Archive for September 2003

The Three Conjectures

Quoth the Belmont Club: The so-called strengths of Islamic terrorism: fanatical intent; lack of a centralized leadership; absence of a final authority and cellular structure guarantee uncontrollable escalation once the nuclear threshold is crossed. Therefore the ‘rational’ American response to the initiation of terrorist WMD attack would be all out retaliation from the outset.

Motion Picture Association Commissions Study

…gets expected results. UPDATE 2003/09/27: Where are my manners? Hat tip: Kim Weatherall. UPDATE 2003/10/24: Hey, and a month later slashdot catches up! Advantage: Weatherall.

The Kiwi Agenda

Matthew Hall, who’s running the Digital Agenda review at Phillips Fox, presented this paper (doc format) in New Zealand earlier this month, which discusses some of the findings of the review so far. Some excerpts: Presently, no economic data supporting the additional costs that are being or are likely to be incurred or that demonstrate […]

Digital Agenda Forum in Sydney

Tim Lister of the south Sydney Greens attended the Sydney forum, and posted a summary. An excerpt: One rebel, the chap who built the modchip that Sony got exercised about, had a good time denigrating the illogicality of the legal system, that made it illegal to modify legal hardware that he legally owned to play […]

Digital Agenda Submissions

A number of people have already made submissions: Deacons (TPM measures insufficiently effective) Stevens (the guy being sued by Sony for modchipping Playstations) Green (got ripped off by product activation) Van Emmerik (reverse engineer) International Disc Duplicating Association (IDDA) (broader statutory licensing) Australian Consumers’ Association (ACA) (various topics) (Links repeated here since the Phillips Fox […]

Spam and Ecash Risks

One risk of solving spam (by doing cool ecash stuff, or by any other means) is that you might be attacked by people who don’t want it solved. I underestimated both the enemy’s level of sophistication, and also the enemy’s level of brute malevolence. I always knew that spammers had no principals and no ethics, […]

Censoring Discussion of How to do Bad Stuff

robochan writes “According to this report in the Sydney Morning Herald, Chief Operating Officer of Symantec, John Schwarz, was quoted as ‘calling for laws to make it a criminal offense to share information and tools online which could be used by malicious hackers and virus writers.’ This article takes a look at the negative affects […]

Saleable Copies and Auxiliary Copies

One of the fundamental properties of digital content is that the content ceases to exist if you don’t make copies. You can’t view it (that means making a copy onto the screen from what was on disk or the network), you often can’t transfer it (that involves making a copy on someone else’s hard disk, […]

Eugene Volokh and Lawrence Solum Debate IP

Volokh proposes an interesting hypothetical to gain a better understanding of property rights over ideas, Solum replies and the debate continues.

Someone to Link

dbs on what to do with orphaned code. Excerpt: When a company is deregistered in Australia, its property at deregistration vests in ASIC: Corporations Act 2001 (Cth) s 601AD. ASIC may deal with the property as it sees fit: Corporations Act s 601AE. I think it would be a neat idea if computer software that […]

Digital Agenda Review — Online Forum Summary

Okay, so here’s a better summary of the forum which I’ve posted to the linux-aus mailing list. And we’re off… Archives are at http://your.phillipsfox.com.au/digitalreview/ The format was: Libraries, etc ISP liability Technology and Rights TPM, Circumvention devices and RMI General discussion There were a bunch of people from Phillips Fox and the Attorney General’s department […]

Lest We Forget

Solidarity! Resistance!

The Maths Cheer

Integration, derivation L’Hopital’s rule, FIGHT! E to the x, e to the x, E to the x, d-y-d-x, Cosine, secant, tangent, sine, Three-point-one-four-one-five-nine, Label the axes y and x, Hell with football — we want sex!

Decompilation, Reverse Engineering, Supporting Orphaned Code

Issue 19 19.1: Do the decompilation amendments achieve the intended balance between owners and users of software? One of the considerations of the review is the changes to the copyright act made back when Y2k was looming. These changes concerned allowing users to demcompile programs they own for compatibility reasons, and to fix bugs in […]

What Next?

Protecting owners interests in Tennessee. Solving spam, by banning software and communication.