Quotulatiousness

October 23, 2012

The law, sexting, and shady website operations

Filed under: Britain, Law, Media, Technology — Tags: , , , , — Nicholas @ 14:41

Tim Worstall discusses the weird and disturbing online world of sexting teens, parasitical porn websites and the insanity of our current laws on the topic:

… the legal problems go much further than just young people losing control of images of themselves.

For we’re in the middle of a social hysteria over child pornography and paedophilia. And as is usual in such hysterias reactions desperately overshoot. For example, in my native UK it is entirely legal for a 16 year old girl to have sex with whichever consenting also 16 years or above human she wishes. Any thing from removing her top for her lover’s delectation through to any perversion you might care to think about. However, if said lover, with her full permission, takes a photograph of her without her bikini top on this is child pornography. Yes, even if they’ve been lovers for nearly two legal years a topless photograph of her at 17 and 364 days old is child porn. And it is here that the real legal problems start.

[. . .]

It gets worse, too. The general assumption in the law these days is that a picture on a computer is production of child pornography, not possession of it. The reasoning is that, before you looked at the picture there was one copy, on the server. Now, as you look at the picture, there are two. One on the server, the other in your browser (or cache, whatever). Thus there are now two pictures, you have made one of them therefore you are producing child pornography. And it’s not all that much of a surprise to find that the penalties for the production as opposed to the possession of such are markedly stronger.

October 14, 2012

“I would hate to live in a world where every dumb ass thing I did from 13 to 30 would be captured forever for those who Googled my name”

Filed under: Liberty, Media, Technology — Tags: , , , , , — Nicholas @ 10:27

James Joyner on the phenomenon of internet privacy — and the growing reality that it’s pretty much an illusion.

In the first instance, a bad person is likely to have his real life — including his ability to make a living — upended by the conscious act of a reporter. In the second, two young people who did nothing more than join a school club had their biggest secret exposed by a well-meaning person who made the mistake of trusting Facebook, a data mining company that makes billions by getting people to give them their personal information.

[. . .]

I’ve been active online now since the mid-1990s and have, by virtue of this blog, been a very minor online public figure for almost a decade. For a variety of reasons, including the fact that my professional career is one that encourages writing and publishing, I’ve done virtually all of my online activity under my real life name. As such, I’ve long been aware that my family, friends, co-workers, bosses, and prospective employers might read everything that I put out there. That’s the safest way to operate online, in that it avoids the sort of disruptive surprises that Brutsch, Duncan, and McCormick received. But it also means, inevitably, that there’s a subtle filter that makes me more cautious than I might otherwise be. That’s likely both good and bad in my own case.

But I continue to worry about what it means for a younger generation, for whom Facebook and other social networks are part and parcel of their everyday existence from their teenage years forward. By the time the Internet was a public phenomenon, I was a grown man with a PhD. I would hate to live in a world where every dumb ass thing I did from 13 to 30 would be captured forever for those who Googled my name.

I have generally used my real name — or at least not tried to actively conceal my real identity — in most of my online activities. Some of this has been because there wasn’t a pressing reason to remain anonymous, but as in the writer’s case, it was a strong suspicion from the start that it would be difficult to maintain that degree of privacy over the long term (information wanting to be free, and all that).

September 22, 2012

The “joy” of data-capped, throttled internet access

Filed under: Business, Cancon, Technology — Tags: , , , — Nicholas @ 09:13

Welcome to Canada:

Blogger Stephanie Morrow has complained about data caps in Canada for a while now. The details of her situation show just how hard it can be to get faster internet even if you are willing to pay for it:

    My monthly data cap at the moment is 80 gigs. I pay just over $100 CA for 80 gigs a month, and $2 CA per gig over my cap. Understandably, 80 gigs is not that much, especially if you play multiple games or download a lot of games on Steam, watch Netflix, have a PlayStation 3, Xbox, 3DS, iPad or iPhone like we do. Sadly, there are not a lot of other options. We have two major ISP companies in the city that work this way (there’s no such thing as unlimited here in Canada from these two ISPs), and then there are a handful of smaller ISPs that do offer unlimited but at a greatly reduced speed.

