Tor or I2P (using the .b32.i2p link), Z-Library is possibly the most illegal site I've - covered so far. It sports a similarly large catalog of books to LibGen, and can be seen as an alternative. +
    • Z-Library loginzlib2vrak5zzpcocc3ouizykn6k5qecgj2tzlnab5wcbqhembyd.onion zlib24th6ptyb4ibzn3tj2cndqafs6rhm4ed4gruxztaaco35lka.b32.i2p: + yet again another shadow library, but this one has been fully kicked off the clearnet and into the Dark + Web. Currently only accessible through either Tor or I2P (using the .b32.i2p link), Z-Library is possibly the most illegal site I've + covered so far. It sports a similarly large catalog of books to LibGen, and can be seen as an alternative. Not that anyone should be looking for alternatives anyway.

    • Anna's Archive annas-archive.org: Anna's archive differs from the other shadow libraries in that it is not a shadow library in and of itself, but a search engine for the rest of the @@ -308,7 +307,7 @@ it trivially easy to find media across the different libraries. Anna's Archive claims that they do not wish to hurt the authors of the content they link to, in their about page, but fail spectacularly by simply existing!
    -

    +

    Again, there are many more examples of non torrent-based piracy sites, but if I were to list them then we'd be here all day. Pirates regularly have their domains seized and are forced to either go dark and take their site down or switch to another domain. It's likely that all the domains I've listed will be different or defunct within a year (here's hoping!). Going on a pirate hunt is a lot like trying to kill the hydra, @@ -329,9 +328,9 @@ .mp3/4's so they can redistribute those as well. Some of these tools include:

      -
    • yt-dlp github.com/yt-dlp/yt-dlp: - A command-line tool used to download YouTube videos as either video files or audio files. Supports many - different types of file format, and bypasses YouTube's rate-limit, enticing pirates who'd want to download +
    • yt-dlp github.com/yt-dlp/yt-dlp: + A command-line tool used to download YouTube videos as either video files or audio files. Supports many + different types of file format, and bypasses YouTube's rate-limit, enticing pirates who'd want to download entire playlists at once. Often used by pirates to download videos and thumbnails either to reupload to an unauthorized place -- such as another YouTube channel, or TikTok -- or to download massive amounts of music.

    • YouTube Revanced github.com/ReVanced/revanced-manager: YouTube Revanced, or rather Revanced Manager @@ -342,7 +341,7 @@
    • NewPipe newpipe.net: NewPipe is a "free front-end" for YouTube that doesn't log into a Google account and allows its user to view YouTube videos without ads, along with enabling the downloading of videos. NewPipe is actually used by ReVanced to download its videos. NewPipe claims that it respects users privacy, but without preventing piracy, what's the point?

    • -
    • GrayJay grayjay.app: An app created by "FUTO" and Louis Rossmann, +
    • GrayJay grayjay.app: An app created by "FUTO" and Louis Rossmann, a notorious pirate who has outright advocated for piracy in many of his videos on YouTube. GrayJay provides an ad-free experience for several platforms, not just YouTube. Furthermore, it provides an account system so pirates can leave comments on videos and chat with each other. What's even more heinous is that Louis and FUTO are charging for this app! There has never been a clearer, textbook case of piracy to ever exist: A group of users seek to subvert copyright protections, and then charge for removing the copyright! Despicable!
    • @@ -369,7 +368,7 @@ available for all platforms (unlike uMatrix). Ghostery claims that they block trackers and make your web browsing experience safer, but they're actively harming the job safety of the site admins that are having their ads blocked!

    -

    +

    - Other notable apps/methods
    As it turns out, the internet isn't just YouTube! There are other platforms with their own pirate problems. There are too many possible piracy methods for me to point out every single one, but I will occasionally @@ -377,7 +376,7 @@

    • xManager github.com/Team-xManager/xManager/releases: xManager is another app in the same vein of ReVanced Manager, an app that doesn't - outright distribute a modified version of Spotify, but distributes patches and a patcher to modify your local install of Spotify. xManager offers premium features without paying for them, which is a godsend from the filthy pirates + outright distribute a modified version of Spotify, but distributes patches and a patcher to modify your local install of Spotify. xManager offers premium features without paying for them, which is a godsend for the filthy pirates who'd stoop so low as to steal from starving artists. I was told about this app by a now former friend; former of course as I can not stand to be associated with pirates in any capacity.

    -- cgit v1.2.3