Skip to main content

Home/ Indie Nation/ Group items tagged works

Rss Feed Group items tagged

John Lemke

Revisiting The Purpose Of The Copyright Monopoly: Science And The Useful Arts | Torrent... - 0 views

  • If there’s one thing that needs constant reminding, it’s the explicit purpose of the copyright monopoly. Its purpose is to promote the progress of human knowledge. Nothing less. Nothing more.
  • [Congress has the power] to promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.
  • has the power, and not the obligation
  • ...5 more annotations...
  • two kinds of monopolies: copyright monopolies and patent monopolies, respectively. Science and the useful arts. The “science” part refers to the copyright monopoly, and the “useful arts” has nothing to do with creative works – it is “arts” in the same sense as “artisan”, that is, craftsmanship.
  • the purpose of the copyright monopoly isn’t to enable somebody to make money, and never was. Its sole purpose was and is to advance humanity as a whole. The monopoly begins and ends with the public interest; it does not exist for the benefit of the author and inventor.
  • The second thing we note is the “science” part. The US Constitution only gives Congress the right to protect works of knowledge – educational works, if you like – with a copyright monopoly. “Creative works” such as movies and music are nowhere to be found whatsoever in this empowerment of Congress to create temporary government-sanctioned monopolies.
  • Which brings us to the third notable item: “the exclusive right”. This is what we would refer to colloquially as a “monopoly”. The copyright industry has been tenacious in trying to portray the copyright monopoly as “property”, when in reality, the exclusive rights created are limitations of property rights (it prohibits me from storing the bitpatterns of my choosing on my own hardware). Further, it should be noted that this monopoly is not a guarantee to make money. It is a legal right to prevent others from attempting to do so. There’s a world of difference. You can have all the monopolies you like and still not make a cent.
  • The fourth notable item is the “for limited times”. This can be twisted and turned in many ways, obviously; it has been argued that “forever less a day” is still “limited” in the technical sense. But from my personal perspective – and I’ll have to argue, from the perspective of everybody reading this text – anything that extends past our time of death is not limited in time.
John Lemke

Kim Dotcom Teases Megabox, Reveals Exclusive Artists? | TorrentFreak - 0 views

  • Kim Dotcom is determined to put the major music labels out of business with Megabox. At the same time he promises to give artists full control over their own work and a healthy revenue stream. Today Dotcom released a video on the making of Megabox which unveils some of the service’s features. The video also shows “The Black Keys,” “Rusko,” “Two Fingers” and “Will.i.am” as exclusive artists.
  • So why would artists join Megabox in the first place? The goal of Megabox is to give the public access to free music and compensate artists through advertising revenue. Megaupload’s founder believes that this “free music” business model has the potential to decrease music piracy while giving artists proper compensation for their work. This revenue comes from the Megakey application that users have to install. Megakey works like an ad blocker, but instead of blocking ads it replaces a small percentage with Mega’s own ads. Those who prefer not to install the app have the option to buy the music instead.
  • “These new solutions will allow content creators to keep 90% of all earnings and generate significant income from the untapped market of free downloads,” Dotcom said.
John Lemke

'Smartware' clothing could signal impending epileptic seizures - 0 views

  • They are currently working on 'smartware', fabrics that treat chronic wounds that result from diabetes and leg ulcers. Their 'senseware' technology, which is motion sensors found inside textiles, can give medical professionals the tools they need to detect the onset of epileptic seizures. The centre's 'bioware' technology is embedded materials and surfaces found in the home and on the body.
  •  
    "They are currently working on 'smartware', fabrics that treat chronic wounds that result from diabetes and leg ulcers. Their 'senseware' technology, which is motion sensors found inside textiles, can give medical professionals the tools they need to detect the onset of epileptic seizures. The centre's 'bioware' technology is embedded materials and surfaces found in the home and on the body."
John Lemke

OverDrive Dumps WMA, Announces all Audiobooks Sold to Libraries Will be in MP3 Format - 0 views

  • The MP3s do not have DRM (Digital Rights Management), as the WMA formatted books do.
  • OverDrive told librarians that it will work with them to get libraries' old WMA format books converted for free.
  • This is in response to user preferences,
  •  
    Quote "This is in response to user preferences" ... also of note they are going to work with libraries on getting the old WMA converted.
John Lemke

Why The Copyright Industry Is Doomed, In One Single Sentence | TorrentFreak - 0 views

