If they only made money for such a short time, why is copyright so long in the tooth?
they make money on back catalogs. music from that "golden age" has to remain locked up because people who bought music during that time will continue to buy the same music again and again on different formats.
Depends on how they block the site. Usually when blocking websites I do it by IP not by DNS name. So even if you do it by DNS it is still blocked. But unless you a lot of money for a strong filter that has more flexibility then direct IP/DNS blocking then it is pretty much worthless.
or just tunnel thru SSH. this is pretty easy to setup (provided you have a shell account somewhere - i recommend the Super Dimensional Fortress: sdf.lonestar.org) and has the added benefit of encryption.
if SSH is blocked, you can tunnel thru http as well, but you need a machine outside the firewall running the service.
short of cutting cables, it's pretty tough to block access to someone with sufficient determination and a little know-how.
Try 20 years ago on key systems, PBX's, Central Office switches (as a feature of course!) and so on. Same for AT&T, Alcatel and a ton of other providers in that space.
i believe in telco parlance it's known as a ring group, or a method for ringing multiple extensions (numbers) at the same time. this is different from a hunt group, where a group of numbers ring sequentially.
Re: Re: Re: I'm certainly not buying into any conspiracy theories.
Its was a psy-op, designed to instill fear in potential whistle-blowers. It was domestic terrorism.
perhaps i wasn't explicit enough. the anatomy of a conspiracy theory is three parts unanswered questions and one part usual suspects. until real evidence surfaces (if it ever does) then all anyone has to go on is conspiracy theory. so your theory could be correct, but so could a number of others.
conspiracy theories are fun, but are not really grounded on evidence. thanks to the sheer volume of unanswered questions in this case, any one of these scenarios could come to pass:
1) manning came to lamo and lamo simply betrayed him, this particular theory is exacerbated by speculation on a thread at boingboing that manning is transgendered. lamo is a homosexual, so that might be why manning chose lamo and not someone else (the kindred spirit from the article), and if that turns out to be the case, it makes the betrayal even worse in my opinion.
2) lamo is an informant for some 3 letter agency and betrayed his journalistic and clerical duties to protect mannings confession. this has happened before in past FBI cases, like the various carder busts (shadow crew, carder market, and dark market.) coincidentally, in his hacking days, poulsen was part of a crew with someone named "agent steal" (whose real name escapes me) who worked for the feds in a similar setup and informed on kevin mitnick. lamo might have done this deliberately to blow his cover as an informant via poulson's press coverage.
3) lamo is nuts and is making this up to get more press coverage, in the past he was busted for breaking into news orgs and using their lexis-nexis accounts to look up articles on himself and other hackers. lamo also spent several days in a mental institution. john markoff's coverage made kevin mitnick a household name, so lamo may be looking for the same buzz.
4) manning is part of cointel-pro type operation against wikileaks and targeted lamo because lamo is some combination of nuts, gay, and/or a press seeking attention whore and therefore seemed like an easily exploited target by some 3 letter agency.
thanks to the startling lack of real evidence, any one theory is as likely as any other.
Re: I'm certainly not buying into any conspiracy theories.
a classified report by the US Army Counterintelligence Center suggested one way to discredit Wikileaks (which it viewed as a threat) would be the "Successful identification, prosecution, termination of employment, and exposure of persons leaking the information by the government... would damage and potentially destroy this center of gravity and deter others from taking similar actions.
It gets played out exactly? And your still not sure? "that seems too out there to believe." That is usually the case.
one of the ways wiki leaks protects sources is by communicating with them anonymously. IF manning is a source, there is no way for wikileaks to verify that it is true. assange has said he doesn't have the embassy cables that manning claims to have sent him, so it's really manning's and lamo's word against assange's. with manning in DoD custody, there's not much he can do to verify anything either.
Right. Breaking it up Worked So Well Last Time(TM). We need to address the environment that allowed them to get the way they are now.
telco regulation worked until 1996, when it was deregulated. the telecommunications landscape went from a large number of competitors in cutthroat price wars to a decade spent rebuilding the bell monopoly in the form of the AT&T and verizon duopoly.
the profits made were not re-invested in their networks, but instead spent buying up competitors.
i would imagine that before long the big telcos will be facing debt problems similar to the newspapers: plenty of income for operations, maintenance, and upgrades, but not enough to do all of that AND service the debts from acquisitions.
