




Slashback: Blaster, Sabers, Canada 317
Art of the Saber Jagaast writes "As a counterpoint to all the hype about the Star Wars kid, here's a Star Wars fan film that's actually very well done. Art of the Saber is 'a light saber fight sequence with the flavor of a Hong Kong martial arts action movie.' Well worth watching." Update by J : I've made torrents available.
Vote early, often, and reversably. An anonymous reader writes "As a follow up to a previous story here on Slashdot on electronic voting, Excite has a story on the same subject with a bit more information including this amazing quote from Deborah Seiler, Diebold's West Coast sales representative: '"These activists don't understand what they're looking at," Seiler said.'"
GSM-crack paper online morcheeba writes "Copies of the GSM-crack paper described in last week's Slashdot article are now available online (PDF) thanks to John Young's Cryptome"
Mandrake ads...take 2 *no comment* writes "Apparently there has been some controversy over the ads in the upcoming Mandrake 9.2. I thought it was pretty cut & dried, but apparently Mandrake thought it was enough of a controversy to to release a written statement about it. I wonder how many flames were posted in the slashdot forum using the download version of Opera."
Blaster Worm still alive and well on MIT campus fwc writes "MIT still has 900 network drops disabled due to the Blaster worm infection. Of particular interest is that MIT network security requires users to reformat their hard drive and re-install their operating system before they get back on the network. Sounds like a good excuse to reinstall something other than a Microsoft operating system."
A big AWOOOGAH for Canadian file sharers.
Rumor writes in response to a recent story suggesting that Canadian users could swap files scot-free: "Listen, Canadians, don't go using your p2p apps and thinking you are immune from lawsuit, you are liable for copyright infringement if you share files on p2p apps.
To wit: a fellow law student and I have written an
analysis of s. 80 of the Copyright Act and we've
concluded that one can download music safely under the Private Copying provision, but no one can share or upload files without infringing on copyright.
In a nutshell, Private Copying allows anyone to make a
copy of a song purely for their own use. As you
probably know, when you share files and someone
downloads from you, what actually happens is that
their computer makes a request and your computer
actually sends the file to them. Thus, you're copying
for someone else's use and infringing. It doesn't
matter if you didn't realize that's what happens,
either... intent is not required for infringement.
The upside is that you can accept copies from other
people (ie. download) all you want. Although there
might be an issue of contributory infringement to
worry about... I won't go into analyzing that, since
so far the record companies are only suing uploaders.
The article can be found on greplaw.
I've recently confirmed this analysis with an IP law professor at my university, so I'm pretty damn sure of it. So, please, be aware of this danger. Downloading cool, uploading/sharing not. I
guess the situation still better than nothing."
Why not ask for your money back? zaaj writes "There are several articles out about a newly found/fixed(openssh.org) buffer management bug in OpenSSH and some derivatives. Cisco's Advisory only mentions DoS attacks against certain of their SSH-enabled devices, but ZDNet's article hints at rumors of long-existing root exploits. Regardless, RedHat's got their typical list of updated packages with the patch back-ported. A few other distro's have info in the vendor section of Cert's advisory CA-2003-24"
Blaster, Sabers, Canada? (Score:5, Funny)
Re:Blaster, Sabers, Canada? (Score:5, Funny)
Yes, only they call it "Hoth"
Re:Blaster, Sabers, Canada? (Score:2)
Re:Blaster, Sabers, Canada? (Score:2)
Re:Blaster, Sabers, Canada? (Score:2)
Apache section? (Score:4, Interesting)
Re:Apache section? (Score:3, Funny)
Yes, timothy's mouse wheel slipped
Re:Apache section? (Score:3, Funny)
The editor forgot to hit preview.
Re:Apache section? (Score:3, Funny)
The editor forgot to hit preview.
At least Timmy didn't archive this one too.
GSM-crack paper online... (Score:5, Funny)
I dunno what's the world coming to?
You can buy crack rock on the street and get crack paper online so what's next, crack scissors from your local hardware store?
P2P (Score:5, Funny)
1) Request a file
2) Ask "Is bit #0 a 1"
3) Get a response, write the appropriate bit to a disk (or buffer).
4) Repeat for the other 9238472093847 bits.
