Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment How do they even plan to *DO* this? (Score 1) 726

That court may consider it just transferring the medium the document is contained in, but I don't believe that will hold up in court. First off, the idea of something scanning in near real time, for something that looks like it could plausibly be an IP isn't going to happen. I'd like to know how they're going to look through every byte of every process involved with networking. As I understand that, whenever anything was executed by the webserver daemon, the scanner would have to look through everything, the stack, and any structures in the memory of that process or thread. What if the daemon just starts? They'd have to find the pointer to the segment it's running in, look through the segment to find something that looks like a request from the server, try to find the IP address in it. What if the process spills over into a new segment? And all this has to be done before the packet is sent back to the client so that everything is logged! If whoever codes this isn't fast enough, does the poor sap running the box get slapped with a destruction of evidence charge? I'm willing to bet dollars to doughnuts that most people are running this on a non realtime, multitasking system. What happens when this memory-snoop dameon doesn't have its turn to execute? What about any request that gets processed when MemorySnoop isn't running? Does whoever wrote the task scheduler get smacked with a Destruction of Evidence charge? Chances are, the task scheduler and memory management parts of the kernel are going to get patched. What if they use a non-free license, and we all have to get our kernels through them? What if Linus or rms sues, since they created a derivative work of the kernel and didn't license it under the kernel's license? Or is there going to be some sort of chip embedded in the hardware, and they have to get new motherboards, or get the chip implanted?

Also, this is assuming that the logging is even legal. IANAL, but under the COPPA act, if the person using the site is under 13, since the RIAA counts IP addresses as personally identifiable information, wouldn't collecting that IP from a child under 13 without parental consent be against the law? At the very least, I can see that getting thrown out of court for exactly that reason. Secondly, if they are simply regarding any packets involving torrentspy.com as attempting to infringe on a copyright, what about the people that hotlinked an image on a forum? Technically, that would be accessing the site, as I doubt it is possible to log everything involving that IP's transaction with the webserver daemon. Or what if someone links to the BitTorrent FAQ on there, to help out someone who wants to download legal material? If simply visiting torrentspy.com is going to be considered possible CI, I can see them pulling the First Amendment, as they could just be reading a news item or the FAQ, and their First Amendment rights being violated as everyone who goes to the site is considered guilty of CI. Just my .02$

Slashdot Top Deals

A formal parsing algorithm should not always be used. -- D. Gries

Working...