Skip to main content

Home/ LumpysCorner/ Group items tagged law

Rss Feed Group items tagged

John Lemke

RIAA lobbyist becomes federal judge, rules on file-sharing cases - 0 views

  •  
    according to the Center for Responsive Politics. Between 2004-2009, Howell was the only listed lobbyist at the firm; the RIAA was her exclusive lobbying client for most of that time. A lobbyist disclosure form describes her as working on "legislation concerning copyright laws as applied to digital music"-which she would be well-placed to do, having previously helped to write such laws.
John Lemke

What happens with digital rights management in the real world? | Technology | theguardi... - 0 views

  • In 1997's Bernstein v United States, another US appeals court found that code was protected expression. Bernstein was a turning point in the history of computers and the law: it concerned itself with a UC Berkeley mathematician named Daniel Bernstein who challenged the American prohibition on producing cryptographic tools that could scramble messages with such efficiency that the police could not unscramble them. The US National Security Agency (NSA) called such programs "munitions" and severely restricted their use and publication. Bernstein published his encryption programs on the internet, and successfully defended his right to do so by citing the First Amendment. When the appellate court agreed, the NSA's ability to control civilian use of strong cryptography was destroyed. Ever since, our computers have had the power to keep secrets that none may extract except with our permission – that's why the NSA and GCHQ's secret anti-security initiatives, Bullrun and Edgehill, targetted vulnerabilities in operating systems, programs, and hardware. They couldn't defeat the maths (they also tried to subvert the maths, getting the US National Institute for Standards in Technology to adopt a weak algorithm for producing random numbers).
    • John Lemke
       
      This is also why they have a hard on for developing a quantum computer.
  • An increase in the security of the companies you buy your media from means a decrease in your own security. When your computer is designed to treat you as an untrusted party, you are at serious risk: anyone who can put malicious software on your computer has only to take advantage of your computer's intentional capacity to disguise its operation from you in order to make it much harder for you to know when and how you've been compromised.
  • The DMCA's injunction against publishing weaknesses in DRM means that its vulnerabilities remain unpatched for longer than in comparable systems that are not covered by the DMCA. That means that any system with DRM will on average be more dangerous for its users than one without DRM.
  • ...4 more annotations...
  • For example, in 2005, Sony-BMG music shipped a DRM called the "Sony Rootkit" on 51m audio CDs. When one of these CDs was inserted into a PC, it automatically and undetectably changed the operating system so that it could no longer see files or programs that started with "$SYS$." The rootkit infected millions of computers, including over 200,000 US military and government networks, before its existence became public. However, various large and respected security organisations say they knew about the Sony Rootkit months before the disclosure, but did not publish because they feared punishment under the DMCA. Meanwhile, virus-writers immediately began renaming their programs to begin with $SYS$, because these files would be invisible to virus-checkers if they landed on a computer that had been compromised by Sony.
    • John Lemke
       
      How the Sony DRM created serious security issues.  It should also be considered a violation of our civil rights.  Who the hell gave Sony permission to modify my OS!  Furthermore why didn't the OS companies sue Sony?  Likely because they are in bed together.
  • If I was a canny entrepreneur with a high appetite for risk -- and a reasonable war-chest for litigation – I would be thinking very seriously about how to build a technology that adds legal features to a DRM-enfeebled system (say, Itunes/Netflix/Amazon video), features that all my competitors are too cowardly to contemplate. The potential market for devices that do legal things that people want to do is titanic, and a judgment that went the right way on this would eliminate a serious existential threat to computer security, which, these days, is a synonym for security itself.And once anti-circumvention is a dead letter in America, it can't survive long in the rest of the world. For one thing, a product like a notional Itunes/Amazon/Netflix video unlocker would leak across national borders very easily, making non-US bans demonstrably pointless. For another, most countries that have anti-circumvention on the books got there due to pressure from the US Trade Representative; if the US drops anti-circumvention, the trading partners it armed-twisted into the same position won't be far behind.I've talked to some lawyers who are intimate with all the relevant cases and none of them told me it was a lost cause (on the other hand, none of them said it was a sure thing, either). It's a risky proposition, but something must be done. You see, contrary to what the judge in Reimerdes said in 2000, this has nothing to do with whether information is free or not – it's all about whether people are free.
  • The DMCA is a long and complex instrument, but what I'm talking about here is section 1201: the notorious "anti-circumvention" provisions. They make it illegal to circumvent an "effective means of access control" that restricts a copyrighted work. The companies that make DRM and the courts have interpreted this very broadly, enjoining people from publishing information about vulnerabilities in DRM, from publishing the secret keys hidden in the DRM, from publishing instructions for getting around the DRM – basically, anything that could conceivably give aid and comfort to someone who wanted to do something that the manufacturer or the copyright holder forbade.
  • Significantly, in 2000, a US appeals court found (in Universal City Studios, Inc v Reimerdes) that breaking DRM was illegal, even if you were trying to do something that would otherwise be legal. In other words, if your ebook has a restriction that stops you reading it on Wednesdays, you can't break that restriction, even if it would be otherwise legal to read the book on Wednesdays.
John Lemke

