Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Piracy

DEFCAD – 3D Printing Torrent Site

Paul Anderson by Paul Anderson
September 22, 2013 - Updated on May 30, 2022
in Piracy, Public
0
DefcadHomepage
94
SHARES
1.6k
VIEWS
Share on FacebookShare on Twitter

Late last year the 3D print torrent website Thingiverse announced that they banned 3D gun designs, citing their terms of service which clearly prohibit files used to make weapons.

You might also like

Silent OS 3.0 for Blackphone Completely revamped

Exploit Kit activity on a steep decline since April

EasyDoc malware infects Macs and routes through TOR

In a reaction, Defense Distributed opened, and the people behind the first 3D printable

gun, opened a website to host the designs that had been banned at Thingiverse. This included the popular blueprints of their own gun “The Liberator.”

The Department of State Office of Defense Trade Controls kindly requested that DEFCAD remove the 3D printable gun documents, mentioning a potential violation of International Traffic in Arms Regulations.

English: Pirate flag during the Pirate Bay trial
English: Pirate flag during the Pirate Bay trial (Photo credit: Wikipedia)

These files were subsequently removed, but DEFCAD was already working on a new project that would prevent government regulation.

“In March of this year, seeing an opportunity to expand the DEFCAD concept to fight the prevailing ideas about intellectual property in the entire physible space, I split Defense Distributed and DEFCAD and turned the latter into another company,” the founder, Cody Wilson told TorrentFreak.

“The idea was to move away from direct hosting to employ the first amendment victories won by Google in the courts and become a meta-search engine as a more robust way of spreading and preserving physibles. We hope to build a piece of infrastructure to help stem the next wave of the IP wars in advance if you will.”

DEFCAD raised a great number of funds and has swiftly rolled out the meta-search engine to the public on DEFCAD.com.

“After the State Department came after Defense Distributed and our hand was forced, I believe the Pirate Bay is still the Pirate Bay of 3D sharing. But nothing would be better than building complementary structures in the spirit of TPB,” Wilson says.

“There was some dissatisfaction with our public testing earlier in the summer. A handful of makers felt like we were taking advantage of Thingiverse’s bandwidth or not adequately respecting their ‘rights’ to their ‘property,’ but since we’ve appointed a DMCA agent we’ve received no takedown requests.”

Tags: 3dPrintingpirate bayTorrentfreak
Share38Tweet24
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Silent OS 3.0 for Blackphone Completely revamped

by Paul Anderson
July 24, 2016 - Updated on May 17, 2022
1
Silent OS 3.0 for Blackphone Completely revamped

Version 3.0 migrates Silent OS to Android Marshmallow 6.0.1 and delivers the Android safety patch level to June 2016. Along with fixes for security vulnerabilities, Silent OS 3.0...

Read more

Exploit Kit activity on a steep decline since April

by Paul Anderson
July 12, 2016
0
Exploit Kit activity on a steep decline since April

As malware writers are moving to Neutrino and RIG exploit kits (EK) for dispersal needs, security experts are investigating how distribution is innovating, and they are generally signaling a huge...

Read more

EasyDoc malware infects Macs and routes through TOR

by Kyle
July 6, 2016
0
EasyDoc malware infects Macs and routes through TOR

Antivirus company, Bitdefender has released an alert regarding a harmful application that infects Macs and connects to the command-and-control servers via Tor. The program, called EasyDoc Converter.app, claims...

Read more

Hummer malware infecting androids earns $3.5 Million a week

by Paul Anderson
July 6, 2016 - Updated on May 17, 2022
0
Hummer malware infecting androids earns $3.5 Million a week

A new Trojan, named Hummer, has been discovered infecting Android phones. The malware creators are earning an estimated $3,500,000 a week or $500,000 a day say researchers at...

Read more

Healthcare sector hit by advanced worms, infects MRI and x-ray machines

by Kyle
July 1, 2016
0
Healthcare sector hit by advanced worms, infects MRI and x-ray machines

MRI, x-ray, and an oncology machines were all found containing malware with code to install backdoors on other connected systems for the purpose of lifting data off the...

Read more
Next Post
New Group Calling themselves the Hidden Lynx Revealed

New Group Calling themselves the Hidden Lynx Revealed

Related News

Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Update-resistant malware infects SonicWall security appliances

Update-resistant malware infects SonicWall security appliances

March 12, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.