Wally 's Techdirt Comments

Latest Comments (3172) comment rss

  • Kim Dotcom Loses Appeal Concerning Extradition

    Wally ( profile ), 01 Mar, 2013 @ 02:39pm

    Re: Re: Re:

    "You Techdirt pirates are particularly fond of censoring this week.

    Good to know that your response to truth is censorship.

    Pirates love to censor!"

    The right to free speech does not literally mean you have the right to say whatever the heck you want...It only means you have a right to state your opinions or emotions or thoughts in a communicably reasonable manner.

    In which case I see no real form of relevant communication out of you. You are only trolling. Therefor, you get censored because it reminds people not to feed you the attention you seek.

  • Kim Dotcom Loses Appeal Concerning Extradition

    Wally ( profile ), 01 Mar, 2013 @ 02:04pm

    Re: Re: Re: Re: Re: Re: Re:

    How is entrapment legal???

  • FCC Might Investigate Whether Or Not Ban On Cell Phone Unlocking Should Have Been Allowed

    Wally ( profile ), 01 Mar, 2013 @ 01:44pm

    Re: Re: If you don't want a locked phone, don't buy one!

    If there is any copyright issue involved with the subsidy phone...it is on the carrier's side of things...they mess with the original OS shells and programming to block features such as FaceTime or prevent the user from actually getting out of a contract.

  • Kim Dotcom Loses Appeal Concerning Extradition

    Wally ( profile ), 01 Mar, 2013 @ 01:27pm

    Re: Re: Re:

    So what is the so called " obvious " point you are making??? Certainly there is a point to your trolling...oh wait...never mind...

    Folks the sad truth is that this AC may actually have a very bad home life.

  • Kim Dotcom Loses Appeal Concerning Extradition

    Wally ( profile ), 01 Mar, 2013 @ 01:22pm

    Re: Re: Re:

    http://www.law.cornell.edu/uscode/text/17/512


    (b) System Caching.?
    (1) Limitation on liability.? A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the intermediate and temporary storage of material on a system or network controlled or operated by or for the service provider in a case in which?
    (A) the material is made available online by a person other than the service provider;
    (B) the material is transmitted from the person described in subparagraph (A) through the system or network to a person other than the person described in subparagraph (A) at the direction of that other person; and
    (C) the storage is carried out through an automatic technical process for the purpose of making the material available to users of the system or network who, after the material is transmitted as described in subparagraph (B), request access to the material from the person described in subparagraph (A),
    if the conditions set forth in paragraph (2) are met.
    (2) Conditions.? The conditions referred to in paragraph (1) are that?
    (A) the material described in paragraph (1) is transmitted to the subsequent users described in paragraph (1)(C) without modification to its content from the manner in which the material was transmitted from the person described in paragraph (1)(A);
    (B) the service provider described in paragraph (1) complies with rules concerning the refreshing, reloading, or other updating of the material when specified by the person making the material available online in accordance with a generally accepted industry standard data communications protocol for the system or network through which that person makes the material available, except that this subparagraph applies only if those rules are not used by the person described in paragraph (1)(A) to prevent or unreasonably impair the intermediate storage to which this subsection applies;
    (C) the service provider does not interfere with the ability of technology associated with the material to return to the person described in paragraph (1)(A) the information that would have been available to that person if the material had been obtained by the subsequent users described in paragraph (1)(C) directly from that person, except that this subparagraph applies only if that technology?
    (i) does not significantly interfere with the performance of the provider?s system or network or with the intermediate storage of the material;
    (ii) is consistent with generally accepted industry standard communications protocols; and
    (iii) does not extract information from the provider?s system or network other than the information that would have been available to the person described in paragraph (1)(A) if the subsequent users had gained access to the material directly from that person;
    (D) if the person described in paragraph (1)(A) has in effect a condition that a person must meet prior to having access to the material, such as a condition based on payment of a fee or provision of a password or other information, the service provider permits access to the stored material in significant part only to users of its system or network that have met those conditions and only in accordance with those conditions; and
    (E) if the person described in paragraph (1)(A) makes that material available online without the authorization of the copyright owner of the material, the service provider responds expeditiously to remove, or disable access to, the material that is claimed to be infringing upon notification of claimed infringement as described in subsection (c)(3), except that this subparagraph applies only if?
    (i) the material has previously been removed from the originating site or access to it has been disabled, or a court has ordered that the material be removed from the originating site or that access to the material on the originating site be disabled; and
    (ii) the party giving the notification includes in the notification a statement confirming that the material has been removed from the originating site or access to it has been disabled or that a court has ordered that the material be removed from the originating site or that access to the material on the originating site be disabled.
    (c) Information Residing on Systems or Networks At Direction of Users.?
    (1) In general.? A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider?
    (A)
    (i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;
    (ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or
    (iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;
    (B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and
    (C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity.
    (2) Designated agent.? The limitations on liability established in this subsection apply to a service provider only if the service provider has designated an agent to receive notifications of claimed infringement described in paragraph (3), by making available through its service, including on its website in a location accessible to the public, and by providing to the Copyright Office, substantially the following information:
    (A) the name, address, phone number, and electronic mail address of the agent.
    (B) other contact information which the Register of Copyrights may deem appropriate.
    The Register of Copyrights shall maintain a current directory of agents available to the public for inspection, including through the Internet, and may require payment of a fee by service providers to cover the costs of maintaining the directory.
    (3) Elements of notification.?
    (A) To be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:
    (i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
    (ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.
    (iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.
    (iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.
    (v) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
    (vi) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
    (B)
    (i) Subject to clause (ii), a notification from a copyright owner or from a person authorized to act on behalf of the copyright owner that fails to comply substantially with the provisions of subparagraph (A) shall not be considered under paragraph (1)(A) in determining whether a service provider has actual knowledge or is aware of facts or circumstances from which infringing activity is apparent.
    (ii) In a case in which the notification that is provided to the service provider?s designated agent fails to comply substantially with all the provisions of subparagraph (A) but substantially complies with clauses (ii), (iii), and (iv) of subparagraph (A), clause (i) of this subparagraph applies only if the service provider promptly attempts to contact the person making the notification or takes other reasonable steps to assist in the receipt of notification that substantially complies with all the provisions of subparagraph (A).
    (d) Information Location Tools.? A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link, if the service provider?
    (1)
    (A) does not have actual knowledge that the material or activity is infringing;
    (B) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or
    (C) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;
    (2) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and
    (3) upon notification of claimed infringement as described in subsection (c)(3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity, except that, for purposes of this paragraph, the information described in subsection (c)(3)(A)(iii) shall be identification of the reference or link, to material or activity claimed to be infringing, that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate that reference or link.

