#BNETD
Explore tagged Tumblr posts
Text
A profoundly stupid case about video game cheating could transform adblocking into a copyright infringement

I'm coming to DEFCON! On Aug 9, I'm emceeing the EFF POKER TOURNAMENT (noon at the Horseshoe Poker Room), and appearing on the BRICKED AND ABANDONED panel (5PM, LVCCâ-âL1â-âHW1â11â01). On Aug 10, I'm giving a keynote called "DISENSHITTIFY OR DIE! How hackers can seize the means of computation and build a new, good internet that is hardened against our asshole bosses' insatiable horniness for enshittification" (noon, LVCCâ-âL1â-âHW1â11â01).
Here's a weird consequence of our societal shift from capitalism (where riches come from profits) to feudalism (where riches come from rents): increasingly, your rights to your actual property (the physical stuff you own) are trumped by corporations' metaphorical "intellectual property" claims.
That's a lot to unpack! Let's start with a quick primer on profits and rents. Capitalists invest money in buying equipment, then they pay workers wages to use that equipment to produce goods and services. Profit is the sum a capitalist takes home from this arrangement: money made from paying workers to do productive things.
Now, rents: "rent" is the money a rentier makes by owning a "factor of production": something the capitalist needs in order to make profits. Capitalists risk their capital to get profits, but rents are heavily insulated from risk.
For example: a coffee shop owner buys espresso machines, hires baristas, and rents a storefront. If they do well, the landlord can raise their rent, denying them profits and increasing rents. But! If a great new cafe opens across the street and the coffee shop owner goes broke, the landlord is in great shape, because they now have a vacant storefront they can rent, and they can charge extra for a prime location across the street from the hottest new coffee shop in town.
The "moral philosophers" that today's self-described capitalists claim to worship â Adam Smith, David Ricardo â hated rents. For them, profits were the moral way to get rich, because when capitalists chase profits, they necessarily chase the production of things that people want.
When rentiers chase rents, they do so at the expense of profits. Every dollar a capitalist pays in rent â licenses for IP, rent for a building, etc â is a dollar that can't be extracted in profit, and then reinvested in the production of more goods and services that society desires.
The "free markets" of Adam Smith weren't free from regulation, they were free from rents.
The moral philosophers' hatred of rents was really a hatred of feudalism. The industrial revolution wasn't merely (or even primarily) the triumph of new machines: rather, it was the triumph of profits over rent. For the industrial revolution to succeed, the feudal arrangement had to end. Capitalism is incompatible with hereditary lords receiving guaranteed rents from hereditary serfs who are legally obliged to work for them. Capitalism triumphed over feudalism when the serfs were turned off of the land (becoming the "free labor" who went to work in the textile mills) and the land itself was given over to sheep grazing (providing the wool for those same mills).
But that doesn't mean that the industrial revolution invented profits. Profits were to be found in feudal societies, wherever a wealthy person increased their wealth by investing in machines and hiring workers to use them. The thing that made feudalism feudal was how conflicts between rents and profits cashed out. For so long as the legal system elevated the claims of rentiers over the claims of capitalists, the society was feudal. Once the legal system gave priority to profit over rent, it became capitalist.
Capitalists hate capitalism. The engine of capitalism is insecurity. The successful capitalist is like the fastest gun in the old west: there's always a young gun out there looking to "disrupt" their fortune with a new invention, product, or organizational strategy that "creatively destroys" the successful businesses of the day and replaces them with new ones:
https://locusmag.com/2024/03/cory-doctorow-capitalists-hate-capitalism/
That's a hard way to live, with your every success serving as a blinking KICK ME sign visible to every ambitious person in the world. Precarity makes people miserable and nuts:
https://pluralistic.net/2024/04/19/make-them-afraid/#fear-is-their-mind-killer
So capitalists universally aspire to become rentiers and investors seek out companies that have a plan to extract rent. This is why Warren Buffett is so priapatic for companies with "moats and walls" â legal privileges and market structures that protect the business from competition and disruption:
https://finance.yahoo.com/news/warren-buffett-explains-moat-principle-164442359.html
Feudal rents were mostly derived from land, but even in the feudal era, the king was known to reward loyal lickspittles with rents over ideas. The "patents royal" were the legally protected right to decide who could make or do certain things: for example, you might have a patent royal over the production of silver ribbon, and anyone who wanted to make a silver ribbon would have to pay for your permission. If you chose to grant that permission exclusively to one manufacturer, then no one else could make it, and you could charge a license fee to the manufacturer that accounted for nearly all their profit.
Today, rentiers are also interested in land. Bill Gates is the country's number one landowner, and in many towns, private equity landlords are snappinig up every single family home that hits the market and converting it to a badly maintained slum:
https://pluralistic.net/2024/05/22/koteswar-jay-gajavelli/#if-you-ever-go-to-houston
But the 21st Century's defining source of rent is "IP" â a controversial term that I use here to mean, "Any law or policy that allows a company to exert legal control over its competitors, critics and customers":
https://locusmag.com/2020/09/cory-doctorow-ip/
IP is in irreconcilable conflict with real property rights. Think of HP selling you a printer and wanting to decide which ink you use, or John Deere selling you a tractor and wanting to tell you who can fix it. Or, for that matter, Apple selling you a phone and dictating which software you are allowed to install on it.