Hyperlink with care, website owners urged :: Freelance UK - 0 views

  • Website owners should use hyperlinks carefully, such as by checking they are not linking to subscription-only content and that the terms of the site linked to permit such an action.
  • Under the directive, right holders have the power to control the online communication to the public of their works – the so called "communication to the public right".
  • “The door was left open to find the right infringed where for example the hyperlinks point to material only available via a subscription.
  • ...2 more annotations...
  • The court also did not address
  • if the website linked to expressly prohibited links or required prior permission in its website terms and conditions or what if these terms prohibited commercial re-use.
  •  
    Sad that we have to worry about sending other sites traffic.
John Lemke

USB Implementers Forum Says No to Open Source - 0 views

  • Please immediately cease and desist raising funds to purchase a unique USB VID for the purpose of transferring, reselling or sublicensing PIDs and delete all references to the USB-IF, VIDs and PIDs for transfer, resale or sublicense from your website and other marketing materials.
  • Arachnid Labs had an interesting idea to solve this problem. Since other USB device vendors such as Microchip and FTDI give away USB PIDs for free, a not for profit foundation could buy a VID, give PIDs away to foundation members making open source hardware, and we would all live in a magical world of homebrew devices that are certified as USB compliant.
John Lemke

Telecom Musical Chairs: Regulators And Lobbyists Swap Roles, Everyone Wins! (Except The... - 0 views

  • Baker is no stranger to questionable revolving door moves, seeing as just months after she voted to approve Comcast's merger with NBC Universal, she took a top lobbying job with Comcast.
  • the current head of the FCC, Tom Wheeler, previously was CEO of CTIA as well. And prior to that he was CEO of NCTA (the cable industry's main lobbying group). And, to top it off, the current head of CTIA is none other than former FCC chair Michael Powell.
  • the top two lobbying organizations on these issues are manned by former top officials and the current top FCC official used to run both those organizations
John Lemke

15 Shocking Facts You Don't Know About Weed - weather.com - 0 views

  • But research on its long-term medical effects — and its impact on healthy individuals — has been hampered by the federal government’s stance on its legality, he continued. “Pharmaceutical development has been thwarted by the federal government’s seeming unwillingness to have new scientific discovery supplant long-standing ideology.”
John Lemke

Compound Plurals - 0 views

  • In regard to American usage, the Chicago Manual of Style recommends that writers consult Merriam-Webster’s Collegiate Dictionary for “tricky” compounds like fathers-in-law, courts-marital, and chefs d’oeuvre, adding, “For those not listed, common sense can usually provide the answer.”
  • Compound nouns are of three kinds: open, closed, and hyphenated.
  • Some speakers have trouble with nouns that end in -ful, puzzling, for example, between cupfuls and cupsful. This is a case in which common sense should probably advise against consulting M-W. Although the M-W entries for cupful, handful, and armful list the plurals cupfuls, handfuls, and armfuls first, they give cupsful, handsful, and armsful as alternative spellings. In addition, the spelling handfull is in there as an “also.” My American spellchecker does not countenance any of these alternatives. Cupsful doesn’t cut it because compound nouns are made up of two or more words that can be used on their own. For example, the words in the compound policeman can be used separately: “The man called for the police.” The element ful in cupful is not a word; it’s a suffix. Common sense tells me that cupsful is incorrect.
1 - 7 of 7
Showing 20 items per page