Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Call the BBB then return it. (Score 1) 467

Well then, these PCs should certainly be illegal! After all, when I buy one I am also required to buy:

Intel processor
Samsung memory
WD hard drive
Broadcom Wifi
Panasonic battery
Sharp LCD display

All brands made up, I don't know what is actually in this product. But the point stands: you are only required to buy one thing, and that is the manufactured product. Adding an OS is no different than adding memory, other than you don't happen to like it. If you don't like the product the manufacturer is offering, DON'T BUY IT. Is that really so difficult a concept?

Comment Re:Smoking something? Copy-pasted, dude (Score 1) 337

It does not 'dramatically change' anything, your reading just sucks. While you were so busy looking for idiotic ways to interpret the presence or lack of a comma you completely missed the words WITHOUT CONSENT. So, yes, it makes PERFECT sense that using 'existing' devices WITHOUT CONSENT is a crime.

Comment Re: Arrest warrent is being drawn up now (Score 1) 337

And it is ILLEGAL. It is really quite simple. Are they offerering a paid-for service? Yes. Are you using that service? Yes. Did you pay for the service? No! Then you have committed theft of services. All your blathering about whitelists, holes, devices, means absolutely nothing. The legal meaning of 'authorized' does not include any nonsense about whitelists, backdoors, mis-configured servers. The legal meaning of authority is 'do you know (mybe not, if you are an idiot), or should you know (absolutely) that the only way this service is offered is by explicit agreement with the provider (ie payment), and do you have that explicit agreement (ie paid)'. And no, a hole in their defenses does NOT provide that agreement.

Comment Re:Arrest warrent is being drawn up now (Score 1) 337

Theft of services is basically defined as knowingly using a service that is being sold without paying for it. It doesn't matter if your method of access is some extremely clever and complicated hack, a mis-configured server, a backdoor, or getting your buddy who works there to authorize your device.

As with most laws, it is YOUR actions that matter, NOT your targets actions.

Comment Re: Arrest warrent is being drawn up now (Score 5, Informative) 337

Where did you get that idea? For instance, here is an excerpt from NY law explaining when a person is guilty of theft of services

With intent to avoid payment by himself or another person of the lawful charge for any telephone service which is provided for a charge or compensation he (a) sells, offers for sale or otherwise makes available, without consent, an existing, canceled or revoked access device; or (b) uses, without consent, an existing, canceled or revoked access device; or (c) knowingly obtains any telecommunications service with fraudulent intent by use of an unauthorized, false, or fictitious name, identification, telephone number, or access device. For purposes of this subdivision access device means any telephone calling card number, credit card number, account number, mobile identification number, electronic serial number or personal identification number that can be used to obtain telephone service.

See anything in there about TOS?

Slashdot Top Deals

"Mr. Spock succumbs to a powerful mating urge and nearly kills Captain Kirk." -- TV Guide, describing the Star Trek episode _Amok_Time_

Working...