From version 4.8 onwards, LimeWire works as a UPnP Internet Gateway Device controller in that it can automatically set up packet-forwarding rules with UPnP-capable routers.
As such, when LimeWire is running and configured to allow it, any files shared are detectable and downloaded on the local network by DAAP-enabled devices (e.g., Zune, iTunes).
[19] Researchers at Cornell University developed a reputation management add-in called Credence that allows users to distinguish between "genuine" and "suspect" files before downloading them.
[22] The software is based on LimeWire 5.6 Beta, and is aimed to allow Windows versions to still work and remove the threat of spyware or adware.
[23][24] A number of forks of LimeWire have been released, many with the goal of giving users more freedom, or in objection to design decisions made by the original developers.
[27] In response to allegations that a current or former member of Lime Wire LLC staff wrote and released the software, the company has stated they were "not behind these efforts.
[33] Prior to April 2004, the free version of LimeWire was distributed with a bundled program called LimeShop (a variant of TopMoxie), which was spyware.
[34] In LimeWire versions before 5.0, users could accidentally configure the software to allow access to any file on their computer, including documents with personal information.
In 2005, the US Federal Trade Commission issued a warning regarding the dangers of peer-to-peer file sharing network usage, due to the risk of identity theft and lawsuits.
The perpetrator had used LimeWire to search other people's computers for inadvertently shared financial information, which he used it to obtain credit cards for an online shopping spree.
[37] In mid-2008, a Macintosh trojan exploiting a vulnerability involving Apple Remote Desktop was distributed via LimeWire affecting users of Mac OS X Tiger and Leopard.
[38] The ability to distribute such malware and viruses was reduced in versions of LimeWire 5.0 and greater, whose default search settings excluded executable files.
It was the key technology behind the now defunct cyber security firm Tiversa which is alleged to have used information from the network to pressure prospective clients into engaging the company's services.
[40] According to a June 2005 report in The New York Times, Lime Wire LLC was considering ceasing its distribution of LimeWire because the outcome of MGM v. Grokster "handed a tool to judges that they can declare inducement whenever they want to".
[42][43] Later in the year, after losing another court battle, with the RIAA, LimeWire was ordered to disable many of its software's capabilities due to the possibility of copyright infringement.
The figure relied on an estimate of thousands of downloads for each of the platform's 11,000 songs[48][49] In May 2011, Gorton agreed to a settlement whereby the company would pay thirteen record labels approximately $105 million.
Mitch Bainwol, chairman of the RIAA, referred to the "resolution of the case [as] another milestone in the continuing evolution of online music to a legitimate marketplace that appropriately rewards creators.