Techdirt Lite.
(Click here for full version)

This Week In Techdirt History: June 28th - July 4th (Techdirt)

by Leigh Beadon

from the it's-all-relative dept on Saturday, July 4th, 2015 @ 12:00PM

Five Years Ago

Last week, we recalled on ASCAP's attack on Creative Commons. This week in 2010, its own members lashed out at it in response. EFF, Public Knowledge and Creative Commons itself all politely responded to the attack, while we noted that the music publishing industry in general has a bad habit of aggression towards consumer's groups and those who respect individual rights.

The Swedish Pirate Party was seeking to host The Pirate Bay from inside the Swedish parliament, while Dutch ISPs were fighting against demands that they block the site entirely, even as Dutch public television was experimenting with BitTorrent distribution. Meanwhile, the pilot of TV show Pioneer One was released on BitTorrent and quickly raised $20,000 do create more episodes.

The Supreme Court's Bilski Ruling came out, narrowly allowing software and business model patents to survive while dropping plenty of hints that the court was against software patents in the long run. The IEEE, on the other hand, just celebrated.

Ten Years Ago

This week in 2005, there were two other expected and fairly predictable rulings from the Supreme Court: Grokster and Brand X. Sweden was putting a bad file-sharing law into effect while a Taiwanese court ruled that file-sharing software is completely legal. The EU wanted an EU-wide licensing scheme for music downloads, former RIAA boss Hilary Rosen realized that these victories might not be victories and at least one record label surprised us by not blaming technology for its problems. Warner Brothers, on the other hand, was still actively rebelling against new business models, while UK residents were discovering that their home VHS copies were the only remaining records of shows the BBC never kept.

Newspapers were having fun making pointless and/or obvious observations about the digital age, like the fact that online directions are sometimes wrong, or that user-created content is popular, or that giant would-you-rather studies about technology yield weird results.

Fifteen Years Ago

Five years before that, the New York Times was already criticizing geeks while lexicographers were struggling to agree on the correct spelling of "dot-com" (or .com or dotcom or...) A former top music exec was pointing out that file-sharing can't be stopped, while a current top music exec was insisting he'll crush digital music sites entirely.

Some high-profile outages also rocked the web this week in 2000: Yahoo! went down when a fiber line was severed, United Airlines' website disappeared for most of a morning, and most shocking of all, a glitch took down Techdirt's front page for an hour and a half.

One-Hundred And Ten Years Ago

We've had lots of technology history lately, so this week let's take a break for some science history. It was on June 30th, 1905 that the Annalen der Physik science journal received Albert Einstein's paper On the Electrodynamics of Moving Bodies, which established the theory of special relativity. The universe would never be the same again.

1 Comment

Awesome Stuff: Supplying The R For VR (Innovation)

by Leigh Beadon

from the look-all-around dept on Friday, July 3rd, 2015 @ 12:00PM

A few weeks ago, we featured the Gloveone and talked about the growing market for supplemental virtual reality devices. We also talked about the coming VR future on this week's podcast episode. But there's another half of the VR world we haven't talked a lot about: the capture and creation of VR environments. This week, we're looking at the Sphericam 2, a 360-degree 4k camera.

The Good

As VR devices like the Oculus Rift become more popular, there's going to be a huge thirst for content — and in this everyone-is-a-creator world, a huge thirst for content-making tools, too. Though much of the excitement has been around video games and from-scratch environments, there are also plenty of compelling things to be done with material captured the real world. For that, you need an elaborate multi-camera setup — or a device like the Sphericam. It's tiny (about the size of a tennis ball), rugged and full-featured, and requires no special knowledge to capture 360-degree footage which can then be converted to a navigable VR environment. It's basically a GoPro combined with a Google Street View car, and that's pretty cool. For the videophile, it has solid specs: 60fps raw video at 4096x2048 resolution, on six cameras with no blind spots.

The Bad

There's really only one major drawback here, and that's the price. At $1500 plus shipping, it's not something that's going to find its way into everyone's pocket overnight. That's not to say the price is unfair — given the amount of technology packed into the device, it seems at least reasonable, but for the time being it remains an obstacle. Still, just like the VR devices themselves, it's likely that things like the Sphericam will only get more and more accessible as time goes on.

The User Generated

This is the part that's really exciting and interesting about devices like this. Today, it's simply no longer enough to release a new means of consuming content to the world — it needs to come with ways of creating that content. The world of virtual reality will have no multi-decade gap between early "professional only" days and later "everyone's in on it" days, like photography or film or recorded music — the two will arrive almost simultaneously, with content coming from a huge spectrum from amateur to professional and everything in between. Devices like the Sphericam are paving the way for this, demonstrating that even something cutting-edge like virtual reality can and will be adopted by creators of all classes. It's going to be an interesting future in more ways than one.


