Announcement

Collapse
No announcement yet.

RIAA vs. hackers WAR?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • In the current situation, I wouldn't even be amazed if the p2p community would become tolerant for people in the US not sharing but only leeching files. A strong "us vs. them" spirit rising. RIAA would have to stamp out entire networks or manage to spread this to the international arena in order to eliminate illegal sharing. Currently they are just hurting their image in the US, not seriously thwarting any activity.
    Cake and grief counseling will be available at the conclusion of the test. Thank you for helping us help you help us all!

    Comment


    • well that's the thing.

      If people overseas keep on being supernodes ( I think this is the term Kazaa uses) overseas, it won't hurt availibility of songs at all. Espeically those in countries such as China.

      But the problem there lies that peole over there have crappy songs . I was searching for some old Iron Maiden songs just now, they are getting hard to find.

      How much american heavy metal do they listen to over there? Especially the older stuff.

      Many people are already being *******s by not sharing songs. It looks like I'll have to join the club. Damn RIAA.

      Comment


      • If all the Americans stopped sharing files, it would hurt a bit BUT it wouldn't stop anything. All the same files would be shared. Americans would just have to settle for leeching, but that's ok. And still some communities can set up private little networks and share their stuff with each other. Nothing stops, or even slows down.

        And when people learn how to protect themselves better, p2p-networks are even hotter than ever. They have to close down every network, and I don't think that's going to work.
        In da butt.
        "Do not worry if others do not understand you. Instead worry if you do not understand others." - Confucius
        THE UNDEFEATED SUPERCITIZEN w:4 t:2 l:1 (DON'T ASK!)
        "God is dead" - Nietzsche. "Nietzsche is dead" - God.

        Comment


        • Copyright law has gotten way out of hand in the US, the founding fathers must be spinning in their graves.

          But about the war. The hackers will win and god bless them.
          For your photo needs:
          http://www.canstockphoto.com?r=146

          Sell your photos

          Comment


          • The hackers will win and god bless them.



            To us, it is the BEAST.

            Comment


            • I like this part the best:

              The research papers state that computer users who share files might use the new hardware-based security systems to create a "Darknet," a secure, but illegal network for sharing digital movies and music or other illicit information that could be exceptionally hard for security experts to crack.


              A Safer System for Home PC's Feels Like Jail to Some Critics

              By JOHN MARKOFF


              SAN FRANCISCO, June 29 — Your next personal computer may well come with its own digital chaperon.

              As PC makers prepare a new generation of desktop computers with built-in hardware controls to protect data and digital entertainment from illegal copying, the industry is also promising to keep information safe from tampering and help users avoid troublemakers in cyberspace.

              Silicon Valley — led by Microsoft and Intel — calls the concept "trusted computing." The companies, joined by I.B.M., Hewlett-Packard, Advanced Micro Devices and others, argue that the new systems are necessary to protect entertainment content as well as safeguard corporate data and personal privacy against identity theft. Without such built-in controls, they say, Hollywood and the music business will refuse to make their products available online.

              But by entwining PC software and data in an impenetrable layer of encryption, critics argue, the companies may be destroying the very openness that has been at the heart of computing in the three decades since the PC was introduced. There are simpler, less intrusive ways to prevent illicit file swapping over the Internet, they say, than girding software in so much armor that new types of programs from upstart companies may have trouble working with it.

              "This will kill innovation," said Ross Anderson, a computer security expert at Cambridge University, who is organizing opposition to the industry plans. "They're doing this to increase customer lock-in. It will mean that fewer software businesses succeed and those who do succeed will be large companies."

              Critics complain that the mainstream computer hardware and software designers, under pressure from Hollywood, are turning the PC into something that would resemble video game players, cable TV and cellphones, with manufacturers or service providers in control of which applications run on their systems.

              In the new encrypted computing world, even the most mundane word-processing document or e-mail message would be accompanied by a software security guard controlling who can view it, where it can be sent and even when it will be erased. Also, the secure PC is specifically intended to protect digital movies and music from online piracy.