  • System Used By New Six Strikes CAS, Falsely Identifies Game Mods As NBC TV Shows

    Wally ( profile ), 01 Mar, 2013 @ 12:06pm

    Re: Re: Re: Re: Re: Re: Re:

    Non taken.

    However, comments like this:
    http://www.techdirt.com/articles/20130224/22341022086/system-used-new-six-strikes-cas-falsely-identifies-game-mods-as-nbc-tv-shows.shtml#c1614


    This:
    http://www.techdirt.com/articles/20130224/22341022086/system-used-new-six-strikes-cas-falsely-identifies-game-mods-as-nbc-tv-shows.shtml#c852

    and This:
    http://www.techdirt.com/articles/20130224/22341022086/system-used-new-six-strikes-cas-falsely-identifies-game-mods-as-nbc-tv-shows.shtml#c1854

    and conversations like This:
    http://www.techdirt.com/articles/20130227/14231422143/comcast-we-wont-terminate-your-account-under-six-strikes-well-just-block-every-single-website.shtml#c3080

    Are typically and frequently occurring as of late since my increased activity on the website.

    It really likely is one person.

  • System Used By New Six Strikes CAS, Falsely Identifies Game Mods As NBC TV Shows

    Wally ( profile ), 01 Mar, 2013 @ 10:59am

    Re: Re: Re: Re: Re:

    Rikuo, look at the recent Comcast story....follow my comments on there using your browser's find function.

  • Kim Dotcom Loses Appeal Concerning Extradition

    Wally ( profile ), 01 Mar, 2013 @ 10:55am

    Re:

    Kim Dotcom's case actually pales in comparison to that of Aaron swartz. But you are correct, Kim Dotcom's case was handled in a way that I don't even think would be handled on US Soil.

  • 'Video Games Do Not Cause Violence,' According To Former FBI Profiler

    Wally ( profile ), 01 Mar, 2013 @ 10:41am

    Re: Comment deleted???

    It was likely the simple fact that you had a proxy or VPN set up to look like multiple AC's. I got a similar message myself a moment ago but did write in explaining (while signed in) why I had a VPN in the first place. All I had to do was tell them the Location of the VPN and they likely confirmed my claims with the IP addresses...all traffic of which the VPN traffic was routed to and from my house and the several nodes at her office. My mother is at my house visiting...she is working at my house and the heavily encrypted VPN which has a lot to do with her job in insurance auditing.

  • 'Video Games Do Not Cause Violence,' According To Former FBI Profiler

    Wally ( profile ), 01 Mar, 2013 @ 10:04am

    Re: Re: Re: Comment deleted???

    If it is the same AC who I think it is...very likely...