Now, here we're not copying anything. We're just asking about it in a way that lets us make an educated guess about the contents of the file. How can that be illegal!?
Re:P2P (Score:4, Interesting)
Assume about
While a neat idea (and sarcastic at that!) the usability people may raise questions.
jason
Re:P2P (Score:5, Interesting)
Is bit 0 a 1?
Is bit 1 a 1?
Is bit 2 a 1?
Is bit 3 a 1?
Then gzip it and send it via some standard TCPIP protocol.
The server would then just generate a similar file saying:
Yes, bit 0 is a 1
Yes, bit 1 is a 1
No, bit 2 is not a 1
Yes, bit 3 is a 1
Re:P2P (Score:4, Funny)
Sheesh, either some people are missing the joke or the grandparent post is joking, or you (parent post) is joking.
Re:P2P (Score:3, Interesting)
That's an interesting idea, but I don't think it'll hold water in court. Remember, MP3s are also machine-made derivatives of the original music tracks, and quite different data-wise from raw music - but courts have no problems holding that as copyright infringement. In the end, all that matte
Re:P2P (Score:5, Interesting)
Remember those college students that just ran an indexing web page listing all of the songs on their fellow students' shared folders? They didn't share the files themselves, but they're now working their way out of debt thanks to the RIAA.
There are hundreds of ways of actually transfering the file without attracting undue attention (Waste would be my favorite at the moment). But how do I find the person who has that file that I want when he's not telling the world that he has it because the world includes that suit-happy association whose business model it obliterates?
How do I find that person?
Seriously, I want to know. I'd like to borrow some of his/her CDs for personal use. Of course, I have some to lend as well...
Re:P2P (Score:3, Interesting)
How do I find that person?
Simple. A P2P client with a licence that specifically disallows use by the RIAA/MPAA, it's employees, agents, etc. If they use it, they infringe the author's copyright, which is what they say they're trying to uphold.
Then, an encrypted protocol that's illegal for them to hack und
Re:P2P (Score:5, Funny)
1) Request a file
2) Ask "Is bit #0 a 1"
3) Get a response, write the appropriate bit to a disk (or buffer).
4) Repeat for the other 9238472093847 bits.
Client: "Is bit #2A389D1 a 1?"
Host: "Go fish!"
Fine (Score:3, Funny)
;-)
Re:P2P (Score:2)
As opposed to insightful or interesting?
Re:P2P (Score:5, Interesting)
Although I might "share" a file, I never give away the whole thing. I only offer very tiny bits of a file to anyone who asks.
AFAIK, copyright law permits giving away small"excerpts" of copyrighted materials.
So provided I never permit upload of the whole file to a single downloader, would I be in the clear?
Re:P2P (Score:4, Insightful)
Give it up, the law does not look kindly upon those looking for a loophole (unless you've made a large campaign contribution).
Re:P2P (Score:2, Insightful)
Now how you deal with the pissed off librarians (who fought for the right to those excerpts) is whole other question/issue.
P.S IANALibrarian
Re:P2P (Score:3, Funny)
Didn't seem to have worked for napster...
"99% and you disconnect me?! No! You fucker! Die! Die! Die! Nooooooooooo!"
Re:P2P (Score:3, Funny)
I think you just did.
Re:P2P (Score:2)
Not the asking bit by bit, as the overhead would kill throughput, but what if we broke peices of the data into mathematical equations, and sent the equations instead? If I can send something like (bare with me here, I suck at math...
It's simply passing formulas, and if I happen to know what "x" is, then I might h
Re:P2P (Score:2)
And I wasn't _really_ joking about the above protocol. Maybe we should do it more than a bit at a time
Re:P2P (Score:2)
The key problem isn't how you send the data, but rather when someone sniffs your data, can they beyond a reasonable doubt prove that you are stealing music/movies, etc... if you use formulas (with variables that you don't transmit) there is no way for them to prove you stole anything... even if plunking in a certain value
Re:P2P (Score:2)
mp3 isn't a copy of the file, it's just a copy of a representation of it.
Yes, but an mp3 has all the parts required to get the 'lossy' copy back on the other end... I propose not transmitting everything that is required, thus saving your ass if you get hauled to court, since they can't take what was transmitted to you and come up with incriminating evidence.