              But while beneficial to the entertainment industry and corporate operations, the new systems will not necessarily be immune to computer viruses or unwanted spam e-mail messages, the two most severe irritants to PC users.

              "Microsoft's use of the term `trusted computing' is a great piece of doublespeak," said Dan Sokol, a computer engineer based in San Jose, Calif., who was one of the original members of the Homebrew Computing Club, the pioneering PC group. "What they're really saying is, `We don't trust you, the user of this computer.' "

              The advocates of trusted computing argue that the new technology is absolutely necessary to protect the privacy of users and to prevent the theft of valuable intellectual property, a reaction to the fact that making a perfect digital copy is almost as easy as clicking a mouse button.

              "It's like having a little safe inside your computer," said Bob Meinschein, an Intel security architect. "On the corporate side the value is much clearer," he added, "but over time the consumer value of this technology will become clear as well" as more people shop and do other business transactions online.

              Industry leaders also contend that none of this will stifle innovation. Instead, they say, it will help preserve and expand general-purpose computing in the Internet age.

              "We think this is a huge innovation story," said Mario Juarez, Microsoft's group product manager for the company's security business unit. "This is just an extension of the way the current version of Windows has provided innovation for players up and down the broad landscape of computing."

              The initiative is based on a new specification for personal computer hardware, first introduced in 2000 and backed by a group of companies called the Trusted Computing Group. It also revolves around a separate Microsoft plan, now called the Next Generation Secure Computing Base, that specifies a tamper-proof portion of the Windows operating system.

              The hardware system is contained in a set of separate electronics that are linked to the personal computer's microprocessor chip, known as the Trusted Platform Module, or T.P.M. The device includes secret digital keys — large binary numbers — that cannot easily be altered. The Trusted Computing Group is attempting to persuade other industries, like the mobile phone industry and the makers of personal digital assistants, to standardize on the technology as well.

              The plans reflect a shift by key elements of the personal computer industry, which in the past had resisted going along with the entertainment industry and what some said they feared would be draconian controls that would greatly curtail the power of digital consumer products.

              Industry executives now argue that by embedding the digital keys directly in the hardware of the PC, tampering will be much more difficult. But they acknowledge that no security system is perfect.

              The hardware standard is actually the second effort by Intel to build security directly into the circuitry of the PC. The first effort ended in a public relations disaster for Intel in 1999 when consumers and civil liberties groups revolted against the idea. The groups coined the slogan "Big Brother Inside," and charged that the technology could be used to violate user privacy.

              "We don't like to make the connection," said Mr. Meinschein. "But we did learn from it."

              He said the new T.P.M. design requires the computer owner to switch on the new technology voluntarily and that it contains elaborate safeguards for protecting individual identity.

              The first computers based on the hardware design have just begun to appear from I.B.M. and Hewlett-Packard for corporate customers. Consumer-oriented computer makers like Dell Computer and Gateway are being urged to go along but have not yet endorsed the new approach.

              How consumers will react to the new technology is a thorny question for PC makers because the new industry design stands in striking contrast to the approach being taken by Apple Computer.

              Apple has developed the popular iTunes digital music store relying exclusively on software to restrict the sharing of digital songs over the Internet. Apple's system, which has drawn the support of the recording industry, permits consumers to share songs freely among up to three Macintoshes and an iPod portable music player.

              Apple only has a tiny share of the personal computer market. But it continues to tweak the industry leaders with its innovations; last week, Apple's chief executive, Steven P. Jobs, demonstrated a feature of the company's newest version of its OS X operating system called FileVault, designed to protect a user's documents without the need for modifying computer hardware.

              Mr. Jobs argued that elaborate hardware-software schemes like the one being pursued by the Trusted Computing Group will not achieve their purpose.

              "It's a falsehood," he said. "You can prove to yourself that that hardware doesn't make it more secure."

              That is not Microsoft's view. The company has begun showing a test copy of a variation of its Windows operating system that was originally named Palladium. The name was changed last year after a trademark dispute.

              In an effort to retain the original open PC environment, the Microsoft plan offers the computer user two separate computing partitions in a future version of Windows. Beyond changing the appearance and control of Windows, the system will also require a new generation of computer hardware, not only replacing the computer logic board but also peripherals like mice, keyboards and video cards.

              Executives at Microsoft say they tentatively plan to include the technology in the next version of Windows — code-named Longhorn — now due in 2005.

              The company is dealing with both technical and marketing challenges presented by the new software security system. For example, Mr. Juarez, the Microsoft executive, said that if the company created a more secure side to its operating system software, customers might draw the conclusion that its current software is not as safe to use.

              Software developers and computer security experts, however, said they were not confident that Microsoft would retain its commitment to the open half of what is planned to be a two-sided operating system.

              "My hackles went up when I read Microsoft describing the trusted part of the operating system as an option," said Mitchell D. Kapor, the founder of Lotus Development Corporation, and a longtime Microsoft competitor. "I don't think that's a trustworthy statement."

              One possibility, Mr. Kapor argued, is that Microsoft could release versions of applications like its Office suite of programs that would only run on the secure part of the operating system, forcing users to do their work in the more restricted environment.

              Microsoft denies that it is hatching an elaborate scheme to deploy an ultra-secret hardware system simply to protect its software and Hollywood's digital content. The company also says the new system can help counter global cybercrime without creating the repressive "Big Brother" society imagined by George Orwell in "1984."

              Microsoft is committed to "working with the government and the entire industry to build a more secure computing infrastructure here and around the world," Bill Gates, Microsoft's chairman, told a technology conference in Washington on Wednesday. "This technology can make our country more secure and prevent the nightmare vision of George Orwell at the same time."

              The critics are worried, however, that the rush to create more secure PC's may have unintended consequences. Paradoxically, they say, the efforts to lock up data safely against piracy could serve to make it easier for pirates to operate covertly.

              Indeed, the effectiveness of the effort to protect intellectual property like music and movies has been challenged in two independent research papers. One was distributed last year by a group of Microsoft computer security researchers; a second paper was released last month by Harvard researchers.

              The research papers state that computer users who share files might use the new hardware-based security systems to create a "Darknet," a secure, but illegal network for sharing digital movies and music or other illicit information that could be exceptionally hard for security experts to crack.

              "This is a Pandora's box and I don't think there has been much thought about what can go wrong," said Stuart Schechter, a Harvard researcher who is an author of one of the papers. "This is one of those rare times we can prevent something that will do more harm than good."
              The ways of Man are passing strange, he buys his freedom and he counts his change.
              Then he lets the wind his days arrange and he calls the tide his master.

              Comment


              • Ross Anderson
                The TCPA FAQ by him: http://www.againsttcpa.com/tcpa-faq-en.html

                Call me paranoid, but I'm quite worried about this progress. I will think twice before getting a system with trusted computing in the future. It might seem quite comfy and freeform now, but who knows what'll come out of this.

                A worst-case scenario would be, say, open source software being declared "insecure" and unsupported, resulting in a computer that won't boot with it installed. Circumventing this in the US would be a federal crime, of course. Not to mention the freedom of speech issues mentioned in the above FAQ.

                It boils down to what I am allowed to do with things I own. A bit same with recording companies that really don't want to sell you the CD, but merely a permission to listen to it.
                Cake and grief counseling will be available at the conclusion of the test. Thank you for helping us help you help us all!

                Comment


                • Originally posted by optimus2861
                  Note that I never said "music" or "RIAA" in my little turnabout, because I'm trying to separate the specific case from the general description. And you didn't really answer my question: what if it were your stuff? Your music, your short-story, your computer program, your artwork, what have you?
                  My counterpoint is this doesn't happen. People will pay you if they like your stuff, because they want you to produce more of it. It's the same regardless whether your stuff is music, artwork, computer program, short story, etc.

