Skip to main content

Home/ LumpysCorner/ Group items tagged respect

Rss Feed Group items tagged

John Lemke

With All Due Respect - 0 views

  •  
    An interesting read as to why we phrase it as "with all due respect" and not another way.
John Lemke

What happens with digital rights management in the real world? | Technology | theguardi... - 0 views

  • In 1997's Bernstein v United States, another US appeals court found that code was protected expression. Bernstein was a turning point in the history of computers and the law: it concerned itself with a UC Berkeley mathematician named Daniel Bernstein who challenged the American prohibition on producing cryptographic tools that could scramble messages with such efficiency that the police could not unscramble them. The US National Security Agency (NSA) called such programs "munitions" and severely restricted their use and publication. Bernstein published his encryption programs on the internet, and successfully defended his right to do so by citing the First Amendment. When the appellate court agreed, the NSA's ability to control civilian use of strong cryptography was destroyed. Ever since, our computers have had the power to keep secrets that none may extract except with our permission – that's why the NSA and GCHQ's secret anti-security initiatives, Bullrun and Edgehill, targetted vulnerabilities in operating systems, programs, and hardware. They couldn't defeat the maths (they also tried to subvert the maths, getting the US National Institute for Standards in Technology to adopt a weak algorithm for producing random numbers).
    • John Lemke
       
      This is also why they have a hard on for developing a quantum computer.
  • An increase in the security of the companies you buy your media from means a decrease in your own security. When your computer is designed to treat you as an untrusted party, you are at serious risk: anyone who can put malicious software on your computer has only to take advantage of your computer's intentional capacity to disguise its operation from you in order to make it much harder for you to know when and how you've been compromised.
  • The DMCA's injunction against publishing weaknesses in DRM means that its vulnerabilities remain unpatched for longer than in comparable systems that are not covered by the DMCA. That means that any system with DRM will on average be more dangerous for its users than one without DRM.
  • ...4 more annotations...
  • For example, in 2005, Sony-BMG music shipped a DRM called the "Sony Rootkit" on 51m audio CDs. When one of these CDs was inserted into a PC, it automatically and undetectably changed the operating system so that it could no longer see files or programs that started with "$SYS$." The rootkit infected millions of computers, including over 200,000 US military and government networks, before its existence became public. However, various large and respected security organisations say they knew about the Sony Rootkit months before the disclosure, but did not publish because they feared punishment under the DMCA. Meanwhile, virus-writers immediately began renaming their programs to begin with $SYS$, because these files would be invisible to virus-checkers if they landed on a computer that had been compromised by Sony.
    • John Lemke
       
      How the Sony DRM created serious security issues.  It should also be considered a violation of our civil rights.  Who the hell gave Sony permission to modify my OS!  Furthermore why didn't the OS companies sue Sony?  Likely because they are in bed together.
  • If I was a canny entrepreneur with a high appetite for risk -- and a reasonable war-chest for litigation – I would be thinking very seriously about how to build a technology that adds legal features to a DRM-enfeebled system (say, Itunes/Netflix/Amazon video), features that all my competitors are too cowardly to contemplate. The potential market for devices that do legal things that people want to do is titanic, and a judgment that went the right way on this would eliminate a serious existential threat to computer security, which, these days, is a synonym for security itself.And once anti-circumvention is a dead letter in America, it can't survive long in the rest of the world. For one thing, a product like a notional Itunes/Amazon/Netflix video unlocker would leak across national borders very easily, making non-US bans demonstrably pointless. For another, most countries that have anti-circumvention on the books got there due to pressure from the US Trade Representative; if the US drops anti-circumvention, the trading partners it armed-twisted into the same position won't be far behind.I've talked to some lawyers who are intimate with all the relevant cases and none of them told me it was a lost cause (on the other hand, none of them said it was a sure thing, either). It's a risky proposition, but something must be done. You see, contrary to what the judge in Reimerdes said in 2000, this has nothing to do with whether information is free or not – it's all about whether people are free.
  • The DMCA is a long and complex instrument, but what I'm talking about here is section 1201: the notorious "anti-circumvention" provisions. They make it illegal to circumvent an "effective means of access control" that restricts a copyrighted work. The companies that make DRM and the courts have interpreted this very broadly, enjoining people from publishing information about vulnerabilities in DRM, from publishing the secret keys hidden in the DRM, from publishing instructions for getting around the DRM – basically, anything that could conceivably give aid and comfort to someone who wanted to do something that the manufacturer or the copyright holder forbade.
  • Significantly, in 2000, a US appeals court found (in Universal City Studios, Inc v Reimerdes) that breaking DRM was illegal, even if you were trying to do something that would otherwise be legal. In other words, if your ebook has a restriction that stops you reading it on Wednesdays, you can't break that restriction, even if it would be otherwise legal to read the book on Wednesdays.
John Lemke