Massive government intervention will only cause the file transfer systems to become more secure and less visible. Massive government intervention will lead to jail time, with 40% of the population of the US downloading 1 movie or more a month, and untold numbers of mp3's its a loosing battle that cant be won just from the perspective of imprisonment. If they begin fining people it will lead to a massive back lash. Fining people or implementing 3 strikes will lead to a backlash against ISP's, politicians, and the labels and studios.
you're not thinking big enough. the US has invaded countries for natural resources, what about invasions to stop copyright infringement?
that developers are spoiled, lazy and stupid and totally responsible for hackers doing what they do.
just kidding.
if you introduce a bug, someone will exploit it. this is why you test software before rolling it out. hopefully someone will exploit the bug in a manner that brings it to your attention without causing much harm, but that doesn't always happen. this is true for any system.
This makes a lot of sense, potentially paving the way for a new business model for the film industry.
i think a better direction would be to make more smaller productions that are more targeted.
bozzo said: The main point, though, is that this only worked because the film is a solid good film (for the target market at least), so word of mouth could only help the film.
the problem with mass market films is that they get downloaded en mass. a smaller production would recover costs faster, and targeting could lead to more support in the form of merchandise sales and donations.
i have seen two films ("the listening" and "the girl with the dragon tattoo") simply because they were mentioned on the nmap website. the listening was decent, and the girl with the dragon tattoo was excellent. i knew that if a film featured nmap that it would be a high tech thriller that would most likely appeal to me.
On the post: Mick Jagger: Artists Really Only Made Money Selling Music For About 25 Years
Re: So...
they make money on back catalogs. music from that "golden age" has to remain locked up because people who bought music during that time will continue to buy the same music again and again on different formats.
On the post: New Zealand Media Claiming That Huge Local Film Success Story Is Being Harmed... By 200 Downloaders?
Re: Re: Re:
you really can't argue with the math. it's mathematical.
On the post: Viacom In Denial Over Court Smackdown In YouTube Case
Re: Re: Wait a damn minute...
problem, officer?
On the post: New Zealand Media Claiming That Huge Local Film Success Story Is Being Harmed... By 200 Downloaders?
Re: best comment on the article:
here's the comment:
Thanx, A 9, V 10 will seed till 1:1 ratio
On the post: New Zealand Media Claiming That Huge Local Film Success Story Is Being Harmed... By 200 Downloaders?
best comment on the article:
On the post: Pakistan Orders Internet Ban On Google, Yahoo, Bing, Hotmail, YouTube, Amazon & MSN
Re: Re:
or just tunnel thru SSH. this is pretty easy to setup (provided you have a shell account somewhere - i recommend the Super Dimensional Fortress: sdf.lonestar.org) and has the added benefit of encryption.
if SSH is blocked, you can tunnel thru http as well, but you need a machine outside the firewall running the service.
short of cutting cables, it's pretty tough to block access to someone with sufficient determination and a little know-how.
On the post: As Google Voice Opens For All... It's Hit With Patent Infringement Claims
Re: Re: Prior art?
i believe in telco parlance it's known as a ring group, or a method for ringing multiple extensions (numbers) at the same time. this is different from a hunt group, where a group of numbers ring sequentially.
On the post: Is The Arrest Of Bradley Manning Part Of A Coordinated Effort To Discredit Wikileaks?
Re: Re: Re: I'm certainly not buying into any conspiracy theories.
perhaps i wasn't explicit enough. the anatomy of a conspiracy theory is three parts unanswered questions and one part usual suspects. until real evidence surfaces (if it ever does) then all anyone has to go on is conspiracy theory. so your theory could be correct, but so could a number of others.
conspiracy theories are fun, but are not really grounded on evidence. thanks to the sheer volume of unanswered questions in this case, any one of these scenarios could come to pass:
1) manning came to lamo and lamo simply betrayed him, this particular theory is exacerbated by speculation on a thread at boingboing that manning is transgendered. lamo is a homosexual, so that might be why manning chose lamo and not someone else (the kindred spirit from the article), and if that turns out to be the case, it makes the betrayal even worse in my opinion.
2) lamo is an informant for some 3 letter agency and betrayed his journalistic and clerical duties to protect mannings confession. this has happened before in past FBI cases, like the various carder busts (shadow crew, carder market, and dark market.) coincidentally, in his hacking days, poulsen was part of a crew with someone named "agent steal" (whose real name escapes me) who worked for the feds in a similar setup and informed on kevin mitnick. lamo might have done this deliberately to blow his cover as an informant via poulson's press coverage.
3) lamo is nuts and is making this up to get more press coverage, in the past he was busted for breaking into news orgs and using their lexis-nexis accounts to look up articles on himself and other hackers. lamo also spent several days in a mental institution. john markoff's coverage made kevin mitnick a household name, so lamo may be looking for the same buzz.
