Control the backend: ACE shuts down AnimePlay’s APK by seizing 29 GitHub repos and hosting in Riau
ACE (the Alliance for Creativity and Entertainment) has dismantled AnimePlay — an Android APK-based piracy app run from Riau, Indonesia — by seizing its entire backend: 29 GitHub repositories with source code, servers, databases, advertising tools, 15 domains and the hosting environment. AnimePlay had operated since 2020, amassed more than 5 million registered users and stored over 60 terabytes of unauthorized anime content; the scale and the surrendered backend explain why this takedown is rare and operationally significant.
Who this approach fits — and who should pay attention
Rights holders and major studios that supply ACE’s coalition — more than 50 companies including Disney, Netflix, Warner Bros. Discovery, Amazon, Paramount and Sony Pictures — will find the AnimePlay seizure relevant because it shows a path to disable high‑impact mobile piracy in markets dominated by Android apps. ACE’s action targeted an APK-based distribution model rather than a simple website, so content owners that see theft routed through apps rather than browser portals are the primary audience for this tactic.
Local law enforcement, hosting providers, and ad networks in Southeast Asia should also monitor this model: the operator cooperated and surrendered code and infrastructure, enabling ACE to take control. That cooperation, combined with the app’s concentration (5M users, 60+ TB of content), made a backend seizure decisive in Riau — a combination not always present in smaller or more distributed operations.
Concrete signals that made the AnimePlay seizure possible
Two practical signals enabled ACE’s success. First, full developer access existed: the operator handed over 29 GitHub repositories containing the app’s source code and tooling plus backend servers and databases, which let ACE disable not only the front end but the operational core. Second, the service’s infrastructure was centralized enough to seize — ACE took 15 associated domains and the entire hosting environment offline, removing the immediate ability to relaunch.
This contrasts with typical website takedowns that often leave mirrors, forks, or new domains intact. ACE’s campaign followed a similar pattern of escalation after its dismantling of Photocall TV (a large TV piracy platform with 26 million annual users), indicating the coalition is expanding from web portals into mobile‑first ecosystems where the backend — not just the public site — is the critical choke point.
Decision checkpoints for attempting a backend seizure
| Condition | Why it matters | AnimePlay example | Recommended action |
|---|---|---|---|
| Operator cooperation or identifiable developer | Surrenders code or credentials shorten takedown time and legal complexity | Operator surrendered 29 GitHub repos and admin access | Proceed if cooperation confirmed; prioritize preservation orders |
| Centralized hosting and domain control | Seizable infrastructure prevents quick relaunches | 15 domains and hosting environment seized | Proceed when hosting jurisdiction allows seizure; involve local police |
| Code and data completeness | Complete source + DB access blocks rebuilds and preserves evidence | Full source code, databases, and ad tooling were handed over | Proceed if integrity of materials can be verified; seek forensic imaging |
| Distribution model is APK / mobile‑first | Mobile apps change resale and rebrand dynamics vs. websites | AnimePlay was an APK with 5M registrations since 2020 | Adjust tactics: include app stores, ad partners, and repo hosts in legal actions |
| Evidence of scale and commercial harm | Higher-impact targets justify resource‑heavy seizures | 60+ TB of infringing content; wide Indonesian user base | Proceed when scale thresholds meet coalition priorities |
In short: move forward only when you can document developer control, locate centralized hosting, and verify that code and data are accessible for seizure. If any of these checkpoints fail — for example, if code is fragmented across encrypted repositories or infrastructure is globally distributed — the return on a seizure falls and alternate tactics (litigation, ad-network pressure, or app‑store takedown campaigns) may be preferable.
Quick questions
Q: Does seizing repos guarantee the app can’t reappear? A: Not guaranteed — it prevents immediate relaunch if the operator lacks copies or collaborators, but determined actors can replicate from offsite backups or mirrors unless those are also controlled.
Q: Should every national enforcement agency attempt this? A: No — jurisdictions with weak legal authority over hosting or repos will struggle to effect lasting change; ACE coordinated with local channels in Indonesia to make this possible.
When to hold back and what to monitor next
Hold off on backend seizure if evidence shows distributed or resilient architectures: multi‑cloud hosting, encrypted or forked repositories, or broad developer teams spread across jurisdictions increase the cost and reduce the chance of stopping a relaunch. In such cases, targeted civil litigation, takedown requests to ad platforms, or coordinated app‑store removals can be better short‑term choices.
Watch two developments closely over the next 6–12 months: whether ACE repeats backend seizures as standard practice (it followed the Photocall action with AnimePlay) and how operators adapt — likely changes include code mirroring, encrypted repositories, use of third‑party CI/CD that obscures origin, and more reliance on decentralized distribution. Those adaptations will change the threshold at which a backend seizure is the most effective intervention.

