Court Says WiFi Isn't Radio Because It's Not Audio; Therefore WiFi Sniffing Can Be Wiretapping

from the it's-not dept

A couple years ago, we were disappointed to see a judge take the technologically wrong stance that data transmitted over WiFi is not a “radio communication,” thereby making sniffing of unencrypted WiFi signals potentially a form of wiretapping. Indeed, based on that, the court eventually ruled that Google’s infamous WiFi sniffing could be a violation of wiretap laws. This is wrong on so many levels… and tragically, an appeals court has now upheld the lower court’s ruling.

There are serious problems with this. Under no reasonable view is WiFi not a radio communication first of all. That’s exactly what it is. Second, sniffing unencrypted packets on an open network is a perfectly normal thing to do. The data is unencrypted and it’s done on a network that is decidedly open. It’s like saying it’s “wiretapping” for turning on your radio and having it catch the signals your neighbor is broadcasting. That’s not wiretapping. Third, even the court here admits that based on this ruling, parts of the law don’t make any sense, because it renders those parts superfluous. Generally speaking, when a court ruling would render a part of a law completely superfluous, it means that the court misinterpreted the law.

Bizarrely, the court seems to rely on the claim that most radio communications are “auditory” (i.e., involving sound) and thus data transmissions are somehow not radio. Seriously. This statement is so uninformed and flat out wrong that it’s kind of shocking the court made it. Specifically the ruling says that the “telltale signs” of “radio communications” are that they’re (1) “auditory” and (2) “broadcast” and then says it doesn’t even need to consider whether or not WiFi signals are broadcast, since the fact that they’re not auditory means they don’t even have to consider that fact. Seriously. Read this and try not to bang your head on the nearest desk or wall:

We need not reach the question of what exactly constitutes a “broadcast” because the Wi-Fi transmissions in question were not predominantly auditory.

The court also stumbles badly on the other key question in the lawsuit — over whether or not these things are “readily accessible to the general public.” Again, here, if you know anything about the technology you know without question that broadcasting unencrypted data over an open WiFi network are by definition “readily accessible to the general public.” That’s how it works and how it was designed to work. But the court says it’s not because someone might send something “sensitive” from a secured network to an open WiFi network, and the sender didn’t intend for that info to be available via open WiFi. But that gets the calculus totally wrong. First, if I’m sending something “sensitive,” it should be encrypted, full stop. Second, the security of the endpoint recipient is the responsibility of that recipient, not the sender, so the whole analogy makes no sense.

Later, the court argues that WiFi isn’t readily accessible because the signal is “geographically limited.” But, um, again, that’s true of just about any radio signal. If I have a low-power transmitter, that’s still a radio transmitter. It also claims that it’s “difficult” to access unencrypted data on an open network, but that’s not true at all. They claim it requires “sophisticated” hardware and software, but that’s not actually true, and if you believe it’s true, you could basically make the same argument about all kinds of radio transmissions.

Either way, there’s a fundamental fact here that the courts don’t seem to recognize: when you broadcast unencrypted data on an open network it’s there for anyone to access. It seems ridiculous to then claim that it’s illegal to access it when it’s presented in a manner that more or less cries out “come take a look!” This really feels like a situation where the court looked at what Google did, decided it didn’t like it, and then tried to tap dance around reality to make it a violation of the law even though it’s almost certainly not a violation.

Filed Under: , , , ,
Companies: google

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Court Says WiFi Isn't Radio Because It's Not Audio; Therefore WiFi Sniffing Can Be Wiretapping”

Subscribe: RSS Leave a comment
93 Comments
nasch (profile) says:

Re: Re:

personally, even though the logic is ass backwards, I kinda like this ruling

We do not want courts to first decide what the outcome should be and then figure out how to make it that way regardless of what the law says. When that happens, laws have no meaning and courts can do whatever they want. If you like the outcome, then you should hope for the laws to be changed, but there is no reason to think this ruling is a good one.

Derek Kerton (profile) says:

Re: Re:

Not at all.

Snooping on open wifi is simply not a problem.

If you think of the following analogy:

Secured WPA WiFi with encrypted data is like a vault in your home. The contents of the vault are expected to be invulnerable.
– It would be disastrous if someone got access.

