Thunder PK User, in the end who is more rogue?

Source: Internet
Author: User

These days about the topic of thunder Fire up. Some people questioned the integration of the donkey download function of the new thunder is "sucking donkey", contrary to the emule of the sharing mechanism; a moment to be exploded Thunderbolt unauthorized upload user information, Interception user screen information, infringement of personal privacy. Thunderbolt and user is the relationship between fish and water, but in the end the thunderbolt was pushed to the position of the wind wave mouth. With a fast-known, with many users of the Thunderbolt is scolded as a rogue behind, in the end what is hidden? This article will delve into the Thunder and users have to say two or three things.

"Foxconn events" in China's internet--a talk from the Thunder hotlinking

One day in June 2006, Huajun, Sky and other domestic well-known download site suddenly released a ban, claiming that the thunderbolt to take illegal hotlinking means, consumption of its download server resources, infringement of the legitimate rights and interests of download sites, so stop providing thunder software download services. This incident has stirred up the entire IT industry--a popular download software that has become a thief all of a sudden.

Huajun, the sky and other think, the thunder of the so-called P2SP download mechanism stolen its download link, just like a phone, from someone else's home telephone line open a hole, pick up the phone, for others to steal a dozen, and telephone charges by the stolen dozen people pay. But the Thunder aspect explained the P2SP downloading mechanism to save the user how much time, to the P2SP downloading principle did not mention.

So, what is the download principle of P2SP? Thunderbolt will automatically collect the user's download address, and the MD5 value to determine whether the same file, thus forming a huge download link library. For example, when user A uses Thunder to download a certain file on a Web site, the Thunderbolt automatically searches for other downloads of the file on the Internet, thereby playing the role of download acceleration. In fact, the other download Address page is not accessed by users, these sites not only did not get web traffic, instead of their own server resources to contribute to the user free of charge, which directly led to investment in advertising and other aspects of economic losses. Many download sites abhor this "hotlinking" behavior.

Not only that, the Thunderbolt will secretly collect users download file information, and in the background to peer-to-peer way to upload to other users. This is the Thunder download resources list, often appear the reason of personal IP address.

Thunderbolt was banned after all to the end of the settlement, reconciliation agreement written in black and white is "... To achieve cooperation and mutual win, and work together to create a harmonious industrial chain. "This can not help but remind people of" Foxconn incident "-Foxconn and the first financial reporter saw to fight a life-and-death, suddenly came two people together and good news. Two of the reconciliation books praised each other, and "agreed to work together to create a harmonious society and promote labour rights and interests."

The reason behind the scenes is unknown, but it is certain that, with the help of the Thunder "hotlinking" mechanism, downloading resources on the internet have become "free" sharing, limited servers can download to unlimited resources, even if the supply of dead chain, users can download. In the long run, this reduces the burden on servers for many download sites, reducing operating costs and risks. Over time, the Thunderbolt and some downloads between the site, also formed a self-evident "tacit understanding."

According to an ex post investigation, in this debate, most users support the Thunderbolt. The reason for these users is also very simple--because the fast speed of thunder! In the eyes of these users, speed seems to be the most critical parameter index. As for downloading sites, and their own computers are treated as a free personal server, they do not care.

Playing "hotlinking" under the banner of winning a wide range of user support, the author can not help but ask: in real life to steal abhorrence, and replaced by the Internet, but the initiative to cater to or even encourage the theft of behavior, this is how?

privacy: "Can this thing be eaten?" "

Thunderbolt suspected of infringing the user's personal privacy is not a fresh topic, but the Thunderbolt has not made a positive explanation. Although some users are dissatisfied with this, but the way to solve the problem is still very backward-love use not. On the thunderbolt suspected of infringing the user's personal privacy, the specific "guilt", the author collected as follows:

First, the Thunderbolt will secretly automatically collect the user's download behavior and information, and secretly uploaded to the server side, after the automatic formation of the thunder of their own download database.

Second, the Thunderbolt in the background to Peer-to-peer way, in the user does not know the situation, the user's download resources to upload to other users privately.

Third, is also the focus of recent controversy. The new version of Thunder by default open "video screenshot sharing" function, the user downloaded video file information uploaded to the server side. This is the Thunder online provides a preview of the origin of the video screenshot.

In fact, many users of the Thunderbolt secretly collect user information, unauthorized upload download resources and other suspected infringement of privacy behavior is not ignorant. However, some users are not concerned about this.

Privacy Can you eat this stuff? "" Passed on the biography, anyway, my computer has nothing to be ashamed of things, "as long as the speed, send something to others also have no relationship" ...

Some users ' indifference to personal privacy, directly to the thunderbolt created a very favorable development environment. From secretly collect information to the private upload file, and then to today's interception of user screen information, the Thunderbolt is just an inch, tasted the sweetness. It can be said that the user's acquiescence to the thunderbolt to violate the privacy of the best defense reasons.

Total 2 page: previous 1 [2] Next page



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.