<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=536468303188339&amp;ev=PageView&amp;noscript=1">

Whitepaper Download: Architectures and Protocols Powering Illegal Content 

Resource Center

 

IBC_tech_paper_Small

"This paper will provide insight into pirate content platforms, covering the various architectures and protocols used, from peer-to-peer protocols adapted for live streaming to more traditional Web streaming protocols."

Over recent years, a major shift has occurred in piracy of paid-for content services toward illegal redistribution of live content in real-time over the Internet. This paper will provide insight into pirate content platforms, covering the various architectures and protocols used, from peer-to-peer protocols adapted for live streaming to more traditional Web streaming protocols.

More specifically, it will focus on the methods generally employed to set up and scale ad-based illegal services using some of the above-mentioned protocols with streaming media platforms, while securing streaming servers, enabling these sites to remain hidden.

A thorough analysis of the used architectures and protocols makes it possible to measure the actual audience viewing illegal streams, typically leveraging peer-to-peer networks data. This enables content service providers to assess the piracy threat level of any content, while illustrating the need for a business intelligence tool that provides relevant information on viewers’ behavior.

Although these changes are a significant break from the past, in reality, they will help video providers create consistent video experiences across devices, reduce time-to-market and, and make it easier to deal with change. 

 

Viaccess-Orca is trusted by:

Orange    Telekom_Romania    Canal+    MediaSet    Singtel_1    Telecom