I find your comment simultaneously both insightful and ironic, since the "mentality" of copyright most often resonates with the philosophy of "moral rights" (which is widespread in Europe) rather than the relatively strict view of copyright as an economic issue which is mostly found in US law.
Do you always feel an urgent need in public forums to repeatedly post over and over again, in a futile attempt to drown out other opinions, rather than actually countering them?
Your understanding of science seems limited. For example, why did you post an "op-ed" piece from the BMJ as evidence? You don't seem to realize that in order to come to a conclusion, you have to review the whole body of scientific literature on a subject, rather than just cherry-picking?
Ever thought of, say, backing up your statements with evidence, or learning some critical thinking skills (never mind science knowledge, which you also seem to woefully lack)? Myself, I'd say that nuclear regulation is about the only sector of government where public pressure manages to counterbalance the growing power of industry (with the result varying from country to country).
I have to admit the "superpowers and spandex" was witty, tho.
Let's invent an algorithm for generating a sequence of random fallback tracker URLs, similar to the algorithms for C&C URLs for botnets --- but let's make sure that it involves using some information from all/any of the *AAs websites.
Then, by the same logic, the court would have to ask for those websites to be similarly expunged. This outcome might "help" the court understand that such a ruling is not a good idea...
> I think he’s using SHA-3 because that’s the anointed > new trendy hawtness from NIST
I guess he missed out the part where NIST "suddenly" wanted to reset the security parameters of SHA-3... anyone following the recent news wouldn't think of SHA-3 as a stellar candidate for being an essential part of a stego algorithm.
Or did the NSA tell them to do that to try to make us think that the original parameters were "too hard" for them? Inquiring minds want to know!
Well, if it's anything like the version I thought up independently, the algorithm only uses a limited number of bits of the result of the hash function, enabling a brute force search to (sometimes, since there is no reason, except statistics, to expect that this would be possible) invert what would ordinarily be, as you said, an uninvertible function.
(In addition, one would probably prefer to use SHA256 nowadays instead of SHA3, since fast hardware is readily available to accelerate such an inversion of SHA256 --- namely, any Bitcoin mining setup.)
I'm off to check it out. I hope his work is an improvement on my own --- it'll save me a lot of trouble getting my own into publishable form.
Not only are you correct about the improper comparison, I would like to point out that anyone really serious about shutting down a facility like the one which was attacked could easily gather intelligence from an unmanned drone, and then attack it with, for example, bombs/grenades launched from a small truck-mounted catapult. Or even possibly just with small rockets designed to drop metal cables in the proper locations --- no explosives necessary.
Spending money to defend against the chance of someone attacking would almost certainly not be cost-effective, however, unless the likelihood of such attacks would increase dramatically. How unfortunate that human psychology is irrationally biased towards favoring safety against vanishingly rare but dramatic risks and ignoring common, small ones (like having less money because electricity is more expensive).
> I'm sure they have considered that feature for > copies that fail their legitimacy check.
Considered? Yes. Conclusion? It's better that home users pirate our stuff, so we maintain market dominance. Gates once admitted that MS greatly preferred that the Chinese pirate Windows rather than them adopting/developing a replacement.
Someone should start a civil disobedience campaign where at every showing of every movie, one or more people hold up their switched-off or screen-blackened-not-recording phones as if they were recording. I think the cops would get very, very sick of coming to investigate for no reason, and the movie theater owners might actually figure out that the "enforcement" loses them customers.
I also wonder how this could be enforced in Canada --- if copying for fair use is a consumer right, there, then if someone records, say, 20 seconds of a movie, I don't see how they could be prosecuted.
I personally prefer the term "creator's usufruct", in that it emphasizes that what is being milked for income belongs to society, not the creator herself. (Besides which, "usufruct" has such a "woody" sound to it...)
Of course, this inversion of rhetoric will probably never see wide use, since: (1) most content creators are too self-centered to adopt it, (2) most content gatekeepers are too savvy to allow language usage to undermine their current rhetorical advantage, and (3) usufruct isn't actually a universal legal concept, but rather a civil law concept.