    So, I had to make the sacrifice. Did I want an unlimited cap when I’d barely able to download anything because it would take weeks and weeks, or did I want a cap and be able to download at the speed of light? The cap is a harsh mistress, not to mention that everything peer-to-peer gets throttled. That means no free-to-play games for me because they typically download via a peer-to-peer method that gets throttled. I was unable to do my job while using internet from Rogers, one of the major companies here. I had no choice but to switch to a smaller company or give up my job. I wrote to the companies about this situation but didn’t hear anything back.

That’s a pretty amazing story. I remember the speeds I got when I used another cable company, and I remember just how bad it felt to have to set a game to download overnight. Stephanie goes on to update the situation on her Google + blog, noting that the company she is with is one of the worst throttlers in the country. She quotes TechVibes:

    In 2010, Shaw throttled 14% of users and Bell throttled 16% of users. Rogers? The Toronto-based telco throttled a startling 78% of users, and this number has surpassed 90% during some quarters since 2008.

Again, it can be hard for many of us to imagine having such a limited connection, but I hear from players all the time who have such issues. Is internet access a human right, as declared by the United Nations? Do players have a right to the internet, even if they are using the connection mainly for gaming? I’d have to say yes simply because there are so many common advantages that come with internet access, access that provides information not only about one’s social network but local weather problems, health issues… the list goes on and on. The internet is now so much a part of our lives that we forget just how much we need it.

It’s a very rare month that I don’t get a bandwidth warning from Rogers…

September 3, 2012

Volokh on the GOP “war on porn” platform plank

Filed under: Business, Media, Politics, USA — Tags: , , , , — Nicholas @ 12:46

At the Volokh Conspiracy, Eugene Volokh points out that aside from satisfying a checklist item for some constituencies, the GOP’s stated intention to crack down on pornography just doesn’t have a lot of benefits:

As we know, there’s lots of porn of all varieties out there on the Internet, including porn that might well be seen as offensive to “community standards” in at least one American state (the standard that would be applicable under the plurality view in Ashcroft v. ACLU (I) (2002), if prosecutors choose to bring a case in that state), or perhaps even under some “national community standard” (the alternative standard urged to varying extents by the other opinions in that case). In principle, the government might well be able to prosecute many American pornography producers and distributors under current obscenity laws.

[. . .]

So we have three possible outcomes:

(1) The U.S. spends who knows how many prosecutorial and technical resources going after U.S. pornographers. A bunch of them get imprisoned. U.S. consumers keep using the same amount of porn as before. Maybe they can’t get porn on cable channels or in hotel rooms any more, but that’s so twentieth century; instead, consumers will continue to be able to get more than they ever wanted on the Internet. Nor do I think that the crackdown will somehow subtly affect consumers’ attitudes about the morality of porn — it seems highly unlikely that potential porn consumers will decide to stop getting it because they hear that some porn producers are being prosecuted.

[. . .]

(2) The government gets understandably outraged by the “foreign smut loophole.” “Given all the millions that we’ve invested in going after the domestic porn industry, how can we tolerate all our work being undone by foreign filth-peddlers?,” pornography prosecutors and their political allies would ask. So they unveil the solution, in fact pretty much the only solution that will work: Nationwide filtering.

[. . .]

(3) Finally, the government can go after the users: Set up “honeypot” sites (seriously, that would be the technically correct name for them) that would look like normal offshore pornography sites. Draw people in to buy the stuff. Figure out who the buyers are. To do that, you’d also have to ban any anonymizer Web sites that might be used to hide such transactions, by setting up some sort of mandatory filtering such as what I described in option (2).

[. . .]

So, supporters of that plank of the platform, which do you prefer — #1, #2, or #3? Note that I’m not asking whether porn is bad, or whether porn should be constitutionally protected. I’m certainly not asking whether we’d be better off in some hypothetical porn-free world (just like no sensible debate about alcohol, drug, or gun policy should ask whether we’d be better off in some hypothetical alcohol-, drug-, or gun-free world).

I’m asking: How can the government’s policy possibly achieve its stated goals, without creating an unprecedentedly intrusive censorship machinery, one that’s far, far beyond what any mainstream political figures are talking about right now?

September 1, 2012

Digital “inheritance”: law has not caught up to our online lives

Filed under: Law, Media, Technology — Tags: , , , — Nicholas @ 00:01

As I mentioned in a post the other day, our laws are still designed for a world where most things have a physical presence, and the problems we see in intellectual property and patent law are just the start of the turmoil our legal system will have to face:

What will happen to your Facebook account after you are gone?

Dealing with digital assets after someone dies is becoming a challenge for families and the legal system alike.

