Here’s a link to a fascinating article by Mark Russinovich detailing his process in detecting the DRM on his computer installed with a Sony music CD that uses rootkit technology to hide its existence. It’s the same process used by a lot of malware to hide their existence. Bad, Sony. Bad, bad bad.
CALEA Expansion Under Fire
As I wrote on September 30th, the battle over the expansion of the CALEA regulations (which stands for the Communications Assistance for Law Enforcement Agencies) is underway. A lawsuit filed on October 25, 2005 before the D.C. circuit asks for review of the FCC’s final order. Seven organizations, including the American Library Association, the Electronic…
Google Print: Now it’s the publisher’s turn
In September, I mentioned the case filed by the Author’s Guild over the Google Print initiative. Today, the Publishers have joined in. Here is a link to the press release from the Association of American Publishers. “The publishing industry is united behind this lawsuit against Google and united in the fight to defend their rights,”…
Anonymous Blogging Upheld
The recent decision of the Delaware Supreme Court in Doe v. Cahill is interesting. Evan Brown of InternetCases.com gives a great summary of the case in his posting today. The higher standard used by the Court before it would unmask the identity of the anonymous blogger is a good practice. The requester was required to…
Excellent article on responses to Phishing
Here is an excellent article on the response taken by a bank (whose identity is kept anonymous in the article) to a Phishing attack. (Link courtesy of beSpacific)
Attention – Part III
Here comes the Attention Recorder! Introduced today by AttentionTrust.org is a Firefox extension that allows users to save their attention data and to share it with services that are als0 members of the Attention Trust. It doesn’t look like that there is anybody to share it with yet, I presume that the entry for “Acme…
Battle Lines being Drawn – Law Enforcement v. Internet Freedoms
I was referred to a nice article by Declan McCullagh outlining the implications of a new “Policy Document” released by the FCC late last Friday, Sept. 23rd. The FCC has come up with the following four pronged set of principles that will govern any new Internet policy it develops: Moreover, to ensure that broadband networks…
New Case: Google Print Snafu
The recent filing of a lawsuit over Google’s new planned Google Print program has raised the bar from an academic discussion of whether the program violates copyright into a full-fledged dispute. There has been some interesting and well-reasoned discussion about it. Fred Von Lohmann of the EFF analyzed it from a fair-use point of view….
Case Summary: Davidson v. Internet Gateway
An interesting decision from the 8th Circuit, Davidson involves an appeal from the grant of summary judgment to the plaintiffs. Davidson does business as Blizzard Entertainment, Inc., creator of popular online cooperative games like Warcraft II. In order to play a game like Warcraft II online, Blizzard’s game connects to its Battle.net servers with a…
Microsoft: Damned if you do.
The patches that Microsoft released for a security flaw are partly to blame for the recent Zotob virus outbreak. As noted in many places, among them being This Week in Tech, hackers reverse engineered the patches to determine exactly where the security flaw was and released the Zotob virus within *THREE DAYS*. Microsoft is damned…