MEMORY PALACE

Friday, 1 May 2009

Anti-DMCA crusaders fight for the right to crack DRM - Ars Technica

  • Anti-DMCA crusaders fight for the right to crack DRM - Ars Technica

    tags:copyright

    • Every three years, the US Copyright Office reviews the Digital Millennium Copyright Act's most controversial section—the ban on circumventing DRM, even for legal uses. The Copyright Office has the authority to issue three-year exemptions to that blanket ban, carving out space for DVD-ripping film school profs, for instance, or making it legal for people to bypass DRM in order to unlock cell phones.

Posted by Joseph at Friday, May 01, 2009

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Followers

AddThis

Bookmark and Share

Twitter Updates

Twitter Updates

    follow me on Twitter

    My Blog List

    • CircleID
      Internet Governance in 2026: Sovereignty, Security, and the Limits of Multistakeholderism - As Internet governance fragments in 2026, authority shifts from open, multistakeholder forums to state-led security regimes, legal instruments, and allianc...
    • IPKat - news and fun for everyone!
      Saturday Sundries - Happy New Year, readers – can you believe it's 2026!?Ring in the new year with the latest IP events, news and opportunities. And don't forget to stay tuned...
    • Ars Technica
      No, Grok can’t really “apologize” for posting non-consensual sexual images - Letting the unreliable Grok be its own "spokesperson" lets xAI off the hook.
    • Freedom to Tinker
      AI Chip Lifespans: A Note on the Secondary Market - Two months ago, I wrote about the competition concerns with the GenAI infrastructure boom. One of my provocative claims was that the lifespan of the chip...
    • The Open Rights Group
      ORG End of Year Review 2025 - Digital rights in 2025 From age verification and digital ID to crime-predicting tech and attacks on migrants’ digital rights, this year we had to fight har...
    • Canadian Privacy Law Blog
      When student data is hacked & stolen: Regulators’ lessons from the PowerSchool data breach - You may recall hearing about a significant cybersecurity breach affecting school boards from the end of last year and the beginning of this year: the Po...
    • The Laboratorium
      Do Not Confuse - I was a few years ago old when I learned that these were all distinct:
    • TechnoLlama
      We need to talk about the EU TDM exception and AI training - Following the recent decision in GEMA v OpenAI, and last year’s Kneschke v LAION, we now have two German courts grappling with the applicability of the tex...
    • Binary Law
      The law? It’s what you believe it to be - “People … prefer stories that affirm their views of themselves, and of others, and of the world around them. The challenge for those who want to place the ...
    • Legal Scholarship Blog
      Call for Proposals: Fall 2024 Symposium - Iowa Law Review is now accepting proposals for the Fall 2024 Symposium. Proposal Requirements: Proposals should be submitted via email to ilr@uiowa.edu. Pr...
    • Cato Unbound
      Of Groups, Intersections, and the People Who Inhabit Them - Jacob T. Levy The powerful norms and rules that structured life in the American South during slavery and Jim Crow not only prohibited sex between black me...
    • BCS Security Articles
      People, not just data - Sometimes, we can overlook the true impact of cybercrime on individuals. Mike Sheward, Director of Information Security at Accolade, explains how learning ...
    • Info/Law
      Prof. Michael Risch on “Paths or Fences” - Professor Michael Risch, of Villanova (congrats Wildcats, BTW!), has a review of “Paths or Fences: Patents, Copyrights, and the Constitution” up at Written...
    • CYB3RCRIM3
      Child Sex Trafficking and Bypassing Security on a Tablet Computer - This post examines a recent opinion from the U.S. Court of Appeals for the 11th Circuit: *U.S. v. Blake*, 868 F.3d 960 (2017). The court begins the opin...
    • stevenberlinjohnson.com
      Wonderland, the book (and podcast!) - I’m very excited to announce my next book — Wonderland: How Play Made The Modern World, to be published in November by my long-time publisher Riverhead Boo...
    • Blogzilla
      Consultation response to "Keeping Children Safe in Education: proposed changes" - *Profs. Ian Brown and Douwe Korff, February 2016* *Introduction* 1. We have only just learned of the consultation, for which we apologise. The...
    • panGloss
      Three myths that need nailed about the right to be forgotten (and one question) - *1 **Everyone thinks it’s a bad idea, so why hasn’t it gone yet, already.* No they don’t, actually. Just the people who get to write in mass medi...
    • Clay Shirky
      Pulling Punches While Covering Print: A Reply to Ryan Chittum - Background: Yesterday, I wrote something about how nostalgia blunted skeptical coverage of Aaron Kushner’s dumb — and now failing — plans to build a newspa...
    • CMLP International Blog
      Will E.U. Court's Privacy Ruling Break the Internet? - In 2012, a bevy of internet companies and web sites waged a successful campaign against bills in Congress -- the PROTECT IP Act and Stop Online Piracy Ac...
    • DP thinker
      Recommend blog posts - For researchers working on privacy developments, here are a few suggested links to keep abreast of the latest: 1) Hunton and Williams Privacy Law Blog - 2)...
    • Moral Panics and the Copyright Wars
      MusicNet, Pressplay and Lost Opportunities - On pages 8-9 of Moral Panics and the Copyright Wars I discuss the aftermath of the shutdown of Napster in 2001. This period is interesting because it prese...
    • EDRI - Digital Civil Rights in Europe
      -
    • The Volokh Conspiracy
      -
    • Center for Democracy and Technology
      -
    • The Technology Liberation Front
      -
    • Technology, Thoughts, and Trinkets
      -

    About Me

    Joseph
    View my complete profile

    Blog Archive

    Picture Window theme. Powered by Blogger.