Lawmakers are trying to clarify rules governing the passage of social-media and email accounts, along with other online assets that might have financial value. Several states have enacted laws to deal with post-death access to digital assets, and several more are working on similar legislation, says Gene Hennig, a lawyer at Gray Plant Mooty in Minneapolis and a commissioner of the Uniform Law Commission.

That group, which recommends uniform state laws, plans to come up with a recommended statute that more states could adopt.

“Eventually people are going to start putting in their wills what they want, and we need to know what’s allowed,” Mr. Hennig says. “In the olden days, grandma had a chest in the attic full of photo albums. Now, your chest of photos is in your computer.”

Update, 3 September: Bruce Willis wants his kids to inherit the music library he’s built up, but the iTunes licensing won’t let him do that.

August 23, 2012

Crisis malware is particularly capable of damage

Filed under: Technology — Tags: , , — Nicholas @ 00:03

John Leyden in The Register:

Security watchers have discovered a virus strain that compromises VMware virtual machines as well as infecting Mac OS X and Windows computers and Windows Mobile devices. It demonstrates previously unseen capabilities in the process.

The Crisis malware typically arrives in a Java archive file (.jar) and is typically installed by posing as a Flash Player Java applet to trick a victim into opening it.

The archive contains executable files targeting Apple and Microsoft operating systems; the malware is able to detect which platform it is running on and serve up the correct variant.

Once launched, the worm puts in place a rootkit to hide itself from view; installs spyware to record the user’s every move on the computer; and opens a backdoor to the IP address 176.58.100.37, allowing miscreants to gain further access to the machine, according to a write-up of the threat by Kaspersky Lab. The malicious code also, unsurprisingly, survives across reboots.

The Windows variant can kill off antivirus programs, log keypresses, download and upload files, take screengrabs, lift the contents of the user’s clipboard, record from the computer’s webcam and mic, and snoop on these applications: Firefox, Internet Explorer, Chrome, Microsoft Messenger, Skype, Google Talk and Yahoo! Messenger.

August 21, 2012

Verity Stob learns to love IPv6

Filed under: Humour, Technology — Tags: , — Nicholas @ 08:45

A love story, of sorts:

Somewhere in the near future…

There were more than 50 people in the room, so it was hot and airless, and it smelled of stale sweat. Government-sponsored crisis posters, tatty and torn, were sticky-taped to the yellowish walls. One urged its readers: ‘Don’t let your selfishness come between little Johnny and his Wikipedia’, another enquired: ‘Do you NATter with your Neighbours? Don’t squander the nation’s resource!’

(The latter effort was illustrated with a carefully posed photo of a beaming, bosomy Minister for IT Conservation encouraging a weedy-looking Everybloke to plug his laptop into her generously exposed router socket. The photo had recently acquired a pleasing piquancy. This same Minister had been caught selling a bunch of government-owned IP addresses, supposedly earmarked for use in schools for the next generation of Olympic heroes, to the International Bank of Fatcat and Taxhavenia.)

Under the flickering fluorescent lighting, a shuffling, miserable queue of the desperate and the hopeless zigzagged towards the bullet- sound- and Windolene-proof glass of the counter. At the front of the queue was me.

The official behind the glass pursed his lips, flicked my carefully filled-in paperwork to one side with disdain, and leaned forward to speak into his goose-neck microphone…

August 8, 2012

How British libel laws work (and why Jimmy Wales is wrong about them)

Filed under: Britain, Law, Media — Tags: , , , , — Nicholas @ 09:54

Tim Worstall explains that Jimmy Wales misunderstands what British libel laws really mean for publishers (and bloggers) in other countries:

The libel law of England and Wales is rather different from many other countries, yes. It’s a lot harder to defend against a charge there, damages are higher than in most other jurisdictions and so on. However, that isn’t the important point. What drags you into that jurisdiction is not where your servers are. Nor where the people who prepared the material, where it was uploaded nor where the company is located. What matters is where was the person reading it located?

Please note, this applies to us all. In all jurisdictions the result is the same. It applies to corporate websites, to blogs, to Wikipedia, to everyone. It is a generally accepted legal rule that publication of digital information takes place where it is read, not where it is “published”. The general logic is that at one point there is a copy on the server somewhere. Then, someone downloads it into a browser window in order to read it. At this time there are two copies, on in the browser, one on the server. This creation of a second copy is therefore publication. And that publication takes place in the jurisdiction of the reader, not anywhere else.

