On Wednesday, the EU will vote on whether to force all online platforms to filter user-generated content against massive databases of copyrighted works (anyone can add anything to these databases, without penalties for abuse); not only is this a catastrophe for everyone who writes software that will have to comply with this bonkers idea, it's also a catastrophe for anyone who writes software, period.
That's because the rules will include copyright filtering for shared code in online repositories. Algorithmically determining whether a code fragment infringes copyright is, of course, impossible, but it will nevertheless be mandatory.
Github is leading the charge against this, and in an excellent post, they explain what developers need to do about this (hint, visit Save Your Internet).
We kicked off the event with our own Julio Avalos giving a big-picture look at where this proposal fits into the tech policy landscape. We explained that the copyright proposal would affect developers by requiring upload filters (Article 13), imposing a “link tax” (Article 11), and leaving text and data mining restricted (Article 3). Mårten Mickos, CEO of HackerOne, emphasized the proposal’s impacts on open source software for HackerOne and in the EU. Then, we moderated a panel with Wikimedia Foundation’s Senior Public Policy Manager, Jan Gerlach, Reddit’s Director of Policy, Jessica Ashooh, and EFF’s International Director, Danny O’Brien covering their communities’ involvement in advocacy and their thoughts on future implications of the proposal.
How developers can defend open source from the EU copyright proposal [Vollmera/Github]
Denuvo bills itself as the best-of-breed in games DRM, the most uncrackable, tamper-proof wrapper for games companies; but its reputation tells a different story: the company's products are infamous for falling quickly to DRM crackers and for interfering with game-play until you crack the DRM off the products you buy.
Locking bootloaders with trusted computing is an important step towards protecting users from some of the most devastating malware attacks: by allowing the user to verify their computing environment, trusted computing can prevent compromises to operating systems and other low-level parts of their computer's operating environment.
The Yokohama Board of Education has posted scans of six fantastic catalogs from Hirayama Fireworks and Yokoi Fireworks, dating from the early 1900s. The illustrated catalogs are superb, with minimal words: just beautiful colored drawings depicting the burst-pattern from each rocket.
What do you get for the techie who has everything? How about giving them a Raspberry Pi and letting them make pretty much anything. Or better yet, do it for yourself with the Ultimate Raspberry Pi eBook Bundle. This trove of ideas and education unlocks the unlimited potential of this mini-computer, whose affordability and versatility […]
Note-taking just caught up to the digital age. For most of us, writing freehand is quicker and more convenient than pecking away on a tablet, but what to do when you need those scribbles on file? Grab a Rocketbook Everlast Reusable Notebook, which seamlessly fuses analog and digital notes. Just jot down your thoughts, journals […]
Remember the cartoons of your youth? There’s a good reason. Nothing sparks the imagination like well-done animation. And whether you need a logo in motion or just want to bring your own imagination to life, CrazyTalk Animator 3 Pro is the tool that can take you there. Easy enough for casual users but with all […]