Create an Account
username: password:
 
  MemeStreams Logo

Strange News And More

search

Stowbari
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Stowbari's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
Current Events
Recreation
Local Information
Science
Society
  Politics and Law
Sports
Technology

support us

Get MemeStreams Stuff!


 
From User: Acidus

EFF representing Memestreams again DMCA attack from TI
Topic: Miscellaneous 7:33 am EDT, Oct 15, 2009

The EFF is representing Tom against TI their DMCA takedown filed against Memestreams.

The crux of this letter from the EFF to TI was the same point many of us were discussing on Memestreams the very day the DMCA notice was served: The TI signing key that was cracked does not protect access to copyrighted material. This is not the same thing as using DeCSS to decrypt the contents of DVDs on a unauthorized and unlicensed devices. That would be circumventing an encryption method (CSS) used to protect copyright material (the film on the DVD). That *would* be a violation of the DMCA. Just go ask 2600 about that...

But that's not whats happening in this case.

The TI signing key allows software written by anyone to run on TI hardware that someone owns. The TI hardware checks the signature (created by signing key) of any software it tries to run. Now that the signing key has been published anyone can run new, non-TI software on TI hardware they have ownership of.This is not a copyright issue in anyway, shape, or form. The DCMA does not apply. This (among other things) is what the EFF is asserting.

Frankly, that's fairly obvious, cut and dry. Having been on the receiving end of a DMCA threat and the countless other cases where baseless DMCA claims are used to shut smart people up, I'm optimistic that the EFF will prevail.

But that's not what's interesting.

What *is* interesting are the legal issues around private keys. Is a private key a trade secret? A 3rd party, through no illegal act, who independently discovers the a trade secret can utilize or publish that secret. Only we aren't talking about the Coca-Cola formula here. Public and private keys are mathematically linked. You can derive a private key, given a public one. It just can be very very (infinite grains of sands on a beach) hard. Or not. As in the TI case. You can't patent a private key, that kind of makes it public. ;-) So what do we do? Does there need to be some new kind of IP protections beyond traditional ones like patents, trademarks, and trade secrets? Are massive efforts to compute a mathematical value legal? Is it based on what that value protects or unlocks? Is it based on the intent of the people who derive the value? Homebrew software developers vs. Blueray crackers?

While I hope this matter is resolved quickly for Tom's sake, I would like to see some of these other legal issues addressed.

EFF representing Memestreams again DMCA attack from TI


ICANN == Whores
Topic: Miscellaneous 10:17 am EDT, Apr  9, 2009

The familiar .com, .net, .org and 18 other suffixes — officially "generic top-level domains" — could be joined by a seemingly endless stream of new ones next year under a landmark change approved last summer by the Internet Corp. for Assigned Names and Numbers, the entity that oversees the Web's address system.

Tourists might find information about the Liberty Bell, for example, at a site ending in .philly. A rapper might apply for a Web address ending in .hiphop.

"Whatever is open to the imagination can be applied for," says Paul Levins, ICANN's vice president of corporate affairs. "It could translate into one of the largest marketing and branding opportunities in history."

ICANN needs to be stopped. They proposing and prompting concepts that will irrevocably damage the Internet with essentially no one to keep them in check.

Something seriously must be done about the pollution of the TLDs.

From RFC 1591 in 1994:

2. The Top Level Structure of the Domain Names

In the Domain Name System (DNS) naming of computers there is a
hierarchy of names. The root of system is unnamed. There are a set
of what are called "top-level domain names" (TLDs). These are the
generic TLDs (EDU, COM, NET, ORG, GOV, MIL, and INT), and the two
letter country codes from ISO-3166. It is extremely unlikely that
any other TLDs will be created.

Postel must be screaming in his grave to know ICANN rolled like a dog in heat to special interests and already created bullshit TLDs like:

*.aero
*.asia
*.biz
*.cat
*.coop
*.info
*.jobs
*.mil
*.mobi
*.museum
*.name
*.pro
*.tel
*.travel

This is insanity. ICANN's mission statement is not to facilitate "the largest marketing and branding opportunities in history." Its to manage and preserve the operational stability of the Internet's addressing systems! When the hell did it become being a stooge for the world's ISPs?

Fuck. This. Shit.

ICANN == Whores


The Innovation Problem
Topic: Technology 4:08 pm EST, Dec 28, 2008

A series of Paul Graham's articles has led me to something I'm calling the Innovation Problem. Essentially it started when I read his article After Credentials. I enjoyed it article, but found this part is odd:

Do they let energetic young people get paid market rate for the work they do? The young are the test, because when people aren't rewarded according to performance, they're invariably rewarded according to seniority instead.
...
If people who are young but smart and driven can make more by starting their own companies than by working for existing ones, the existing companies are forced to pay more to keep them.

This statement about motives seemed out of sync with his essay Great Hackers:

Great programmers are sometimes said to be indifferent to money. This isn't quite true. It is true that all they really care about is doing interesting work. But if you make enough money, you get to work on whatever you want, and for that reason hackers are attracted by the idea of making really large amounts of money. But as long as they still have to show up for work every day, they care more about what they do there than how much they get paid for it.

Perhaps this is because Graham is talking about a general case of person in the first essary and a subset of people (Specifically great programmers) in the second.

Now, I don't consider myself a super hacker and nor would I ever compare myself to someone like RTM or others Graham has mentioned. Quite the contrary I've gone out of my way to deny unwarranted comparisons. I do however consider myself a hacker and I understand exactly what Graham means in his 2nd essay.

I think that performance metrics are one half of a two sided coin, depending on what drives you are a person: pay or project.

Let me explain. I work for a Fortune 15 technology corporation. They pay me very, very, very well. However in return I'm subjected to (with a fair bit of good things) unbelievably stupid bullshit. They don't seem to realize that I couldn't give 2 shits about their money otherwise I'd have alot less bullshit in my life.

Jay Chaudhry met with me twice in the spring of 2008 and asked me to join his new start up Zscalar. I turned him down for a couple reasons, the biggest being he kept appealing to the wrong side of me. He kept talking dollars, he never talked projects. How are you doing "in the cloud" security. Are you buying or building? ... [ Read More (0.4k in body) ]

The Innovation Problem


A Cost Analysis of Windows Vista Content Protection
Topic: Technology 11:24 am EST, Jan 27, 2007

This document looks purely at the cost of the technical portions of Vista's content protection [Note B]. The political issues (under the heading of DRM) have been examined in exhaustive detail elsewhere and won't be commented on further, unless it's relevant to the cost analysis. However, one important point that must be kept in mind when reading this document is that in order to work, Vista's content protection must be able to violate the laws of physics, something that's unlikely to happen no matter how much the content industry wishes that it were possible [Note C].

Nicely put together article that avoids preaching most of the dogma around DRM.

A Cost Analysis of Windows Vista Content Protection


The Anatomy of a Large-Scale Hypertextual Web Search Engine
Topic: Technology 10:09 pm EDT, Jun 25, 2005

The Anatomy of a Large-Scale Hypertextual Web Search Engine
Sergey Brin and Lawrence Page
{sergey, page}@cs.stanford.edu
Computer Science Department, Stanford University, Stanford, CA 94305
Abstract

In this paper, we present Google, a prototype of a large-scale search engine which makes heavy use of the structure present in hypertext.

Brin and Page's original paper about Google while grad students at Stanford. Good reference for understanding how spiders/crawlers index, how you can search massive amounts of data efficently, etc.

The Anatomy of a Large-Scale Hypertextual Web Search Engine


Massive cow manure mound burns for third month
Topic: Miscellaneous 7:32 pm EST, Jan 29, 2005

] But Dickinson, who makes his living in the cattle
] business, has an environmental problem on his hands that
] is vexing state officials: a 2,000-ton pile of burning
] cow manure.

Buring shit.

Massive cow manure mound burns for third month


Ten Mint Ten
Topic: Miscellaneous 1:01 am EST, Feb  7, 2004

Home shopping follies. The mix of rednecks and swords.

[ hahahahhahahaha! What a fricking moron! Also, what quality in those "katanas"... awesome. one of the funniest things i've seen in weeks. -k]

This was so worth trying to get Quicktime to work in Linux

Ten Mint Ten


 
 
Powered By Industrial Memetics
RSS2.0