You would think that with a procedure that notices a website to take down content, that they would actually go to the website itself and send that notice to take down the content. That way it becomes irrelevant if Google links to it or not since there's no longer any content to direct to.
But no, apparently we need to keep on whacking the mole that simply tells people that site and the content is there instead of the content itself, as if that will somehow magically make everyone forget that it's there.
When I say "The Pirate Bay" I've just linked someone to the Pirate Bay. Because then they'll go research the site, it's domain name, etc etc. Which is no different from an actual URL or a URL to a URL, because a URL is just words and letters too.
The logical conclusion of this is that everybody should be forbidden from talking about the Pirate Bay whatsoever. Because to talk about it is to link someone to it.
It is also worth remembering that when it comes to issues of "freebooting" on Facebook, the complaints are in the opposite direction: that Facebook hides links to pirated content too well. After all, artists must be able to see where the piracy is happening! As they say.
And it all comes from folk who still haven't done a thing about the Pirate Bay after 15 odd years. They are beyond serious consideration.
The gold shirt or medals or transporter by themselves do not necessarily constitute appropriation - but in its entirety this is essentially what the movie is. It is an appropriation of Star Trek without permission or paying royalties. This is the very essence of what copyright was designed to prevent.
You know what I always say to somebody who claims to be against cultural "appropriation", whether it be in the form of portraying/sampling everything from rap music to Japanese Kimono? It's this: when you protest something like this, deciding what is "culturally appropriate" is the very thing you are trying to do, not them.
I don't find it a coincidence that copyright's core mantra dating all the way back to its conception in the 1600s has very much in common with the petty social justice warrior movements of today, plaguing the minds of the naive and turning many decent folk away from universities. And not just that. Back in the 50's and 60's communists like Sam Aaronovitch protested the capitalist "appropriation" of American comics seeping their way into British cultural life in place of what should have been purist socialist ideology. In other words, unauthorised forms of culture were to be resisted simply for being alien, in place of more appropriate appropriation.
There is a reason why those of us aligned with Thomas Paine, 18th century liberal radicalism and freedom of expression are good at seeing through these things. Though I do wish most on my side would see the connection with the problems of copyright's right to decide what culture is "appropriate" too.
It goes right back. When things like the Inquisition and the Dark Ages were afoot every bit of blasphemy could be pinpointed as an equivalent of morons killing each other based on what was culturally appropriate for Jesus and the like. I came to realise that whenever I criticised this solipsistic concept of ownership of expression instead of freedom of expression in copyright circles, I often found I would say copyright believers were in effect wanting blasphemy laws protecting their work from being defamed, wich in any other context would be seen for the transparent prior-restraint tripe that it is, which would logically extend to silencing critics of the work too since they too could sway the culture in the direction outside of the artist's "permission". Yet copyright squares the circle and pretends that the logic doesn't extend that far for a reason I've yet to hear. I was not, and am not, wrong to make this comparison.
It's not an encryption issue, because the brute-forcing bit is easy. It's a hacking issue because the software/hardware is forbidding the speedy process of it. The FBI want Apple to tinker with their source code essentially.
Though I keep stressing the warrant was granted here. It's not comparible to unwarranted, mass unconstitutional spying. If it were, by definition Apple would be asked to do it secretly anyway.
Law enforcement asking for a key to a house does not mean we should all be afraid of our locks on the count of the possibility that law enforcement could be forcing all keymakers to keep copies of keys in secret, as a result of that one house "hacking".
"The government can't be trusted" is an argument you could make against any security breach, even so much as walking through a criminal's front door rendering all doors untrustworthy.
And it's worth asking as well: we always talk about on this site the importance of security holes in programs coming to light, precisely so that they can be patched and fixed with greater security in the end. Sometimes not in ways I approve of - I don't exactly think that because someone's front door is left wide open that therefore you need to walk into the house and tresspass in order to make the point that there's a security hole. In fact local police here in the U.K. did that exact same thing and were rightly criticised for it: http://www.huffingtonpost.co.uk/2016/01/26/coventry-police-criticised-over-burglary-patrol-tactic_n_ 9075722.html
So I don't believe it is honourable to hack a company through its security hole in order to make them aware of that security hole.