4) manning is part of cointel-pro type operation against wikileaks and targeted lamo because lamo is some combination of nuts, gay, and/or a press seeking attention whore and therefore seemed like an easily exploited target by some 3 letter agency.
thanks to the startling lack of real evidence, any one theory is as likely as any other.
On the post: Is The Arrest Of Bradley Manning Part Of A Coordinated Effort To Discredit Wikileaks?
Re: I'm certainly not buying into any conspiracy theories.
It gets played out exactly? And your still not sure? "that seems too out there to believe." That is usually the case.
one of the ways wiki leaks protects sources is by communicating with them anonymously. IF manning is a source, there is no way for wikileaks to verify that it is true. assange has said he doesn't have the embassy cables that manning claims to have sent him, so it's really manning's and lamo's word against assange's. with manning in DoD custody, there's not much he can do to verify anything either.
On the post: Man Charged With Using Open WiFi To Send Death Threats To VP Biden
Re: Re: Re:
the next door neighbor could also set the wifi owner up in a pseudo meta frame scenario, wherein the neighbor frames himself framing the wifi owner.
the neighbor would get away free because the evidence of the frame would be evidence that he was framed.
On the post: AT&T Ditches Metered Billing Trials Without Telling Anyone
Re: Re: Re: AT&T is a racket
telco regulation worked until 1996, when it was deregulated. the telecommunications landscape went from a large number of competitors in cutthroat price wars to a decade spent rebuilding the bell monopoly in the form of the AT&T and verizon duopoly.
the profits made were not re-invested in their networks, but instead spent buying up competitors.
http://www.newnetworks.com/ShortSCANDALSummary.htm
i would imagine that before long the big telcos will be facing debt problems similar to the newspapers: plenty of income for operations, maintenance, and upgrades, but not enough to do all of that AND service the debts from acquisitions.
On the post: Once Again, The Justice Department Fails To Tell Congress About Its Wiretapping Activities, As Required By Law
Re: Re: Re: Wow, no trolls on this thread.
who cares?
On the post: LimeWire Sued Again... How Many Times Does The Industry Want To Kill It?
Re: Re:
you're not thinking big enough. the US has invaded countries for natural resources, what about invasions to stop copyright infringement?
http://craphound.com/overclocked/Cory_Doctorow_-_Overclocked_-_After_the_Siege.html
On the post: Is Forcing IsoHunt To Block Search Terms A First Amendment Violation?
Re: Just a thought here...
screw the progress, what about those sweet delicious studio profits?
On the post: Forget The Early Adopters: Gadget Companies Should Target The Late Leapfroggers
Re: Describes me for a number of things.
holy shit, the core2 duo is 4 years old?? where has the time gone?
On the post: Blaming Users When You Screw Up
Re: Re:
that developers are spoiled, lazy and stupid and totally responsible for hackers doing what they do.
just kidding.
if you introduce a bug, someone will exploit it. this is why you test software before rolling it out. hopefully someone will exploit the bug in a manner that brings it to your attention without causing much harm, but that doesn't always happen. this is true for any system.
On the post: For Staunch Copyright Defenders, Big Singers From Big Labels Seem To Copy From Others A Lot...
Re: This is an interesting movie
http://www.youtube.com/watch?v=EMaE0xBxf6o
On the post: For Staunch Copyright Defenders, Big Singers From Big Labels Seem To Copy From Others A Lot...
not just songs from cameroon
http://www.youtube.com/watch?v=qC4BRLYlGjE
On the post: After 46 Years Of Unfulfilled Hype And Promises, Is Video Calling Finally Ready?
Re:
skype uses the internet which isn't real, and computers, which are just a fad.
also, people who use skype are stealing phone service. who wants to video call a bunch of phone pirates?
On the post: Film Director: File Sharing Only Hurts Bad Or Mediocre Films
Re: New Business Model?
i think a better direction would be to make more smaller productions that are more targeted.
bozzo said:
The main point, though, is that this only worked because the film is a solid good film (for the target market at least), so word of mouth could only help the film.
the problem with mass market films is that they get downloaded en mass. a smaller production would recover costs faster, and targeting could lead to more support in the form of merchandise sales and donations.
i have seen two films ("the listening" and "the girl with the dragon tattoo") simply because they were mentioned on the nmap website. the listening was decent, and the girl with the dragon tattoo was excellent. i knew that if a film featured nmap that it would be a high tech thriller that would most likely appeal to me.
Next >>