How Section 1201 Of The Copyright Statute Threatens Innovation (Copyright)

by Cathy Gellis

from the breaking-computers dept on Thursday, July 2nd, 2015 @ 7:39PM

It would take many, many blog posts to fully articulate all the ways that modern copyright law threatens innovation. But one notable way is through Section 1201 of the copyright statute.

As discussed previously, Section 1201 is ostensibly supposed to minimize copyright infringement by making it its own offense to bypass the technical protective measures (TPMs) controlling access to a particular copy of a copyrighted work. (Sometimes these sorts of TPMs are referred to as DRM, or Digital Rights Management.) It is a fair question whether forbidding the bypass of TPMs is at all an effective approach to minimizing infringement, but it’s an even more important question to ask whether the portion of the copyright statute that forbids the bypassing of TPMs does so at the expense of other sections of the statute that specifically entitle people to make certain uses of copyrighted works.

The answer to this latter question is clearly no, and in fact Congress anticipated that it would be “no,” when it put into Section 1201 the requirement that the Copyright Office consider afresh, every three years, whether certain types of TPM bypassing should be deemed specifically permissible, notwithstanding Section 1201’s general prohibition against it. Unfortunately these triennial rulemakings are an extremely cumbersome, expensive, and ineffective way of protecting the non-infringing uses of copyrighted works the public is entitled to make. But the even bigger problem, and the one that I will focus on here, is that Section 1201’s prohibition against bypassing TPMs is increasingly standing in the way of not just non-infringing uses of copyrighted works but non-infringing uses of computing devices as a whole.

In the triennial rulemaking underway members of the public petitioned for a number of exemptions to Sections 1201’s prohibition, which the Copyright Office distilled into 27 classes of exemptions. The first 10 classes generally sought to allow people interact with copies of copyrighted works in ways they were entitled to but that the TPMs controlling the interaction prevented. But the latter classes, 11 through 27, were notable in that, rather than involving the sort of consumption of copyrighted media content DRM is designed to control, they all were classes designed to allow people to interact with computing logic itself.

Some of these classes, like 23 (“Abandoned software – video games requiring server communication”) and 24 (“Abandoned software – music recording software”), sought to allow people to bypass TPMs so that they could actually run the copies of software they legitimately had access to. But for many of these classes petitioners found themselves needing to ask not for exemptions to use copyrighted works in ways that they that the legitimate right to but for exemptions allowing them to use computers in ways they had the legitimate right to use them.

Because particularly for the classes seeking exemptions to modify the functionality of, or perform security research on, devices like phones (Classes 11 and 16), tablets (Class 12), TVs (Class 20), vehicles (Classes 21 and 22), and even computer-chipped medical devices (Class 27), that’s what these devices all are: computers. They just happen to be phone, TV, car, and pacemaker-shaped computers. Like a home PC (which Congress had not explicitly sought to regulate access to in 1998 when it codified Section 1201) they are pieces of computing hardware with circuitry that gets controlled by software. And, just like the home PC, people should be able to use the processing power of their computing devices as they would choose to, regardless of the shapes they come in.

Unfortunately, unless they bypass the TPM they can’t, and unless the Copyright Office grants the exemption they can’t bypass the TPM legally. And that’s a problem, because when people’s exploration of the full contours of their computing devices is limited by the threat of legal sanction, all the innovation and discovery that exploration would have yielded is chilled.

But to the extent that it is copyright law that is causing this chilling, it is a particularly bizarre result. Copyright law is inherently about promoting the progress of the arts and sciences, or, in other words, stimulating innovation and knowledge-sharing. It is completely anathema to copyright law’s constitutional mandate for Section 1201 of the copyright statute to explicitly impose barriers to that discovery.

This contradiction was an important point I made in two sets of comments and testimony submitted as part of this rulemaking process. In them I argued that these exemptions, particularly for classes 11-27, should be granted liberally in order that people’s freedom to tinker with the tools they legitimately possessed not be impinged upon just because those tools happened to contain a TPM. If the Copyright Office were to do nothing and simply let these TPMs continue to block this free exploration with the threat of legal sanction it would be particularly unjust because none of those TPMs were implemented to limit the infringement of copyrighted works. While the software running a device may itself be a copyrighted work, the TPM bypass would not be about violating any of the exclusive rights in that work’s copyright. Rather, the TPM bypass would simply be about getting the device itself to work as its user would choose.