Secured WiFi is like a locked home. The contents of your house are expected to be relatively safe.
– You wouldn’t want anyone to break in, and have taken measures against it.

Unsecured WiFi is like offering a connection to anyone. It’s like leaving the contents of your house in a park with a “Free, take me” sign.
– This is a useful tool for coffee shops, marketers, people hoping that users can easily get on the network.

Our problem with government agencies is hardly that they are snooping on our open WiFi networks. I would care as little about that as I do about Google’s mapping war drives. This discussion is soooo far away from what the government does, it’s hard to see how you connected them.

You don’t want to broadcast your WiFi transmissions? Turn on security. Most routers have defaulted to this for almost 5 years. It should be considered a conscious choice if someone leaves their WiFi fully open.

In fact, the very “openness” of the WiFi signal is the only indication I have as to whether you want your signal to be open or not.

So, if you don’t want people to snoop on your open WiFi…secure it. But that still won’t stop the gov’t from seeing your shit.

Jose_X (profile) says:

Re: Re: Re:

> Unsecured WiFi is like offering a connection to anyone. It’s like leaving the contents of your house in a park with a “Free, take me” sign.

For people who (a) are not tech savvy and (b) generally expect privacy, they see it instead as leaving your house unlocked and then having people come inside just because it’s trivial to open an unlocked door.

Most people who do not realize they have to use a lock, expect privacy and aren’t voluntarily putting things outside with a “take me” sign.

Derek Kerton (profile) says:

Re: Re: Re: Re:

OK. Assume for a moment you are correct.

Then how would someone who DOES want to put the wifi out there for automatic guest connections indicate they are offering access?

Because that is what open wifi is saying with it’s broadcast signal and beacon.

People can sent the opposite message by using a lock/security, and that is now the default (so even the ignorant are safe from unwittingly sharing).

John Fenderson (profile) says:

Re: Re: Re:2 Re:

Exactly. I do this — I leave my WiFi open specifically so that others can use it.

Also, since every consumer WiFi AP goes to great lengths to inform people that the need to secure their AP and make it as easy as possible to do, the only ones that are unaware of this are those who actively avoid looking at any documentation at all, even those little “IMPORTANT INFO” fliers.

People who run sophisticated equipment without learning even the bare minimum about the equipment they’re using are idiots. We should not design our society to cater to idiots.

out_of_the_blue says:

Like Google, Mike thinks everything is open to the public.

It’s certain that when most people set up a wireless router, they don’t wish anyone within range to make use of it, no more than putting a gazebo on your lawn makes it available for every drunk to stumble into, puke, and pass out. No one is intentionally broadcasting to the public.

Private property and privacy already include the rulings of this court.

Passers-by including Google Streetview have no right to access your network.

As for Mike’s all-inclusive “radio communications” — PFFFT! Distinctions are easily made, and should be.


Mike Masnick on Techdirt: “its typical approach to these things: take something totally out of context, put some hysterical and inaccurate phrasing around it, dump an attention-grabbing headline on it and send it off to the press.”

Rikuo (profile) says:

Re: Like Google, Mike thinks everything is open to the public.

A gazebo on your lawn is on your property, so a drunk who passes out in it is trespassing.
An unencrypted, non passworded Wifi radio signal? It passes through the walls of your house and goes next door, where anyone can pick it up. Most, if not all routers, these days are intentionally manufactured with a password/phrase by default, so typically, if you detect a signal and it’s open, it’s by design. The last router I used had a guest access feature (too bad my current one doesn’t) and I left that open intentionally for others to use, so that shoots a hole in your “No-one is intentionally broadcasting to the public”.

Anonymous Cowdard says:

Re: Re: Like Google, Mike thinks everything is open to the public.

Well, if you ARE intentionally broadcasting to the Public, it is no longer like the gazebo on your front lawn.

Although it’s disingenuous to compare a radio frequency signal to a gazebo, I think it would be more similar to your Gazebo sitting partially in your lawn and partially in the sidewalk; there’s no mistake here that this is your gazebo, but damn it, you’ve placed it in and on an area that is considered a public easement. If you get upset that the public is now sitting in your gazebo, it is your responsibility to make sure it’s no longer in a public easement.