However, I am in favour of raising awareness of those security holes (discretely, so that noone may take advantage of them in the meantime). And ultimately that means Apple need to make it so that they can't hack their way into a phone whatsoever.
If they are still able to hack into the phone, it's a flaw with the initial design in the first place. And if you acknowledge that this flaw is unavoidable because that's the nature of coding - that is, someone with the source code can recode and infiltrate - you have to accept that it's the case regardless, and the FBI are entitled to get Apple to hack this single phone without hacking others.
Asking for one key is not the same as asking for all keys. If it were, we wouldn't be trusting our door locks at all.
Well you could say that could happen after any crime. You wouldn't therefore dismiss the validity of warranted searches on that basis.
I mean, state forces can bully anyone into spying without a warrant in secrecy in regards to any kind of pretence. You could therefore say the slippery slope would apply to any court order and do away with prosecutions completely.
I've recently read a book by the ever brilliant Simon Singh called The Code Book. It's not as up-to-date because it was published in the year 2000 I believe. However it details the historical progression of encryption from Ancient Egypt to the internet and provides a fascinating look into encryption arms races: the prosecution against the Mary Queen of Scots, the uncracked Beale Papers, the Enigma machine and Alan Turing, the use of ultra-rare languages from the Navajo as a means of encryption against the Japanese in WWII, the decipherment of lost scripts such as Linear B providing revolutionary material for historians to better document the past (the conclusion of which will fill us folk who are passionate about science and the enlightenment with such pride and joy), and finishes both on one of the most counter-intuitive sceintific breakthroughs: that of assymetric encryption through a clever interpretation of modular mathematics and number theory, and the purely theoretical concept of quantum computing which harnesses the one-time pad perfect encryption (and will take you a good couple of reads to process as it did with me - if you think you understand quantum theory, you don't understand quantum theory).
Encryption has always been mathematical warfare. Let us just hope nobody solves the P vs NP problem before quantum encryption gets here.
I'm starting to have second thoughts about this particular case. Don't get me wrong I'm all for civil liberties and "warrant or gtfo", but a warrant was delivered here and I'm beginning to suspect Apple's "masterkey" theory is a bit far-fetched.
If the argument is "if we were made to crack this phone all other phones (the 5C) will be compromised" but it's worth bearing in mind that the FBI have stated they do not want possession of the hack-update that will unlock this phone. See here: http://www.bbc.co.uk/news/technology-35601035 so if anything Apple are at liberty to destroy the hack after it's all unlocked and finished.
What's being asked is, essentially, to customise the iOS source code and compile it for this device only, which again it must be stressed is not an update required to be in possession of the FBI. If this were not the case I would probably protest against that, but that alone, not the hacking at the behest of a warrant. Because it would be the equivalent of - don't think "masterkey" - giving a copy of all unique keys to everybodys' houses for the sake of allowing law enforcement to find one key into a single house. But it is quite possible to be against the former and be for the latter, and suspect that the keybearer is incorrect when he says the handing over of one key will lead to the handover of all keys as some kind of "slippery slope".
Slippery slope fallacies exist too, and this could be one of them.
"Keys" isn't even the right metaphor here anyway. What we are talking about is not encryption, but hacking. It's also not right to say "if someone else has a way in bad guys will exploit it" - well, does the fact that "good guys" can change their source code for updates on their end also mean a slippery slope where "bad guys" will exploit? In other words, is the fact that source code is updateable at ALL in itself a "backdoor"? It can't be, unless you really stretch it. I mean, criminals can break into companies and steal source code all the time e.g. Half Life 2, but we wouldn't talk about thatin the rhetoric of "You SEE? This is why we need end-to-end encry-*cough*, sorry, source code security!" There is no such thing as "end-to-end" source code which is unhackable by a good or bad middleman.
