Thunderbolt PK Users, in the end who is more rogue than who?

Source: Internet
Author: User
Keywords Server thunder in the end

The intermediary transaction SEO diagnoses Taobao guest stationmaster buys the Cloud host technology Hall

These days about the topic of thunder Fire up. Some people questioned the integration of the donkey download function of the new thunder is "sucking donkey", contrary to the emule of the sharing mechanism; a moment to be exploded Thunderbolt unauthorized upload user information, Interception user screen information, infringement of personal privacy. Thunderbolt and user is the relationship between fish and water, but in the end the thunderbolt was pushed to the position of the wind wave mouth. With a fast-known, with many users of the Thunderbolt is scolded as a rogue behind, in the end what is hidden? This article will delve into the Thunder and users have to say two or three things.

"Foxconn events" in China's internet--a talk from the Thunder hotlinking

One day in June 2006, Huajun, Sky and other domestic well-known download site suddenly released a ban, claiming that the thunderbolt to take illegal hotlinking means, consumption of its download server resources, infringement of the legitimate rights and interests of download sites, so stop providing thunder software download services. This incident has stirred up the entire IT industry--a popular download software that has become a thief all of a sudden.

Huajun, the sky and other think, the thunder of the so-called analyzes download mechanism stolen its download link, just like a phone, from someone else's home telephone line open a hole, pick up the phone, for others to steal a dozen, and telephone charges by the stolen dozen people pay. But the Thunder aspect explained the analyzes downloading mechanism to save the user how much time, to the analyzes downloading principle did not mention.

So what is the analyzes download principle? Thunderbolt will automatically collect the user's download address, and the MD5 value to determine whether the same file, thus forming a huge download link library. For example, when user A uses Thunder to download a certain file on a Web site, the Thunderbolt automatically searches for other downloads of the file on the Internet, thereby playing the role of download acceleration. In fact, the other download Address page is not accessed by users, these sites not only did not get web traffic, instead of their own server resources to contribute to the user free of charge, which directly led to investment in advertising and other aspects of economic losses. Many download sites abhor this "hotlinking" behavior.

Not only that, the Thunderbolt will secretly collect users download file information, and in the background to peer-to-peer way to upload to other users. This is the Thunder download resources list, often appear the reason of personal IP address.

Thunderbolt was banned after all to the end of the settlement, reconciliation agreement written in black and white is "... To achieve cooperation and mutual win, and work together to create a harmonious industrial chain. "This can not help but remind people of" Foxconn incident "-Foxconn and the first financial reporter saw to fight a life-and-death, suddenly came two people together and good news. Two of the reconciliation books praised each other, and "agreed to work together to create a harmonious society and promote labour rights and interests."

The reason behind the scenes is unknown, but it is certain that, with the help of the Thunder "hotlinking" mechanism, downloading resources on the internet have become "free" sharing, limited servers can download to unlimited resources, even if the supply of dead chain, users can download. In the long run, this reduces the burden on servers for many download sites, reducing operating costs and risks. Over time, the Thunderbolt and some download sites, also formed a self-evident "tacit understanding."

According to an ex post investigation, in this debate, most users support the Thunderbolt. The reason for these users is also very simple--because the fast speed of thunder! In the eyes of these users, speed seems to be the most critical parameter index. As for downloading sites, and their computers are treated as free personal servers, they don't care.

Playing "hotlinking" under the banner of winning a wide range of user support, the author can not help but ask: in real life to steal abhorrence, and replaced by the Internet, but the initiative to cater to or even encourage the theft of behavior, this is how?

Privacy: "Can this thing be eaten?" ”

Thunderbolt suspected of infringing the user's personal privacy is not a fresh topic, but the Thunderbolt has not made a positive explanation. Although some users are dissatisfied with this, but the way to solve the problem is still very backward-love use not. On the thunderbolt suspected of infringing the user's personal privacy, the specific "guilt", the author collected as follows:

First, the Thunderbolt will secretly automatically collect the user's download behavior and information, and secretly uploaded to the server side, after the automatic formation of the thunder of their own download database.

Second, the Thunderbolt in the background to Peer-to-peer way, in the user does not know the situation, the user's download resources to upload to other users privately.

