The Read-Once, Write-Never Web 177
grub points to this TechWeb story about a software tool (NetRecall) from a company called Athentica which they claim can selectively allow viewing, copying, and forwarding of online materials. The idea is to maintain control of content on a per-person or per-category basis -- something which could have good or bad applications, but which sounds difficult to implement effectively no matter what use it's put to. (Will the required plug-on also block all screenshot utilities? If not, exactly who is it intended to stop?) Of course, since circumventing even simple methods used to "protect" copyrighted materials is illegal under the DMCA, perhaps that doesn't much matter.
Yeah right (Score:1)
Yes... (Score:1)
Around COPY & Paste in adobe (Score:1)
Re:Authenticate THIS! (Score:1)
People are missing the point of this (Score:1)
Re:Why this won't work... (Score:1)
Didn't XP also break most of the 3rd-party tools? A review I saw (maybe CNet?) suggested that all of the 3rd-party tools they tried failed to work under XP--even tools that worked fine in 2k. Now, since XP and 2k are based on the same code base, I fail to see why a program that works fine on 2k wouldn't work on XP unless functionality it relied on was specifically targeted for change (perhaps ASPI mods to prevent ripping? That's where I've had the most problems under Win2k).
Re:Maybe not... (Score:1)
lyrics.ch == Paper Tiger, albeit an obnoxious one.
E.g., use Netscape to look up lyrics for a song. Right click and select "View Frame Info". You'll see a couple of JAR files: SPDEN2Controls.jar and one of the form X12345.jar. The former contains the applet, and the latter contains the lyrics for the song you looked up.
The applet will proceed to read the lyrics out of this X12345 JAR and draw them as image text, which gets wiped away the moment the applet window loses focus or you hit a key, etc. The better to tantalize, and enrage, you!
However, there is nothing to stop you from downloading X12345.jar and, for example, displaying its content with strings.exe (from SysInternals.com). You could also download the other JAR, decompile it, and modify it to supply suction to an automated lyric spider. You could, but that would be wrong (to paraphrase a dead president).
By the way, SPD = Self Protecting Document. It's part of the Xerox ContentGuard system. They've come a long way since PARC.
Re:I think people are missing the point (Score:1)
Read Once ? (Score:2)
What if I memorize it and just keep reading it in my mind ?
:)
Re:Why this won't work... (Score:2)
Re:hack-fu (Score:2)
Do you really want to access the stuff? (Score:2)
Last I checked, I do believe we still have freedom of choice in the market place. But when packaging all turns to the same shade of gray, then maybe it's time to become seriously concerned.
Could this be the beginning of something more restrictive?
There is China and the cyber cafes that are becomming a concern to the government. Concern about the need to apply censoring methods. So it seems to me that the real value in overcomming organized constraint efforts is in support of freedom of speech and education of the real world more so than gaining access to corporate selected restricted information.
Maybe this is apporaching the matter/topic from the other side. Perhaps there is a bias against the Chinese due to the political issues at hand. But when did promoting censorship or restriction of the real world ever achieve genuine solutions?
Besides it's not the chinese people responsible for the political issues at hand now, but governments playing the game of war. The sort of thing that gets removed thru education of the real world of adverage people.
Maybe it's not so much what is restricted but who such restrictions are to apply to, directed at?
Clearly there has been enough supporting comments to our ability to get around such restrictions, but if a whole country is restriced from access then who's gonna know there is something there to see? Unless someone outside tells them?
Affect on Slashdot? (Score:2)
I am, quite frankly a comment thief.
You call me by many names...troll, imposter.
I do a search on whatever topic the story is on in the slashdot archives. I then pick highly rated posts, and simply copy and paste them into the new story.
I have amassed great amounts of karma in a short time doing this.
If I could only VIEW old comments...I would be forced to retype all that drivel (usually the high scoring comments are decently long)
So..I hope slashdot never uses a system like this...or I will be out of a job.
This IS good (Score:4)
Re:Good Use (Score:4)
So you're saying that women in this age group don't have young guys to help them "do screen shots, print to PDF, and post on a web stie, bla, bla, bla."
So what if a few forward or cut-n-paste. Besides, we can always sue offenders under the DCMA.
Sure, sue your customers. Great business plan. And the first time you do it, your "content" will be on approximately 1.2 bazillion "whack-a-mole" Geocities type sites, Gnutella, and Freenet.
