Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Doesn't Fully Disable? (Score 1) 188

nope android users aren't dumb at all. Hey clueless they're your wireless carrier. If your phone is on they are tracking you! Do you think when you make calls they have no idea what phone is connecting to there network? It doesn't matter what phone or what carrier if you connect they know where you are. It's part of the connection protocol and can never be turned off. And unless your VPNing they know every site you visit.

Comment Re:So what? (Score 1) 252

Such things can be used as evidence that not only did Swatz break the law, but that he did so intentionally. Also the first two bits, the changing of the MAC address and providing a false email address might become supporting evidence for the argument asserting wire fraud.

Can't convict on wire fraud for access to the network as it did not cross state lines. An element of the crime.

Comment Re:So what? (Score 1) 252

Actually no it's not a crime. There are other required elements under the current law. I'm not sure that in this we are even talking about a "protected computer" as defined by the law.
If this was a local copy of the archive I don't think he broke any laws at all and the Feds have no jurisdiction. If the MIT computer has connected to and retrieving info from a JSTOR server it much more complex. Is accessing a system that gets info from another the same as connecting to it directly?

Comment Re:Wrong term as usual (Score 1) 252

Actual this is correct. Simply using someone else's property is not theft. It only becomes theft or more accurately conversion if the owner is denied his use of the property. That's why with IP it's civil infringement and not criminal theft. Copying something does not deprive the owner of the original of its use.

Comment I wonder? (Score 1) 252

Do the Feds even have jurisdiction here. He accessed only from within the network at the physical location from what I can see. Therefore he accessed no telecommunication infrastructure and did not operate across state lines. Does the federal government have any authority here. Seems to me that this should be a state case as I don't see this as a copyright case but as a theft of service case. JSTOR has no valid copyright claim here. The originals are not copyrighted and by definition a scan of a page can not be copyrighted. There is no "art" here. Anyone could scan the same page and get pretty much the same result thus any copyright claim is invalid.

Comment A comparison (Score 2) 116

Well let's see.
Nether company creates there own games. EA buys them and Zynga steals them.
Both companies steal from their users it's just that EA does it $50 at a time while Zynga does it $.50 at a time.
Both companies treat gamers like crap.
EA abuses the hell out of professional developers while Zynga abuses the hell out of people that think they are developers.
(sorry Zynga workers but my dog writes better code)
EA uses huge expensive marketing campaigns of BS while Zynga just spams you until you give in.
EA often ruins good games after taking them over. Zynga often ruins good games after copying them and flooding the market with their version.
EA actions makes you hate them. Zynga's actions make you hate yourself.
All in all the world would be better off if neither existed. But the tie breaker goes to EA as we would actually miss their games.

Slashdot Top Deals

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...