You simply got a bunch of formulas. You get the keys elsewhere... and I can hear the next argument, why not
Re:P2P (Score:5, Insightful)
Similarily (in the UK at least), you can't get around paying for a TV licence by doing something stupid like sending it over ethernet and routing it via your printer or something
Re:P2P (Score:2)
Just playing devil's advocate here. Loopholes are ways to get around the "intent and result" you mention. And ideas like the grandparent post may be valid loopholes.
Re:P2P (Score:3, Informative)
Actually, I've got a funny little story about exactly that. The US have (had?) this funny law about exporting strong crypto.
Now, this law only covered the electronic implementation of the crypto systems. If you remember Phil Zimmerman of PGP fame
Re:P2P (Score:2)
Wouldn't that mean that if you're downloading a 20 meg file, you'd be sending out 20 megs worth of data?
Re:P2P (Score:2)
However, this would be very similar to using analog methods to record music from the radio or the soundcard.
Someone correct me if I'm wrong, please.
*still chuckling*... A very clever idea indeed. Would this mean that once the original material has been verified elsewhere, that the subsequent information can be shared wholesale? ie: shared normally through p2p.
openssh 3.7.1 STILL gots holes (Score:4, Interesting)
may I suggest a nice bottle of '01 -fstack-protector?
You can, but you'd be wrong... (Score:4, Interesting)
draconian, defined. (Score:5, Interesting)
That's a draconian policy if I've ever heard of one!
To reformat you need to backup - and if you have more data to backup than some puny CDRs? and you can't get on the network to backup onto your friend's gigantic file server that he has kindly carved out a nice chunk for you for a week? and I have a laptop so it's not exactly a good idea to be pulling drives out?
all practical concerns I'd face if I was part of the MIT network - but glad that I am not on the MIT network, and that blaster didn't come my way. heh...
poor suckers who'd have similar problems with me, though - maybe that kind of explains why there are still so many people un-connected... they are all looking for used tape drives...
Re:draconian, defined. (Score:2, Interesting)
You get a hub and some cables and some private IP addresses and you get to work. That doesn't make the policy any less draconian, though.
Re:draconian, defined. (Score:2, Insightful)
Grab a knoppix (or similiar) disk and upload that why.
Reboot. Install. Retrieve.
Re:draconian, defined. (Score:2, Funny)
1) reformat harddrive
2) reinstall windows from the CD, (back to the version without Service Packs, security updates, etc.)
3) Get network access reenabled
4) Pray MSUpdate is faster downloading and installing all the updates than MSBlaster et al. is at find the vulnerabilities that used to be patched.
Re:draconian, defined. (Score:3, Funny)
1) Reformat hard drive
2) Reinstall Windows from CD
3) Install the patch from CD
4) Get network access reenabled
5) Ignore recommendations and never touch Windows Update, never intall a firewall, and never install antivirus software.
6) Get hit by the next Windows worm.
7) Go to step 1. Do not ???, do not Profit!
Re:draconian, defined. (Score:3, Insightful)
1. Call your buddy to clean the computer, or do it yourself since it's simple
2. Call IT support
3. Lie to the overworked underpaid slave/student who doesn't actually care
4. Laugh at all the dumbasses who formatted their computers.
Re:draconian, defined. (Score:2)
Re:draconian, defined. (Score:2)
Is being sued the worst that can happen? (Score:2, Funny)
Re:Is being sued the worst that can happen? (Score:2)
Art of the Saber format? (Score:3, Funny)
Re:Art of the Saber format? (Score:4, Informative)
The file's has a .mov extension, but neither file nor xine seems able to recognize it. Does anyone know what format it is, and how to play it?
MPlayer [mplayerhq.hu] with the Quicktime support compiled in plays it fine. It's using the SVQ3 decoder module, if that helps.
Re:Art of the Saber format? (Score:2)
Re:Art of the Saber format? (Score:2, Informative)
Re:Art of the Saber format? (Score:2, Interesting)
Re:Art of the Saber format? (Score:3, Insightful)
Xine 0.9.21 plays it just fine for me, sound and everything. Perhaps you need to upgrade or install the windows codecs.
Gentoo 1.4, 1.4 ebuild of Xine.
