On TechDirt, Glyn Moody reports the outrageous news that the Australian government refuses to release any substantive information on the secret copyright enforcement meetings it held, redacting nearly the entirety of the documents before releasing them to a Freedom of Information request. The government also claims that it can't release a list of attendees because it doesn't have such a list -- that is, the government doesn't know who was invited to its secret, eyes-only copyright meeting. Most orwellian is this, though, from the Attorney General's office: "Disclosure of the documents while the negotiations are still in process, would, in my view, prejudice, hamper and impede those negotiations to an unacceptable degree. That would, in my view, be contrary to the interests of good government -- which would, in turn, be contrary to the public interest."
What this really means is: "All hell will break loose when the public finds out what is being discussed behind closed doors. So what we're going to do is to come up with an agreement in secret, and then present it as a fait accompli, without offering citizens any options to change anything substantive. By contrast, to release the documents, and allow the public to have a say in how they should be allowed to use a critical 21st-century technology, would be contrary to the interests of this very good government, which by definition is identical with the public interest."
Australian Gov't: Not In The Public Interest For The Public To Be Interested In Secret Anti-Piracy Negotiations
Charles Duan from Public Knowledge sends us “a video we put together for Fair Use Week about copyright and fair use, to the tune of ‘Let It Go’ from Frozen, and full of clips of other fair use videos.”
An excellent excerpt from Aaron Perzanowski and Jason Schultz’s The End of Ownership: Personal Property in the Digital Economy on Motherboard explains how Section 1201 of the 1998 Digital Millennium Copyright Act — which bans tampering with or bypassing DRM, even for legal reasons — has allowed corporations to design their products so that using […]
Securelist’s report on the security vulnerabilities in Android-based “connected cars” describes how custom Android apps could be used to find out where the car is, follow it around, unlock its doors, start its engine, and drive it away.
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]
Learning new skills is a great way to improve your resume and stand out from other candidates. Especially in a workforce in which many job-seekers have a wide variety of qualifications. With lifetime access to Virtual Training Company, you won’t have to choose a specific focus. You can pick up new expertise whenever you deem it […]