Click = big
This is no surprise. I learned last night that Fileserve also owns Filesonic, which closed to sharing first.
In the past, TV networks have employed firms to leak pilots to the Net to generate word of mouth. The best and fastest way to snag a copy was via locker.
I think the first to feel the effects of this will be TV viewership. People just aren’t going to bother to watch commercial TV as a substitute (or even Hulu). For some programs that originate overseas and will never appear in the U.S., there is no substitute. You won’t see the kind of post-cancellation cults build as they have for, say, Firefly.
Also, people will move back to torrents. But by the time someone wants something via torrent — having finally gotten the word of mouth — the Seeds are gone or are so few and the transfer rate is so slow that few people will even bother.
All of you praying for Apple TV to save your ass, do you really want to be just another bitch for a tech company?
In the physical retail world, there’s such a thing as breakage. These are inevitable losses incurred by shipping, warehousing, employee theft, and customer accidents. Breakage is how these lockers should be regarded. Anyone who thinks they’re the downfall of any entertainment industry is simply out of touch with reality and should just shut the fuck up.
Finally, it’s worth remembering that Hollywood wouldn’t even exist if it wasn’t for pirates. Had Edison had his way, it would have never existed and where would we be now? And where will we be with all of the lockers gone? If you think better, just go away, you have nothing to say.
Hollywood: Founded By And On Piracy
Filesonic Shuts Its Doors To Sharing
Copyright: Statute Of Limitations
From what point in time does the copyright statute of limitations begin to run?
Under copyright law, the statute of limitations tolls, or begins running, when the infringement is discovered. So, if someone republished your work as their own six years ago, but you just discovered it, you can still sue for copyright infringement. However, the issue is then raised as to the amount of damages you can collect.
This is bound to be a hot topic with rumors flying around Twitter that the logs of Megaupload are now in the custody of American Feds (and probably their pimps in Hollywood too).
America will probably be the first nation on earth to create a new class of jail: Copyright Prison.
The shit is going to hit the fan this year.
Americans will not continue to be abused like this.
The Coming War on General Computation, Cory Doctorow, Presented at 28C3
So today we have marketing departments who say things like “we don’t need computers, we need… appliances. Make me a computer that doesn’t run every program, just a program that does this specialized task, like streaming audio, or routing packets, or playing Xbox games, and make sure it doesn’t run programs that I haven’t authorized that might undermine our profits”. And on the surface, this seems like a reasonable idea — just a program that does one specialized task — after all, we can put an electric motor in a blender, and we can install a motor in a dishwasher, and we don’t worry if it’s still possible to run a dishwashing program in a blender. But that’s not what we do when we turn a computer into an appliance. We’re not making a computer that runs only the “appliance” app; we’re making a computer that can run every program, but which uses some combination of rootkits, spyware, and code-signing to prevent the user from knowing which processes are running, from installing her own software, and from terminating processes that she doesn’t want. In other words, an appliance is not a stripped-down computer — it is a fully functional computer with spyware on it out of the box.
Because we don’t know how to build the general purpose computer that is capable of running any program we can compile except for some program that we don’t like, or that we prohibit by law, or that loses us money. The closest approximation that we have to this is a computer with spyware — a computer on which remote parties set policies without the computer user’s knowledge, over the objection of the computer’s owner. And so it is that digital rights management always converges on malware.
Boldfaced emphasis added by me.
Update: December 25, 2011: There’s a press release stating this was not the work of Anonymous, from Anonymous. See it after the break.
Click = big
Admitted member of Anonymous.
Anonymous could change the world, but I don’t think they have a goal other than to fight for freedom.
Freedom just isn’t enough any more.
The ultimate freedom is not to have your sovereignty stripped from you.
The monetary system we are currently enmeshed in makes us all hostages, uses the threat of stripping our sovereignty to get us to comply. There is nothing voluntary about it. It’s as compulsory as any draft.
Liberating ourselves from this system should be the goal of any movement fighting for freedom.
The only thing that can change the world is trust.
Bruce Sterling did a short story called Maneki Neko. That is the future we are destined to have. That is what Anonymous should be working towards.
Anything else is doomed to fail.
It’s all or nothing.
“Bisexual money-grubber with Asperger’s”: How to troll Anonymous
Reading that, I thought, why not turn the tables?
So, after the break, I profile The Suit.
L019: Bitcoin P2P Currency: The Most Dangerous Project We’ve Ever Seen
We seem to have been introduced to it around the same time.
But I have STFU about it.
Some aspects of the upcoming Overthrow should be whispered about, not trumpeted to all.
At least not yet.
And remember this: The Internet always wins.
Your homework: Maneki Neko by Bruce Sterling.
Source: 2.7 terabytes of data recovered from bin Laden compound
Digital forensic and evidence recovery specialists were part of the raid team — springing into action after the compound was secured. The team had to rapidly preserve everything, freezing everything on computers so that it didn’t get wiped out. The recovery specialists had to be particularly careful before they unplugged the computers not to trigger software programs designed to destroy hard drives or delete data that may have been installed by bin Laden’s people as protection.
“The trick was to get it out fast but to preserve everything, a source said, “for intelligence purposes first but also for evidence for possible prosecutions,” of terrorists.
Well, that answers a question I had.
UPDATED: Anonymous Hits Chamber!
As we speak I’m sitting on a mile high pile of data released about the US Chamber of Commerce. Thousands and thousands of docs released a few hours ago. Wanna help read through the docs and see what crazy things the Chamber is up to? There’s thousands of these docs. It’s a 1.2 GIGABYTE download. My computer is choking on it. Looks like a lot of docs scraped from their sites.
This evening I came across a reference to a torrent on Twitter that caught my eyeball — A “torrent” in this case is basically a document dump. Basically. The message intrigued me not only because it mentioned secret documents from the US Chamber of Commerce, but also….
A. It’s a document dump from Anonymous
B. It contains documents from an organization that particularly makes my teeth curl, the Michigan based Mackinac Center for Public Policy. Those are the dudes who brought us the Overton Window. They’re kind of nuts.
Got an iPhone or 3G iPad? Apple is recording your moves
Yet according to Comments there, this is not news.
What I found interesting in the Comments was a link to a presentation about webOS.