SB
OpenSSH updated patch (Score:5, Informative)
PS. Don't feed the trolls! Given the recent DCOM fiasco, it's fairly obvious where this thread goes...
MIT say it isn't so (Score:5, Informative)
"MIT still has 900 network drops disabled due to the Blaster worm infection. Of particular interest is that MIT network security requires users to reformat their hard drive and re-install their operating system before they get back on the network. Sounds like a good excuse to reinstall something other than a Microsoft operating system."
Reformat? That's pretty dumb
B. Clear your computer of the Blaster worm
1.On the taskbar at the bottom of your screen, click Start, and then click Run. Type in services.msc and click on OK.
2. The Services window will appear. Enlarge it, if small, so you can see things. Click on the Name heading so the list is in alphabetical order. Look down the list for Remote Procedure Call (RPC) which Provides the endpoint mapper, etc. Do not choose Remote Procedure Call (RPC) Locator, which Manages things. Right click on Remote Procedure Call (RPC) and left click on Properties.
3. Click on the Recovery tab, and change first, second and subsequent failures to Restart the service, not Restart the computer. Click on Apply then OK. Close the Services window.
4. Hold down Ctrl and Alt keys and press the Delete key. The Windows Task Manager window will appear. Click on Processes. Click on Image Name to put the list into alphabetical order. Look down the list for msblast. There it is. Right click on it and click on End Process. Close all windows.
Total time to find this info: less than 30 seconds on Google cache [216.239.41.104]... Interested in SoBigF? Check out my psychotic rants [politrix.org] on it.
As for so called security team of whatever, I don't know why they would tell their users to format their machines... Seems a bit irresponsible, and makes me think their too lazy to read something like the DOC I just linked (Google cache link)... Hell they don't have to if you think about it... Print it out and throw it on every damn door. Come on if MIT can hang cars off bridges, place cars on roofs for pranks don't tell me they cant ctrl-p a damn doc...
Re:MIT say it isn't so (Score:2)
- disconnect the box from the network
- perform reasonable l
Reformat and Reinstall sounds right to me... (Score:5, Informative)
The command-line exploit for the hole was available several weeks before the Blaster worm came out. I demo'd it in the office by breaking into my Boss's workstation (Yes, while he was watching over my shoulder). Compile the exploit on a Linux box, run it against a remote NT host, up comes a nice command-shell with Administrator access.
While the Blaster worm itself is pretty easy to get rid of, the RPC/DCOM bug is a remotely-compromiseable hole that gives you Administrator privileges. As such, it's quite possible that vulnerable machines could have been backdoored by something other than the worm (or by some rare variant of the worm) in the process.
A Blaster-infected machine was wide open for long enough for the virus to catch it. At that point, you have no idea what malware could have be installed. You're pretty sure it's "just" the regular worm, and the standard removal instructions are all you need, but how sure is that? Network security want to be completely sure that their network doesn't become a home of a few thousand more DDOS drones.
In my judgement MIT security may be being a little paranoid, but if you work in network security, you're paranoid by definition anyway.
Charles Miller
Re:Reformat and Reinstall sounds right to me... (Score:4, Interesting)
Basically, what Chris said was right. A format and reinstall is the standard response to a root-level system compromise, which the RPC vulnerability leaves a system open to. It's also enough of a pain in the rear, that people don't want to have to do it again.
Furthermore, Network Security only has two full-time staff members, a handful of student employees (the category I fall under), and a handful of volunteers from here & there. Under normal loads, we don't have the resources to do forensics or any type of individually tailored recovery advice. With the thousands of computers being compromised on campus, it's the quickest (and easiest, believe it or not) solution for everyone.
Give us a break, this thing has generated way more overtime hours than any one (or two now) security hole(s) should be allowed to do.
Re:Reformat and Reinstall sounds right to me... (Score:3, Insightful)
Mandating up to date antivirus software is good, and the fact that you are able to make sure everyone has it before getting on the network is noteworthy. However, do you als
Re:MIT say it isn't so (Score:2)
Reformatting will get rid of whatever spyware they have, too, at least for a little while.
I'm not defending their policy. I'm just bitter from having to deal with lusers.