Personally, I don't subscribe to any service that assumes I'm a copyright infringer (sometimes erroneously referred to as "thief") and impedes my use of the information I paid for. In that case, if it's something I want, I'll just take it, and people with your attitude can take that copy protection and pound sand.
~~~
Re:Hrmph.. Entertaining.. (Score:1)
One big difference is that it allows the person sending the document to place restrictions on how and when the document can be used. With PGP you would have no way to prevent them from forwarding the information to individuals who are not supposed to view the data.
Wayne
--
Re:Good Use (Score:2)
Re:Yeah right (Score:1)
I imagine it's for organisations that have requirements for mandatory access controls already. Some secure systems have pervasive systems that tightly control the flow of content (indeed, NSA Linux implements an NSA system); if those organisation want to deploy browser-based applications, this would be a good tool.
Re:Why this won't work... (Score:2)
What's the point of showing people something they're not supposed to remember? You may as well not show it to them in the first place, the net effect is the same.
--
Circumventing screen shot preventers (Score:2)
Do these screen shot preventers still work if windows is run through plex86 or vmware?
--
Re:Fixing what is broken (Score:2)
Assuming, of course, that monetary motivations are the only ones that matter. That however has been proven wrong repeatedly, for instance by the huge amount of free software produced by enthusiastic volunteers.
--
Re:Photographic memory now illegal (Score:2)
Is that a copyright violation? Sure. The act of making a copy is the crime, it doesn't matter how it is done.
--
Re:Circumventing screen shot preventers (Score:2)
--
Re:Circumventing screen shot preventers (Score:2)
--
Re:Fixing what is broken (Score:2)
For the longest time, most hackers fell into category (c): students.
People were hacking on Linux, FreeBSD, gimp and apache with abandon even before the term "open source" existed and before a single article about free software had appeared in the New York Times. There was no money in it, and putting your Linux experience on a resume was not on anybody's mind.
Hackers hack for three reasons:
There simply is nobody who sits down at night and thinks "ok, tonight I'm going to submit a patch to the gimp in the hope that I will learn from it and that will improve my earning power in the future".
While I agree that nowadays writing the patch will probably marginally improve his earning power: even if it didn't, the guy would still write the patch.
Nor do I think that hacking on free software is an optimal strategy to maximize one's earning power in the least amount of time. There are lots of more efficient (but less sexy) ways to do that.
--
SUE MS! (Score:1)
Re:Closer and closer... (Score:4)
I am not siding w/the fact that they are stopping this kind of service from running, I am saying that it isn't free and we aren't squashing any free trading of computer data. I have a good feeling that email, ftp, and www will be around for a while to do just that.
some people never learn. (Score:3)
repeat after me: If someone can read something, they can copy it. Obviously the computer screen can be saved (by screenshot, by decoding the video signal, by pointing a camera at it... whatever). However, it gets better
The fundamental flaw in the security models of this (and DVD) is that they trust the user's computer with the capability to decrypt the content. However, as the user's computer is controlled by the user and not the DRM company, the model is flawed.
There is no doubt in my mind that, should there ever be good reason to do so, this will be cracked. Additionally, what with recent events such as the SDMI fiasco, I believe that at this point basing your business model on DMCA protection of your security is risky. Also, remember that in many uses simply being able to prosecute people for cracking it might not cut it; after sensitive data has been leaked no amount of litigation can undo the potential damage.
hmm.. (Score:2)
---
Re:Why this won't work... (Score:1)
Sorry, please play again [slashdot.org].
But thanks, really.
Actually, it's interesting the level of knee-jerk defense Microsoft gets on this issue. Do you guys really think that they won't go further to restrict possible "non-approved" use of Windows XP? The mp3 thing is just a shot across the bow. Microsoft looks out for #1, and what's good for big media is good for #1.
See, just 'cause I didn't take four paragraphs to explain myself above, doesn't mean I wasn't right :)
Caution: contents may be quarrelsome and meticulous!
Re:Java? (Score:2)
My memory says that I was told that it's just a flag, and that if you modify the program to just ignore it, then it acts unset. I was also told that it's an easy change, but that somebody (the xpdf maintainer?) wasn't going to make it because he thought the author's choices should be respected. Sounds like a good argument to me, even if it has caused me to trash a few interesting files (I tend to feel that files like that shouldn't be on my computer).