Wifi is the same reason, and this court’s opinion is wrong exactly as you’ve defined the reason: Most routers have some basic form of security built in by default, so if you’re broadcasting openly you’re doing it intentionally. If you’re intentionally broadcasting a signal to the public, it’s no longer up to you who receives it. Containing the signal in a non-public way is YOUR responsibility.

Jeremy Shawaf says:

Re: Re: Like Google, Mike thinks everything is open to the public.

Signals left open by design…..

-Starbucks
-Many Coffee Shops
-Pacbell Park (San Diego)
-City Wifi in Los Angeles
-City Wifi in Downtown San Diego
-City Wifi in XXXXX
-Many Hotels and Motels
-Any network that offers intentional guest access
-A TON OF OTHER PLACES

So the idea is to regulate all these places so people dont transmit Wifis from them? lol -.-

Anonymous Coward says:

Re: Like Google, Mike thinks everything is open to the public.

So if I’m yelling at someone in my yard and someone next door happens to hear it they are wiretapping?

It’s their responsibility to not listen to something that’s there (just like air) as opposed to my responsibility to keep my voice down if I don’t want people to hear?

Before you go off saying my example is different, think carefully about a few things:

1) Sound is simply a signal

2) I broadcast it to a public area

3) I somewhat have an expectation that people aren’t just sitting outside listening to me

4) My voice is geographically limited (I can’t yell in quite a few areas – think library)

JMT says:

Re: Like Google, Mike thinks everything is open to the public.

“It’s certain that when most people set up a wireless router, they don’t wish anyone within range to make use of it, no more than putting a gazebo on your lawn makes it available for every drunk to stumble into, puke, and pass out.”

Total analogy fail. Your lawn is on your property; your WiFi signals can reach well outside your property.

“No one is intentionally broadcasting to the public.”

Except for those people deliberately running open WiFi for the specific purpose of providing public access.

“Passers-by including Google Streetview have no right to access your network.”

Receiving open WiFi signals is not accessing a network! Now you sound just as technologically ignorant as this judge.

“As for Mike’s all-inclusive “radio communications” — PFFFT! Distinctions are easily made, and should be.”

But we note you haven’t made any distinctions, most likely because you know you can’t.

TheLastCzarnian (profile) says:

Most Radio is audio...

WTF is television? I’m pretty sure they broadcast that in on the RADIO. As a matter of fact, I have consumer radios that pick up the VIDEO portion as well as the audio portion of a broadcast (well, they did before digital, anyway.)
Someone needs to send these intellectually challenged judges back to grade school, or buy them a “How and Why” book. (How and Why, for those who do not know, are books from the ’60s and ’70s which simplifies science for 8 to 12-year-olds)

Ed the Engineer says:

1) TV signals have always been more than audio. Although I built simple AM radio receivers as a kid, I never managed a simple TV receiver, so I guess TV is not readily available.

2)The first radio transmissions were digital, not audio.

3)Cell phones are digitally transmitted audio signals. Does that mean listening in on cell phone calls is not wiretapping?
Guess that’s why the NSA can do it.

btr1701 (profile) says:

Predetermined Outcome

It’s obvious that the court(s) in this case have a predetermined outcome– they want sniffing unencrypted wifi to fall under wiretapping laws– and the only question for them is to come up with some way to justify it legally. They’re starting with the conclusion and working backward, instead of doing it the proper way.

One can usually tell when a court is doing something like this because it results in all manner of legal and factual absurdity. The most famous example of this is the Roe v. Wade case and the “penumbras of freedom” that somehow were discovered only in the 1970s.

Stan (profile) says:

...Because It's Not Audio

“…broadcast FM isn’t audible.”

The court seems to be fixated on whether or no the final product comes out a speaker as audio waves. When it does, they call it “audible” and i’s not wire-tapping, according to the court’s logic.

By their thinking, it should be fine to capture the AUDIO-only portion of Skype traffic over wi-fi (or MagicJack, etc) and do what you want with it.

BTW, I guess it’s now a crime for me to fire up my short wave radio and listen to some CW only morse code traffic. Anyone care to contribute to my defense fund?

Stan.