Copying for someone else's use? (Score:3, Insightful)
Re:Copying for someone else's use? (Score:2)
But when you knowingly place copyrighted music into a public forum via the internet, that's the same as you using your own casette recorder to make copies and giving them away.
Sorry, but I don't think saying that you didn't realize people were actually downloading the mp3's you shared over Kazaa will hold up as a lega
Out of curiosity (Score:2)
Hell FOX [fox.com] even says you can copy broadcasted shows from friends. So why is copying from one broadcast medium ok and another not?
Now before anyone says, "Oh, but if you copy the CD and share it, you are sharing songs that were not broadcasted", le
Re:Copying for someone else's use? (Score:2)
I mean to make your Mp3's (Ogg's) available you have to do it intentionally, at least in my experience.
Blaster and variants (Score:4, Interesting)
Reformat and reinstall? Ack! (Score:4, Interesting)
Of course, no patches have been installed, since they are available as downloads unless MIT is distributing service packs and patches to the students via CD.
So now you have completely unpatched machines on the network, at least for the time it takes to repatch.
I've had rebuilt machines reinfected during that short time (yes, I should have thought of that first).
Maybe they have something in place to prevent this from happening, but that isn't indicated one way or another.
Besides, given the ease of fixing problems like these without reinstalling the OS, why bother forcing a drive wipe?
Just wondering if they're forcing everyone with the SSH hole to reformat and reinstall? (Yes, not as serious since it isn't a worm, but still)
Re:Reformat and reinstall? Ack! (Score:2)
they might instruct them to shut down the services(i doubt they would be able to, the users, and if the
Re:Reformat and reinstall? Ack! (Score:3, Informative)
Actually, we are, but aside from that, we also tell them how to (temporarily) use the built in firewalling of winxp and win2k to prevent a compromise while installing the patches. Yes, there were cases of people getting recompromised before patching was finished. As a test, an unpatched laptop was placed on the network. Time to compromise: ~1 minut
Re:Reformat and reinstall? Ack! (Score:2)
This is not unlikely, especially given this policy. PSU had a massive PR campaign called "disinfect before you connect" where they printed what must be a couple thousand CDs with the patches and stuff, and handed out flyers to everyone, and had RAs try to get people to patch, and stuff like that.
I'm not a Mandrake user, but... (Score:5, Funny)
Canadian Loophole (Score:3, Interesting)
The loophole? Okay, on a P2P app, when someone downloads a file from you it is REMOVED from your hard drive. Translation: You've lent it to them. Then you get sent the file back. They've made their copy by "borrowing" yours, and then given it back.
Probably not viable since there'd be wankers who'd download and then kill the software so you don't get your song back (the RIAA would love to abuse that I bet!) but still, there has to be some loophole as the law doesn't take P2P into account.
Re:Canadian Loophole (Score:2)
I think that the question is - when a file is transferred, who is making the copy?
I'd say that the receiver is making the copy, because it doesn't exist until it's on his HD. (A 'copy' is something that's "fixed in a tangible form" - by definition, it can't be fixed until it arrives at the destination.)
The poster says he's run it by his law professor - but does this professor truly understand computers, or does he have the same understanding as the writers
Re:Canadian Loophole (Score:2)
Something I found interesting, in a section called "Scope of exclusive rights in sound recordings", was this:
reformatting without patching?? (Score:3, Interesting)
MIT requires a reformat? (Score:2)
Proper patching and de-infecting should be enough.. until the next round.
Re:MIT requires a reformat? (Score:2)
I disagree. Who is to say that machine was infected by a new strain of the worm that would plant spyware or a trojan? You just can't fully trust a compromised machine.
Re:MIT requires a reformat? (Score:4, Insightful)
Isn't still running MS Windows, after all these years, also a bit extreme?
Which is more extreme? One of these acts has been increasing in extremity, for a very long time. The other act started out as extreme, but at least it's stable and doesn't get any more insaner as the years drag on.
It's just a question of when one of them passed, or will pass, the other. Pretty subjective, I guess. But when you see it keep happening year after year, with complete oblivion to experience and a total lack of capacity for learning, it's hard to keep a straight face when anyone throws around the word "extreme."
You always keep thinking, "Is that finally the last lemming that will jump off the cliff?" and they just keep surprising you with their determination.
Whoever pays Diebold=Election Winner! (Score:2)
Seriously though, from what I saw in an election on September 9 here, we have an even bigger problem that doesn't involve connectivity. Anybody could just go in and punch their votes as many times as they want, as long as the total number of votes doesn't exceed the number of registered voters in that district. This would have to be done by a voting official though, which could easily be arranged. This could also be done by anybody who just wants
Re:Whoever pays Diebold=Election Winner! (Score:2)
In other news, voter turnout in ZZZZZ county was 90% compared to the 15% it normally has. I doubt that would happen without anyone noticing.
Here [slashdot.org] is a possibility for a decent voting system. (dont forget to read the replys from this prior post as well.)
Why would we bitch about Mandrake? (Score:3, Insightful)
I didn't see too much complaining myself (maybe I ignored some of it) but I'm sure some got hysterical about it (it wouldn't be a internet-age community without someone getting hysterical).
Anyhow, I wish them best of luck. Good idea whoever decided on this. Programmers need to get paid and I *want* my Mandrake.
About Mandrake, ads and our community (Score:5, Insightful)
I've always held Mandrake in high esteem as they are the [possibly only] commercial entity that adheres closest to the principles of Free Software, listens to community feedback, and, if you read the press release about the ad, very polite in their communication - even when lesser people would've ignored us or told us to fuck off. Do you imagine slagging them off for being French makes you look intelligent? Hell, if they are typical of France, I would hold them with deep respect.
Remember - we all have our favourite distros, preferences, and so on. But until the day we realise that a loss for our [Mandrake-loving] peers is a loss for the entire community, we are not living by, and upholding, the principles of freedom, choice and tolerance.
Re:About Mandrake, ads and our community (Score:2)
But I think the irritating factor for some people is having ads in something you've paid for, and from what I've heard there will be (easily removable Linux-related) ads even in the commercial version. Now in many cases we accept ads on things we pay for, such as cable television and magazines, because we recognize our subscription fees alone are not enough to keep some things afloat.
I don't know enough about Mandrake to
Uberhacking (Score:3, Funny)
I really can't stand Tom Green
Mandrake ads and Paid Links (Score:5, Insightful)
Usually when I am installing an operating system, I leave the room or do something else when I am done with any user interaction. Why should I care if the show an ad while the OS is being copied to my hard drive and I am not looking?
As for the bookmarks who cares if I can delete them. Microsoft does this, Netscape did this(and now AOL does this.) You have to pay for Microsoft's OS (In more ways than one), and with AOL's version of Netscape they have things like Net2Phone that you can't remove. (I admit when AOL posted its ad links that could not be removed, I switched to Mozilla.)
As long as Mandrake sticks to their words from their press release, "ads won't be intrusive (no pop-up windows) and can be removed easily;" I will not mind if they make a few bucks to stay afloat financially.
Fanfilms (Score:5, Informative)
TFN Fanfilms [theforce.net] has a huge library of Star Wars home movies. Many of them have excellent stories, and do much more than display the rotoscoping skills of the creators.
Duality [crewoftwo.com] is one of the most visually impressive, but because of conflicts between the two guys who made it it's not available on TFN anymore.
Whaaaaa???? (Score:2, Interesting)
You've got to be shitting me. If their IT department is too fucking stupid to cut/paste Blaster removal instructions, they should just turn out the lights and go home. They've got no business accepting money for that kind of "work". It took me about 5 minutes to clean Blaster off my Grandpa's computer (he got hit before the virus defs were upated).
Canada File Sharing Idea (Score:2)
What if instead we did this:
Person A MOVES the file to Person B, who then makes a copy. Person B then MOVES the original back to person A. Hmm...
time stamp (re:Vote early, often, and reversably.) (Score:2)
Is it possible in this case, Jim March (love how it's the March 2002 incident, and his name is March, but I digress) doesn't know what he was looking at?
What does the time stamp mean? Is it necessa
I said this yesterday about updoading in Canada (Score:3)
I said essentially the same thing yesterday [slashdot.org] when the original article came out and I got modded up 1 for insightful and modded down 1 for overrated. Where's the justice?
Lightsaber nitpicking (Score:2)
Only siths have red sabers.
