Hard News: Get yer avatars out
195 Responses
First ←Older Page 1 2 3 4 5 6 … 8 Newer→ Last
-
the primary social role of a good government is to keep people happy.
something makes me a little uncomfortable with that statement.
-
I'm sorry about that jon. 'Happy' may be to slaphappy a word, basically I wrote that with an eye towards their basic mandate to govern vis à vis the habitual inclintions of those who give it to them,as opposed to whatever this is that they have going on, from my 'happy' perspective somewhere, where it's a non-issue.
-
Don't really wish to be a negative nancy, but wouldn't it be prudent to at least wait until March 27 before declaring "victory"?
The TCF policy is still in draft form, so the implementation of 92A was always going to have to be delayed by the Government to protect the large telcos until they sort their shit out. -
TracyMac: for sure, you can do that, but not with the low-end kit that most consumers and small businesses will buy or the sysadmin time/skill they can afford. Eg my tiny router at home in its default state will hand out addresses happily without any logging or login process in its default state.
-
Don't really wish to be a negative nancy, but wouldn't it be prudent to at least wait until March 27 before declaring "victory"?
Maybe, but getting any movement at all from the Government, is a significant step, after the resolute stonewalling from officials and elected members.
The TCF policy is still in draft form, so the implementation of 92A was always going to have to be delayed by the Government to protect the large telcos until they sort their shit out.
No, no, no. You're applying logic. The Government (both Labour and National) has repeatedly said that implementation would occur on the 28th, so that means regardless of whether the Code of Practice was complete. It was particularly WTF that the closing date for submissions was always after the implementation date.
While the Code may act as a de facto regulatory framework, it has no status in law at present, which is a major chickenshit move by government officials in that they should have been drawing up real regulations for this Act.
-
the primary social role of a good government is to keep people happy.
something makes me a little uncomfortable with that statement.
Sounds like someone needs a gramme of soma. Remember citizen, a gramme is better than a damn!
While the Code may act as a de facto regulatory framework, it has no status in law at present, which is a major chickenshit move by government officials in that they should have been drawing up real regulations for this Act.
Correct.
-
I was trying to exp,lain to a 'merkin friend that "we'd won!, well we got a postponement, and maybe a seat at the table" - he responded "Sometimes it works -- in a creaky, Brazil sort of way"
-
RIANZ says its evidence is “highly reliable, well-tested and accepted worldwide”.
Later in TFA we read this:
RIANZ does not want the notices sent out to users accused of infringement to include evidence that would be admissible in court.
You see, as Stephen so rightly said, they *know* their evidence doesn't stack up. If this is not a reason to oppose a deal with these guys I really don't know what is.
-
This article is very interesting, those of a more technical mind may be able to offer some comment on it:
-
Bruce: spot-on. This excerpt from their concluding paragraph is exactly what I was thinking:
Although content providers are increasingly relying on systematic monitoring of P2P networks as a basis for deterring copyright infringement, some currently used methods of identifying infringing users are not conclusive. Through extensive measurement of tens of thousands of BitTorrent swarms and analysis of hundreds of DMCA complaints, we have shown that a malicious user can implicate arbitrary network endpoints in copyright infringement, and additional false positives may arise due to buggy software or timing effects.
Also, their paper suggests that the logical next step for recording companies is to pressure ISPs to start intrusive logging. I think they're right, and the next big policy thing in this space, probably in conjunction with aligning with ACTA, will be requiring network operators above a certain size to keep detailed records of user behaviour.
-
Why so uncommunicatively (?) long?
Disney made a lot of classic films and bought the rights to various books, like Winnie The Pooh, starting in the 1930's. With a 75 year (or 50 years after the author's death for the book rights) copyright term, these would now have expired and thus their movies would be in the public domain.
Disney, as a large corporation and owner of the ABC TV network, was able to pressure the US Congress into extending copyright terms.
-
Disney, as a large corporation and owner of the ABC TV network, was able to pressure the US Congress into extending copyright terms.
Hence the nickname of the bill, "Mickey Mouse Protection Act" ("The Goofy Clusterfuck" was already taken).
-
"The Goofy Clusterfuck"
Is that any relation to the legendary wrap party after one of Disney's most famous movies, the Snow White Orgy?
-
In addition to what Stephen Judd said, it's worth noting that IP address forgery or spoofing is trivial to accomplish.
An IP address doesn't identify users in the same way a registration plate on a car leads to the driver of the vehicle (and even that can be easily faked).
Imagine what fun script kiddies will have from now on, putting other people's IP addresses into the totally reliable detection systems used by the entertainment industry surveillance contractors, and firing up those downloads...
-
Juha - I wonder if that function will become part of the bittorrent clients sometime soon.
I have another article link (for those interested), that describes some innovative ways that some record labels are using to combat the piracy problem:
http://www.fastcompany.com/resources/marketing/manners/112904.html?page=0%2C0
-
Juha, IP spoofing is not that trivial. Not for any conversation longer than one IP packet, as a download almost certainly will be. It can cause trouble, but I imagine the trouble would mostly be on the spoofer, not the spoofed.
-
I wonder if that function will become part of the bittorrent clients sometime soon.
Exactly. Last year I switched to a bittorrent client which used encoding, as my ISP was strangling my old client.
The demand is there, the technology will move ahead.
-
You can send IP packets with any source address, but a well configured router will reject them. You won't of course get any packets back, so like Ben says, it's no good for messages that are longer than 1500 bytes or require a reply.
I'm unconvinced you could register as a torrent host that way.
BitTorrent encryption is a different beast, but does run into the issue of how you share keys between host and downloader.
-
I am now officially Sean Plunket's biggest fan...
http://podcast.radionz.co.nz/mnr/mnr-20090224-0721-Controversial_copryright_analysis-048.mp3
Quote du jour:
"are you going to leave this law on the books even though it is, ah, rubbish?"
-
I just listened to that clip - and I second that statement.
-
As I understand it, spoofing TCP/IP conversations is only possible on the Hollywood OS
-
Hollywood OS
All computer dialogs, especially Virus Detected or Access Denied are displayed full screen.
-
Rich
You missed the tags:
<blink></blink>
-
All computers can be hacked remotely whether they are connected to a network or not. Once hacked, the hacker has total control, including locking out anyone actually using the machine.
-
Did we notice that Dylan Horrock's cartoon is now leading on the Pirate Bay?
Post your response…
This topic is closed.