Think of Unity, a company that makes tools for video-game makers, demanding a royalty from every game that is eventually sold, calling this "shared success":
https://pluralistic.net/2023/10/03/not-feeling-lucky/#fundamental-laws-of-economics
Every time one of these conflicts ends with IP's triumph over real property rights, that is a notch in favor of calling the world we live in now "technofeudalist" rather than "technocapitalist":
https://pluralistic.net/2023/09/28/cloudalists/#cloud-capital
Once you start to think of "IP" as "laws that let me control how other people use their real property," a lot of the seemingly incoherent fights over IP snap into place. This also goes a long way to explaining how otherwise sensible people can agree on expansions of IP to achieve some short-term goal, irrespective of the spillover harms from such a move. Hard cases make bad law, and hard IP cases make terrible law.
Five years ago, some anti-fascist counterdemonstrators hit on the clever idea of blaring top 40 music during neo-Nazi marches, on the theory that this would prevent Nazis from uploading videos of their marches to Youtube and other platforms, whose filters would block any footage that included copyrighted music:
https://memex.craphound.com/2019/07/23/clever-hack-that-will-end-badly-playing-copyrighted-music-during-nazis-rallies-so-they-cant-be-posted-to-youtube/
Thankfully, this didn't work, but not for lack of trying. And it might still work, if calls for beefing up video copyright filters are heeded. Cops all over the place are already blaring Taylor Swift songs and Disney tunes to prevent their interactions with the public from being uploaded:
https://pluralistic.net/2022/04/07/moral-hazard-of-filternets/#dmas
The same thinking that causes progressives to recklessly argue in favor of upload filters also causes them to demand that web scraping be treated as a copyright crime. They think they're creating a world where AI companies can't rip off their creation to train a model; they're actually creating a world where the Internet Archive can't capture JD Vance's embarrassing old podcast appearances or newspaper editorial boards' advocacy for positions they now recant:
https://pluralistic.net/2023/09/17/how-to-think-about-scraping/
It's not that Nazi marches are good, or that scraping can't be bad â it's just that advocating for the use of IP to address either is a cure that's not just worse than the disease â it's also not a cure.
A problem can be real, and still not be solvable with IP. I have enormous sympathy for gamers who rail against cheaters who use aftermarket hacks to improve their aim, see through buildings, or command other unfair advantages.
If you want to tell a stranger how they must configure their PC or console, IP ("any law that lets you control your competitors, critics or customers") is an obvious answer. But â as with other attempts to solve real problems with IP â this is a cure that is both worse than the disease, and also not a cure after all.
Back in 2002, Blizzard sued some hobbyists over a program called "bnetd." Bnetd was a program that provided a game-server you could connect to with the Blizzard games that you'd bought. It was created as an alternative to Battlenet, Blizzard's notoriously unreliable game-server software that left gamers frustrated and furious due to frequent outages:
https://www.eff.org/cases/blizzard-v-bnetd
To the public, Blizzard made several arguments against bnetd. They claimed that it encouraged piracy, because â unlike the official Battlenet servers â it didn't check whether the copies of Blizzard software that connected to it had a valid license key. Gamers didn't really care about that, but they did respond to another argument: that bnetd lacked the anti-cheat checking of Battlenet.
But that wasn't what Blizzard took to the court: in court, they argued that the hobbyists who made bnetd violated copyright law. Specifically, Section 1201 of the Digital Millennium Copyright Act, which bans "circumvention of access controls to copyrighted works." Basically, Blizzard argued that bnetd's authors violated the law because they used debuggers to examine the software they'd paid for, while it ran on their own computers, to figure out how to make a game server of their own.
Blizzard didn't sue bnetd's authors for pirating Blizzard software (they didn't â they'd paid for their copies). They didn't sue them for abetting other gamers' piracy. They certainly didn't sue them for making a cheat-friendly game-server.
Blizzard sued them for analyzing software they'd paid for, while it was running on their own computers.
Imagine if Walmart â one of the biggest book-retailers in America â had a policy that said that you could only shelve the books you bought at Walmart on shelves that you also bought at Walmart. Now imagine that Walmart successfully argued that measuring the books you bought from them and using those measurements to create your own compatible book-case violated their IP rights!
This is an outrageous triumph of IP rights over real property rights, and yet gamers vocally backed Blizzard in the early noughts, because gamers hate cheaters and because IP law is (correctly) understood as "the law that lets a company tell you how you can use your own real, physical property." Hard cases make bad law, hard IP cases make batshit law.
It's more than 20 years since bnetd, and cheating continues to serve as a Trojan horse to smuggle in batshit new IP laws. In Germany, Sony is suing the cheat-device maker Datel:
https://torrentfreak.com/sonys-ancient-lawsuit-vs-cheat-device-heads-in-right-direction-sonys-defeat-240705/
Sony argues that the Datel device â which rewrites the contents of a player's device's RAM, at the direction of that player â infringes copyright. Sony claims that the values that its programs write to your device's RAM chips are copyrighted works that it has created, and that altering that copyrighted work makes an unauthorized derivative work, which infringes its copyright.
Yes, this is batshit, and thankfully, Sony has been thwarted in court to date, but it is steaming ahead to the EU's highest court. If it succeeds, then it will open up every tool that modifies your computer at your direction to this kind of claim.