  • In order to prevent copyright monopoly violations from happening in such channels, the only means possible is to wiretap all private digital communications to discover when copyrighted works are being communicated. As a side effect, you would eliminate private communications as a concept. There is no way to sort communications into legal and illegal without breaching the postal secret – the activity of sorting requires observation.
  • Therefore, as a society, we are at a crossroads where we can make a choice between privacy and the ability to communicate in private, with all the other things that depend on that ability (like whistleblower protections and freedom of the press), or a distribution monopoly for a particular entertainment industry. These two have become mutually exclusive and cannot coexist, which is also why you see the copyright industry lobbying so hard for more surveillance, wiretapping, tracking, and data retention (they understand this perfectly).
  • Any digital, private communications channel can be used for private protected correspondence, or to transfer works that are under copyright monopoly. In order to prevent copyright monopoly violations from happening in such channels, the only means possible is to wiretap all private digital communications to discover when copyrighted works are being communicated. As a side effect, you would eliminate private communications as a concept. There is no way to sort communications into legal and illegal without breaching the postal secret – the activity of sorting requires observation.
John Lemke

Little red lawsuit: Prince sues 22 people for pirating his songs | The Verge - 0 views

  • The case, filed as Prince v. Chodera in the Northern District of California, reads, "The Defendants in this case engage in massive infringement and bootlegging of Prince's material." Only two defendants are named in the suit, however — the rest are listed as John Does, though eight do have the distinction of being regarded by their online handles. Nevertheless, Prince, based on "information and belief," alleges that each of the individuals worked together on Facebook and Blogger to conduct infringing activity, and lists extensively the mirror sites and blogs each used to distribute copies of his work. He has thus demanded $1 million with interest in damages from each of the defendants, along with a permanent injunction to prevent all of them from doing further harm.
John Lemke

Paul Foot award: Guardian wins special investigation prize for Snowden files | Media | ... - 0 views

  • Guardian journalists have been recognised at the Paul Foot award 2013 for their work on the investigation into what files leaked by Edward Snowden revealed about the extent of mass surveillance by British and US intelligence agencies.
  • The £2,000 special investigation award,
  • Private Eye and the Guardian set up the Paul Foot award in 2005 in memory of the campaigning journalist, who died in 2004.
  • ...1 more annotation...
  • Ian Hislop, the editor of Private Eye, said: "The results of the Paul Foot award are a closely kept secret. Unless you work in GCHQ when you presumably have known for weeks. However what is not a secret is how impressive the entries are this year, how resilient investigative journalism is proving to be and how optimistic this made the judges feel."
John Lemke

Robert Duncan Begins Prison Sentence For Working In Legal Medical Pot Shop - 0 views

  • Duncan does not have a background in the marijuana industry, and only began working for the dispensary after being laid off from a more traditional sales job as the economy soured. After the raid, he returned to mainstream employment and up until recently was a sales manager at a Bay Area merchandising company; Duncan told The Huffington Post that he wouldn't have taken the pot job if the feds hadn't signaled that they'd steer clear of medical marijuana businesses that were in compliance with state laws."It was shortly after the federal government said it would not intervene if people followed state law," Duncan said. "We wanted to abide by the rules. None of us had criminal backgrounds. We’re all regular guys. The only reason we got into this was because the federal government said they wouldn’t intervene."
John Lemke

RapidGator Wiped From Google by False DMCA Notices | TorrentFreak - 0 views

  • File-hosting service RapidGator has had nearly all of its search results wiped from Google, including many clearly non-infringing pages. The URLs in question were removed by the search engine after a DMCA notice from several copyright holders. RapidGator is outraged and says the overbroad censorship is hurting its business, warning that the same could happen to others. “If it happens to us, it can happen to MediaFire or Dropbox tomorrow,” they state.
  • Thus far this has resulted in more than 200 million URLs being removed from Google’s search engine. While many of these takedown claims are legit, some are clearly false, censoring perfectly legitimate webpages from search results. File-hosting service RapidGator.net is one site that has fallen victim to such overbroad takedown requests. The file-hosting service has had nearly all its URLs de-listed, including its homepage, making the site hard to find through Google. Several other clearly non-infringing pages, including the FAQ, the news section, and even the copyright infringement policy, have also been wiped from Google by various takedown requests.
  • “Our robots.txt forbids search engines bots to index any file/* folder/ URLs. We only allow them to crawl our main page and the pages we have in a footer of the website. So most of the URLs for which Google gets DMCA notices are not listed in index by default,” RapidGator’s Dennis explains.
  •  
    Quoting the article: "File-hosting service RapidGator has had nearly all of its search results wiped from Google, including many clearly non-infringing pages. The URLs in question were removed by the search engine after a DMCA notice from several copyright holders. RapidGator is outraged and says the overbroad censorship is hurting its business, warning that the same could happen to others. "If it happens to us, it can happen to MediaFire or Dropbox tomorrow," they state." This is, sooner or later, going to have to be addressed... It totally works against the concept of the cloud. I can not believe that more people are using the cloud for illegal uses than legit.
John Lemke