Caution: Now approaching the (technological) singularity.
Re:Good Use (Score:1)
If it's something I want, I'll just COPY it
And if I remember correctly, the definition of thief doesn't mention anything about copying.
Re:Closer and closer... (Score:3)
It's only a matter of time.... (Score:1)
Is my MSFT keyboard in violation of the DCMA? (Score:1)
-ShieldWolf
Re:Good Use (Score:2)
DMCA = Digital Millenium Copyright Act
Re:Why this won't work... (Score:2)
I know that if I was looking to crack something like SDMI that I'd try now, but wait to release anything until the format had a few billion invested in it to release the crack. After content providers get stung repeatedly with unsecure 'secure formats' enough they'll stop trying that method.
Taking a screenshot of that bill would be 'easy', in that it's easily said. You'd obviously have hooked all the screen viewing and capture routines but the video is still displayed by the graphics card. Overlays are harder to read, but can be done. And better yet, they can be done directly from the hardware. Maybe the hack would have to be written for each major video card, but it'd get around any level of OS-level protection.
And if that didn't work, there's always VMWare.
All your method would do is raise the bar. But it takes a lot longer to write a protection system than it does for an equally skilled person to break it.
Re:Java? (Score:4)
Ah, but they have... There is an option in the document properties (file..document info..security in acroread). Now, I don't know how durable this is under Acrobat (the editor), but I thought it interesting that there's an option for 'selecting text and graphics'. So no copy/pasting either. Yikes.
And, remember, it's not just available on Windoze... it's MacOS, Solaris (both x86 and Sparc), HP-UX, Irix, AIX, and this little thing called Linux.
PDF tools (Score:2)
http://www.ecn.purdue.edu/~laird/PDF/
You can also modify xpdf and recompile it: http://www.foolabs.com/xpdf/download.html
Commercial tool:
http://www.elcomsoft.com/apdfpr.html
More can be found looking for password recovery and PDF in search engines and web directories.
Re:Java? (Score:2)
gs -dBATCH -sDEVICE=epswrite -sOutputFile=myfile.eps myfile.pdf
BTW, it can decode encrypted pdf too with a little modification. Just follow the (very simple) instructions printed when you try to read an encrypted .pdf for the first time...
Combined with pstoedit [geocities.com] is a great tool
This has already been tried . . . (Score:4)
Also, even if this software is Windows only, a screen capture would work just fine under VMWare [vmware.com] or similar program.
Re:I think people are missing the point (Score:3)
JOhn
Re:Why this won't work... (Score:5)
Many years ago now, the DOD tried to push the Orange Book as a solution to this problem, and IMO, it was a dramatic failure. But in any case, any implementation requires a trusted client terminal, either a tamperproof PC or preferably a terminal in a secure facillity (where you can observe to make sure people don't take pictures, copy down notes, etc). They you just have to worry about people remembering everything well enough to copy it down later.
As content protection for copyrighted material (music, nytimes articles, pr0n), just making it "to painful" to reproduce might be good enough to prevent the majority of casual or unintentional copying. However, once again, people forget the primary attribute of the virtual world: "All marginal costs are zero". Once someone discovers how to circumvent the plugin, the process can be automated and provided as a patch and you will never have to worry about it again.
Linux Plug-In (Score:3)
why use PDF (== portable document format) and then require a plug-in that will only run on win32 or mac, that's just stupid.
since everyone and their mother is working on a content protection system (which in 99% of the cases only works in MS-DOS 9x/NT/2000), I wonder if there is being worked on an open source, cross-platform content protection system.
I realize OSS people don't like content-protection but since there seems to be a demand for it it's better to have an open, cross-platform system then to have a closed (security through obscurity) win32-only system wich will result in linux users not being able to view some content.
---
What's really going on... (Score:5)
Screenshots only work if the OS doesn't clamp down on the ability to make them. And there aren't many OS manufacturers to convince to get your policy adopted by 90+% of consumers...
And don't expect those input/output jacks in your computer to remain sacrosanct for long if there's big bucks on the table. Go do a search on "Macrovision" to see what's already adopted in millions of VCR jacks for preventing that sort of thing. For bonus points, cross-reference Firewire. Sure you can take photographs of your screen or tape-record your speakers. But that's not the point.
It's all about barriers-to-entry. Or in this case barriers-to-copy, barriers-to-distribute, and barriers-to-publicize.
