Towards More Sensible Anti-circumvention Regulations
نویسنده
چکیده
The circumvention of technical protection systems and the making of tools to enable such circumventions may seem to financial cryptographers a wholly natural and constructive set of activities. This community knows that it is impossible to make encryption systems more secure unless one tests how strong they are from time to time by trying to break them. However, now that other industries, notably entertainment industries, are relying on encryption technologies to protect information in digital form, it should not be surprising that these industries have a different perspective about circumvention and circumvention technologies. Copyright industry spokesmen are fond of likening the act of circumventing a technical protection system to “breaking and entering” a dwelling; they also liken the tools built to enable circumvention to “burglars’ tools,” the possession or sale of which has been outlawed in numerous states. The Digital Millennium Copyright Act (DMCA) anti-circumvention regulations, enacted by the U.S. Congress in October 1998, on which this paper will mainly focus, address the concerns of these industries that circumvention of technical protection systems substantially threatens the viability of copyright industries such that both the act of circumvention and the making of circumvention-enabling technologies need to be heavily regulated.
منابع مشابه
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
This chapter overviews the legal issues arising from the modification of the Sony PlayStation console under Australian Copyright Law the so called anti-circumvention provisions. It will explain how these provisions have been interpreted by the courts and focus on the very recent decision of the Australian High Court. The article concludes by examining the extent to which the Australia-US Free T...
متن کاملHow the Great Firewall of China is Blocking Tor
Internet censorship in China is not just limited to the web: the Great Firewall of China prevents thousands of potential Tor users from accessing the network. In this paper, we investigate how the blocking mechanism is implemented, we conjecture how China’s Tor blocking infrastructure is designed and we propose circumvention techniques. Our work bolsters the understanding of China’s censorship ...
متن کاملOptimal strategies for driving a mobile agent in a guidance by repulsion model
We present a guidance by repulsion model based on a driver-evader interaction where the driver, assumed to be faster than the evader, follows the evader but cannot be arbitrarily close to it, and the evader tries to move away from the driver beyond a short distance. The key ingredient allowing the driver to guide the evader is that the driver is able to display a circumvention maneuver around t...
متن کاملThe ethics of DeCSS posting: towards assessing the morality of the Internet posting of DVD copyright circumvention software
Introduction. We investigate the conditions under which posting software known as "DeCSS" on the Internet is ethical. DeCSS circumvents the access and copy control protection measures on commercial DVDs. Through our investigation, we point to limitations in current frameworks used to assess ethical computer based civil disobedience. Method. The paper draws on empirical findings of actual DeCSS ...
متن کاملVideo Games and Reverse Engineering: Before and After the Digital Millennium Copyright Act
INTRODUCTION ...................................................................................210 I. THE INTELLECTUAL PROPERTY CONTEXT OF REVERSE ENGINEERING..............................................................................212 A. Intellectual Property Law and Reverse Engineering ............212 B. No Coherent Treatment of Reverse Engineering.................215 II. REVERSE ENGINEE...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000