Russian Programmer's Arrest To Test Copyright Law

from the okay,-I'll-post-it dept

If you read technology news anywhere, you've probably already read about yesterday's arrest of a Russian programmer who was in the states for DefCon 9. Adobe sent the FBI after him for his company's software that disables the (apparently very weak) encryption on their eBooks. I read the stories about it yesterday and didn't think there was much worth posting that wouldn't be covered at other sites. Today, however, we're getting more in depth looks at the legal implications of the case. Dan Gillmor explains why Ed Felton should be scared, since Adobe decided to go with a criminal suit rather than a civil law suit (like most cases involving the DMCA) - which could open up Felton to criminal charges as well. He also explains why this case clearly demonstrates (if you hadn't figured it out already) why the DMCA is a threat to fair-use (though, not the type of "fair-use" that Symantec tried to claim in the article below). Another article suggests that the folks at the EFF are thrilled about the case because they think they can tear down the DMCA with it. This would be nice - but it's dangerous to assume that the courts are automatically going to realize how ridiculous the case is.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • identicon
    sb, 18 Jul 2001 @ 12:07pm

    No Subject Given

    those FOOLS should be HIRING him for 600k a year, instead of putting him in jail.

    link to this | view in chronology ]

  • icon
    Wklink (profile), 19 Jul 2001 @ 8:17am

    Weak encryption or not

    While some of the encryption was really weak (rot13 was actually used), some was actually top grade stuff, including one that required a hardware dongle.
    Strictly speaking, the program never "cracked" any encryption. If you didn't have a valid key in the first place, you couldn't use this program to decrypt anything.
    What the program allows you to do is save, as a PDF w/out encryption, any "secure" document that you can open. No matter how great the authorization mechanism is, at *some* point, the key has to be transmitted for the application to open the document. Once opened, it can be saved w/out the "security".
    Heck, they could use a retinal scan and DNA sample and it wouldn't change the fact that, at some point, the application decrypts the document.

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.