  • Bradley Manning Pleads Guilty To Some Charges: Reveals That Major Newspapers Ignored His Offer To Leak Collateral Murder Video

    Wally ( profile ), 01 Mar, 2013 @ 09:51am

    Re: Re:

    I can only give you this piece of information.

    http://www.techdirt.com/articles/20130228/11343922157/bradley-manning-pleads-guilty-to-some-charges-reveals-that-major-newspapers-ignored-his-offer-to-leak-collateral-murder-video.shtml#c542

  • Vatican Deletes All Of Pope Benedict's Tweets

    Wally ( profile ), 01 Mar, 2013 @ 09:48am

    Re: Re: Re: update

    Precisely ^_^

    It should be noted that I do not take credit for that explanation. My lovely wife was the one who gave me that information.

  • Vatican Deletes All Of Pope Benedict's Tweets

    Wally ( profile ), 01 Mar, 2013 @ 09:46am

    Re: Re: Re: update

    Facebook only requires you to use a real name, but it does not have to be yours. The idea, in short, is simply that the twitter account is reserved for the the one person who has the rank of Pope.

  • Comcast: We Won't Terminate Your Account Under Six Strikes; We'll Just Block Every Single Website

    Wally ( profile ), 01 Mar, 2013 @ 09:26am

    Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:

    Isn't that a shift key that does that....oh well different typing styles I guess...

  • Comcast: We Won't Terminate Your Account Under Six Strikes; We'll Just Block Every Single Website

    Wally ( profile ), 01 Mar, 2013 @ 09:25am

    Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:

    Ah I see :-)

  • Comcast: We Won't Terminate Your Account Under Six Strikes; We'll Just Block Every Single Website

    Wally ( profile ), 01 Mar, 2013 @ 08:45am

    Re: Re: Re: Re: Re: Re: Re: Re: Re: So... To all pirates who think 6 Strikes can't work...

    What's really sad is that you thought I wouldn't see that.

    I mean seriously...you're the one asserting to everyone that I'm a fool, yet here you are validating my claims. This only proves you're a troll.

  • Comcast: We Won't Terminate Your Account Under Six Strikes; We'll Just Block Every Single Website

    Wally ( profile ), 01 Mar, 2013 @ 08:42am

    Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: So... To all pirates who think 6 Strikes can't work...

    Thank you for helping me clarify that. And I am sorry for accusing (specifically) you as being troll :-)

    Ok so now that you have clarified that for me, I now politely ask you to look at the point I was making. I will shorten it and for the sake of not mixing things up in terminology I will now refer my point using the word "Code".


    My point is this. Comcast has pointed out that no matter where a user goes after they have been redirected to their anti-piracy website, even onto another Internet connection on another ISP, they will still get redirected to Comcast's anti-piracy web site. This means that they might have to inject a malicious code through the embedded firmware on their modems. It doesn't matter whether it is Java-based code or not.

    Thanky you PaulT you are awesome :-)

  • Bradley Manning Pleads Guilty To Some Charges: Reveals That Major Newspapers Ignored His Offer To Leak Collateral Murder Video

    Wally ( profile ), 01 Mar, 2013 @ 08:10am

    Re: Re: Re: I've been out working. But where are the usual fanboys?

    Zos, I can assure you that the AC you responded is not out_of_the_blue himself, the AC that posted the initial thread in this conversation is. He has been quite reasonable in thought lately. The idiot you responded to is a troll posing as OOTB.

  • Bradley Manning Pleads Guilty To Some Charges: Reveals That Major Newspapers Ignored His Offer To Leak Collateral Murder Video

    Wally ( profile ), 01 Mar, 2013 @ 08:05am

    Re: Re: Re: Re:

    Oh no worries ^_^ Honestly the information on all this was declassified in 2006 and only names were redacted.

    The specific reason for these "lies" that US told other countries around the world stemmed from the fact that while UN investigators found no evidence of manufacture of unconventional warfare (Saddam Hussein ordered the evidence to be dismantled and destroyed after a certain incident in 1989), but Saddam Husein repeatedly told his subjects he still had them and threatened to use the weapons on them to keep the populous in control, and to keep Israel and Iran at bay.

  • Bradley Manning Pleads Guilty To Some Charges: Reveals That Major Newspapers Ignored His Offer To Leak Collateral Murder Video

    Wally ( profile ), 01 Mar, 2013 @ 07:58am

    Re: Re: Re: Re: Re: Re: I've been out working. But where are the usual fanboys?

    An Alford Plea is not permissible as evidence against the accused, it's an acknowledgement and assertion of one's own innosence after a trial. The aknowledgement that prosecution had enough evidence against you to get you to plea guilty, and the assertion by you of your own innocence in the matter.

    You may be right that an Alford Plea may not be permissible under Manning's case, but Manning is taking lesser charges for pleading guilty....Which is a part of the Alford Plea process.


    I admire the fact that you love to try to call me out, but you have got to work on your tact a bit ;-)

Next >>