The MPAA has updated one of its more ridiculous pro-censorship arguments; five years ago, they were telling lawmakers that blocking P2P would help block child pornography. Now they've presented at an information meeting in Mexico on ACTA, the Anti-Counterfeiting Trade Agreement, a secret, far-reaching copyright treaty that contains provisions for China-style censoring firewalls for every country. The MPAA wants these national firewalls to block sites like The Pirate Bay, but the case they've made to lawmakers for it is: "Bring in a censoring firewall to block piracy and you can use it to shut off sites that embarrass your government, like Wikileaks."
You can almost imagine the MPAA rep dry-washing his hands and licking his lips like a grand vizier manipulating a gullible sultan as he utters these words. During the Bush years, the MPAA recruited a bunch of Republican stalwart, ultra-conservative foot-soldiers (one of them told me that he believed in the Young Earth and Creationism). I can imagine that if you're one of these square-jawed rock-ribbed types, you could believe that the government had the right to cover up murder and torture by blocking Wikileaks.
In an open information meeting at the Ministry of the Economy in Mexico about ACTA last week. There were two oddities that they called attention to. The first is that there was an MPAA representative at the meeting, who apparently asked whether or not ACTA could be used to block access to "damaging" sites like Wikileaks. As the Open Acta Mexico people asked, what does Wikileaks have to do with movies? It seems like an interesting question, though, and I'm assuming that the MPAA is using Wikileaks as an example of a site they deem "dangerous" to get the idea across, so that later when they designate other sites (say... The Pirate Bay....) as dangerous, they can use this to make the case it should be blocked. Nice to see the MPAA is so blatant about using copyright for censorship...
Philips has acquired Luciom, a French startup that makes Li-Fi products, which allow for very fast network connections over short distances by flickering an LED at speeds that are too fast to register on the human eye, and which can ever work in the dark by operating at low dimness settings the human eye perceives […]
Many insurers offer breaks to people who wear activity trackers that gather data on them; as Cathy “Mathbabe” O’Neil points out, the allegedly “anonymized’ data-collection is trivial to re-identify (so this data might be used against you), and, more broadly, the real business model for this data isn’t improving your health outcomes — it’s dividing […]
As the US government ramps up its insistence that visitors (and US citizens) unlock their devices and provide their social media accounts, the solution have run the gamut from extreme technological caution, abandoning mobile devices while traveling, or asking the government to rethink its policy. But Maciej Cegłowski has another solution: a “travel mode” for […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]