There are lots of ways around these restrictions: One of the criticisms of such rules isn???t that they are too invasive, but that they don???t work against the really hard-core file-sharers that are allegedly the target of this strategy ??? since virtual private networks, proxy addresses, cloaking software and other tools can make it almost impossible to detect infringing downloads.