It doesn't matter how or where the files are hosted, it also doesn't matter where the domains are registered. Simply using a case of abstraction it will be able to be shown who is in effective control of this new network. Then various mitigation strategies can decapitate or at least disable the organization.
Until Kim Dotcom can find a replacement billing system with wide adoption, or clone himself to be in many places at once he's vulnerable.
|