Writer Unboxed » A 'Logic Model' for Author Success - 0 views

  • in this age of the “writer as an entrepreneur” responsible for a growing share of the work required to not only create but also sell a book, adding management skills to our repertoire of abilities is not at all a bad idea.
  • as launch time approaches, authors get overwhelmed by thinking that they have to do “everything:” Twitter, Facebook, Goodreads, ad campaigns, bookstore talks, conference panels, media articles, email newsletters, book clubs…you name it.
  • what our goals are beyond sales
  • ...2 more annotations...
  • Based on our mission and our definition of success, we can then work out a manageable set of steps to take in line with our specific interests and goals. We feel more in control and less anxious about having to “do it all.”
  • A more viable definition of success does have a quantitative element, but it doesn’t necessarily mean “number of copies sold or dollars earned.” It can mean other measurable outcomes such as landing a teaching job or a column in a respected publication.
John Lemke

The Complete Flake's Guide To Getting Things Done - Copyblogger - 0 views

  • What we lack is focus. Everything looks good to us.
  • You’re not going to get a damned thing done until you actually know what you want to get out of it.
  • Just know what you want to get out of the thing you’re thinking about doing.
  • ...6 more annotations...
  • “Pivotal Technique,”
  • Step 1. Get nice and clear about what you want. Step 2. Get completely, impeccably, bullshit-free clear about where you are now, with respect to that.
  • Flakes are flaky because the map seems impossible. Productive people are productive because the map seems real. The flakes are actually right, but a fat lot of good that does us. The productivity people follow their imaginary map, and because they’re doing something, they get somewhere. (Curse you, productivity people!)
  • Allen is very smart about this. It has to be the single next thing to take action on.
  • If you can’t do it in 20 minutes, it’s probably not the next action. Find the next action.
  • The plan in 7 reasonably painless steps When you’ve got something to do, figure out what you really want to get out of it. Do the Pivotal Technique. Think about what you want, then get clear about where you are right this minute. Notice the difference. Figure out the next action. Do what you feel like. Rinse, lather, repeat. Start a compost pile for ideas, notes, plans, and insights. Stick to a few primary areas of focus — three or four is a good number for a lot of people.
  •  
    A good article on why "flakes" actually rule.
John Lemke

The Smart Way to Use Other People's Audiences to Build Your Own - Copyblogger - 0 views

  • That’s the basic idea: Get in front of OPA, and then publish fantastic content so you can earn that audience’s respect and trust.
  • Interacting with others, sharing the content of others, and participating in communities are all great ways to generate attention and build an audience.
  • build an audience that is relevant to what you do
  • ...2 more annotations...
  • If you get attribution links as a result of the guest post, then the site and page giving you the link will be closely matched to your site and the specific page receiving the link.
  • You are not a fit for every audience. Don’t worry about it. Pass on opportunities where you can’t bring the good stuff, and focus your energies in the places where you can.
  •  
    As people often say regarding writing, "it is just as much about networking as it is working".  If you blog or write, these are some great ways to build your audience.
1 - 5 of 5
Showing 20 items per page