While GitHub did not find sufficient information to determine a valid anti-circumvention claim, we determined that this takedown notice contains other valid copyright claim(s). --- Note: Because the reported network that contained the allegedly infringing content was larger than one hundred (100) repositories, and the submitter alleged that all or most of the forks were infringing to the same extent as the parent repository, GitHub processed the takedown notice against the entire network of 485 repositories, inclusive of the parent repository. --- Note: Because the reported network that contained the allegedly infringing content was larger than one hundred (100) repositories, and the submitter alleged that all or most of the forks were infringing to the same extent as the parent repository, GitHub processed the takedown notice against the entire network of 144 repositories, inclusive of the parent repository. --- Note: Because the reported network that contained the allegedly infringing content was larger than one hundred (100) repositories, and the submitter alleged that all or most of the forks were infringing to the same extent as the parent repository, GitHub processed the takedown notice against the entire network of 310 repositories, inclusive of the parent repository. --- Pursuant to 17 U.S.C. § 512(c)(3) and 17 U.S.C. § 1201(a)(2) Date: [private] To: GitHub, Inc. Attn: DMCA Agent / Section 1201 [private] [private] [private] Via: [private] From: Remove Your Media LLC I. NATURE OF THIS NOTICE This notice addresses violations of the anti-circumvention provisions of 17 U.S.C. § 1201(a)(2). The repositories identified herein traffic in technology that facilitates circumvention of technological protection measures implemented by authorized streaming services (including Crunchyroll, Funimation, VIZ Media, and other licensed platforms) to control access to copyrighted audiovisual works. These tools provide automated access to unauthorized copies of protected content distributed through piracy infrastructure ([private] / [private]), thereby circumventing the subscription paywalls, digital rights management, and access controls that rights holders employ to protect their works. II. COMPLAINANT IDENTIFICATION Company: Remove Your Media LLC Address: [private] Email: [private] Phone: [private] Role: Authorized representative of copyright holders including Crunchyroll LLC, VIZ Media LLC, and other anime content owners who distribute their works through licensed platforms protected by technological access controls. III. TECHNOLOGICAL PROTECTION MEASURES OF RIGHTS HOLDERS This section describes the access controls implemented by our clients that these tools effectively circumvent. A. Access Controls Implemented by Licensed Platforms Our clients control access to their copyrighted anime content through multiple technological protection measures: 1. Subscription Paywalls: Platforms such as Crunchyroll, Funimation, and HIDIVE require paid subscriptions to access their full catalogs of licensed anime content. 2. Digital Rights Management (DRM): Licensed platforms employ DRM technologies to prevent unauthorized copying and redistribution of video streams. 3. Geographic Access Controls: Content is licensed on a territorial basis, with geo-blocking ensuring content is only accessible in regions where distribution rights have been secured. 4. Authentication Systems: User account authentication ensures only authorized subscribers can access premium content. B. How These Tools Circumvent Rights Holders' Access Controls The repositories identified in this notice circumvent these access controls by: 1. Providing Unauthorized Access: The tools extract streaming URLs from [private] and [private], piracy services that host unauthorized copies of content that should only be available through licensed, paid platforms. By automating access to these pirated copies, the tools provide a circumvention pathway around the subscription paywalls of legitimate services. 2. Bypassing DRM Through Pirate Sources: Rather than attempting to break the DRM on licensed platforms directly, these tools access content that has already been stripped of DRM protections and redistributed through piracy infrastructure. The effect is identical: users gain access to content without paying rights holders or respecting their access controls. 3. Defeating Geographic Restrictions: The piracy infrastructure these tools access has no geographic restrictions, effectively circumventing the territorial licensing controls implemented by rights holders. 