Art of the Saber (Score:3, Insightful)
Idea for Canadians (Score:4, Interesting)
Here is how:
Break up any mp3 files into say 10 RAR and calculate MD5 for each part plus total.
Name the 10 parts equal to their MD5 number
Make small Identity file that contains above plus all of the normal mp3 ID's like Name, artist etc.
Make small plug in that disallows for any more than 3 or so of the parts to be made available for up load and obviously never the total mp3 file.
Make small script that takes Identity file as input and as output automatic tries to find and download all MD5 pieces.
Once retrieved combine and play.
If real fancy you could make the "Encryption" / "decryption" function DMCA proof, so RIAA can not legally tamper with it.
I am sure we can elaborate but you get the idea.
Oh yeah (Score:2)
SB
Blaster/SoBig (Score:3, Informative)
Seems like a much more reasonable way of dealing with it than MIT's policy.
Law School Analysis Flawed (Score:5, Informative)
All the potential copyright actions in the world aren't going to matter when you don't know who to name as a party defendant.
The DMCA has a subpoena provision which has been interpreted to require an ISP to provide the identity of the Kazaa user (say) in the USA.
No such similar provision exists under Canadian law and the DMCA has no applicability in Canada in a civil suit. The closest you could get to it is a Bill of Discovery for an intended action.
While you might get such a discovery right against the ISP, this area of the law is wholly unexplored in the context of file sharing in Canada.
Getting a Bill of Discovery granted for a novel action is also problematic.
And most of all - it would be extremely expensive. You can't just do all your Bills of Discovery in one motion either. To do them all at once would amount to a Class Proceeding, which in this context, would first require a certification motion and motions to strike before you ever got a single user name. And then it's appeals to the Divisional Court, Court of Appeal, motion for Leave to Appeal to the SCC and maybe even leave granted...
Four years later...your Kazaa user isn't even with the ISP anymore and Kazaa is yesterday's news. What now Mr. Bronfman?
Theory is fine - but $$$ and delay are the essence of the practice of litigation.
Robert Trifts
Barrister & Solicitor (Ontario)
Who's running the computer? (Score:5, Insightful)
The Crux of this argument revolves around a simple question: Who is operating the computer?
Possible Answer #1: The owner of the computer is operating it. Even if he does not explicitly review and authorize each operation that the computer performs, the owner still dictated the paramaters under which the computer would make those decisions. As a result, the computer copying and sending the music file is identical in every respect to the owner copying and sending the file... a clear copyright violation.
The parallel to this notion is that you go to a friend's house, point to a CD on his shelf and say, "I want that one." The friend then burns you a copy of the CD and gives it to you, a clear violation.
Possible Answer #2: The remote individual is teleoperating the computer. The owner has permitted some limited form of teleoperation, but each action the computer takes is at the behest of that remote individual. Since the non-owner individual is running the remote computer, its actions in making a copy for that individual's personal use are reasonable and completely legal.
The parallel to this notion is that you go to a friend's house, point to a CD on his shelf and say, "I want that one." You then take it off the shelf and copy it using your friend's computer while he stands by and watches. Legal in Canada.
Possible Answer #3: The computer is operating itself. Soon it will take over the world. Muahaha. We'll relegate this answer to science fiction where it belongs.
The current caselaw is varied and confusing. Generally though, the following theme has developed: INTENT. If the owner knew and expected the computer to be used for a specific purpose, then when the computer does its as if the owner did that same action himself, regardless of who actually instigated the action. If the owner did not know and should not reasonably have known that the computer could perform such an action, then whoever actually induced it to perform that action is the guilty party.
Lets set up exteme hypotheticals to illustrate that theme:
Example #1: You rig an electric chair to a computer and a modem so that the next time a telemarketer calls, the chair will electrocute its occupant. A telemarketer calls. Who is guilty of murder, you or the telemarketer? Duh. You of course.
Example #2: Your Windows laptop gets a worm on it. You don't know it. You carry it to work behind the corporate firewall where it runs rampant, deletes everything and ruins the company. Are you guilty of destroying the company or is it entirely the worm author's fault? You're absolved; its entirely the worm author's fault.
