Quote:
Originally Posted by Toto
No, remember that part of the evidence gathering process is to take some or all of the file from an IP address. Flooding a torrent request with fake IP's doesn't work because you wouldn't be able to get evidence from it.
|
Depends, Media Defender and others were just using IP addresses. AFAIK no further evidence has ever been produced in a UK court.
Quote:
The methods used by the BPI mean that they can produce file evidence because they have collected it, which means they have connected to the peer.
|
How do they prove it was you though, and not someone else in the family or someone using your wifi connection? I work in a computer shop and we get people coming in all the time saying that they use someone else's wifi.
Keep in mind that even if it's someone you allowed to use your connection, you are still not guilty. It's like if someone borrows your car and gets snapped by a speed camera - they get the points, not you.