Seriously there have been exploits in the past for turning somebodies computer on the Gnutella network into a remote proxy, tricking it into downloading whatever you want it to, from whatever server you want it to, and storing it in its shared files ( which actually allows you to turn Gnutella into an anonymity network for yourself as well ) . I wonder how many people arrested for sharing CP on this network even realize that such an attack is possible. In the majority of cases I highly HIGHLY doubt that the forensic analysts (who are sometimes trained for only a few months prior to being certified) going over the seized computers realize that such an attack is possible. They are not trained to look for things like this, they are trained to run P2P spidering software and basic software forensic tools that do all of the real work for them. Guess what, anybody who went to prison for having CP obtained from the Gnutella network, or who went to prison for having CP while running one of the many vulnerable Gnutella clients, did NOT get a fair trial if they did not know about this attack! www.ics.forth.gr/~elathan/papers/gdos.acns06.pdf This attack can be used to get arbitrary people to download CP and put it in their shared files, and if it is carried out correctly Mr. 6 month forensic certificate is not going to be able to tell that this is what happened. Forensic analysts often are not going to be able to tell if somebody fell victim to this attack or if they actually downloaded and shared CP. And yet there are hundreds of thousands of people in prison right now for having downloaded CP off of gnutella and shared it. And probably NONE of them know about this!