Source: https://repo.zenk-security.com/Others/La bataille Hadopi.pdf