NSA reportedly intercepting laptops purchased online to install spy malware | The Verge - 0 views

  • According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access. While the report does not indicate the scope of the program, or who the NSA is targeting with such wiretaps, it's a unique look at the agency's collaborative efforts with the broader intelligence community to gain hard access to communications equipment. One of the products the NSA appears to use to compromise target electronics is codenamed COTTONMOUTH, and has been available since 2009; it's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine.
  • The Der Spiegel report, which gives a broad look at TAO operations, also highlights the NSA's cooperation with other intelligence agencies to conduct Hollywood-style raids. Unlike most of the NSA's operations which allow for remote access to targets, Der Spiegel notes that the TAO's programs often require physical access to targets. To gain physical access, the NSA reportedly works with the CIA and FBI on sensitive missions that sometimes include flying NSA agents on FBI jets to plant wiretaps. "This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work," the report notes.
  •  
    While the scope or the targets are reportedly not known, the article also does not mention anything about a search warrant. This is what happens when the government feels they are above the law.
John Lemke

New Zealand Launched Mass Surveillance Project While Publicly Denying It - The Intercept - 0 views

  • Documents provided by NSA whistleblower Edward Snowden show that the government worked in secret to exploit a new internet surveillance law enacted in the wake of revelations of illegal domestic spying to initiate a new metadata collection program that appeared designed to collect information about the communications of New Zealanders.
  • Those actions are in direct conflict with the assurances given to the public by Prime Minister John Key (pictured above), who said the law was merely designed to fix “an ambiguous legal framework” by expressly allowing the agency to do what it had done for years, that it “isn’t and will never be wholesale spying on New Zealanders,” and the law “isn’t a revolution in the way New Zealand conducts its intelligence operations.”
  • Snowden explained that “at the NSA, I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called ‘X KEYSCORE.”" He further detailed that “the GCSB provides mass surveillance data into XKEYSCORE. They also provide access to the communications of millions of New Zealanders to the NSA at facilities such as the GCSB facility in Waihopai, and the Prime Minister is personally aware of this fact.”
  • ...4 more annotations...
  • Top secret documents provided by the whistleblower demonstrate that the GCSB, with ongoing NSA cooperation, implemented Phase I of the mass surveillance program code-named “Speargun” at some point in 2012
  • Over the weekend, in anticipation of this report, Key admitted for the first time that the GCSB did plan a program of mass surveillance aimed at his own citizens, but claimed that he ultimately rejected the program before implementation. Yesterday, after The Intercept sought comment from the NSA, the Prime Minister told reporters in Auckland that this reporting was referring merely to “a proposed widespread cyber protection programme that never got off the ground.” He vowed to declassify documents confirming his decision.
  • That legislation arose after it was revealed in 2012 that the GCSB illegally surveilled the communications of Megaupload founder Kim Dotcom, a legal resident of New Zealand. New Zealand law at the time forbade the GCSB from using its surveillance apparatus against citizens or legal residents. That illegal GCSB surveillance of Dotcom was followed by a massive military-style police raid by New Zealand authorities on his home in connection with Dotcom’s criminal prosecution in the United States for copyright violations. A subsequent government investigation found that the GCSB not only illegally spied on Dotcom but also dozens of other citizens and legal residents. The deputy director of GCSB resigned. The government’s response to these revelations was to refuse to prosecute those who ordered the illegal spying and, instead, to propose a new law that would allow domestic electronic surveillance.
    • John Lemke
       
      The Dotcom raid was ruled illegal.  Yet the Dotcom spying was exactly the type of activity of this plan.
  • n high-level discussions between the Key government and the NSA, the new law was clearly viewed as the crucial means to empower the GCSB to engage in metadata surveillance. On more than one occasion, the NSA noted internally that Project Speargun, in the process of being implemented, could not and would not be completed until the new law was enacted.
John Lemke

Spy Babe Now Wants to Design Astronaut Outfits | Danger Room | Wired.com - 0 views

  •  
    Is your national space program fashion-forward enough? Astronauts getting a little frumpy after the Cold War? Having trouble getting that space plane off the ground? Why not lift morale and brighten up the place with some fierce new uniforms designed by planet Earth's most infamous ex-spy? Yes, Russia's famously outed sleeper agent Anna Chapman is back in yet another installment of her merciless publicity tour. This time, she's looking to help the ground crew at Khrunichev State Research and Production Space Center work it down the runway in style. Frilly epaulets for all! "Chapman told me that she intends to participate in designing clothing for the Khrunichev [Space] Center, in what capacity, designer or financially, she did not specify," the Gagarin Astronaut Training Center's top astronaut told Russian state media today.
John Lemke

