Bandits Give Microsoft a Lesson on Copying, Stealing
the451.com reported last week that Brad Smith, deputy general counsel for the company, asked at a meeting, "How can you steal something if the original is still there after you've made the copy?"
The answer to Smith's question is that copying and stealing are different, the bandit argued. "Any corporate counsel who didn't get his law degree out of the back of a comic book should know the difference between copying, which is often legal, and stealing, which is a crime", the bandit said. Customers have the right to make some copies, such as quotations, backups and personal copies on portable devices, and Microsoft's so-called "Digital Rights Management" attacks legitimate copying along with copyright infringement, he added.
Although Microsoft is free to disable copying functionality in its own software products, the bandit said, even people who don't use Microsoft's software should be concerned by the company's "close the PC" plan, described at http://research.microsoft.com/crypto/openbox.asp. The plan "involves making minor modifications to the PC's hardware to allow Microsoft to make a secure version of the Windows Media Player", and, according to the site, some hardware vendors are already close to signing on.
Will Microsoft be able to use the "minor modifications" to lock out non-Microsoft software? Will Microsoft's hardware-based attack on free speech and fair use succeed where software alone has failed? Nobody knows. And will Microsoft ever learn the difference between copying and stealing? "I'll keep stealing until they do", the bandit said.
|Bitcoin on Amazon! Sort of...||Sep 28, 2016|
|Free Today: September Issue of Linux Journal (Retail value: $5.99)||Sep 27, 2016|
|nginx||Sep 27, 2016|
|Epiq Solutions' Sidekiq M.2||Sep 26, 2016|
|Nativ Disc||Sep 23, 2016|
|Android Browser Security--What You Haven't Been Told||Sep 22, 2016|
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Bitcoin on Amazon! Sort of...
- Android Browser Security--What You Haven't Been Told
- Epiq Solutions' Sidekiq M.2
- Nativ Disc
- Identity: Our Last Stand
- The Many Paths to a Solution
- Securing the Programmer
- Tech Tip: Really Simple HTTP Server with Python
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide