Quote:
Originally Posted by cook1984
|
No, remember that part of the evidence gathering process is to take some or all of the file from an IP address. Flooding a torrent request with fake IP's doesn't work because you wouldn't be able to get evidence from it.
Quote:
Of course, this doesn’t work when the pirate-tracking company requires itself to connect to the peer, before the IP-address is collected, since it is impossible to connect to a non-existing peer
|
The methods used by the BPI mean that they can produce file evidence because they have collected it, which means they have connected to the peer.