PW (profile) says:

To broadcast or not to broadcast, that is the question

While the rationale for the ruling certainly seems screwy (technical term ;), it feels like the distinction here is that WiFi interactions aren’t purely broadcast, in that a user initiates a request with the intent being for the response to only come back to them. The fact that someone else is packet sniffing, which is likely being done without the requester’s knowledge or approval, makes this the surreptitious activity that is likely being called out.

By way of analogy, sending a sealed envelope by “snail mail” offers no real protection beyond that which the seal’s glue can provide. One could argue that it’s not much protection, and yet we have developed laws as a means of building trust in that form of communication, that an opened sealed envelope by someone other than who it was originally addressed to, is a federal offense, and this carries harsh penalties. In other words, just because it’s technically feasible to open an envelope (or to sniff a data stream) doesn’t mean it should be legal. For their to be a modicum of trust in these communications, there needs to be disincentives. Of course, my disincentive logic fails immediately when we learn that the NSA isn’t subject to any of this 😉

Again, while I believe their ruling’s justification is a kludge, I can’t disagree with its intent.

Jobastion says:

Re: To broadcast or not to broadcast, that is the question

The problem with this analogy is that with unsecured wifi, there is no envelope, just the letter. And the letter isn’t delivered to just to your house, a copy is sent out to everyone in the neighborhood. The only protection is that the letters are all written using a 1960’s crackerjack box encoder device, so you have to have a piece of red Cellophane to read them. In other words, fairly common technology can read any unencrypted, unsecured wifi connection.

Not an Electronic Rodent (profile) says:

Re: Re: To broadcast or not to broadcast, that is the question

The only protection is that the letters are all written using a 1960’s crackerjack box encoder device, so you have to have a piece of red Cellophane to read them.

A great turn of phrase, but that’s secured WiFi you’re talking about – at least secured by WEP.

Un-secured WiFi would be like me posting this and then saying “I’m only talking to you so no-one else read it please”.

In other words, fairly common technology can read any unencrypted, unsecured wifi connection

You mean every single WiFi device in existence. This is how WiFi works. Your WiFi card receives every packet and then chooses whether to throw it away afterwards based on who it says it’s for.

If it’s like mail at all as PW says then would be like a postcard – a polite postman might not read what’s next to the address, but would you really expect him not to?

Not an Electronic Rodent (profile) says:

Re: To broadcast or not to broadcast, that is the question

it feels like the distinction here is that WiFi interactions aren’t purely broadcast

Yes. They Are. Unsecured WiFi is like having a shouted conversation across a crowded restaurant. People choose not to pay attention.

Secured WiFi on the other hand is more like having the same conversation in Attic Greek – everyone can hear it but no-one can understand unless they break the “code”. This would fit better with your “snail mail” analogy.

Cowards Anonymous says:

Re: Re:

Awesome, so when the police use a radar gun to check your speed they are wiretapping the waves that bounce back off your car. Unless they have a warrant or are the NSA, they can’t use that evidence against you in the court of law (or the courts will have to invent another misinterpretation of plain English to make the law mean what they want it to mean).

Anonymous Coward says:

Federal Circuit Courts should be required to consult at least one independent technology expert when ruling on cases which involve technology that is obviously over their heads.

Most judges are so far behind technology, that their profession is fast becoming obsolete. If they want to keep from going the way of the Dodo Bird, I advise the court to start hiring independent technology advisers, ASAP.

bullsballs (profile) says:

radio

dumb judge, poor judgement…

Radio is the wireless transmission of signals through free space by electromagnetic radiation of a frequency, or frequencies, as with spread spectrum transmissions.

notice it does not say anything about audio, video, or digital, just signals, which means the transmission of anything you can modulate the radio frequency with.

out_of_the_blue says:

Mike has as usual, UN-stated key facts:

Becoming so dulled by Mike’s non-stop mis-statements that I sometimes forget to add back what he takes out. But this piece in LATimes reminded me:

http://www.latimes.com/business/technology/la-google-street-view-liable-wiretapping-20130910,0,817289.story

Between 2007 and 2010, the Street View fleet also contained Wi-Fi antennas and software that collected data transmitted by Wi-Fi networks in homes and businesses.