Remember the following simple table, bulletized since /. doesn't let me do HTML tables:
Barriers-to-copy: Copyright? Check. DMCA-no-reverse-engineering? Check. Increase the proportion of technology components protecting copying by requiring reverse engineering? Ongoing, minor consumer resistance at best sighted so far, marketing and upgrades will take care of the rest...
Barriers-to-distribute: Suing webserver owners? Check. Shutting down napster? Check. Shutting down gnutella/freenet? Umm, working on that but if all else fails street-fight with denial of service- pay someone to pollute popular servers with bad content.
Barriers-to-publicize: Contributory-copyright-infringement law? Check. Intimidate press by suing people who link to workarounds like 2600? Check. Shut down highly publicized services with said law like napster? Check. Fragment any potential successor networks so no one approach gets too much publicity? In progress (but if network effects overrides these efforts, must insure other barriers are up)
Checkmate. Game over man, game over.
"Freedom for one" is not "freedom for all". And freedom for only a repressive-law-disobeying techno-elite is no freedom at all. We are destined to lose it very soon if we don't organize to make our voices heard very big and very fast. Do something. I'd start with the EFF and your congressperson.
--LinuxParanoid, thinking about adding a new alias, RIAAParanoid...
"only the paranoid survive" ... and I don't think most Linux proponents are paranoid enough
Maybe not... (Score:3)
Or it could be similar to lyrics.ch - the lyrics you can view (which are owned by the Fox Agency), can only be viewed through a java applet that won't allow you to select the text to copy (surprise).
--
Screen Capture?. (Score:2)
Actually, taking a screen capture would probobly be your last resort, I'm sure there are 20 other ways to copy a "protected content web page"
Hmm, but, if it can't be screen captured, then how did they make that demo
(OT?) Re:I think people are missing ... (Score:2)
You know, it's really unfortunate that people keep saying this in the past few weeks. Napster is not "dead." All the reports I read said that usage was down something like 20-25% from the pre-filter average.
If you're counting, that means upwards of 70% of napster users are still there. What on earth could they be trading?! Probably a bunch of name-mangled stuff, but I doubt that's all. RIAA gave Napster a list of songs/artists that had to be blocked. And insisted that the Billboard top 100 be blocked each week. Which really screws over people trying to get the latest "Destiny's Child" remix, but not, by and large, people trading electronic, punk, classical, or folk music. Or anything legally traded.
So, let's not start with Napster doomsday scenarios. They might start doing some crappy things like restricting the copying of mp3s you download, but so far, it's not at all dead.
---
Re:Why this won't work... (Score:3)
Re:Maybe not... (Score:2)
It must be something wrong with your GIMP / X combo. =)
If you want, I can put a screenshot up for you.
Security (Score:2)
The only secure computer is the one that's powered off and unplugged from the wall.
I'm sorry for sounding so skeptical, but I just can't believe that they can make this "secure". And if it's not secure, then it's crackable. If it's crackable, then it's only a matter of time (usually days, sometimes hours) until somebody posts a cracked version on a website.
I understand that it's important to get security, but I think that it's important to keep things in perspective. People should keep working on more and more secure applications. But at the end of the day, nothing is truly secure.
------
That's just the way it is
Re:hmm.. (Score:2)
Re:I think people are missing the point (Score:4)
It's the same thing with mp3s: the average person doesn't know how to rip / encode a cd that isn't even copyright protected, but give them a program like napster, and they can can download mp3s all day.
Why this won't work... (Score:5)
Or, will it stop people from using a pencil, writing it down, and retyping it? As long as people can read it, we can copy it- even if it's without a computer.
-----
Re:Why this won't work... (Score:2)
Perhaps you should mention that to Microsoft, becuase they say otherwise. According to their own web site [microsoft.com]:
Secure Audio Path [google.com]Web secrets (Score:2)
The real value of online materials (Score:4)
As much as I would want to hope that we will be able to convince our legislators and big businesses of such things, I believe that it is a lost cause. The digital copyright revolution won't happen until the "net" generation siezes power.
Photographic memory now illegal (Score:5)
Quick -- must forget-- the cops are coming.. aughh...
Re:Why this won't work... (Score:2)
The real point here (Score:2)
1. Do you think this is ethically wrong. Should content be entrusted to the user.
It's a bitch, but not morrally wrong IMO.
