Forgot your password?
typodupeerror

Comment: Re:One more, cannot prove you shared it... (Score 1) 375

by InnovATIONS (#36521408) Attached to: Might iCloud Be a Musical Honeypot?
The argument will be made that the leecher made one unauthorized copy of the song...the copy that came from the file sharing service to their computer's disk. It may be just one little copy but it was clearly the leecher's intentional action that created it. Copyright infringement is in the copying.

Comment: Re:So this is Apple's laundry service? (Score 1) 375

by InnovATIONS (#36521344) Attached to: Might iCloud Be a Musical Honeypot?
Well I guess in either way it is a laundering service. The real issue is in what way. The optimists think that Apple will launder all of the dirty laundry for $24.99. The article thinks that you will store all your laundry for $24.99 and then the RIAA laundry inspectors will accuse you of having hundreds or thousands of dirty shirts. And then Apple will allow you to clean that laundry and get rid of the laundry inspectors for just 99 cents a song!

Comment: Re:Question for any budding lawyers out there (Score 1) 375

by InnovATIONS (#36519196) Attached to: Might iCloud Be a Musical Honeypot?
I am not an RIAA lawyer but I suspect that their argument will go like this: In order for iTunes Music Match to find the song it had to be on your disk. In order for it to be on your disk you made a copy of the song without the rights to do so. The act of making that copy was a violation of copyright. You had 10,000 such files. But then out of the shadows steps your hero Steve Jobs! He offers that with one click you can make all ten thousand copies legal and make the RIAA go away! And it will only cost you $9,900!

Comment: Re:The author lost me at MD5 (Score 1) 375

by InnovATIONS (#36518878) Attached to: Might iCloud Be a Musical Honeypot?
MD5s can possibly be reverse engineered or cracked, but the chances of two files in the wild accidentally having the same MD5 are beyond astronomical. MD5's are perfectly acceptable for doing file comparisons. Besides MD5s were just being used as an example. They may be using SHA or something else.

A computer scientist is someone who fixes things that aren't broken.

Working...