A member of Germany's Social Democrat party has defected for the Pirate Party, making him the first Pirate Party member in German parliament. Glyn explains, "Tauss left the Social Democrats after the party helped to pass a law mandating ISPs block a list of websites in a attempt to stop child porn. Tauss argues that it's the first step towards an extensive Internet censorship regimen and it will not work in its stated aim."
Tauss is being investigated for possession of child porn images that he says he downloaded as part of his ministerial investigation into the propagation of child porn.
Although Tauss is known for his experience in information technology matters and he has a track record in investigating child porn websites, he said the decision to give the government powers to close such sites down is a mistake.
Tauss becomes first 'Pirate' in parliament after leaving SPD
He released a statement on Friday explaining his departure from the SPD, saying that although he agreed with many points of the party's programme, there was a "terrible wrong turn eing taken" in domestic, legal and internet policy.
He promised to continue to vote with the SPD in matters unrelated to these topics, but the party has demanded he step down from his parliamentary seat.
(Thanks, Glyn and everyone else who suggested this!
Redditor Vadermeer was in a local Goodwill Outlet and happened on a trove of files from Apple engineer Jack MacDonald from 1979-80, when he was manager of system software for the Apple II and ///.
Charles Duan from Public Knowledge sends us “a video we put together for Fair Use Week about copyright and fair use, to the tune of ‘Let It Go’ from Frozen, and full of clips of other fair use videos.”
An excellent excerpt from Aaron Perzanowski and Jason Schultz’s The End of Ownership: Personal Property in the Digital Economy on Motherboard explains how Section 1201 of the 1998 Digital Millennium Copyright Act — which bans tampering with or bypassing DRM, even for legal reasons — has allowed corporations to design their products so that using […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]