[. . .]

Thus Wikipedia not having servers in the UK, not being a UK corporation or charity, does not protect it from English libel laws. None of us are so protected from them, we are liable under them if as and when someone in England and Wales reads our pages.

[. . .]

But as I say, it is still true that jurisdiction on the internet depends upon where the reader is, not the producer or the servers. It’s not a happy thought that we’re now subject to 200 off legal jurisdictions every time we post something but it is true.

July 12, 2012

Säkerhetsbloggen does some preliminary analysis of Yahoo’s 453,000 leaked passwords

Filed under: Technology — Tags: , , , , , — Nicholas @ 10:01

As we’ve noticed before, there are lots of really, really bad passwords in use:

Recently, Ars Technica reported about a leak by “D33ds Company” of more than 450.000 plain-text accounts from a Yahoo service, which is suspected to be Yahoo Voice.

Since all the accounts are in plain-text, anyone with an account present in the leak which also has the same password on other sites (e-mail, Facebook, Twitter, etc), should assume that someone has accessed their account.

[. . .]

Total entries = 442773
Total unique entries = 342478

Top 10 passwords
123456 = 1666 (0.38%)
password = 780 (0.18%)
welcome = 436 (0.1%)
ninja = 333 (0.08%)
abc123 = 250 (0.06%)
123456789 = 222 (0.05%)
12345678 = 208 (0.05%)
sunshine = 205 (0.05%)
princess = 202 (0.05%)
qwerty = 172 (0.04%)

Other bits of password-related idiocy are here.

July 10, 2012

Does “Rule 34” have an exception after all?

Filed under: Cancon, Humour, Media — Tags: , , , — Nicholas @ 09:58

Kathy Shaidle may have found the only known exception to Rule 34:

Since women (and not a few men) obviously love a man in uniform, where is all the porn featuring the Royal Canadian Mounted Police?

Dirty cops are an X-rated staple, and “the UPS guy” has almost driven the once-ubiquitous “mailman” out of the porn business.

Even Nazis get to go where Mounties fear to tread. Those sleek black (Hugo Boss-designed) SS getups can get under even the most surprising skins: During the Eichmann trial in Israel, “Stalag” porn became Über-popular sexual samizdat.

So this slightly put-out Canuck wonders: What’s wrong with the RCMP, eh? Their uniforms are pretty sharp, too. And Due South fandom was rabid.

Yet there’s a distinct Mountie-porn void, one that violates a law of the Internet — “Rule 34” to be exact, which declares, “If it exists, there is porn of it.”

July 6, 2012

This might be damage that even the Internet can’t route around

Filed under: Law, Liberty, Media, Technology, USA — Tags: , , , — Nicholas @ 12:50

Tim Worstall on the worst-case interpretation of a recent legal decision in the US courts:

… we now have a ruling that websites are a place of public accommodation under the Americans with Disabilities Act. If this ruling holds then this really will break the internet and web as we have come to know it.

The case is discussed here.

    The case involves a Cyberlaw perennial: are websites obligated to comply with the Americans with Disabilities Act (the ADA)? In this case, the desired accommodation is close-captioning for Netflix-streamed video. If websites must comply with the ADA, all hell will break loose. Could YouTube be obligated to close-caption videos on the site? (This case seems to leave that door open.) Could every website using Flash have to redesign their sites for browsers that read the screen? I’m not creative enough to think of all the implications, but I can assure you that ADA plaintiffs’ lawyers will have a long checklist of items worth suing over. Big companies may be able to afford the compliance and litigation costs, but the entry costs for new market participants could easily reach prohibitive levels.

[. . .]

The place of publication is where the reader is, where the browser through which the site is being viewed. Thus would mean that any foreign website which an American might want to read (say, my personal blog) would become subject to the rules and restrictions of the ADA. And believe me, the 6.7 billion people who are not Americans are not going to put up with that. We might all ignore the law, or we might try and ban access from the US (or more alarmingly, ISPs might be told to do so). Or possibly be subject to the tender ministrations of an ambulance chasing lawyer.

July 5, 2012

What do software developers and predatory bankers have in common?

