Breaking the key apart is "security through obfuscation". Breaking it into more parts increases the level of obfuscation, but anything that relies on "security through obfuscation", no matter the level of obscurity, it can be reversed engineered./div>
"It could mean they are choosing their battles carefully and efficiently as they should be."
When their weapons for battle are overly broad, punitive, and numerous (double-jeopardy) laws, then they can efficiently "administer justice" by the letter of the law (but rarely the spirit)./div>
"...consumers can choose not to use Google or Facebook"
I disagree. While we can explicitly not use their "direct" services, like going to Facebook.com, it's harder to not use their "indirect" services where many 3rd-party websites implement their code (ads, Google Analytics, FB Comments, etc)./div>
They could go the same way that they have with currencies. Ask manufactures of cameras to voluntary adhere to the EURion Constellation and have the software blur the ballot. Of course, I would be annoyed by this as a consumer, but it solves the issue of impeding on free speech because it becomes an issue between the user and the company selling the camera./div>
This clerical error could have easily been avoided with basic workflow technology where all parties to a case can see the current status of motions and rulings. Newegg would have been able to see that there was an order staying the case and could have made contact asking why and it would have been resolved right then-and-there./div>
"Powerful corporate interests, like Pandora, are determined to stand in the way of meaningful music licensing reform so that they may continue to shortchange songwriters." --- ASCAP CEO Beth Matthews response (found on their website)
Interesting that she's playing the "powerful corporate" card against Pandora... I guess I was wrong about the (weak!?) music labels being the ones that "shortchange songwriters".../div>
Computer Fraud and Abuse Act, 5A: Knowingly causes the transmission of a [...] command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;
I would like a prosecutor to get them for a CFAA violation, because we all know how it can be applied broadly... I would argue that the servers they sent their commands to were protected computers (need user account), they subsequently caused damage to the data (false reports), and all of that was unauthorized (Waze terms of service)./div>
Techdirt has not posted any stories submitted by Brian.
(untitled comment)
"The lowest percentage of "yes" vote was Woodland Park in Teller County with 55 percent."
That's probably because of a small, local ISP that services the area offering gigabit speeds.
/div>(untitled comment)
Does this suggest that the NIT they used required this data to be transmitted in the open so that they could intercept it at another point?/div>
Re: Better Idea
Re: need or want (repost)
Try to think outside of your own viewpoint and realize that something that may be true for you is not true for someone else!/div>
Re:
When their weapons for battle are overly broad, punitive, and numerous (double-jeopardy) laws, then they can efficiently "administer justice" by the letter of the law (but rarely the spirit)./div>
(untitled comment)
I disagree. While we can explicitly not use their "direct" services, like going to Facebook.com, it's harder to not use their "indirect" services where many 3rd-party websites implement their code (ads, Google Analytics, FB Comments, etc)./div>
(untitled comment)
Re:
(untitled comment)
Maybe website owners should go after the ISPs for copyright violations./div>
(untitled comment)
(untitled comment)
(untitled comment)
(untitled comment)
Interesting that she's playing the "powerful corporate" card against Pandora... I guess I was wrong about the (weak!?) music labels being the ones that "shortchange songwriters".../div>
(untitled comment)
(untitled comment)
(untitled comment)
I would like a prosecutor to get them for a CFAA violation, because we all know how it can be applied broadly... I would argue that the servers they sent their commands to were protected computers (need user account), they subsequently caused damage to the data (false reports), and all of that was unauthorized (Waze terms of service)./div>
Techdirt has not posted any stories submitted by Brian.
Submit a story now.
Tools & Services
TwitterFacebook
RSS
Podcast
Research & Reports
Company
About UsAdvertising Policies
Privacy
Contact
Help & FeedbackMedia Kit
Sponsor/Advertise
Submit a Story
More
Copia InstituteInsider Shop
Support Techdirt