The information included the networks? names, the number assigned to the router transmitting the wireless signal, the signal strength and whether the network was encrypted. Such information enables business to provide services to help mobile phone users find nearby restaurants and attractions.

But the Google equipment also gathered and stored data from unencrypted networks, including personal emails, usernames, passwords, videos and documents.

And that was NOT by accident, occurred over three years.

It’s all lies from a mega-corporation that’s keeping $48 billion offshore to dodge US taxes, until it can buy politicians to let it bring that in at a “legally” zero rate.


When you think surveillance or spying or snooping, think Google!

PaulT (profile) says:

Re: Mike has as usual, UN-stated key facts:

“key facts”

Why is the well-known fact that Google collected this information “key” to a moronic attempt to pretend that receiving information on a publicly owned radio magnetic spectrum frequency is wiretapping? What difference does it make to the idiocy being argued?

Oh yeah, you couldn’t stop masturbating over the idea that you can “attack” Mike by slandering Google again long enough to realise that this is irrelevant. Yet again, more insane drivel from an obsessed stalker, not a shred of facts or logical argument as to why the article being commented upon is incorrect. Quelle surprise!

Derek Kerton (profile) says:

Re: Mike has as usual, UN-stated key facts:

The LA Times reporter stated some truth, but you and many others misinterpret it because the reporter wasn’t clear enough:

“But the Google equipment also gathered and stored data from unencrypted networks, including personal emails, usernames, passwords, videos and documents.”

What that really means is:

But the Google equipment also captured the bits that happened to be transmitted in the few seconds as they were driving by. If those networks were not locked, that means Google would capture bits that represented parts of emails, web pages, or whatever content the WiFi network was broadcasting openly at the time.

You see, the way the reporter positioned it, and the way you read it, it makes it look like Google went poking around INSIDE the “victim’s” LAN network, snooping into PCs and programs to take documents, emails, etc. They did not. They just stored what was being transmitted freely into the streets, as they briefly drove by.

You want security for your documents and emails (from Google), don’t broadcast them, unencrypted into the street. Not when Google drives by…or not really ever. Easy to achieve.

Anonymous Coward says:

But the court says it’s not because someone might send something “sensitive” from a secured network to an open WiFi network, and the sender didn’t intend for that info to be available via open WiFi.

Where the hell is this reasoning when the court is deciding if it’s OK for the government to snoop on my communications based on whether I have a reasonable expectation of privacy?

I disagree says:

Your ontology is absurd in the real world

This article classifies wifi as radio because it uses the elcectromagnetic spectrum. It then argues that because radio waves can be listened to with out permission by people that wifi should be too. By that rationale our infrared emissions should also be viewable by people while we are in our houses. While this is logically consistent I think that it is bad for society.

There are alternative ways to classify electromagnetic signals in terms of their privacy effects. Namely, if I expect people to not look then they shouldn’t look. Radio broadcasts are meant to be publicly viewed by the people putting out the signal. I have never met a person who uses wifi to broadcast what they are doing online to other third parties.

The argument that encryption should be used is also kind of weak. What if the crypto sucks and someone cracks it? I am not sure if it is legal or not to crack wifi crypto. If it is it seems like you run in to difficulties defining what is and isn’t crypto. If I use an outdated easily broken cypher or realy stupid password doe sthe law protect me from people breaking it? If it does it seems like the law is just saying I am protected because I had the intent to remain private. If the law doesn’t protect people who use shitty security practices then who gets to decide what qualifies as good practices in an age where the fundamentals of encryption protocols and practices are in doubt. Crypto is just prespective, if you gave a scientist from the 1950’s access to a wifi signal stream he plausibly could look at it and assume that it was encoded to maintain privacy. Most citizens are that way today, they are no more likely to really understand the technical risks of using any given protocol online.

I love techdirt and read it everyday but every once in a while they make an argument that just doesn’t seem that sound.

nasch (profile) says:

Re: Your ontology is absurd in the real world

By that rationale our infrared emissions should also be viewable by people while we are in our houses.

If you could choose whether to emit infrared or not, maybe.

Namely, if I expect people to not look then they shouldn’t look.

Not quite – if a court decides you have a reasonable expectation of privacy.