Opponents to these classes argued that, even if the TPMs were not guarding against copyright harms, they prevented other sorts of harms that might result if people could use computing technology with unfettered freedom. For instance, they fretted, with regard to vehicles it was argued that if people could study or modify the software on their cars then brakes would fail, pollution would increase, and other terrible consequences would befall the world. But something important to remember is that by limiting this sort of discovery we also limit all of its benefits as well. If people cannot legally do security research on their cars, for instance, it doesn’t make those cars more secure. It just makes it harder to make them more secure.

Also, it is not the role of copyright to regulate technology use and development (except to the extent that it is designed to stimulate innovation). When the Copyright Office suddenly gets to be the gatekeeper on how people can use their computing technology, while it may forestall some potential negative outcomes to that use, it also forestalls any good ones. Furthermore it prevents any other more appropriate authority better equipped to balance the costs and benefits of technology use to craft more nuanced and effective regulation to address any negative ones. As they would — after all, it’s not like we have been living in the Wild West up until the Copyright Office managed to become inserted into the technology regulation space. For instance, even in the analog world if people modified the physical attributes of their cars – something they never needed the Copyright Office’s blessing to do – other regulators could still speak to whether they would be allowed to drive their modified cars on open roads. These other regulators have not become enfeebled just because the modifications people may choose to make to their cars may now be digital, particularly when the consequences to these modifications are not.

But even when the consequences to how people use their machines are digital, regulators can still address those outcomes. The problem has been that regulating computing use is tricky and up to now we haven’t done it very well. Instead we’ve ended up with laws like the Computer Fraud and Abuse Act (CFAA), laws that are very powerful and just as blunt, which punish beneficial computer uses as much as negative ones. But just because we have not perfected laws governing computer use does not mean that the Copyright Office should simply say no to these uses. In fact, it’s actually reason that the Copyright Office should say yes to them.

One of the problems with the CFAA is that it construes the question of wrongfulness of a computer use based on the permissibility of that action. As a result, without the exemptions we are left in a situation where barriers erected under the auspices of copyright could threaten to become the sole basis by which the CFAA gets its teeth to sanction the very sort of inherently non-infringing activity that copyright law was never intended to prevent. And that’s the bitter irony, because while laws like the CFAA sadly lack any adequate mechanism to assess whether a computer use is a beneficial or otherwise fair use, copyright law by design can, and, indeed, pursuant to its Constitutional origins, must.

For these reasons the Copyright Office should grant all the sought after exemptions, particularly for these latter classes. And it’s also for these reasons that it’s time to amend the copyright statute to remove the bottleneck to innovation Section 1201 has become given how it requires the permission of the Copyright Office before any of this computer use can be allowed.

Thanks to Jeffrey Vagle and others for their help preparing these comments and testimony.

Reposted from Digital Age Defense


Let's Encrypt Releases Transparency Report -- All Zeroes Across The Board (Privacy)

by Mike Masnick

from the now-let's-watch-if-anything-changes dept on Thursday, July 2nd, 2015 @ 6:18PM
We've talked a bit about the important security certificate effort being put together by EFF, Mozilla and others, called Let's Encrypt, which will offer free HTTPS security certificates, making it much easier to encrypt the web. They've been busy working on the project which is set to launch in a few months. But first... Let's Encrypt has released its first transparency report. Yes, that's right: before it's launched. As you might expect, there are a lot of zeros here:
This is actually pretty important for a variety of reasons. First, it clearly acts as something of a warrant canary. And by posting this now, before launch and before there's even been a chance for the government to request information, Let's Encrypt is actually able to say "0." That may seem like a strange thing to say but, with other companies, the government has told them that they're not allowed to claim "0," but can only give ranges -- such as 0 to 999 if they separate out the specific government requests, or 0 to 249 if they lump together different kinds of government orders. Twitter has been fighting back against these kinds of rules, and others have argued that revealing an accurate number should be protected speech under the First Amendment.

Let's Encrypt is, smartly, getting this first report out there -- with all the zeroes -- before the government can swoop in and insist that it has to only display ranges. In other words, this is getting in before any gag order can stop this kind of thing. Smart move. It's also nice to see them break down all of the different possible types of orders, rather than lumping them into more general buckets. That's an important step that it would be nice to see others follow as well.

Read More

DailyDirt: Bring Out Your Dead... (Green Tech)

by Michael Ho

from the urls-we-dig-up dept on Thursday, July 2nd, 2015 @ 5:00PM
Disposing of dead bodies is usually not a funny topic for anyone -- except for maybe Monty Python. But until we figure out how to cheat death, we're going to need to deal with corpses. Burying the dead six feet under might not be practical in some places, and not everyone is keen on cremation. Here are just a few other options. Hopefully, you won't need to actually employ any of these options any time soon.

Older Stories >>