2. Is this technically possible.
To a limited extent yes. But should we trust our nuclear secrets to a safe or should be build a number of security precautions? This is one tool.
Yeah that's all there really is to talk about. Sorry.
Right-click traps are ineffective and clumsy (Score:2)
People are using JavaScript to prevent viewers from using the right mouse button to save a picture
Blocking contextual menus is more trouble than it's worth (read more [everything2.com]). (Circumvent it in IE by holding down the right mouse button and pressing Enter, or choosing File : Save As... : Web page complete. Circumvent it anywhere by wgetting the page and its images.) And it pisses some people off enough to make them write right-click shit lists [pineight.com].
To protect against Print Screen, use DirectX (Score:3)
it's always possible to make a screenshot
Not if the plugin opens DirectX and puts the image in an overlay, or goes full-screen and traps all keys but Ctrl+Alt+Del.
(even if they try to stop me from doing that, I can always directly read the video memory or something and circumvent their protection
And go to jail for posting this information on Slashdot. (You're posting it on a U.S. operated web site; therefore you're posting it in the U.S. under U.S. jurisdiction, including the Digital Millennium Copyright Act.)
Re:Why this won't work... (Score:2)
But the engineering effort invovled is pretty much a one-time investment. There may be substantial up-front effort (I'd assume that the best way of doing something like this properly is to run the OS over something like VMWare and extract the memory image directly) but once it's invested you can copy anything that you can access. The effort needed to perform the crack is likely to be less than the effort needed to design the system in the first place, and nobody would develop a system like this unless they thought that the data they were protecting was likely to be pretty damn valuable.
Re:Oh well, it's better than the alternative. (Score:2)
Not to mention that people with good (or better still, photographic) memories can reproduce text, images, and sounds pretty accurately anyway.
Even if you put someone inside a custom built room, frisk them for recording devices, and show them the media, nothing short of erasing their own memory can prevent copyright infringement.
Use Hypersnap if you want this (Score:4)
Authentica PageRecall Technology White Paper (Score:2)
Re:Photographic memory now illegal (Score:3)
I'm a reasonable pianist and I buy sheet music from time to time. However, if there is only one song in the book I'll simply pick it up off the shelf, play it on a piano there and go home. I can usually remember most of the song.
Is that a copyright violation?
FBI + Authentica (Score:3)
"The FBI is using Authentica's software, company officials said. According to one source, the technology may help the agency keep tabs on would-be spies by preventing agents from printing files that reside on an intranet or by monitoring what they do or attempt to do with sensitive documents."
Somehow, I get the nagging feeling that, if the FBI isn't ALREADY monitoring this stuff (how hard is it to log access to so-called 'sensitive documents,' anyhow?), we have more serious problems on our hands. Now, I have no clue how tight internal security there is, but a software program like this obvioulsy isn't the way to keep people from viewing it. When (not if, when) it's cracked, if the FBI is relying solely on this program for internal security, that will be a Bad Thing(tm).
Re:No need to prevent screenshots... (Score:2)
A camera, exactly.
I always am reminded of Bob Frankston programming VisiCalc on the Apple ][.
He said he didn't have a printer (Apple sold the Silenttype thermal printer, but it was pretty expensive; it was only later that dot matrix printers from Japan became inexpensive).
So he used a Polaroid camera to take screenshots of the assembler listings and the spreadsheet display.
Nothing should stand in the way of a true genius.
RMS's "The Right To Read" (Score:5)
Time to dig out RMS's "The Right To Read" [gnu.org] essay again. The scariest part is that I probably reread this essay once a year, and each time, we've crept closer and closer to it being reality.
Re: (Score:2)
Comment removed (Score:5)
Shopping by appointment only (Score:5)
There will always be a market for free content.
Otherwise you run into the situation of those certain stores. There are some stores in fancy areas of any city where you can shop at only if someone has told you where they are, and where if you have to ask, you can't afford it anyhow. It is shopping by appointment only. It is not just fashion, but includes antiques, and many other high price items.
Now this makes sense with exotic items. It even makes sense with things like porn.
But in the model of the corner grocery store, where you want to encourage traffic and lots of people, you can not suddenly put a lock on the door. What level of paranoia must you have to suddenly require an ID and a credit check to buy the equivalent of a can of Internet soup and a newspaper? I would go shop someplace else. I would move to another neighborhood.
An awful lot of sites going to the shopping by appointment only model are only selling soup, and they are cutting their own throats.