The point about true "end-to-end" encryption is that not even the encryption designer, Apple, can get in. But if Apple can get in here, the "backdoor" is already there, but that's because of source code, not asymmetric keys or anything.
As for this slippery slope, again no court or even government agency would seriously say that because we need to break into this guy's house, therefore all citizens from now on must have no locks on their doors. It wouldn't get far.
Re: Why this is an impossible request from the court
Good post. If it is the case that we're getting to the stage where Apple are winning on a microscopic warfare front, to the point where a simple 4-digit pin will do, for all practical purposes this would suffice for security in itself.
Who needs copyright law when you can design device-unique combined hardware/softwa-*cough*- Digital Rights Management that makes the copying of flash data exponentially hard? Apple seems to be able to stop the copying process so well with natural scarcity as it is that they don't even need copyright law! I guess the FBI will be joining forces with the EFF to condemn DRM then.
Anyway, I wouldn't want to be one of those Apple programmers. One slip-up, one bug, one wrong library, and you face possible federal prosecution for triggering the self-erase function.
What would be hilarious is if they unlock the phone only to find third-party advanced RSA encryption on the phone without any private prime-number keys - the only location being inside the criminal's mind, memorised using mnemonics. Because after all that is the only way you can guarantee (for now) that nobody will ever crack your messages.
"There is nothing a new copyright holder can do to stop that."
You've said all I could say.
Copyright is unenforcable. You cannot stop unauthorised copies when it is ultimately everybody else's decision as to whether copies exist or not. Copyright law gets zero credit for the funding of creative artists, because such a law cannot possibly "deter" or otherwise socially condition society into paying for work.
It's not enforcable, as you've said. And considering these specific photos, why would you want it to be?
I have a question: if Digital Rights Management really can achieve that magical ability to prevent games from ever being copied without authorisation, why would games companies need copyright law whatsoever?
The answer is that they need copyright law to prevent games from being copied without authorisation.
In other words, you can have either copyright law or Digital Rights Management. But if want to have both, you'll just look silly.
I never did agree that there is such a thing as a "false consciousness" conspiracy. Google don't "brainwash" any more than NBC or Fox News, because the inherent problem of any stupidity is the stupidity of the people themselves.
Chomsky is overrated, putting it mildly.
"It reflects poorly however on Google because their results are more of a popularity contest rather than an attempt to get you the best results."
Your obscure definition of "best results" proves exactly my point. Who is to say your "best results" are any more appropriate than anyone else's "best results"? You want to be the puppeteer to pull the very strings you deplore.
It's the same mentality that is currently coming from here in the UK in regards to Leveson, in regards to Scottish nats lashing at the BBC for "bias", in regards to GamerGate thinking the approprate response to SJWs thinking gaming media is biased against their interests is to say gaming journalism is biased against THEIR interests, Corbynistas claiming every media criticism is a "smear", and now (predictably, as Google is naturally a target for conspiracists) that Google is the big, evil, moustached organisation pulling all the strings of our collective brainwashed unconscious or something.
Well this issue is all well and good and everything, but shouldn't we be screaming about the blatant LotR copyright infringement going on right now?! And the infringment of the photographer of Erdogan?!!?
Stop violating identity rights of creative work! Stop infringing on freedoms!! You freedom hater you!
A "digital version of fiat currency" would be if the Federal Reserve accepted JPEG dollars, which only they are allowed to print, as legal tender. But policing people from making forgeries of the JPEG dollars would fail spectacularly, and such a silly idea would very quickly fall apart in society.
But for some reason we all fall for a delusion that is something very similar. Ask yourself: what else is a system involving failed attempts at artificial scarcity, where you choose who is and who is not allowed to make copies in order to give the "money" value, where not just JPEG is legal tender but ANYTHING with the dollar sign on it is legal tender, yet is collectively, religiously believed by many to be a workable way of protecting property rights?
Start asking more copyright economists this question and see if you can get any good rebuttals.
It's not fiat, because you can't just print a new BitCoin whenever you please. It's much more like a gold standard, where BitCoins need a lot of work to mine before you can circulate new ones, like gold.