So, how does all this help with the question of who's running the computer as it makes and sends the copy of the song? Well, it doesn't really. You could make a powerful argument that running a P2P server is no different than inviting the public at large to use your computer. You could strongly counter that by specifically setting up the computer to copy those particular songs, you and not the stranger are the agent of its copying. You could argue that its no different than radio, deliberately putting specific songs into the ether where any stranger can record them.
In fact, you can argue the issue back and forth through a lot of permutations. Before the matter is settled, you can expect the courts to argue the issue back and forth through a lot of permutations, ruling both ways while they seek the right balance.
So basically, the short answer is:
If you want to try to prove a point, go ahead but beware: Folks who want to live don't jump in front of trucks and epect them to stop, and the courts are behaving like a drunk drivers. Your best bet for longevity is not to play in the street.
Those stupid math guys. (Score:4, Funny)
I don't know shit about dot products but I do know a shitty looking PDF when I see one.
Somebody give these folks some fonts!
Second-hand lending legal? (Score:2)
Downloading from Saudi Arabia (Score:4, Insightful)
However, since the communication actually does involve one machine copying from another it would seem the ISP the downloader is connecting to might well be liable for anything downloaded as well as the telecomunications industry. Yet, there are provisions in place so that the telecommunications indusrty has a legal right to copy and cache anything that is put on the net so perhaps they are off the hook too.
It seems the laws with respect to internet content have been designed so that the creators of the work lose the right to control or otherwise profit from the distribution of their content the moment it hits the net. The opportunity to profit transfers to the telecomunications industry.
This means that there is perhaps a business opportunity. If we set up a company in say Saudi Arabia to serve copyrighted material for say a small subscription and legally buy one copy of each CD then any Canadian should be able to rip off the musicians legally. As for Americans, well perhaps we can legally ship pirated music out of Saudia Arabia... I don't know... it is an open question in my mind but I do think it is legal for any American to purchase a legally created CD even if it arrives from Saudi Arabia.
Another way out for Americans might be for each to claim they are offering telecommunications services because under the DMCA they would then gain the right to "cache" any music placed on the net. They might not have the right to listen to it mind you - but then they would have to be caught in the act so to speak.
There is already another business opportunity which is well underway now... this is the resale of used CD's. For about $12 bux I can buy a used CD in the mall near here and then copy it for my personal use and then take it back an hour later for a refund of $6 bux.
Personally I think the spread is too great mindyou. But I suspect the prices will come down with more competition.
If I ever bother to buy a cd burner perhaps I will make some copies but only of material I presently own as albums. I personally consider this fair use. I do not think ripping off artists is morally acceptable but then it was a stoopid liberal politition named Sheila Copps who organised the changes to the copyright act. Thus, WHY the present laws are written the way they are is perfectly understandable.
On the other hand, what this change has accomplished is basically to remove the opportunity to profit from the distribution of copyrighted material away from the recording industry and transfer it without compensation to the retailers who set up little cd exchange shops. In a twist of fate it would seem however that the RIAA effectivly managed to do that to the artistic community because as Janic Ian pointed out, she has never received a royalty cheque where they did not claim she owed them money!
One could argue that this puts recording artists into the same boat as webmasters because webmasters also lose the opportunity to make money from the distribution of their copyrighted materials as soon as they are placed on the net.
Oh well, artists should expect to be poor and die broke!
Numerically-based P2P bypasses copyright? (Score:4, Interesting)
1) Server receives HTTP GET for file.
2) Recognize that (for example) a 3 megabyte file can be described by a 24 million bit long number in base 2, or even shorter numbers in other bases you might prefer.
3) Recognize that numbers are free and can't be copyrighted. Every number can and is used for a multitude of purposes.
4) Respond with HTTP code 401 Unauthorized or a 403 Forbidden or whatever is applicable. Heck, create a new code that informs the client that you can't give them the file requested, since copying a digital work -may- infringe on copyright law.
5) In the body of the response, give an extended error code number as per 2) above. It's up to the client how they interpret or use that number. You're giving them a freely available and multi-purpose number.
Nothing in my response to the client was a copyrighted work, just a free number that is not and cannot be copyrighted.
Okay, my tongue is out of my cheek now...
Re:If this was a Microsoft bug (Score:3, Insightful)