“This paper will provide insight into pirate content platforms, covering the various architectures and protocols used, from peer-to-peer protocols adapted for live streaming to more traditional Web streaming protocols.”
Over recent years, a major shift has occurred in piracy of paid-for content services toward illegal redistribution of live content in real-time over the Internet. This paper will provide insight into pirate content platforms, covering the various architectures and protocols used, from peer-to-peer protocols adapted for live streaming to more traditional Web streaming protocols.
More specifically, it will focus on the methods generally employed to set up and scale ad-based illegal services using some of the above-mentioned protocols with streaming media platforms, while securing streaming servers, enabling these sites to remain hidden.
A thorough analysis of the used architectures and protocols makes it possible to measure the actual audience viewing illegal streams, typically leveraging peer-to-peer networks data. This enables content service providers to assess the piracy threat level of any content, while illustrating the need for a business intelligence tool that provides relevant information on viewers’ behavior.
Although these changes are a significant break from the past, in reality, they will help video providers create consistent video experiences across devices, reduce time-to-market and, and make it easier to deal with change.