| http://www.w3.org/ns/prov#value | - However, copyright holders often demand cooperation from ISPs in stopping transfers or catching the parties involved, and use techniques related to the ones described in this paper, notably detecting transfers and using IP addresses to identify the party at one end.
|