Swedes may soon exchange postage stamps for SMS codes - 0 views

  •  
    that ritual is about to be replaced with a more high-tech one: people may soon be able to pay for their postage via text message, thereby eliminating the need for a stamp. The system works like this: Swedes will be able to send a text message to the postal service saying that they want postage for a letter. The postal service will then presumably charge an account on file, then respond with another text that contains a code. The letter-sender will then write the code on the envelope to show that postage had been paid.
John Lemke

Ohio TV Anchor Discovers Thongs Are Not Tax Deductible | Scene and Heard: Scene's News ... - 0 views

  •  
    Anietra Hamper has been a TV anchor at two Columbus-area stations. In addition to being well-versed in local news and national trends, Hamper also made it a point to keep up her appearance, a key tenet of the talking head gig. From 2005-2008, she worked at NBC4 and then moved on to WBNS until 2010. It was the period from 2005-2008, however, that caught the eye of the IRS. You see, Hamper, in pursuit of beauty, spent gobs of money on clothes, gyms, trainers, manicures, and more. Why does the IRS care? She tried to write off every dime she spent on aesthetic accessories and clothing - a staggering total of $167,356.
John Lemke

White House releases trusted Internet ID plan - security, government, Google, Gary Lock... - 0 views

  •  
    The U.S. government will coordinate private-sector efforts to create trusted identification systems for the Internet, with the goal of giving consumers and businesses multiple options for authenticating identity online, according to a plan released by President Barack Obama's administration. The National Institute of Standards and Technology (NIST) will work with private companies to drive development and adoption of trusted ID technologies, White House officials said. The National Strategy for Trusted Identities in Cyberspace (NSTIC), released by the Department of Commerce on Friday, aims to protect the privacy and security of Internet users by encouraging a broad online authentication market in the U.S. "The fact is that the old password and username combination we often use to verify people is no longer good enough," Commerce Secretary Gary Locke said at an NSTIC release event hosted by the U.S. Chamber of Commerce. "It leaves too many consumers, government agencies and businesses vulnerable to ID and data theft."
John Lemke

Ыtudents develop thought-controlled, hands-free computer for the disabled - 0 views

  •  
    The student team, Ori Ossmy, Ofir Tam and Ariel Rozen, developed the prototype application for their bachelor's degree project under the supervision BGU Prof. Mark Last, Dr. Rami Puzis, Prof. Yuval Lovitz and Dr. Lior Rokah. As part of a recent demonstration, a student composed and sent a hands-free e-mail using only thought combined with the adaptive hardware. The students and BGU team plan to continue research working with the disabled.
John Lemke

BGU Students Develop Thought-Controlled, Hands-Free Computer For The Disabled - 0 views

  •  
    BGU software engineering students have developed innovative technology that could enable people to operate a computer without using a keyboard or mouse - only their brainwaves. While there have been previous attempts to develop devices to read brainwaves and operate specific programs, they were cumbersome and not feasible outside of a laboratory setting. The BGU technology features a helmet equipped with 14 EEG connect points that sense brain activity. According to Dr. Rami Puzis, "The technology is designed to assist those who are physically disabled who might otherwise be unable to manipulate a computer mouse or keyboard." The student team, Ori Ossmy, Ofir Tam and Ariel Rozen, developed the prototype application for their bachelor's degree project under supervision at BGU by Prof. Mark Last, Dr. Rami Puzis, Prof. Yuval Elovich and Dr. Lior Rokah. As part of a recent demonstration, a student composed and sent a hands-free e-mail using only thought combined with the adaptive hardware. The students and BGU team plan to continue research working with the disabled.
John Lemke

The Internet Isn't Broken; So Why Is The ITU Trying To 'Fix' It? | Techdirt - 0 views

  • Of course, internet access has already been spreading to the far corners of the planet without any "help" from the ITU. Over two billion people are already online, representing about a third of the planet. And, yes, spreading that access further is a good goal, but the ITU is not the player to do it. The reason that the internet has been so successful and has already spread as far as it has, as fast as it has, is that it hasn't been controlled by a bureaucratic government body in which only other governments could vote. Instead, it was built as an open interoperable system that anyone could help build out. It was built in a bottom up manner, mainly by engineers, not bureaucrats. Changing that now makes very little sense.
  • And that's the thing. The internet works just fine. The only reason to "fix" it, is to "break" it in exactly the way the ITU wants, which is to favor a few players who have done nothing innovative to actually deserve it.
1 - 20 of 35 Next ›
Showing 20 items per page