I can see the use of this software for the exclusive content set. Artists, etc. But in the long run, alot content will develop it's own alternate forums.
Check out the Vinny the Vampire [eplugz.com] comic strip
screen meet digital camerra, camera meet screen (Score:2)
Yawn.
Re:some people never learn. (Score:2)
And Timothy: you say that DMCA will somehow prevent people from developing work-arounds. Maybe it will be illegal, but so was driving over 55 mph until recently, and that didn't stop anyone. So also "circumvention" tools. Really, how long do you think it will be before a DeSDMI is available to convert SDMIs back to MP3s? Ten minutes?
Finally, this: consumers need to buy the "content" for any of this to make money. Shit like this is always so user-hostile that it actively prevents sales / usage. Why do you think newspapers have the "Email article" tool? Because sending around that plain text increases pageviews and ad impressions - because it's user-friendly. This sort of thing, being intentionally difficult to use, will wither and die on the vine.
What is the value of a defeatable protection? (Score:4)
By example, if Napster hadn't been so widespread and easy to use -- if we were just exchanging MP3's via email, for example -- I bet the landscape would look quite different, because MP3 exchange wouldn't be seen as such a threat to copyrights and royalties.
I hate technologies that restrict what strikes me as 'fair use,' that restrict the free exchange of ideas, or that treat something that appears commonsensical and public-domain as if if were proprietary.
That being said, I won't dismiss the commercial value of easy-to-defeat restrictions. If 90% of the end users are perpetually confused, then taking the 'save as' button away from a
JMHO -- Trevor
Re:Java?, PC anywhere (Score:2)
c00l!! (Score:4)
Seriously though, how long until the browser plugin is hacked and the content is downloaded anyway?
simple... (Score:2)
True Freedom of Information is Coming. (Score:4)
Re:Take a look at what's in use today (Score:2)
Bypass #1: Disable JavaScript. Bypass #2: Read the source code, download the image directly from the URL. Bypass #3: Take a screenshot and cut out the image you want.
Lots of protection there.
Re:Good Use (Score:4)
Your problem isn't the 80% female over 35 audience. Its the single 15 year old linux kiddie who knows how to rip out the content, and distribute it to the 80% female over 35 audience for free (or a lot less than you charge).
...and no, the DCMA does not protect against cut & paste - that's the job of Copyright. The plug-in decrypts the information (legally) and displays it -- *then* it gets copied.
Re:Why this won't work... (Score:2)
In 1997 I wrote a program Cyber Sentry (as a consulting for Microsystems), which was intended as exactly this kind of copyright protector. The clients wishing to access sites with protection would install this small (70k) Cyber Sentry client, and the same client managed database of site copyright certificates, so only one client download was needed for all the sites using its protection.
The client would monitor and correlate multitude of system activities (winsock, gdi, user, display drivers, screen rectangles, file i/o, debugger presence, browser cache, etc; despite all the monitoring, there was no perceptible performance degradation during browsing). It would let you use screen capture utilities or various forms of saving from browser, as long as the rectangle captured wouldn't overlap with the copyrighted material rectangle. It would also block viewing the html source of the page.
In the final couple months of alpha testing, the product contractor had put up a web page with a gif of a $20 bill, and a group of testers were let loose to try capture & print the image, and if they could do it (and demonstrate how they did it, so they wouldn't cheat with old images), they would get the real $20 reward. They tried every screen capture they could download off the web, plus some they rigged themselves. In the final few weeks, not a single printout/capture was produced.
The same Cyber Sentry product would also protect multimedia files (music, video) and PDF/DOC files, including when inside third party viewers.
All the protection was done without the content provider having to do anything to their content (i.e. they could leave their html, media or other protected files unchanged), and it it didn't require some special viewers, allowing customer to use any viewer they wish.
So this kind of protection is perfectly doable (it does require lots of tricky code and undocumented windows stuff). The reason this newest try will not succeed in the market is the same as for the market flops of the earlier ones -- cutomers won't put up with it (even though we did everything imaginable not to block or interfere with any non-infringing save operations).
Re:RMS's "The Right To Read" (Score:2)
Does Microsoft really care whether Windows is used? They only care about getting paid. The usefulness of their software releases interests them insofar as it is useful in lining their pockets. This is why they are able to turn on a dime and do things like invade the Internet with success. They aren't looking to improving their products so much as to improving their bottom line. Of course, it takes investment of capital and other resources to create products that consumers will be willing to pay for.