(Please don't take this post to mean that I support the current form or terms of these usufructs; this is about terminology, only...)
I think he would have been OK if he had only recorded his side of the conversation from the start using a second recorder located in the same room with him, far from the telephone.
> Subscription-based publishers argue that OA publishers are
> merely check-cashing operations
They would, wouldn't they now... Are you talking about the "expose" done by Science magazine (as seen on Slashdot)?
As many people on Slashdot noticed, this study only answers the question "Are there open-access science journals which are substandard?" and not the real question which is "Are there proportionally more substandard open-access journals compared to traditional ones?". For example, it is well-known that some traditional journals have been mere fronts for special interests (e.g., pharmaceutical companies).
Your idea about copying reputation models from the Web is quite interesting, I have to admit I thought about that also.
Does it have a good ending? Are the police limited to slapping him only with little tiny fish, until he gets a "big fish" court ruling to knock them into the water?
(Oh, God, the copyright inquisition is gonna get me! Or maybe not, considering I expect it...)
If a corporation is distributing GPL-licensed software like Linux, and it has become well-known that there is a significant chance that the NSA has corrupted Linux binaries, then in order to avoid legal liability the corporation might have to compile from source --- since the NSA backdoors wouldn't be GPL-licensed (presumably, and even if so, the corporation would be unable to distribute the sources to those backdoors).
The companies actually contacted by the NSA would almost certainly be immune, however (if they were American).
If I remember correctly, before (3) happens, you get hauled into some kind of "court" (but maybe more like a review board), and they have to decide to disconnect you. The guy who was found responsible for his wife's infringements was also fined 150 euros if I remember correctly.
What is this "regular" piracy you talk about, is that the "regular" piracy in the eyes of the **AAs (you know, the those blokes who once claimed that ripping CDs was piracy), "regular" piracy in the eyes of your average consumer, or "regular" piracy in the eyes of Lawrence Lessig?
On the post: British Library Says It's Copyright Infringement To Take Photos Inside The Library; Demands Person Delete Tweet
Re:
On the post: Thanks Anti-Vax Loons: The Return Of The Measles And The Backlash Against Jenny McCarthy
Re: orly?
> lots of people every year
Could we have references for this, please?
On the post: Thanks Anti-Vax Loons: The Return Of The Measles And The Backlash Against Jenny McCarthy
Re: Re: Re: orly?
Your understanding of science seems limited. For example, why did you post an "op-ed" piece from the BMJ as evidence? You don't seem to realize that in order to come to a conclusion, you have to review the whole body of scientific literature on a subject, rather than just cherry-picking?
On the post: DailyDirt: Harnessing Fusion Energy
Re: Re: We should be continuing with nukes
I have to admit the "superpowers and spandex" was witty, tho.
On the post: Dangerous Ruling In Germany Makes Domain Registrar Liable For Copyright Infringement On Website It Registered
Gotta try this
Then, by the same logic, the court would have to ask for those websites to be similarly expunged. This outcome might "help" the court understand that such a ruling is not a good idea...
On the post: Netflix, YouTube Streaming Gets Worse on Major ISPs, Who In Turn Blame the Deep, Dark Mysteries of the Internet
Re: Re: Re:
Brings to mind: NSA. You probably share an ISP and similar location to someone who's connected to someone who's suspicious, eh?
On the post: A New Twist On Steganography From The Creator Of BitTorrent
Re: Re: Explanation is unclear
> new trendy hawtness from NIST
I guess he missed out the part where NIST "suddenly" wanted to reset the security parameters of SHA-3... anyone following the recent news wouldn't think of SHA-3 as a stellar candidate for being an essential part of a stego algorithm.
Or did the NSA tell them to do that to try to make us think that the original parameters were "too hard" for them? Inquiring minds want to know!