4. Eliminating Authentication Requirements: These tools require no user authentication or subscription, circumventing the account-based access controls of licensed platforms. IV. PIRACY INFRASTRUCTURE ENABLED BY THESE TOOLS The circumvention tools target the following piracy-as-a-service infrastructure: - [private] : A notorious piracy site hosting unauthorized copies of anime licensed to our clients. Listed in the MPA's 2025 Notorious Markets report. - [private] : A video hosting service designated as "Piracy-as-a-Service" in the MPA's 2025 Notorious Markets report (formerly [private]). [private] hosts the unauthorized video files that HiAnime.to embeds. These services host content that has been pirated from licensed platforms, stripped of DRM, and made available without authorization. The GitHub tools automate and scale access to this pirated content. V. CIRCUMVENTION DEVICE REPOSITORIES A. Primary Target: Decryption Key Distribution Repository: https://github.com/yogesh-hacker/MegacloudKeys Function: Distributes cryptographic keys enabling extraction of video streams from MegaCloud's piracy infrastructure. These keys are essential for the circumvention tools to function and provide unauthorized access to content that rights holders distribute exclusively through protected, licensed platforms. § 1201(a)(2) Analysis: This repository is primarily designed for circumvention, has no commercially significant purpose other than enabling unauthorized access to copyrighted content, and is marketed (through its use by other circumvention tools) for circumventing access controls. B. Core Circumvention Library Repository: https://github.com/ghoshRitesh12/aniwatch Circumvention Code: src/extractors/megacloud.ts Function: Implements stream extraction from piracy infrastructure, using keys from the MegacloudKeys repository. This library enables automated, scalable access to unauthorized copies of content protected by our clients' access controls. C. API Implementation Repository: https://github.com/ghoshRitesh12/aniwatch-api Forks: 414+ (as of date of notice) Function: REST API exposing circumvention functionality, enabling third-party applications to programmatically access pirated content without interacting with legitimate, protected platforms. D. Additional Circumvention Implementations The following repositories implement similar circumvention functionality: https://github.com/yahyaMomin/hianime-API https://github.com/IrfanKhan66/hianime-mapper https://github.com/Shalin-Shah-2002/Hianime_API https://github.com/ayanrajpoot10/hianime-api https://github.com/itzzzme/anime-api VI. ABSENCE OF SUBSTANTIAL NON-INFRINGING USE These tools have no substantial non-infringing use: 1. Target Exclusively Piracy Infrastructure: The tools are specifically designed to extract content from [private] and [private], which host exclusively unauthorized content. There is no licensed, legitimate content on these platforms. 2. No Creative Commons or Public Domain Content: Unlike [private] (which hosts user-generated and public domain content), HiAnime.to hosts only commercially-produced anime that is available through licensed channels. 3. Designed to Evade Payment: The explicit purpose of these tools is to access content without using (and paying for) the licensed platforms where this content is legitimately available. VII. DISTINCTION FROM [private] This matter is distinguishable from the [private] takedown (October 2020) that was reversed: - No Legitimate Content: [private] hosts substantial non-infringing content (Creative Commons, public domain, user-generated). [private] hosts exclusively pirated commercial content. - No Legitimate Use Cases: [private] had legitimate uses (journalists, accessibility, archiving personal uploads). These tools exist solely to access pirated anime. - Targets Piracy Infrastructure: [private] accessed a legitimate platform. These tools specifically target sites designated in the MPA's Notorious Markets report as piracy operations. VIII. REQUESTED ACTION We request that GitHub: - Remove yogesh-hacker/MegacloudKeys - Remove ghoshRitesh12/aniwatch - Remove ghoshRitesh12/aniwatch-api and forks containing circumvention code - Remove the additional implementations listed in Section V.D IX. REQUIRED DECLARATIONS I declare under penalty of perjury that: - I am authorized to act on behalf of the copyright owners whose works are made available through licensed platforms protected by access controls that these tools circumvent. - I have a good faith belief that the repositories identified herein traffic in circumvention devices in violation of 17 U.S.C. § 1201(a)(2). - The information in this notice is accurate. - I understand that abuse of this process may result in liability under 17 U.S.C. § 512(f) Based on the representative number of forks I have reviewed, I believe that all or most of the forks are infringing to the same extent as the parent repository. Each of these fork networks contains the same circumvention code as its parent — specifically, the MegaCloud/HiAnime stream extraction functionality that provides automated access to pirated anime content in violation of 17 U.S.C. § 1201(a)(2). The forks do not introduce any legitimate, non-infringing functionality that would distinguish them from their parent repositories. Respectfully submitted, [private] Authorized agent Company: Remove Your Media LLC