How bad can it be? Well, get this: the German publishing giant Axel Springer (owned by a monomaniacal Trumpist and Israel hardliner who has ordered journalists in his US news outlets to go easy on both) is suing Eyeo, makers of Adblock Plus, on the grounds that changing HTML to block an ad creates a "derivative work" of Axel Springer's web-pages:
https://torrentfreak.com/ad-blocking-infringes-copyright-ancient-sony-cheat-lawsuit-may-prove-pivotal-240729/
Axel Springer's filings cite the Sony/Datel case, using it to argue that their IP rights trump your property rights, and that you can only configure your web-browser, running on your computer, which you own, in ways that it approves of.
Axel Springer's war on browsers is a particularly pernicious maneuver, because browsers are the best example we have of internet software that serves as a "user agent." "User agent" is an old-timey engineering synonym for "browser" that reflects the browser's role: to go out onto the web on your behalf and bring back things for you, which it displays in the way you prefer:
https://pluralistic.net/2024/05/07/treacherous-computing/#rewilding-the-internet
Want to block flickering GIFs to forestall photosensitive epileptic servers? Ask your user agent to find and delete them. Want to shift colors into a gamut that accounts for your color-blindness? Ask your user-agent:
https://dankaminsky.com/2010/12/15/dankam/
Want to goose the font size and contrast so you can read the sadistic grey-on-white type that young designers use in the mistaken belief that black-on-white type is "hard on the eyes"? That's what Reader Mode is for:
https://frankgroeneveld.nl/2021/08/24/most-underused-browser-feature/
The foundation of any good digital relationship is a device that works for you, not for the people who own the servers you connect to. Even if they don't plan on screwing you over by directing your user agent to attack you on their behalf right now, the very existence of a facility in your technology that causes it to betray you, by design, is a moral hazard that inevitably results in your victimization:
https://pluralistic.net/2023/08/02/self-incrimination/#wei-bai-bai
"IP" ("a law that lets me control how you use your own property") is a tempting solution to every problem, but ultimately, IP ends up magnifying the power of the already powerful, in contests where your only hope of victory is having a user agent whose only loyalty is to you.
The monotonic, dangerous expansion of IP reflects the growing victory of rents over profits â income from owning things, rather than income from doing things. Everyday people may argue for IP in the belief that it will solve their immediate problems â with AI, or Nazis, or in-game cheats â but ultimately, the expansion of a law that limits how you can use your property (including your capital) to uses that don't threaten neofeudalists will doom you to technoserfdom.
Support me this summer on the Clarion Write-A-Thon and help raise money for the Clarion Science Fiction and Fantasy Writers' Workshop!
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/07/29/faithful-user-agents/#hard-cases-make-bad-copyright-law
#pluralistic#torrentfreak#sony#axel springer#germany#copyright#copyfight#felony contempt of business model#bnetd#computer programs directive#eu#datel#cjeu#ip#adblocking#adblock plus#eyeo#bgh#action replay#feudalism#capitalism#rents#profits
977 notes
·
View notes
Text
CTRI : Le BNETD - CĂŽte d'Ivoire manifeste son intĂ©rĂȘt pour le potentiel du Gabon
Le PrĂ©sident de la Transition, Brice Clotaire Oligui Nguema a echangĂ© le 14 mai 2024 au palais RĂ©novation avec Kinapar Coulibaly, Directeur gĂ©nĂ©ral du Bureau national dâEtudes Techniques et DĂ©veloppement (BNETD) -CĂŽte dâIvoire.Dans le cadre de la coopĂ©ration sud â sud qui unit le Gabon et la CĂŽte dâIvoire, et dans la continuitĂ© de la visite de travail et dâamitiĂ© effectuĂ©e par le Chef de lâĂtatâŠ

View On WordPress
0 notes
Photo
Réception de la dalle par le BNETD du poste transformateur stade EBIMPà avant coulage.Matrelec "La maßtrise du délai et de la qualité"#matrelec #foragehorizontaldirigé, #electricite(#HT-#BT-#EP), #plomberie, #telecom, #hydraulique,
0 notes
Photo

And the process begins. Nails â #party #sweet16 #fun https://www.instagram.com/p/BneTd-ehyGB/?utm_source=ig_tumblr_share&igshid=1pkpdk7lkvrja
1 note
·
View note
Text
This day in history
I'm on tour with my new novel The Bezzle! Catch me next in SALT LAKE CITY (Feb 21, Weller Book Works) and SAN DIEGO (Feb 22, Mysterious Galaxy). After that, it's LA, Seattle, Portland, Phoenix and more!
#20yrsago How to get free iTunes from Pepsi with every bottle https://web.archive.org/web/20040319061658/http://www.macmerc.com/news/archives/1270
#20yrsago Woman sued for file-sharing brings RICO countersuit against RIAA https://forums.musicplayer.com/topic/44111-ironic-twist-riaa-sued-by-mom/
#20yrsago FCC Chairmanâs astounding statement of Internet Rights https://web.archive.org/web/20041022115925/hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-243556A1.pdf
#20yrsago Free WiFi influences 40% of Schlotskysâs customers https://web.archive.org/web/20040404003117/http://home.businesswire.com/portal/site/google/index.jsp?ndmViewId=news_view&newsId=20040218005460&newsLang=en
#20yrsago Bnetd brief: a legal doc that sings https://web.archive.org/web/20040716143522/https://www.eff.org/IP/Emulation/Blizzard_v_bnetd/20040217_bnetd_Reply.pdf
#20yrsago Jim Macdonald explains writing https://web.archive.org/web/20040317104013/http://pub43.ezboard.com/fabsolutewritefrm3.showMessageRange?topicID=257.topic&start=1&stop=20
#20yrsago Story of the TiVo remote https://www.nytimes.com/2004/02/19/technology/now-preening-on-the-coffee-table.html
#15yrsago Geeks go to New Zealand Parliament to protest new copyright law https://www.flickr.com/photos/taniwha/sets/72157614045293527/
#15yrsago NYPDâs enforcement of non-existent subway photo-ban costing taxpayers a fortune in lawsuits https://www.nytimes.com/2009/02/18/nyregion/18about.html?_r=1
#10yrsago American overseas volunteerism: what really works https://medium.com/thsppl/the-problem-with-little-white-girls-and-boys-b84d4011d17e
#10yrsago Hungry man defeats TSAâs war on peanut butter by spreading it on crackers https://takingsenseaway.wordpress.com/2014/02/13/letter-from-a-passenger-i-made-a-bagful-of-peanut-butter-crackers-and-was-no-longer-considered-a-terrorist-threat/
#10yrsago American citizen and EFF sue Ethiopian government for installing British spyware on laptop https://www.eff.org/press/releases/american-sues-ethiopian-government-spyware-infection
#10yrsago Dante for fun: kids books that retell the Inferno, Purgatorio and Paradiso https://memex.craphound.com/2014/02/18/dante-for-fun-kids-books-that-retell-the-inferno-purgatorio-and-paradiso/
#10yrsago Tessellated Escher cookies https://www.flickr.com/photos/fdecomite/12598506655/in/pool-41894168726@N01
#5yrsago ç«„ç””è§Łäžćœćș: a wonderfully bizarre 19th century Japanese fanfic history of America https://twitter.com/nick_kapur/status/1062823813338091520
#5yrsago Public records requests reveal the elaborate shell-company secrecy that Google uses when seeking subsidies for data-centers https://www.washingtonpost.com/business/economy/google-reaped-millions-of-tax-breaks-as-it-secretly-expanded-its-real-estate-footprint-across-the-us/2019/02/15/7912e10e-3136-11e9-813a-0ab2f17e305b_story.html
3 notes
·
View notes
Text
CÎte d'Ivoire : Partenariat BNETD-INP-HB, plus d'une cinquantaine d'ingénieurs issus de la ...
Le BNETD, résolu à s'entourer des meilleures ressources humaines nationales, depuis cinq ans, accueille en son sein, plus de 300 stagiaires tous ... from Google Alert - "ressources humaines" -H/F https://ift.tt/2QWsvjf
0 notes
Text
CĂTE D'IVOIRE đšđź : QUI EST TIDJANE THIAM
CĂTE DâIVOIRE đšđź : QUI EST TIDJANEÂ THIAM
Tidjane Thiam :
#Ă _20_ans : il est le 1er ivoirien Ă rĂ©ussir le concours dâadmission Ă lâĂ©cole militaire polytechnique dont il est parmi les majors.
#Ă _24_ans : il est diplĂŽmĂ© de lâĂ©cole des Mines de Paris, dont il sort major de promotion.
#Ă _32_ans : il quitte la Banque Mondiale pour ĂȘtre nommĂ© Directeur GĂ©nĂ©ral du BNETD (Bureau National dâEtudes Techniques et de DĂ©veloppement.).
#Ă _34_ans : ilâŠ
View On WordPress
0 notes
Link
Last weekendâs Cambridge Analytica newsâthat the company was able to access tens of millions of usersâ data by paying low-wage workers on Amazonâs Mechanical Turk to take a Facebook survey, which gave Cambridge Analytica access to Facebookâs dossier on each of those turkersâ Facebook friendsâhas hammered home two problems: first, that Facebookâs default privacy settings are woefully inadequate to the task of really protecting user privacy; and second, that ticking the right boxes to make Facebook less creepy is far too complicated. Unfortunately for Facebook, regulators in the U.S. and around the world are looking for solutions, and fast.
But thereâs a third problem, one that platforms and regulators themselves helped create: the plethora of legal and technical barriers that make it hard for third partiesâcompanies, individual programmers, free software collectivesâto give users tools that would help them take control of the technologies they use.
Think of an ad-blocker: you view the web through your browser, and so you get to tell your web-browser which parts of a website you want to see and which parts you want to ignore. You can install plugins to do trivial things, like replace the word âmillennialsâ with âsnake peopleââand profound things, like making the web readable by people with visual impairments.
Ad-blockers are nearly as old as the web. In the early days of the web, they broke the deadlock over pop-up ads, allowing users to directly shape their online experience, leading to the death of pop-ups as advertisers realized that serving a pop-up was a guarantee that virtually no one would see your ad. Weâthe usersâdecided what our computers would show us, and businesses had to respond.
Web pioneer Doc Searls calls the current generation of ad-blockers âthe largest consumer revolt in history.â The users of technology have availed themselves of the tools to give them the web they want, not the web that corporations wanted us to have. The corporations that survive this revolt will be the ones who can deliver services that users are willing to use without add-ons that challenge their business-models.
In his 1999 classic Code and Other Laws of Cyberspace, Lawrence Lessig argued that our world is regulated by four forces:
Law: what's legal
Markets: what's profitable
Norms: what's morally acceptable
Code: what's technologically possible
Under ideal conditions, companies that do bad things with technology are shamed and embarrassed by bad press (norms); they face lawsuits and regulatory action (law); they lose customers and their share-price dips (markets); and then toolsmiths make add-ons for their product that allow us all to use them safely, without giving up our personal information, or being locked into their software store, or having to get repairs or consumables from the manufacturer at any price (code).
But an increasing slice of the web is off-limits to the âcodeâ response to bad behavior. When a programmer at Facebook makes a tool that allows the company to harvest the personal information of everyone who visits a page with a âLikeâ button on it another programmer can write a browser plugin that blocks this button on the pages you visit.
This week, we made you a tutorial explaining the torturous process by which you can change your Facebook preferences to keep the companyâs âpartnersâ from seeing all your friendsâ data. But what many folks would really like to do is give you a tool that does it for you: go through the tedious work of figuring out Facebookâs inscrutable privacy dashboard, and roll that expertise up in a self-executing recipeâa piece of computer code that autopiloted your browser to login to Facebook on your behalf and ticked all the right boxes for you, with no need for you to do the fiddly work.
But they canât. Not without risking serious legal consequences, at least. A series of court decisionsâoften stemming from the online gaming world, sometimes about Facebook itselfâhas made fielding code that fights for the user into a legal risk that all too few programmers are willing to take.
That's a serious problem. Programmers can swiftly make tools that allow us to express our moral preferences, allowing us to push back against bad behavior long before any government official can be convinced to take an interestâand if your government never takes an interest, or if you are worried about the government's use of technology to interfere in your life, you can still push back, with the right code.
Today, we are living through aâtechlashâ in which the world has woken up to realize that a single programmer can make choices that affect millionsâbillionsâof peoplesâ lives. Americaâs top computer science degree programs are making ethics an integral part of their curriculum. The ethical epiphanies of geeks have profoundly shaped the way we understand our technology (if only all technologists were so concerned with the ethics of their jobs).
We need technologists to thoughtfully communicate technical nuance to lawmakers; to run businesses that help people master their technology; to passionately make the case for better technology design.
But we also need our technologists to retain the power to affect millions of lives for the better. Skilled toolsmiths can automate the process of suing Equifax, filing for housing aid after youâre evicted, fighting a parking ticket or forcing an airline to give you a refund if your ticketâs price drops after you buy it (and thatâs all just one programmer, and he hasnât even graduated yet!).
When we talk about âwalled gardens,â we focus on the obvious harms: an App Store makes one company the judge, jury and executioner of whose programs you can run on your computer; apps canât be linked into and disappear from our references; platforms get to spy on you when you use them; opaque algorithms decide what you hear (and thus who gets to be heard).
But more profoundly, the past decadeâs march to walled gardens has limited what we can do about all these things. We still have ad-blockers (but not for âpremium videoâ anymore, because writing an ad-blocker that bypasses DRM is a potential felony), but we canât avail ourselves of tools to auto-configure our privacy dashboards, or snoop on our media players to see if theyâre snooping on us, or any of a thousand other useful and cunning improvements over our technologically mediated lives.
Because in the end, the real risk of a walled garden isnât how badly it can treat us: itâs how helpless we are to fight back against it with our own, better code. If you want to rein in Big Tech, it would help immensely to have lots of little tech in use showing how things might be if the giants behaved themselves. If you want your friends to stop selling their private information for a mess of potage, it would help if you could show them how to have an online social life without surrendering their privacy. If you want the people who bet big on the surveillance business-model to go broke, there is no better way to punish them in the marketplace than by turning off the data-spigot with tools that undo every nasty default they set in the hopes that we'll give up and use products their way, not ours.
Related Cases:Â
Facebook v. Power Ventures
Blizzard v. BNETD
0 notes
Text
Yet Another Lesson from the Cambridge Analytica Fiasco: Remove the Barriers to User Privacy Control
Last weekendâs Cambridge Analytica newsâthat the company was able to access tens of millions of usersâ data by paying low-wage workers on Amazonâs Mechanical Turk to take a Facebook survey, which gave Cambridge Analytica access to Facebookâs dossier on each of those turkersâ Facebook friendsâhas hammered home two problems: first, that Facebookâs default privacy settings are woefully inadequate to the task of really protecting user privacy; and second, that ticking the right boxes to make Facebook less creepy is far too complicated. Unfortunately for Facebook, regulators in the U.S. and around the world are looking for solutions, and fast.
But thereâs a third problem, one that platforms and regulators themselves helped create: the plethora of legal and technical barriers that make it hard for third partiesâcompanies, individual programmers, free software collectivesâto give users tools that would help them take control of the technologies they use.
Think of an ad-blocker: you view the web through your browser, and so you get to tell your web-browser which parts of a website you want to see and which parts you want to ignore. You can install plugins to do trivial things, like replace the word âmillennialsâ with âsnake peopleââand profound things, like making the web readable by people with visual impairments.
Ad-blockers are nearly as old as the web. In the early days of the web, they broke the deadlock over pop-up ads, allowing users to directly shape their online experience, leading to the death of pop-ups as advertisers realized that serving a pop-up was a guarantee that virtually no one would see your ad. Weâthe usersâdecided what our computers would show us, and businesses had to respond.
Web pioneer Doc Searls calls the current generation of ad-blockers âthe largest consumer revolt in history.â The users of technology have availed themselves of the tools to give them the web they want, not the web that corporations wanted us to have. The corporations that survive this revolt will be the ones who can deliver services that users are willing to use without add-ons that challenge their business-models.
In his 1999 classic Code and Other Laws of Cyberspace, Lawrence Lessig argued that our world is regulated by four forces:
Law: what's legal
Markets: what's profitable
Norms: what's morally acceptable
Code: what's technologically possible
Under ideal conditions, companies that do bad things with technology are shamed and embarrassed by bad press (norms); they face lawsuits and regulatory action (law); they lose customers and their share-price dips (markets); and then toolsmiths make add-ons for their product that allow us all to use them safely, without giving up our personal information, or being locked into their software store, or having to get repairs or consumables from the manufacturer at any price (code).
But an increasing slice of the web is off-limits to the âcodeâ response to bad behavior. When a programmer at Facebook makes a tool that allows the company to harvest the personal information of everyone who visits a page with a âLikeâ button on it another programmer can write a browser plugin that blocks this button on the pages you visit.
This week, we made you a tutorial explaining the torturous process by which you can change your Facebook preferences to keep the companyâs âpartnersâ from seeing all your friendsâ data. But what many folks would really like to do is give you a tool that does it for you: go through the tedious work of figuring out Facebookâs inscrutable privacy dashboard, and roll that expertise up in a self-executing recipeâa piece of computer code that autopiloted your browser to login to Facebook on your behalf and ticked all the right boxes for you, with no need for you to do the fiddly work.
But they canât. Not without risking serious legal consequences, at least. A series of court decisionsâoften stemming from the online gaming world, sometimes about Facebook itselfâhas made fielding code that fights for the user into a legal risk that all too few programmers are willing to take.
That's a serious problem. Programmers can swiftly make tools that allow us to express our moral preferences, allowing us to push back against bad behavior long before any government official can be convinced to take an interestâand if your government never takes an interest, or if you are worried about the government's use of technology to interfere in your life, you can still push back, with the right code.
Today, we are living through aâtechlashâ in which the world has woken up to realize that a single programmer can make choices that affect millionsâbillionsâof peoplesâ lives. Americaâs top computer science degree programs are making ethics an integral part of their curriculum. The ethical epiphanies of geeks have profoundly shaped the way we understand our technology (if only all technologists were so concerned with the ethics of their jobs).
We need technologists to thoughtfully communicate technical nuance to lawmakers; to run businesses that help people master their technology; to passionately make the case for better technology design.
But we also need our technologists to retain the power to affect millions of lives for the better. Skilled toolsmiths can automate the process of suing Equifax, filing for housing aid after youâre evicted, fighting a parking ticket or forcing an airline to give you a refund if your ticketâs price drops after you buy it (and thatâs all just one programmer, and he hasnât even graduated yet!).
When we talk about âwalled gardens,â we focus on the obvious harms: an App Store makes one company the judge, jury and executioner of whose programs you can run on your computer; apps canât be linked into and disappear from our references; platforms get to spy on you when you use them; opaque algorithms decide what you hear (and thus who gets to be heard).
But more profoundly, the past decadeâs march to walled gardens has limited what we can do about all these things. We still have ad-blockers (but not for âpremium videoâ anymore, because writing an ad-blocker that bypasses DRM is a potential felony), but we canât avail ourselves of tools to auto-configure our privacy dashboards, or snoop on our media players to see if theyâre snooping on us, or any of a thousand other useful and cunning improvements over our technologically mediated lives.
Because in the end, the real risk of a walled garden isnât how badly it can treat us: itâs how helpless we are to fight back against it with our own, better code. If you want to rein in Big Tech, it would help immensely to have lots of little tech in use showing how things might be if the giants behaved themselves. If you want your friends to stop selling their private information for a mess of potage, it would help if you could show them how to have an online social life without surrendering their privacy. If you want the people who bet big on the surveillance business-model to go broke, there is no better way to punish them in the marketplace than by turning off the data-spigot with tools that undo every nasty default they set in the hopes that we'll give up and use products their way, not ours.
Related Cases:Â
Facebook v. Power Ventures
Blizzard v. BNETD
from Deeplinks http://ift.tt/2GNoxUb
0 notes
Link
0 notes
Text
Multiplayer Server Case Law
The EFF Petition for the Abandoned Video Games exemption seeks to allow circumvention of a specific kind of technological protection measure: âcommunication with servers.â How do we know that this is true bona fide protection measure under the DMCA? Two court cases are provided, both involving Blizzard. It should be noted that both of these cases involve some form of multiplayer server and neither involves simple authentication checks. However, given that an authentication check is clearly a measure that âcontrols accessâ as required under 1201(a), I can understand the focus on simple interoperability with non-publisher multiplayer servers where it has not been permitted. Certainly, Blizzard is very known for not permitting users to do things.
Both cases involve Blizzard, but at different times.
DAVIDSON & ASSOCIATES v. JUNGÂ 422 F.3d 630
In 2005, the 8th Circuit Court of Appeals decided a case involving Blizzard/Vivendi (âDavidson & Associatesâ) and several individuals (âJungâ et al.) who had been responsible for the creation of a service called bnetd which acted as an alternative to Battle.net. At the time of Blizzardâs original filing, this means that the games concerned were StarCraft, Brood War, WarCraft II: Battle.net Edition, Diablo, and Diablo II: Lord of Destruction. âbnetdâ acted as a full alternative to Battle.net including discussion forums, matchmaking services, and other multiplayer functions.Â
âbnetdâ was created through reverse engineering. Many of the amicus briefs (legal briefs filed by third parties, usually supporting one party or the other and providing information they believe will be useful to the court) that were in support of the creators of âbnetdâ stressed the importance of preserving the right to reverse engineering and the importance of doing so. It should be noted that while the âbnetdâ server did receive the playerâs CD Key, it did not verify that the CD Key was a proper one. Hence, many players who used the alternative âbnetdâ service were running pirated versions of the games.
The discussion of copyright preemption here is beyond the scope of my interest in this series of blog posts. Instead, weâre focused on the DMCA claims that Blizzard has made against the creators of âbnetd.â
On 639-640, the 8th Circuit discusses their take on the 1201(a)(2) and (b)(1) provisions of the DMCA. As it comes up in the later 9th Cir. decision in MDY v. Blizzard, the Court of Appeals for the Federal Circuit (CAFC) has a weird take on the distinction between these provisions. My discussion of the DMCA will comport with the 8th Cir. and 9th Cir. even if CAFC has some persuasive policy reaons.
There are three operative provisions for creating causes of action: 1201(a)(1), 1201(a)(2), and 1201(b)(1). 1201(a)(1) forbids the use of circumvention technology that controls access to a protected work. 1201(a)(2) forbids trafficking in the means to accomplish 1201(a)(1). 1201(b) forbids trafficking in means to circumvent protection measures designed to protect rights of a rights owner. The difference is this: bypassing a CD Key for a computer game violates 1201(a)(1) because it is circumventing technology designed to prevent access, giving someone a keygen program violates 1201(a)(2) because it is trafficking in means to circumvent technology designed to prevent access, and providing technology to crack and copy a computer game violates 1201(b) because the crack program violates the rights ownerâs right to control reproduction of the computer program.
The 8th Circuit finds that the defendant creators of âbnetdâ violated the first two provisions, 1201(a)(1) and (a)(2). The technological protection measure that was circumvented was the CD Key. Ordinarily, the CD Key would be used as part of a secret handshake between the Battle.net server and the client program.
The 8th Circuitâs discussion of the violation of 1201(a)(1) on 640-641 is confusing at best and betrays a misunderstanding of the computer program at worst. 1201(a)(1) requires that â[n]o person shall circumvent a technological measure that effectively controls access to a work protected under this title.â The 8th Circuit reasons that because the control measure (i.e., the secret handshake in Blizzardâs Battle.net server code) was not freely available and had to be reverse engineered, it follows that the use of the âliteral elements of Battle.net modeâ constituted âa circumvention of Battle.net and Battle.net mode.â
What confuses me here is what exactly the âworkâ is that is being accessed. If the circumvention were to allow a player to cheat the CD Key check but still log on to Blizzardâs Battle.net, I would be on board. In this case, I believe âbnetdâ likely made use of some of the copyrightable assets of Battle.net. Were these assets limited to those reverse engineered so as to be a functional alternative to Battle.net or did they go beyond that usage? Is the issue here that âbnetdâ was imitating Battle.net or merely that it was an alternative to Battle.net?
âbnetdâ was an open source program that was made freely available. If you believe the creators of âbnetdâ violated 1201(a)(1) then, given that it was open source, 1201(a)(2) follows naturally.
The last important discussion here concerns DMCA 1201(f) aka the interoperability exception. 8th Cir. says there are four requirements to meet the language of 1201(f):
they lawfully obtained the right to use a copy of a computer program;Â
the information gathered as a result of the reverse engineering was not previously readily available to the person engaging in the circumvention;Â
the sole purpose of the reverse engineering was to identify and analyze those elements of the program that were necessary to achieve interoperability of an independently created computer program with other programs; andÂ
the alleged circumvention did not constitute infringement.Â
The 8th Cir. found that the defendants failed the last point. The reasoning is that because it was possible for other people who had pirated the game to play on the âbnetdâ servers, which had no real check for valid CD Keys, the defendants had committed infringement. There were no facts established that the defendants had made copies of game code except in making âbnetd.â
Yes, let that reasoning sink in. Because other people pirated the game and used pirated copies to play on your open source multiplayer server, you yourself committed infringement.
While the facts did establish that the creators of âbnetdâ were aware of this issue, the facts did not establish if they had tried to âsolveâ it. I would be very curious to know that, if completely reverse engineered, a valid CD Key check would have gotten the creators off the hook because then they would not even be enabling âmore successfulâ infringement by those who had pirated the game.
The 8th Cir. opinion gives the impression that the presiding judge was unhappy that âbnetdâ allowed for some software pirates to access online multiplayer and that correct statutory interpretation was no bar to finding the creators in violation of various provisions of 1201.
MDY v. BLIZZARDÂ 629 F.3d 928
In 2010, the 9th Circuit Court of Appeals decided a case involving Blizzard and MDY Industries. Blizzard had previously threatened to bring suit against MDY and, in response, MDY filed suit for a declaratory judgment that it did not infringe Blizzardâs rights.
MDY was the business of Michael Donnelly, who had created a World of Warcraft bot called Glider. The function of Glider was to automate certain tedious tasks for the player, especially early game tasks, such that the player was able to advance to later levels sooner. When Glider was initially sold and made available in 2005, Blizzard had neither forbidden their use in any ToU/EULA nor put in place any technological protection measures to defeat their use. Blizzard later introduced explicit language and also, by the end of 2005, launched their Warden software which identified users with bots and banned them accordingly.
Again, there are some interesting copyright discussions that will not be discussed here. Sorry. There is discussion about âcontractual covenants vs. license conditionsâ which is mildly confusing to someone who just finished courses in property law and contract law.