Filed under: Business, Technology — Tags: , , , , , — Nicholas @ 09:02

In his regular column at The Register, Matt Asay points out that using another company’s API can be a quick and easy way to get going, but it carries significant risks:

In tech today, it has become a truism that “if you’re not paying for it, you’re the product”. Somehow we have applied this wisdom to consumers without recognising that the same principle applies to enterprises and their developers. Recently, however, Netflix and LinkedIn have reminded us just how precarious it is to build on someone else’s platform — or API.

Paul Graham, one of the founders of Y Combinator, has described APIs as “self-serve [business development]”. It’s a great story: open and document your API and watch a thousand businesses bloom, bringing you cash and legitimacy. All of which may be true, if done correctly.

But the other side of Graham’s “business development” is the difficulty of predicting the business planning on the other side of the API. Twitter was pretty free with API access in its early days when it was seeking adoption rather than income. Now that the company has grown up and continues to tighten its grip on how and where users interact with tweets, Twitter terminated its tweet syndication partnership with LinkedIn and has promised to clamp down even more tightly on how developers use its API. Twitter is doing this because it can, as professor Joel West points out, but also because it must: its advertising business depends upon it.

So where’s the banking similarity come in?

There’s one other thing to consider, as venture capitalist Bill Davidow opines in The Atlantic, and that is the very real possibility that this API mercantilism is a sign of how the technology world is changing, and not for the better:

    At both Hewlett-Packard and Intel, where I next worked, money was important — but it wasn’t the top priority. The goal was to do the right thing and do it well. If you did that, over time, rewards followed and shareholders supported your efforts…

    Many other things have changed in the valley over the past five decades. I’ve become increasingly concerned about one thing that is seldom discussed: the valley is no longer as concerned about serving the customer, and even sees great opportunity in exploitation. We are beginning to act like the bankers who sold subprime mortgages to naïve consumers…

Or sold developers subprime APIs?

Cisco “updates” consumer routers to allow tracking of internet usage, automatic bricking for terms & conditions violations

If you have a modern Cisco or LinkSys router on your home network, you may have just given up a significant amount in the last “update” the company distributed. ESR has the details:

For those of you who have missed the news, last a few days Cisco pushed a firmware update to several of its most popular routers that bricked the device unless you signed up for Cisco’s “cloud” service. To sign up, you had to agree to the following restrictions:

    When you use the Service, we may keep track of certain information related to your use of the Service, including but not limited to the status and health of your network and networked products; which apps relating to the Service you are using; which features you are using within the Service infrastructure; network traffic (e.g., megabytes per hour); internet history; how frequently you encounter errors on the Service system and other related information (“Other Information”).

So in order to continue using the hardware you bought and paid for and own, you have to agree to let Cisco snoop your browser history and monitor your traffic — a clickstream they would of course instantly turn around and sell to advertising agencies and other snoops. Those terms are so loose (“including but not limited to”) that they could legally read your email and sell that data too.

Disgusted enough yet? Wait, it gets better. The cloud terms of service also includes this gem:

    You agree not to use or permit the use of the Service: (i) to invade another’s privacy; (ii) for obscene, pornographic, or offensive purposes; (iii) to infringe another’s rights, including but not limited to any intellectual property rights; (iv) to upload, email or otherwise transmit or make available any unsolicited or unauthorized advertising, promotional materials, spam, junk mail or any other form of solicitation; (v) to transmit or otherwise make available any code or virus, or perform any activity, that could harm or interfere with any device, software, network or service (including this Service); or (vi) to violate, or encourage any conduct that would violate any applicable law or regulation or give rise to civil or criminal liability.

Translated out of lawyerese, this gives Cisco the right to brick your router if you use it to view anything Cisco considers pornography, or do anything that it might consider IP theft — like, say, bit-torrenting a movie. Or even if you send anything it considers unsolicited advertising — which doesn’t have to mean bulk spam, see “any other form of solicitation”?

The sum of these paragraphs is: “We control your digital life. We can spy on you, we can filter your traffic, we can cut off your net access unilaterally if you do anything we don’t like, and you have no recourse.”

The idea of replacing your router with one that can load and run an open source rather than proprietary system just became a lot more enticing (such things do already exist, although not for all routers).

June 18, 2012

New proposal: HTTP Error Code 451 to indicated “content censored by authorities”

Filed under: Government, Law, Liberty, Media, Technology — Tags: , , — Nicholas @ 14:04

Kevin Fogarty at PC World looks at a new HTTP error code proposal:

A high-profile Google developer has proposed that the Internet Engineering Task Force (IETF) that it endorse a new HTTP Status Code to warn readers the page they’re looking for has been censored by authorities, according to TheVerge.

