RE: BitTorrent Methodology

From: Skinner, Andrew \(NBC Universal\) <Andrew.Skinner_at_nbcuni.com>
Date: Thu, 3 May 2007 16:25:18 -0700

Jay,

 

That is good news!

 

 

Are the collected IPs categorized in any way? For example, the reporting
site lists the number of spoofs and decoys sent on a particular title.
Are these numbers pulled from the data collection system? If so can they
be tracked back to an IP?

 

 

Does the data collection system search supply and demand regardless of
where countermeasures are being deployed? I'm not sure whether the
collection system is functions merely as a recording tool working
alongside the countermeasure servers, or if it its own independent
system that actively searches for pirate files and user searches.

 

 

I'm learning a lot today :0)

 

Andrew

 

________________________________

From: Jay Mairs [mailto:jay_at_mediadefender.com]
Sent: Thursday, May 03, 2007 3:56 PM
To: Skinner, Andrew (NBC Universal); Ben Grodsky
Cc: Markham, Aaron (NBC Universal); Ben Ebert
Subject: RE: BitTorrent Methodology

 

Andrew,

 

Yes, the data collection system collects IP addresses. The data is
daily data, so it is always associated with a date. Depending on
network, there can also be time of day data.

 

-Jay

 

From: Skinner, Andrew (NBC Universal) [mailto:Andrew.Skinner_at_nbcuni.com]

Sent: Thursday, May 03, 2007 3:11 PM
To: Jay Mairs; Ben Grodsky
Cc: Markham, Aaron (NBC Universal); Ben Ebert
Subject: RE: BitTorrent Methodology

 

Hi Jay,

 

Thanks for the quick reply. The questions were aimed at all networks. I
only have one follow up question for you.

 

1. If the countermeasures computers do not collect information to
ID a person, will the data collection system do it? Or what kind of data
is collected in that system? The goal is to be able to process a list of
IPs to see if you have interacted any of them, and at what time(s).

 

 

Andrew

 

 

________________________________

From: Jay Mairs [mailto:jay_at_mediadefender.com]
Sent: Thursday, May 03, 2007 2:33 PM
To: Skinner, Andrew (NBC Universal); Ben Grodsky
Cc: Markham, Aaron (NBC Universal); Ben Ebert
Subject: RE: BitTorrent Methodology

 

Andrew,

 

I assume these questions are for all networks, not just Bittorrent (as
the subject implies).

 

1. IP addresses are not (and cannot be) collected by
protection(countermeasures) computers. In fact, this is why we
developed a separate data collection system for your data feeds.

2. Supply collection implementation details vary by network. In
general, supply corresponds to a user sharing a file with a certain
hash on a certain day. A user will be counted again if revisited on a
different day, but not if it's the same day.

3. Demand collection also varies by network. Demand is defined as
a keyword search by a user. These are counted daily to give a daily
demand number. If a user types in a search string and hits the search
button, that will be counted once. If the same user does a second
search, that will also be counted once.

4. Our countermeasures are removed prior to the calculation of the
demand and supply numbers, so they don't have any effect on them.

 

Regards,

Jay Mairs

 

From: Skinner, Andrew (NBC Universal) [mailto:Andrew.Skinner_at_nbcuni.com]

Sent: Thursday, May 03, 2007 1:50 PM
To: Ben Grodsky; Jay Mairs
Cc: Markham, Aaron (NBC Universal)
Subject: RE: BitTorrent Methodology
Importance: High

 

Next Thursday will be fine. I think that most of the questions about
supply and demand can be answered through some quick email exchanges
though. Jay, would you mind sparing a few moments to clarify the
following:

 

1. Are IP addresses time stamped and collected during countermeasures?
Is it possible to figure out if countermeasures were used on user X, and
If so, how many times and when? During the call we will most likely be
discussing these questions in regard to ed2k user hash.

 

 

2. How is supply measured and collected? Basically, how do you define
supply? If a swarm is entered and supply data is captured will existing
users be counted again if it is revisited at a later time?

 

 

3. How is demand measured and collected? How do you define demand?

 

 

4. How do spoofs, decoys, swarming, and interdiction affect supply and
demand numbers? Are these counts included, counted separate, or not
included in the supply/demand numbers?

 

 

 

Thanks,

 

Andrew

 

 

________________________________

From: Ben Grodsky [mailto:grodsky_at_mediadefender.com]
Sent: Wednesday, May 02, 2007 12:19 PM
To: Skinner, Andrew (NBC Universal); Markham, Aaron (NBC Universal)
Cc: Randy Saaf; Jay Mairs
Subject: RE: BitTorrent Methodology

 

Aaron and Andrew,

Attached please find our BitTorrent testing methodology. This is what
our QA team does. We added the last step as a way for your team to help
us improve our BitTorrent effectiveness for your titles.

Thanks,

Ben

________________________________

From: Ben Grodsky
Sent: Tue 01-May-07 15:13
To: 'Andrew.Skinner_at_nbcuni.com'; Jay Mairs
Cc: 'doganaksoy_at_crd.ge.com'
Subject: Re:

Andrew,

I'm out Thursday (this week) through Wednesday (next week). Could we set
a call for Thursday next week?

Thanks,
Ben

----- Original Message -----
From: Skinner, Andrew (NBC Universal) <Andrew.Skinner_at_nbcuni.com>
To: Ben Grodsky; Jay Mairs
Cc: Doganaksoy, Necip (GE, Research) <doganaksoy_at_crd.ge.com>
Sent: Tue May 01 14:56:03 2007
Subject:

Hi Ben & Jay,

Are you guys open for a call this Friday? Necip and I would like to
discuss how supply and demand are measured, as well as how user hashes
are collected. I'll be free for the rest of the day if one of you would
like to clear some stuff up ahead of time.

Thanks,

Andrew

818.777.3491
Received on Fri Sep 14 2007 - 10:55:50 BST

This archive was generated by hypermail 2.2.0 : Sun Sep 16 2007 - 22:19:45 BST