Megaupload 2.0 will be called Mega and will be unassailable

megaupload 2.0Megaupload will return with the simple name of "Mega", and it seems that this time Kim Dotcom has definitely put protected from possible complaints and raid at home. The new service provides fact that files uploaded by users to be protected by encryption, and the keys are not in possession of directors.
In this way, the responsibility for a pirate movie is just the user, because only he will have the key needed to decrypt the protection. It will be up to the user and third-party application developers to the task of managing access to files (and disseminate password).
 
[adsense:block:adcontenuto]
 
According to Dotcom's the only way to stop the new service would make the same encryption illegal, but "according to the Human Rights Charter of the United Nations, privacy is a fundamental right. We have the right to protect your personal information from espionage," said New Zealander.
 
The other piece of the puzzle is the use of redundant servers in different countries (The New Megaupload is almost ready: ranked servers). In this way, "even if a country decides to block the server - do not believe it can happen, because we respect all applicable laws of the countries where we have servers - or if there is a natural disaster, there is another source where files are available. Thus it is impossible to perpetrate abuses such as those we have experienced in the United States, "said Mathias Ortmann, a member of Kim Dotcom.
 
The system also provides for the hosting is widespread and that everyone can participate, even if they have few resources. "We can work with anyone, because the host does not know what's on the same server." How The Pirate Bay then Mega will be a service dematerialized, which is located exclusively in the "cloud", and virtually impossible to break down with a single shot accurately.
 
[adsense:block:adcontenuto]
 
To further complicate life for the copyright owners is the fact that this system does not de-duplication: if the same file is present there will be a hundred times a hundred voices with as many decryption keys, and then it will take one hundred removal requests.
 
Yes, because the major film and music can still request removal of a file, for example if you are on a forum link and the password to decrypt it. Indeed, Dotcom has also created a means by which copyright owners can directly access the server and delete content they do not like. "This time, however, if they want to use that instrument will accept before gaining access, that we may terminate or be liable for the actions of users."
 
In short, it seems that Mega is a sort of Megaupload 2.0. Spread in a cloud of servers around the world, and with the strong encryption protection. It remains to be seen whether and how users will use it to spread illegal material.

 

Money Making Systems: 

Similar Content

Identify harmful Web Shell with PHP Shell Detector

webshell php

A web shell is a script, commonly written in PHP, which can provide access as the root user to a web server compressed. Trojan also renamed PHP can be very harmful if used correctly by an attacker, it is therefore important to periodically analyze the platform's web in search of intruders.
Development: 

How to hide data in a JPG file

hide data jpgAs you can see, what I'm proposing and 'enter data within of image files, especially in JPG files. The choice of using the JPG files to hide data is not ' was taken randomly. The JPG files in the last few years have seen a spread high, in fact, can they be 'found everywhere, starting from the most websites, to get to the digital photo albums.

Offline Utility: 

The @ mentions of Instagram translated automatically on Twitter

instagram on twitterA small and fast news about Instagram is sure to please lovers of this now proven compatibility mobile application but also aficionados of Twitter.
 
For non-experts and for the less "geek" is a little cumbersome to understand at first, but not impossible.
News Magazine: