Comment Re:URL shorteners, anyone? (Score 1) 198
If they wanted to protect users from malware, why would they make a feature where the user could inadvertently run remote code from a link?
If they wanted to protect users from malware, why would they make a feature where the user could inadvertently run remote code from a link?
Worse is how game console mfgs, Apple and others use Digital Restrictions Management to control what you can do with your computing devices. Microsoft is trying to get this on general purpose computers with their "Secure Boot" initiative. In the near future, you may not be able to buy a device which you can install the OS/software of your choice (or programs you write). You will only be able to run what the mfg allows.
CBDTPA and "Trusted Computing" are blueprints for how we are going to be controlled.
Well, at least you can still download 3.6.x from releases.mozilla.org. Though I hear they will stop updating 3.6 soon...
You are assuming computers have psychic mind powers to determine the intent of people using the service. The company was running a Bayesian phishing filter, but even this wasn't perfect. What do you expect them to do?
What "search"? Unless I misunderstood the story, the Feds contacted the site's registrar (GoDaddy) and asked for it to be shut down. The website's database was obviously hosted someplace else as the JotForm registered jotform.net and pointed it to their host, putting their entire database back online.
Yeah, right. The whole of Usenet receives far more than 200 posts/hour. That is why it is divided into newsgroups, so you don't have to drink from a firehose.
When you say Slashdot (or other web boards) "works fairly well," it just shows you've never used a decent Usenet newsreader program. A threaded newsreader blows away by far even the most "advanced" web boards I've ever seen.
You mean like the CBDTPA? They already tried that ten years ago.
Actually we need to both "stand up against censorship in the streets" and create "dark unknown meshnets" which evade censorship and surveillance.
Which is why you probably shouldn't use your real name when posting on the Internet. Then again, the government probably has a way to track you anyway. Don't some of the major ISPs have government hardware running on site?
Considering most MS Windows lusers, they'll probably be comforted knowing they can't load any "rogue" software. Even though there will be plenty of security holes for malware to get through, including Microsoft signing it.
(Yeah, mod me down microserfs. I don't care!)
No problem. Since Hollywood is going bankrupt from "rampant piracy," you can probably hire the Oceans Eleven team to pick up your stuff for dirt cheap.
I agree with you, but as I recall, the RIAA and friends sued anyone who tried to create P2P technology. Which is why "we failed to develop P2P networking"--everyone was afraid to do it.
If this law would only combat copyright infringement, I would be all for it. But it doesn't. This law is based on blocking from vague accusations just like the DMCA, and look how that law has been abused. Takedown requests generated by bots who select files which have the same words as the title of a movie/song or whatever. Takedown requests for things they don't even own. And of course, religious organizations abused the DMCA to silence critics.
Then there are the lawsuits. Suing Veoh which destroyed them, even though they won the lawsuit. Then there is Viacom v. YouTube where viacom sued YouTube, even though Viacom was uploading the videos for promotion. Then there is this video which I am not sure I agree with, but he has a point.
Then there is what happened in Denmark.
It all seems to me that the big media companies main goal is to turn the Internet into a one way TV medium which doesn't allow user content, not protect their copyrights.
Hmm... this sounds familiar. Could it be this story?
"Except in some rural areas, there aren't many songs left," he says. "In the film we show how China saw this kind of music and the Tibetan culture as a threat. Tibet was never exposed to recorded music until China invaded Tibet in the late 1940s. So the first thing they did was they set up these loud speakers and they blasted Chinese propaganda music to brainwash Tibetan people. They took Tibetan folk melody and put Chinese communist lyrics. And they trained Tibetan singers to sing these songs."
The biggest difference between time and space is that you can't reuse time. -- Merrick Furst