Kim Dotcom's New Encrypted Cloud: German Pirate Back Making Waves In New Zealand
In his native Germany, Mr "Dotcom" is called by his real name, Kim Schmitz; but Germans joined with the rest of the world to see the roll-out of his new outsized Internet file-sharing site.
BERLIN - Of course it looked as if somebody had just declared war. Then again big, iconic performances are nothing new to Kim Dotcom. For photographs, the 39-year-old likes to pose with expensive cars and good-looking women. His mansion is supposedly the most expensive in all New Zealand. His tangles with the justice system would provide fodder for any number of Hollywood movies. And Dotcom is of course is not his real name – here in his native Germany, his real name is Schmitz.
The live-streamed press conference he gave on Sunday morning to launch his new Internet service – Mega – was perfectly staged. Performers clad as native New Zealanders danced to a song that had overtones of a battle hymn.
For the launch, Dotcom, who hails from the northern German city of Kiel, had selected a particularly symbolic date – January 19. It was on that day last year that New Zealand police raided his estate in Coatesville, arrested Dotcom on suspicion of copyright infringement, and seized a large quantity of items on the premises, shutting down one of the Internet’s biggest websites – Megaupload.
It’s been a year since the raid, and much has happened, especially on Twitter. Dotcom discovered the 140-sign medium’s virtues as a mouthpiece after his release from jail and sent hundreds of tweets. But the most important message was sent last Saturday. At 6:47 PM, Dotcom wrote: "As of this minute one year ago #Megaupload was destroyed by the U.S. government. Welcome to Mega.co.nz."
What followed was a glitch in the otherwise perfect launch – so many people tried to log on immediately after Dotcom’s tweet that the server couldn’t handle it and Mega was unavailable for hours. In the first hour alone, 100,000 were reported to have registered. A few hours later Dotcom claimed over 500,000 registered users. That is huge for a website only a few hours old.
These figures can only be understood in the context of the phenomenal success Mega’s predecessor, Megaupload, enjoyed. On peak days the site had 50 million users. The data sent via its servers sometimes accounted for 4% of worldwide Internet traffic. It was allegedly storing more than 50 petabytes – that's some 51,200 terabytes or 51,200,000,000,000 bytes. When Megaupload was taken down, Internet providers the world over registered the fact in their traffic protocols. So it’s no wonder that many are eager to check out Megaupload’s successor.
Digital encryption for the masses
There are indications that Mega may turn out to be even more successful than Megaupload. While the latter was just one of several similar concepts on the Internet, the idea behind Mega could change the way data is shared – all files are encrypted locally before they’re uploaded.
So Mega servers store files that only the user and those authorized by the user know the content of. It could be a copyrighted video, or illegally copied music. It could also be a cooking recipe. The point is that neither the Internet provider, the police, or – and this is the big legal trick – Kim Dotcom know what’s been uploaded. The idea is simple – what Dotcom doesn’t know can’t land him in jail. If piracy is going on within his servers Dotcom can claim he has no way of knowing. And thus be safe from criminal prosecution.
Mega is using what other storage suppliers like market leader Dropbox also theoretically offer, except that with them it’s up to the user to camouflage content. Mega on the other hand is making encryption available to the masses.
First tests by the American Techblogs suggest that the Dotcom team has done a good job. And upload time is fast, at least when you’re using Google Chrome. User interface is simple and clear, but there is no smart phones and tablet access as of yet. Time will tell just how secure the concept is, although Dotcom claims that the program codes are open source, and that experts are welcome to examine them for security gaps.