Tim Bray, who co-invented XML and works as Android Developer Advocate at Google, is submitting a proposal that pages censored by someone other than the owner of the site or of the user’s local network display the error code “451 Unavailable for Legal Reasons.”

The number in the code is a reference to Ray Bradbury’s “Farenheit 451,” which describes a dystopian future in which book burnings and the censorship of unacceptable material is routine. Google already highlights search terms that may return censored results, in some countries.

The wins and losses in the C-11 copyright reform bill

Filed under: Books, Cancon, Law, Liberty, Media — Tags: , , , , — Nicholas @ 10:14

Michael Geist on the good and the bad aspects of bill C-11 which will probably pass third reading today in the House of Commons and be sent to the Senate for approval:

There is no sugar-coating the loss on digital locks. While other countries have been willing to stand up to U.S. pressure and adopt a more flexible approach, the government, led by Canadian Heritage Minister James Moore on the issue, was unwilling to compromise despite near-universal criticism of its approach. It appears that once Prime Minister Stephen Harper made the call for a DMCA-style approach in early May 2010, the digital lock issue was lost. The government heard that the bill will hurt IP enforcement, restrict access for the blind, disadvantage Canadian creators, and harm consumer rights. It received tens of thousands of comments from Canadians opposed to the approach and ran a full consultation in which digital locks were the leading concern. The NDP, Liberals, and Green Party proposed balanced amendments to the digital lock rules that were consistent with international requirements and would have maintained protection for companies that use them, but all were rejected. [. . .]

Since the Conservatives took power in 2006, there were effectively four bills: the Pre-Bill C-61 bill that was to have been introduced by Jim Prentice in December 2007 but was delayed following public pressure, Bill C-61 introduced in June 2008, and Bill C-32/C-11, which was introduced in June 2010 (and later reintroduced in September 2011). The contents of December 2007 bill was never released, but documents obtained under the Access to Information Act provide a good sense of what it contained (a call was even scheduled on the planned day of introduction between Prentice and U.S. Ambassador David Wilkins to assure the U.S. that digital locks were the key issue and would not be altered). This chart highlights many of the key issues and their progression over the years as the public became increasingly vocal on copyright:

Issue Pre-Bill
C-61 (2007)
Bill C-61
(2008)
Bill C-11
(2012)
Fair Dealing Expansion No No Yes (education, parody, satire)
Format Shifting No Limited (only photographs, book,
newspaper, periodical, or videocassette)
Yes (technology neutral, no
limit on number of copies, includes network storage, and no reference
to contractual overrides)
Time Shifting No Limited (no network PVRs,
Internet communications)
Yes (C-61 limitations removed)
Backup Copies No No Yes
User Generated Content Exception No No Yes
Statutory Damages Cap No Limited ($500 cap for
downloading)
Yes (Max of $5000 for all
non-commercial infringement)
Enabler enforcement provision No No Yes
Internet Publicly Available
Materials Exception for Education
Yes Yes Yes
Public Performance in Schools No No Yes
Technology Neutral Display
Exception in Schools
No No Yes
Limited Distance Learning
Exception
Yes Yes Yes
Limited Digital Inter-Library
Loans
Yes Yes Yes
Notice-and-Notice Yes Yes Yes
Notice-and-Takedown No No No
Three Strikes//Website Blocking No No No
Internet Location Tool Provider
Safe Harbour
Yes Yes Yes
Broadcaster Ephemeral Change No No Yes
Expanded Private Copying Levy No No No
Commissioned Photograph Change Yes Yes Yes
Alternate Format Reproduction No No Yes

[. . .]

Public engagement on copyright continuously grew in strength – from the Bulte battle in 2006 to the Facebook activism in 2007 to the immediate response to the 2008 bill to the 2009 copyright consultation to the 2010 response to Bill C-32. While many dismissed the role of digital activism on copyright, the reality is that it had a huge impact on the shape of Canadian copyright. The public voice influenced not only the contents of the bill, but the debate as well with digital locks the dominant topic of House of Commons debate and media coverage until the very end. Bill C-11 remains a “flawed but fixable” bill that the government refused to fix, but that it is a significantly better bill than seemed possible a few years ago owes much to the hundreds of thousands of Canadians that spoke out on copyright.

« Newer PostsOlder Posts »

Powered by WordPress