SHARE
Facebook X Pinterest WhatsApp

P2p protection

What happens when you deliberately put a real debit card and pre-paid phone card out on a peer file sharing service and measure how it long before someone tries to access the cards and drain them of any value? About a week, according to an experiment conducted by Tiversa, a company who sells P2P protective […]

Written By
thumbnail David Strom
David Strom
Jul 26, 2007
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

What happens when you deliberately put a real debit card and pre-paid phone card out on a peer file sharing service and measure how it long before someone tries to access the cards and drain them of any value? About a week, according to an experiment conducted by Tiversa, a company who sells P2P protective software.

VARs should take a look at the company’s offerings, and I’ll describe the results of the experiment and some lessons learned in this blog post. The results were reported in congressional testimony today. http://oversight.house.gov/story.asp?ID=1424

The researchers put a file called “credit card and phone card numbers.doc” on a PC running Limewire inside a shared directory, as part of a test earlier this year. Within a few days, dozens of downloads were tracked, and soon the total value stored on both cards was depleted.

This is a very real scenario. While I won’t get into whether P2P file sharing is legit, plenty of people are running this software on their PCs, and they may easily place files in the shareable folder that contain equally sensitive information. The problem is compounded if these services are being run from corporate-owned PCs, too.

So let’s try something out. If you are running a sharing service on your PC, take a moment now and see if you have made yourself an inadvertent target:

Have you set up your entirely hard drive as shareable? Not a good idea. At least change the setting to just the folder where your media files are located.

Is your hard disk not very organized, and you don’t pay much attention to where you store your files? Now is the time to look. The Tiversa researchers found dozens of copies of passports and birth certificates, hundreds of copies of tax returns, and federal student aid applications when they did a quick search of the Gnutella network. It didn’t take them very long to find this stuff, and when they downloaded a few samples they seemed like the real McCoy.

Did the file sharing software add other folders besides the one where you knowingly store your music and videos? They are good at finding all of your media files elsewhere, and if you have an MP3 in the same place where you have your Quicken data, you could be in trouble. Spend some time cleaning house now.

Do you do work on a PC that is also used by your teenagers? You could have saved a work document in a shareable folder by mistake, or not realized that later on the folder became shareable. In a recent study by Osterman Research, 71% of employees answering the survey have checked work-related email from home on a non-work owned computer. Work is being done away from the office more often all the time.

You have been warned.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA
Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.