Researchers at the University of Washington have discovered serious flaws in the way that the copyright cartel's enforcers detect and complain about copyright infringement. The methods used by these enforcers are so sloppy that they sent a DMCA takedown notice to three campus laser-printers
, alleging that the inanimate objects were downloading Iron Man and Indiana Jones.
And yet these companies expect universities to take their notices seriously and spend their operating capital chasing down every wild accusation they make.
In two separate studies in August of 2007 and May of this year, the researchers set out to examine who was participating in BitTorrent file-sharing networks and what they were sharing. The researchers introduced software agents into these networks to monitor their traffic. Even though those software agents did not download any files, the researchers say they received over 400 take-down requests accusing them of participating in the downloads.
The researchers concluded that enforcement agencies are looking only at I.P. addresses of participants on these peer-to-peer networks, and not what files are actually downloaded or uploaded–a more resource-intensive process that would nevertheless yield more conclusive information.
In their report, the researchers also demonstrate a way to manipulate I.P. addresses so that another user appears responsible for the file-sharing.
An inanimate object could also get the blame. The researchers rigged the software agents to implicate three laserjet printers, which were then accused in takedown letters by the M.P.A.A. of downloading copies of “Iron Man” and the latest Indiana Jones film.
CSIR-Tech is the commercial arm of the Indian government’s Council of Scientific and Industrial Research; after spending ₹50 crore (about USD7.6M) pursuing more than 13,000 “bio-data patents” (patents of no real value save burnishing the credentials of the scientists whose names appear on them), they have run out of money and shut down.
Troy Hunt, proprietor of the essential Have I Been Pwned (previously) sets out the hard lessons learned through years of cataloging the human costs of breaches from companies that overcollected their customers’ data; undersecured it; and then failed to warn their customers that they were at risk.
The World Wide Web Consortium has announced that its members have until April 19 to weigh in on whether the organization should publish Encrypted Media Extensions, its DRM standard for web video, despite the fact that this would give corporations the new right to sue people who engaged in legal activity, from security researchers who […]
The Raspberry Pi Foundation has done outstanding work packing a fully capable desktop computer into a package the size of a deck cards—especially one that only costs $35. But if you already have a working laptop, why should you care? Oh, how much you have to learn. Besides operating well as a compact digital media hub, […]
Custom coffee vessels are the perfect piece of office flair, but it’s just a matter of time before your VOTE FOR PEDRO mug will start to lose its relevant wit. Why not have a new one every day, with whatever silly nonsense you want sticking off the sides? You can save big on your novelty […]
The Lightning port has thus far resisted the cruel fate that befell the headphone jack, and despite rumors that it may be disappearing come iPhone 8, for the present and foreseeable future, Lightning cables are a hot commodity for iPhone users. As such, we must make do in this strange time in which long, glorified […]