Court Gets A Torrent-full About Linux
BitTorrent is one of the most contentious technologies available. At least, that is, to the Old Order, those lovely suit-clad corporate types bent on holding technology forever in the days of the — manual — typewriter. The technology, and the suits' dreams of a world free of it, are on trial in Australia, where Linux made an appearance today — at the defense table.
The matter at hand is a lawsuit by the Australian Federation Against Copyright Theft — yes, that's AFACT — against iiNet, an Australian internet service provider over the ISP's role in allowing its service to be used for illegal BitTorrent downloading.
The basis for the case, according to trial coverage, is an earlier case — concerning photocopies of print books — which held that the University of New South Wales was liable for copyright infringement essentially because they controlled the copiers. AFACT hopes to use the same argument against iiNet, holding it liable for what goes through because it owns the tube.
Linux made its appearance in defense of iiNet today, during iiNet CEO Michael Malone's the third day of cross examination. Obtaining Linux had already been listed as one many legal reasons for using BitTorrent, though AFACT's barrister sought to deflate the importance, describing it as "likely to be downloaded, if at all, once by the person who uses it." According to reports, Malone did not comment on the amount of traffic such downloads represent, but did point out that Linux is actually updated on a regular basis, presenting new opportunities for downloads.
Reportedly, Tony Bannon, AFACT's counsel, also suggested that iiNet itself was responsible for its customers use of BitTorrent in the first place. Malone pointed out that iiNet's customer service — who Bannon apparently insinuated were pushing BitTorrent on customers — does not handle third-party application support. He went on to defend iiNet's service representatives, rebuffing the implication that because they are "relatively young" they would be "the sort of people you would expect to be familiar with the processes for downloading via BitTorrent." "I don’t expect," he told the court, "that every young person in Australia is downloading illegally using BitTorrent."
Experts have suggested that, though the trial is scheduled to end in the near future, the result may be some months in coming. David Brennan — an Associate Professor of Law at Melbourne University and consultant for an Australian copyright management group — is quoted saying that "the period in which the court reserves to prepare its judgment will be measured in months rather than weeks." The matter is unlikely to end with the Federal Court — it will more thank likely land before the High Court of Australia for a final decision. (The High Court is roughly equivalent to the Supreme Courts of the UK and US.)
Justin Ryan is a Contributing Editor for Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide