Jump to content


style="text-align: center;">  

Thread Locked

because no one has posted on it for the last 330 days.

If you need to add something to this thread then

 

Please click the "Report " link

 

at the bottom of one of the posts.

 

If you want to post a new story then

Please

Start your own new thread

That way you will attract more attention to your story and get more visitors and more help 

 

Thanks

Recommended Posts

Hello forum,

this is not a request for something to do, it's well explained all over this forum, just want to share a case and add some considerations.

Timeline:

Contacted by a sale representative of Ansys by email (contacts taken from internet website and social networks), located in Europe, attaching a pdf letter intimating the illegal use of Ansys for several years, asking to review the letter in 7 days.

Nothing to hide, I consider myself a polite person, I replied denying all and asking for what he called "evidence".

He asked for a meeting, this was denied, I have no time to waste.

After some more exchange of emails he sent a single log line (saying it was part of the full log) with an ip address, geographical coordinates and an image of google maps.

Replied one more time, last time, reiterating what I were writing in previous emails.

---

Now waiting for a contact from solicitors, and of course all future communications will be ignored.

---

Considerations:

- In my specific case the ip address is not belonging to me (their target)

- Even if the ip address was mine, it's not even relevant in a possible lawsuit; there are very serious past cases in my Country, not relevant to copyright, which stated that it's not possible to link a person to an ip address

- Their logs have no value: logs are txt files and unless of property of a third party legal entity they are simply text files and who knows if they have been altered..

- Even if the logs are authentic I'm quite sure I could be able to sniff the authentic sent packets, forge my own with fake data and send to their piracy control system

- Mac addresses were still not shared; like ip addresses they have even less importance, they can be spoofed or, even more, they can be changed for virtual adapters

- Even if they open a case, most probably they will open it in the court where their company resides (US?); the law, in my Country, says that the case must be opened in the Country of the defedant; they state that the user accomplished to their terms and conditions of their contract when the user installed the pirated copy; however, a sentence in the UK stated that the contract inside a pirated copy has no value and cannot be considered valid

- Do they know what is GDPR? if they can track users, and they can (till now, I know they grab ip addresses and they use wifi tracking), they can be reported to the privacy guarantor in Europe, and I think in UK too..

- Just to give you some "numbers": Ansys sent in this year (2023) an average of 3,5 emails with letters attached per day.

---

All of this was before reading this forum.

 I will update this post for more information on how the situation will evolve, just to have a complete report of this.

 

Special thanks to dx100uk

  • Thanks 2
Link to post
Share on other sites

ignore totally

 

dx

 

  • Like 1

please don't hit Quote...just type we know what we said earlier..

DCA's view debtors as suckers, marks and mugs

NO DCA has ANY legal powers whatsoever on ANY debt no matter what it's Type

and they

are NOT and can NEVER  be BAILIFFS. even if a debt has been to court..

If everyone stopped blindly paying DCA's Tomorrow, their industry would collapse overnight... 

Link to post
Share on other sites

  • Recently Browsing   0 Caggers

    • No registered users viewing this page.

  • Have we helped you ...?


×
×
  • Create New...