I have never met a person who uses wifi to broadcast what they are doing online to other third parties.

Everyone who ever uses an open wifi connection does exactly that, whether they realize it or not.

The argument that encryption should be used is also kind of weak. What if the crypto sucks and someone cracks it?

That has nothing to do with this situation, since this is about unencrypted wifi.

Crypto is just prespective, if you gave a scientist from the 1950’s access to a wifi signal stream he plausibly could look at it and assume that it was encoded to maintain privacy.

That doesn’t mean it actually is encrypted. Encryption is not a matter of perspective. An unencrypted signal doesn’t become encrypted just because someone doesn’t have the equipment or understanding to receive it. Encryption involves transforming the signal in such a way that a piece of secret information is (intended to be*) necessary to receive the message.

* obviously sometimes encryption is broken

Derek Kerton (profile) says:

Re: Your ontology is absurd in the real world

Not a bad argument, but there is a serious difference between fields and emissions your body emanates involuntarily, and those that require a deliberate effort.

IR heat signatures are totally involuntary, and we have no option to stop transmitting. Wi-Fi is completely deliberate, and requires effort to openly broadcast a signal (since the defaults are secured).

Once again, my main counter-argument is: how do people who WANT to share do so, if courts consider the technological equivalent of broadcasting an invitation as NOT an invitation. My side of this debate has given a clear answer as how people can signal that they don’t want to share, but the opposition has not shown a way we can signal a share, given that signaling “I am open for connections” means not that.

John Fenderson (profile) says:

Re: Your ontology is absurd in the real world

Namely, if I expect people to not look then they shouldn’t look.

But how is do you inform people what your expectation are?

In terms of Wifi, I think encryption can perform this function nicely.

If you’ve turned on WEP, you’re pretty clearly indicating that you don’t want people to use your AP without permission. How easy the encryption is to break is irrelevant — you’ve still signaled your expectations. If you’re running an unsecured AP, then you cannot expect people to ignore your AP.

It’s very much like a window. You can’t blame people for looking through it if you leave your blinds open. If you close them, you can, even if they can use some kind of trickery to see through them.

Derek Kerton (profile) says:

Google Stole My Kid's Toys

“Google stole my kids toys!”

“From where?”

“From right in the city park, where I left them. I figured why take them home every night, then back to the park the next day, so I just left them there. But when I came back, they were gone.”

“Here’s an idea. You should not leave your stuff in a public park where its free for anyone to access. People won’t know whether it’s public property, private, a freebie, and eventually some person will surely just take it. Next time, take your toys home, and put them inside your house. Then, lock your house.”

“Wow. That’s easy to do. Thanks for the great advice.”

robyeldon (profile) says:

Judges

Clearly, ignorant judges make bad decisions. It seems that the legal counsel had no idea what Wifi was either or they would have presented an expert witness to explain to the (un)learned judge that wifi is indeed a radio signal.

On the issue of wiretapping, I have never understood how a wiretapping law could apply to videotaping anyone. Where is the wire being tapped?

judge says:

dumb dumb DUUUUMB

okay, so here’s the thing. encrypted or not, it’s not MORAL to snoop another persons wifi traffic, especially for a company who’s suppose to “not be evil”

second, you seem to defend this with the concept:
if i have the technology to listen in on your conversations and the conversation is NOT encrypted, then i’m not doing anything wrong.

therefore, if there is a way for me to use passive microphones to listen to your unencrypted telephone communications, then there is no wrongdoing here right? you don’t encrypt your telphone communications, and these are broadcast across publicly accessable wire lines, listening in on your conversations is completely okay then? right?

nasch (profile) says:

Re: dumb dumb DUUUUMB

you don’t encrypt your telphone communications, and these are broadcast across publicly accessable wire lines, listening in on your conversations is completely okay then? right?

Phone lines are not publicly accessible. A better analogy would be if I’m talking to my neighbor with an unencrypted walkie-talkie, and you listen in. Not a problem, because I’m broadcasting in the clear. You have done nothing wrong by receiving my transmission. If you hear something that’s clearly meant to be a private conversation, it would be rude to listen in, but IMO not immoral. And it certainly should not be illegal.

Leave a Reply to Derek Kerton Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...