Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Comment Re:CBC assumed CNN owned it (Score 1) 222

The plaintiff may sue whoever used it incorrectly. Subsequently, CBC may hold CNN responsible for their losses in court if CBC can show that it relied on CNN's presentation of facts in entering into their agreement, or the decision may assign all responsibility to one or all of the parties. The plaintiff does not need to locate the person ultimately responsible prior to making their claim of infringement.

Comment Re:Out of context quote (Score 1) 222

The passage you cited only permits YouTube to display the user's content. Another section of the TOS prohibit use of the material unless done through YouTube. Section 5B of the TOS: "You shall not copy, reproduce, distribute, transmit, broadcast, display, sell, license, or otherwise exploit any Content for any other purposes without the prior written consent of YouTube or the respective licensors of the Content. YouTube and its licensors reserve all rights not expressly granted in and to the Service and the Content." Section 6C: "For clarity, you retain all of your ownership rights in your Content." The copyright law cited is fairly clear. Removal of the copyright notice is a violation, and the act of removal also indicates willfullness and intent.

Comment Re:Core problem: backdoor = all messages in plaint (Score 1) 91

No, I'm not saying that anyone who breaks into your computer is a bad guy. What I am saying is that if the FBI gets a back door to do good things, then they also greatly increase the chance of crimes being committed by criminals who use the same back door the FBI uses. I am also saying that is that without back doors, a rogue FBI agent violating his authority can do damage to people and the nation, but that a rogue FBI agent violating his authority and with back doors can do extremely large amounts of damage to people and the nation.

Comment Core problem: backdoor = all messages in plaintext (Score 2) 91

The article is quite good, and later on it points out that any back door leads to all of the bad guys having just as much or more access to communications as the government or law enforcement have. Comey, FBI, etc. are wishing for visibility into communications, but are not technical enough to realize that they are actually asking for there to be no encryption at all, since the presence of the backdoor renders the communication useless for sensitive information. Another topic that isn't addressed is protecting the public from misuse of the backdoor by government. The existence of pervasive surveillance eventually will lead to the creation of two classes of citizens: The first class "good" ones with law enforcement access to all communications, and the second class, who do not have such access to back doors.

Comment Dr. Who fans are the real conspiracy! (Score 1) 214

Maybe in the United Kingdom Scotland Yard fears local fans of American science fiction programs, but they got it backwards. The real troublemakers, tracked by the F.B.I. and U.S. Secret Service, are American fans of the British television show Doctor Who. The American authorities fear that these American fans might go mad and kill themselves, turn against society or start a weird cult. After all, it is patently obvious that X-Files and Star Trek convey perfectly normal behaviors, but Doctor Who presents some very odd and disturbing ideas, not to mention the strange accents and misspellings of simple words like "color" and "civilization".

Comment Aren't performances copyrighted? (Score 1) 73

Your driving performance is just another performance, like singing or dancing. It doesn't matter than some company has created a device to record it. The copyright on the data that records the performance belongs to the performer. So any data collected by a company by an app belongs to the user, not the developer of the app.

Comment Comcast's Cards are Corruption (Score 2) 131

To reiterate Roodvlees' point, the giving of the cards and the receiving of the cards is corruption. It may not be obvious what the dollar value is immediately, but if you count up the time saved by the politically-connected recipients when they get expedited service, then it almost certainly would exceed Federal standards for gifts.

Submission + - Pizza Hut Tests New "Subconscious Menu" That Reads Your Mind

HughPickens.com writes: Allison Griswold reports at Slate that Pizza Hut wants to help you order your food subconsciously with a new product that is being tested at 300 locations across the UK that uses eye-tracking technology to allow diners to order within seconds using only their eyes. The digital menu shows diners a canvas of 20 toppings and builds their pizza based on which toppings they look at longest. To try again, a diner can glance at a "restart" button. "Finally the indecisive orderer and the prolonged menu peruser can cut time and always get it right," a Pizza Hut spokesperson said in a statement, "so that the focus of dining can be on the most important part — the enjoyment of eating!" According to news release from Tobii Technology, the Subconscious Menu can determine which ingredients your mind and eyes have been looking at longest in exactly 2.5 seconds. The menu then uses a powerful mathematical algorithm to identify, from 4896 possible ingredient combinations, the customer’s perfect pizza. "Tests on the Subconscious Menu have been incredibly positive with 98% of people, recommended a pizza with ingredients they love."

Submission + - ISPs Must Take Responsibility For Sony Movie Leaks, UK MP Says (torrentfreak.com)

An anonymous reader writes: As the fallout from the Sony hack continues, who is to blame for the leak of movies including Fury, which has been downloaded a million times? According to the UK Prime Minister's former IP advisor, as "facilitators" web-hosts and ISPs must step up and take some blame.

Mike Weatherley MP, the recent IP advisor to Prime Minister David Cameron, has published several piracy reports including one earlier in the year examining the advertising revenue on pirate sites. He believes that companies with no direct connection to the hack or subsequent leaks should shoulder some blame.

“Piracy is a huge international problem. The recent cyber-attack on Sony and subsequent release of films to illegal websites is just one high-profile example of how criminals exploit others’ Intellectual Property,” Weatherley writes in an email to TF.

“Unfortunately, the theft of these films – and their subsequent downloads – has been facilitated by web-hosting companies and, ultimately, ISPs who do have to step-up and take some responsibility.”

Weatherley doesn’t provide detail on precisely why web-hosts and ISPs should take responsibility for the work of malicious hackers (possibly state-sponsored) and all subsequent fall out from attacks. The theory is that “something” should be done, but precisely what remains elusive.

I have a theory that it's impossible to prove anything, but I can't prove it.