As a consumer, does it benefit me when I can get a piece of software for a negligible fee on the black market? Sure, inasmuch as I am not losing much of my own capital. However, when done on a large enough scale, such "sharing" of software leads manufacturers to such responses as "Spyware" and "Ratware". Who is to blame for these developments when the same people who cry foul are the ones advocating not paying in the first place?
The thing about the "Microsoft tax" is that it is wholly a "use tax". Unlike your income tax which pays for services you may never use, no one is forcing you to pay.
Dancin Santa
Re:Good Use (Score:3)
Dancin Santa
hack-fu (Score:5)
Sounds great at first but should someone want the information they don't neccessarily have to use tech methods to get it. Take a good old pen and paper and write down what you want, or take a picture of the screen with a digital camera.
What if the second party receiving the email chooses not to use the plugin then what? Are companies going to be willing to let business go because someone doesn't want to comply with using a certain product. Aside from that how is this plugin written, my guess is its a Windows based plugin which does little for Nix users.
Its sort of like this tool called Comet Cursor [cometsystems.com] which allows you to highlight any word in a document and get all the information on that word even if they don't have a link posted on the document, only difference is, its blocking information.
Oh well I'll wait to see how people circumvent this, and laugh at the companies who dished out 30+ thousand dollars for this cheesy program.
I think people are missing the point (Score:5)
Hullabaloo (Score:3)
Unless they lock all our computers in glass cases and leave us without a single port to access, we'll still be able to record this stuff to our heart's delight. This is all hullabaloo.
Re:What is the value of a defeatable protection? (Score:2)
This will work the same way. Sure, most Slashdot readers may be capable of circumventing the tech, but it will keep Joe User from appropriating content simply because he/she doesn't know how or doesn't care to expend the effort to find out how.
-----
How long until this is broken. (Score:3)
snake oil (Score:2)
At best, plug-ins like that are an expression of policy and preference, not a security device, and only keep casual users from accidentally storing data. Trouble is that they are being marketed for security purposes: the article talks about proprietary design documents, the FBI, and sensitive corporate information. In my opinion, for that, they are completely unsuitable, and anybody who buys them for that is a fool.
Closer and closer... (Score:4)
("Andre creep, Andre creep...")
--
Oh well, it's better than the alternative. (Score:5)
In all seriousness, do we really need to look at every one of these companies whose business is based on ignorance of the simple rule: "If I can see it or hear it, I can record it."?
--
Re:Java? (Score:3)
Re:hack-fu (Score:4)
Digital cameras are circumvention devices! MPAA sues Kodak! News at 11!
Best Buy is the world's largest distributor of circumvention devices...
Re:Why this won't work... (Score:5)
Java? (Score:4)
I remember a year ago, seeing a little Java applet being run that prevented the user from 'stealing' the image so to speak as it was displayed in a box. However, I'm not quite sure how this would stand up for documents. One thing that could be done would be to display such images in a PDF format. I'm surprised that Adobe, the head of the WinOS PDF readers, has not yet made an option that prevents printing of certain documents. Alas, those are my mere thoughts of a mere man.
Re:Why this won't work... (Score:3)
a dismal future (Score:2)
Soon enough, information will be distributed in a closed manner similar to this. People who wish to view this information will have to use The System. Big Media will team up with Big Microsoft to form one huge monopoly that *no one* can break. (See: Windows XP and MP3). Unfortunately, most attempts by the open source community et al will fail because secrets to reading information will be kept only by the monopolizers (See: DeCSS encryption). The occasional advances made by the community will be stopped by lawyers and legislation (See: Your Rights Online).
Possible Endings:
1) You have been assimilated into the Complex. Do not resist.
2) Viva la comunista! Down with the capitalist regime!
3)
Re:Good Use (Score:5)
Jeez, I was probably using FidoNet when some of you guys were thinking solid food was a neat idea...
Just because some of us are old enough to be a parent of many of you doesn't mean we're by definition tech-ignorant; people do pick this up later in life, too - my mother didn't get her first (PowerMac) computer until she was 60!
I've also done enough tech support to see there are just as many ignorant males as females-of all ages- out there...
Anyway, I don't mean to be strident; I just ask that y'all be a little more open-minded, please!
= )