Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Extraordinary claims require extraordinary proo (Score 2) 251

The company I work for owns patents that are licensed in every mobile device you own. Without the patent system we would either immediately stop investing billions in R&D, or have to manufacture everything in house and instead of licensing technology we would sell black box tamper proof chips to cell phone manufacturers. Phones would suck and cost more.

Comment Re:Solving the problem through random numbers (Score 1) 41

Subpoena would more likely be for online threats, locating fugitives, charlie papa, DEA stuff.
DMCA violations are different requests that follow the same technical process but are taken more or less seriously depending on the ISP. If a subpoena is received saying "Email provider X says that a bomb threat was sent from IP A.B.C.D at 4:32 on the 13th of December", more or less. They typically already have subpoena'd some information from Google or Yahoo or Microsoft or somebody. Then the ISP goes back through DHCP/Router logs and reports back which subscriber that was. If CG-NAT is in use, the ISP will also require a TCP port or they can't respond to the request. I don't know anyone who would respond with a list of multiple subscribers. That would be useless for prosecution and real bad for the ISP.

Slashdot Top Deals

You're using a keyboard! How quaint!