Third, is also the focus of recent controversy. The new version of Thunder by default open "video screenshot sharing" function, the user downloaded video file information uploaded to the server side. This is the Thunder online provides a preview of the origin of the video screenshot.

In fact, many users of the Thunderbolt secretly collect user information, unauthorized upload download resources and other suspected infringement of privacy behavior is not ignorant. Some users, however, do not care.

Privacy? Can you eat this stuff? "" Passed on the biography, anyway, my computer has nothing to be ashamed of things, "as long as the speed, send something to others also have no relationship" ...

Some users of personal privacy indifference, directly to the thunderbolt created a very favorable development environment. From secretly collect information to the private upload file, and then to today's interception of user screen information, the Thunderbolt is just an inch, tasted the sweetness. It can be said that the user's acquiescence to the thunderbolt to violate the privacy of the best defense reasons.

is the Thunder "sucking the Blood donkey"?

The new version of Thunder began to support the donkey download, the message came out, there are netizens preemptive trial and come to the expected conclusion-the Thunder is "sucking blood donkey."

It is worth mentioning that the definition of blood sucking donkey is not just "download not upload." About the blood sucking donkey more detailed information, through the search engine can find a lot of, here is the main discussion is the Thunder sharing mechanism.

According to the official Thunder, the Thunder does not include file sharing function is mainly due to copyright considerations. In fact, users use Thunder to download the resources, the ten are pirated. And the Thunderbolt online itself provides powerful search capabilities for these pirated resources. If for the sake of copyright consideration, does Thunderbolt's practice contradict?

If the Thunder allows users to deny file sharing, the power of the donkey sharing mechanism of great damage. As we all know, the important difference between an electric donkey and BT is that unless the user manually removes it, the donkey's shared files will be permanently uploaded to other users. BT ran off, then the popular seeds also have extinct day. And the donkey's file can always keep the source, is called a long history ...

The back of the Thunderbolt Rogue: Rogue user's will embodies the theft of other links, secretly collect user information, unauthorized upload user files, destroy the electric donkey sharing mechanism ... Any one of these is an unpopular scandal. According to common sense, set a lot of rogue behavior as one of the software should be resolutely blocked by netizens. However, the Thunder in each big download site download volume shows that thunder more and more Chinese netizens welcome.

Indeed, perhaps most of the small use of the thunder of the White do not know the download mechanism of the Thunderbolt, the rogue behavior of the Thunderbolt can be said to be unaware. However, there are a large number of so-called senior users also on the thunderbolt shone, even "to use foreign software for the glory, the use of domestic software for shame," the "elite" can not find the tools to replace the Thunderbolt.

"Speed is life, death must be under"--P2SP download mechanism advantages not only reflected in the download speed, even if the dead chain can be downloaded. In pursuit of the only goal of speed, the user's rogue mentality is increasingly revealed.

The important reason that thunder dares to bully is to cater to the user's first demand--as long as you are fast enough. As for other people's website rights and interests, personal privacy protection, sharing what, like a "sweep, Mo Guan Others tile on the frost."

In other words, if the user can adhere to their own principles, cherish their rights, respect for the public interest, then, such as thunder such software may be difficult to survive in the fierce market competition.

Yelling in real life, "Catch the Thief!" , but in the virtual world, but connivance even encourage hotlinking behavior; in real life even mobile phone calls are worried about being tapped, and in the virtual world of personal data leaked but do not care about, in real life to charity cause indifference, and in the virtual world but willing to be trampled on the flow of not well-off. Although the real life in a suit of gentleman appearance, on the net stripped naked clothes into a rogue under the small, is this also Chinese characteristics of the Internet environment of the deformed products?

Online criticism of the sound of Thunder has never disappeared, when everyone will focus on the Thunderbolt, who also noticed that we these users of the rogue mentality?

"Rapid trend", using this phrase can describe the speed of the Thunderbolt fast, but please do not forget, netizens spoof "swift potential to steal the bell," can also be used to describe the netizens self-deception how stupid and ignorant.

PostScript: I try to be an outsider to evaluate the recent thunder of some things, I have been hoping that they can use the standards of saints to restrain themselves, but I am very clear, many times I do not. As if I knew the importance of intellectual property, I was still unwilling to pay for the license of some commercial software. But one thing is for sure, I will never say anything nice about piracy.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.