And how does the company intend to sabotage the pirates? According to the company, they first identify the pirates IP address and then forward it to producers and the pirate's ISP. They then flood the P2P networks with "decoy" files which would in theory bury the original files as well as "saturate the networks' waiting lists to increase file's download time" and send "corrupt data to users while they are trying to download the pirate files."
CoPeerRight Managing Director Romina González Galetto called the solution "Bytes Corrupted" and said that many of the producers at the festival were surprised by the claim. The company claims it is "the only way to retard the download of the illegal copies available on P2P networks."
Source:
ContactMusic