                  Originally posted by optimus2861
                  Unauthorized distribution of copryighted works = violation of copyright law = actionable in a court of law. Just because RIAA has been completely brain-dead in their public relations handling of the file-sharing era, it doesn't change the laws of the land.
                  Copyright law is to prevent the owner(s) from material losses. As it was pointed out before, it is very hard to prove such losses. Of course, the letter of the law allows people to be sued without any actual losses, but it will be much harder to persuade the court to hear it. Besides, without losses, what would the RIAA seek in compensation (remember, copyright is mostly civil)?
                  (\__/) 07/07/1937 - Never forget
                  (='.'=) "Claims demand evidence; extraordinary claims demand extraordinary evidence." -- Carl Sagan
                  (")_(") "Starting the fire from within."

                  Comment


                  • Originally posted by Promethus
                    "My hackles went up when I read Microsoft describing the trusted part of the operating system as an option," said Mitchell D. Kapor, the founder of Lotus Development Corporation, and a longtime Microsoft competitor. "I don't think that's a trustworthy statement."


                    Originally posted by Promethus
                    One was distributed last year by a group of Microsoft computer security researchers
                    Oh yeah, deliciously ironic.
                    (\__/) 07/07/1937 - Never forget
                    (='.'=) "Claims demand evidence; extraordinary claims demand extraordinary evidence." -- Carl Sagan
                    (")_(") "Starting the fire from within."

                    Comment


                    • I just read an article, new one, but I lost the page so I can only tell what I remember, sorry.

                      They were monitoring p2p-networks after announcing the new aggressive plan. After 10 hours, there were less transfers than in a long time, but after 24 hours, people got their second wind and it was back in business 100%, in the US. And that about now, there is no difference in users, or available files than a month ago. SO that much for scaring tactics.
                      In da butt.
                      "Do not worry if others do not understand you. Instead worry if you do not understand others." - Confucius
                      THE UNDEFEATED SUPERCITIZEN w:4 t:2 l:1 (DON'T ASK!)
                      "God is dead" - Nietzsche. "Nietzsche is dead" - God.

                      Comment


                      • well we have to wait until a few high profile cases of individuals being sued by the RIAA.

                        As of right now, until they actually do something, it is all talk- no action.

                        Comment


                        • What are you waiting for? Of course they will sue some people. THey have said they will do it, so I'll expect them to make some law suits. So.. what gives?
                          In da butt.
                          "Do not worry if others do not understand you. Instead worry if you do not understand others." - Confucius
                          THE UNDEFEATED SUPERCITIZEN w:4 t:2 l:1 (DON'T ASK!)
                          "God is dead" - Nietzsche. "Nietzsche is dead" - God.

                          Comment


                          • I had a longer reply worked up the other night, but then I had a brownout and it went *poof* . Must be a sign that it's time to move on from this thread...

                            One quick comment:

                            Originally posted by Urban Ranger
                            Copyright law is to prevent the owner(s) from material losses.
                            Excellent point, I may have lost sight of this. I'll have to keep this in mind for the next time this topic gets kicked around.
                            "If you doubt that an infinite number of monkeys at an infinite number of typewriters would eventually produce the combined works of Shakespeare, consider: it only took 30 billion monkeys and no typewriters." - Unknown

                            Comment


                            • RIAA's Most Wanted

                              "The subpoenas are flying, and we're naming names. Are you on the list?"

                              link

                              "Relax, pay your income tax!" - The Fast Show
                              "Once you discover white paint, you'll never wash your underwear again." - Conan O'Brien

                              Comment


                              • Last month, we brought you the story of Jesse Jordan, a 19-year-old college student who became one of the first to be hit with a lawsuit by the RIAA. Jordan settled his case by paying $12,000 to the RIAA.

                                jesus? $12k from a student? Oh crapola, that's huge.
                                I feel sorry for the hunted friends in the US. Stay tough!
                                In da butt.
                                "Do not worry if others do not understand you. Instead worry if you do not understand others." - Confucius
                                THE UNDEFEATED SUPERCITIZEN w:4 t:2 l:1 (DON'T ASK!)
                                "God is dead" - Nietzsche. "Nietzsche is dead" - God.

                                Comment

                                Working...
                                X