The upgrade frenzy caused by Apple is really, really concerning. Just the labor practice alone[1][2] is appalling enough, not to mention the the amount of energy[3] it takes to produce a new device every 6 months. Can't people live with the same gadget for at least a couple/few years without going ape every time something new comes out?
[1] - http://thenextweb.com/apple/2010/02/27/apple-child-labor-china-history-sketchy-manufacturing/
[2] - http://www.zdnet.com/blog/government/apple-may-be-poisoning-chinese-workers-and-doesnt-seem-to-care-should-we/9908
[3] - http://www.enviroliteracy.org/article.php/1119.html
Hmm.. the author calls it an exploit in the article. Seems to me that anytime you devise a method to utilize something that it wasn't really intended for is indeed and exploit, hack, workaround, kludge, whatever.
I think it's marvelous this person found a way to use the system in a way it wasn't intended. He/She is probably very bright. Thing is though, if you're going to mess around in places you really aren't supposed to, don't be surprised if someone takes issue with it. That's the risk you take. Used to be people used pseudonyms to mitigate some of the risk, but that's a whole 'nother discussion on privacy vs. idiocy.
Dropship that allows users to exploit Dropboxâ(TM)s file hashing scheme to copy files into their account without actually having them."
I can see why they would be a bit ruffled over this. Seems like this could be in the same realm as an SQL injection attempt. It's just using JSON instead.
"First of all, attempting to protect a proprietary protocol is going to get them nowhere. "
Ok, that's a problem. The reason the protocol is proprietary is because the company has put a lot of time, money and effort into developing their product. They want to recoup some of the development costs through the implementation of their protocol.
The DMCA thing well
A password doesn't equate to security.
It would be a lot harder to prove someone else used your setup when it's 'secured' with a password, but it can happen. Besides passwords being a piss-poor way to secure *anything* these days, many people choose stuff like their kids names, or birthdays or other crappy dictionary words.
What's worse, is a lot of people and places are still using WEP, which is useless in terms of accountability, but it would be enough for a court to say "You say you secured your setup but someone cracked it anyway? Yeah, right"
Nobody I know (corporates included) use a password like(lei3%dk&l[_#=3 anyway because it's "too hard" for users to remember.
Passwords are pointless for proving, or disproving, accountability.
If the aborigine drafted an IQ test, all of Western civilization would presumably flunk it. -- Stanley Garn