On the post: A New Twist On Steganography From The Creator Of BitTorrent
Re: Explanation is unclear
(In addition, one would probably prefer to use SHA256 nowadays instead of SHA3, since fast hardware is readily available to accelerate such an inversion of SHA256 --- namely, any Bitcoin mining setup.)
I'm off to check it out. I hope his work is an improvement on my own --- it'll save me a lot of trouble getting my own into publishable form.
On the post: British Judge Rules Google Can Be Sued In UK Over Privacy Case
Bye, bye, net...
That sounds practical...
On the post: Weird California Incident Last Year Points To The Real Threat To The Power Grid (Hint: It's Not Cyberattacks)
Re: Re:
Spending money to defend against the chance of someone attacking would almost certainly not be cost-effective, however, unless the likelihood of such attacks would increase dramatically. How unfortunate that human psychology is irrationally biased towards favoring safety against vanishingly rare but dramatic risks and ignoring common, small ones (like having less money because electricity is more expensive).
On the post: You Don't Own What You 'Bought': Disney And Amazon Play The Role Of The Grinch In Taking Back Purchased Film
Re: Try software
> copies that fail their legitimacy check.
Considered? Yes. Conclusion? It's better that home users pirate our stuff, so we maintain market dominance. Gates once admitted that MS greatly preferred that the Chinese pirate Windows rather than them adopting/developing a replacement.
On the post: The MPAA's Plan To Piss Off Young Moviegoers And Make Them Less Interested In Going To Theaters
Easy target for civil disobedience
I also wonder how this could be enforced in Canada --- if copying for fair use is a consumer right, there, then if someone records, say, 20 seconds of a movie, I don't see how they could be prosecuted.
On the post: Google Gets Total Victory Over Authors Guild: Book Scanning Is Fair Use
I prefer: Creator's Usufruct
Of course, this inversion of rhetoric will probably never see wide use, since: (1) most content creators are too self-centered to adopt it, (2) most content gatekeepers are too savvy to allow language usage to undermine their current rhetorical advantage, and (3) usufruct isn't actually a universal legal concept, but rather a civil law concept.
(Please don't take this post to mean that I support the current form or terms of these usufructs; this is about terminology, only...)
On the post: Google Gets Total Victory Over Authors Guild: Book Scanning Is Fair Use
Well, bully for Judge Chin, _this_ time
On the post: Boston Police Department Claims Contacting Its Public Affairs Number Is A Criminal Act
Re: Re: Re: Re: So let me get this straight...
On the post: Fighting To Free Knowledge Paid For By Taxpayers -- And Winning
Re: Re: Who to manage this output
> merely check-cashing operations
They would, wouldn't they now... Are you talking about the "expose" done by Science magazine (as seen on Slashdot)?
As many people on Slashdot noticed, this study only answers the question "Are there open-access science journals which are substandard?" and not the real question which is "Are there proportionally more substandard open-access journals compared to traditional ones?". For example, it is well-known that some traditional journals have been mere fronts for special interests (e.g., pharmaceutical companies).
Your idea about copying reputation models from the Web is quite interesting, I have to admit I thought about that also.
On the post: Universal Music Targeting Domain Registrars To Take Down File Sharing Sites Without Due Process
Re: Re: Re: Re:
(Oh, God, the copyright inquisition is gonna get me! Or maybe not, considering I expect it...)
On the post: Linus Torvalds Admits He Was Approached By US Government To Insert Backdoor Into Linux -- Or Does He?
NSA exposures may actually require compilation
The companies actually contacted by the NSA would almost certainly be immune, however (if they were American).
On the post: French Farce: Hadopi's First And Only Suspension Has Been Suspended
Re: OK, someone help me out here...
On the post: MPAA Gets Its Wish: Court Basically Says It Can File Bogus DMCA Takedowns Without Concern For Fair Use
"Regular" piracy?
What is this "regular" piracy you talk about, is that the "regular" piracy in the eyes of the **AAs (you know, the those blokes who once claimed that ripping CDs was piracy), "regular" piracy in the eyes of your average consumer, or "regular" piracy in the eyes of Lawrence Lessig?
Next >>