In determining whether MDY violated 1201(a)(2) and 1201(b)(1), the 9th Cir. looks at the district courtâs decision, especially as it relates to how to define the protected work. The district court defined three types of components of WoW:
The gameâs code stored on the client machine was called the softwareâs âliteral elements.â
The visual and audible components that make up the game were called the softwareâs âindividual non-literal elements.â
The real-time experience of playing WoW was called the softwareâs âdynamic real-time experience.â
The district court had reasoned the Warden software protected access to the âdynamic real-time experienceâ of playing WoW, but not the other elements and so MDY had violated 1201(a)(2). Before getting into their feelings about this, the 9th Cir. conducts an in-depth explanation of the construction of these provisions. I already went over these above in the previous case. The 9th Cir. spends some time making fun of the CAFC for their decision in Chamberlain, but further construction of 1201 is outside the scope of the discussion here.
The 9th Cir., after arriving at their construction of the relevant 1201 provisions, finds that MDY violated 1201(a)(2) because they trafficked in a program designed to circumvent Warden, Warden being a technological protection measure preventing access to the âdynamic real-time experienceâ of playing WoW. Given their construction, I find this result much more agreeable than the 1201(f) analysis performed by the 8th Cir.
HOW DOES THIS RELATE TO THE ABANDONED VIDEO GAMES EXEMPTION
Davidson applies fairly directly to the aims of the proposed exemption. Users seek to connect their computer game programs to third party servers, often reverse engineered, once the publisher game servers have gone offline. While Battle.net was clearly alive and kicking at the time (and is still alive and kicking right now), creating server software for abandoned video games would likely be a risky proposition, especially if living in the 8th Cir.Â
MDY does not seem to apply here and I am unsure why it is cited. The exemption proposal explicitly states that âthis exemption would not apply to massive multiplayer online role-playing games such as World of Warcraft or Wildstar.â The finding in MDY hinges on the fact that it is access to the âdynamic real-time experienceâ that is controlled rather than access to the literal elements on the userâs hard drive. Without any âdynamic real-time experienceâ it is doubtful that the holding of MDY would apply and instead it is more likely that the holding of the 6th Circuit in Lexmark International would apply (387 F.3d 522).
0 notes
Text
Why Iâll never buy a Blizzard Game
Growing up in the 90âČs I grew to love older Blizzard games like Warcraft II, StarCraft, and Diablo.  I also loved playing Diablo II during college.  But it was apparently to me well before WoW that this was a company that I would avoid - and Iâve managed it since the Diablo II expansion.  Iâm not even sure if any of the original developers still work there.  Blizzard seems to be a giant corporate shell that publishes treadmill-style MMOs more than the clever game developer of yore.
And Blizzard has a history of wanting total control of their gaming properties.  They always seem to program in an online component to their games (which started really with StarCraft).  You may have heard of bnetd - something put together by fans.  Bnetd was released on April 28, 1998 under the name StarHack and provided near-complete emulation of the original online multiplayer gaming service network.  Blizzard sued the developers and won the case in 2002 - which set a legal milestone of terms and services vs. reverse-engineering.  Despite the developers not using any of Blizzardâs source code, they did write something that would connect with their software.  I personally think the developers were in the right and that itâs ridiculous to think that I couldnât reverse-engineer the protocol by experimentation to use with a piece of used software picked up at a second-hand store. Â
Now, more recently, Blizzard went after Nostalrius - a fan-created reverse-engineered Word of Warcraft server.  This might remind you of bnetd - and it should.. itâs really the same sort of thing.  Engineers and fans built their own private server to use with already-purchased WoW software and Blizzard went out of their way to shut them down.  I never played Nostalrius and I donât have any friends that played on it to speak of.  But I just find this behavior unacceptable and against what software should be.  You should have the right to preserve and play software you purchased any way you want.  It should be yours after you buy it to do what you want with.  Thatâs the idea of property.  This notion of terms and conditions applying 10 or 20 years later when you bought a physical game from a used book store is just ludicrous.  It really should be none of Blizzardâs business what I do with an old WoW game.
Yes legally Blizzard is in the right; the courts have spoken. Â The law is on their side and they currently have the money to pay lawyers to do their bidding. Â But you have the right to not spend your money on a Blizzard product. Â Letâs see them pay for lawyers when theyâre bankrupt.. thatâs my take on it. Â And maybe they will never go broke and will continue to exist the rest of my life. Â Thatâs fine.. but I donât have to help them out either. Â And itâs not like youâre going to miss out on a whole lot with their current franchises. Â Also, there are a ton of great games out there from other companies. Â And itâs true that some of them act (heck most of them) just as egregious as Blizzard. Â Thatâs fine.. just donât buy their products if you find their terms ridiculous. Â Or wait until the next generation of young adults grow into power and change these terrible IP laws to be more fan/hacker-friendly.
0 notes
Text
CĂTE D'IVOIRE : LA VRAIE HISTOIRE DU PONT HKB
CĂTE DâIVOIRE : LA VRAIE HISTOIRE DU PONTÂ HKB
Photo RTI 1
Le Pont Henri KONAN BEDIE dont la premiĂšre pierre a Ă©tĂ© posĂ©e Ă Abidjan le mercredi 7 septembre 2011, Ă grand renfort de publicitĂ©, est un projet initialement connu sous le nom de Pont Riviera-Marcory, dans le cadre « des 12 travaux de Ă©lĂ©phant dâAfrique » du rĂ©gime du PrĂ©sident BĂ©diĂ© dĂ©jĂ en 1996.
(moreâŠ)
View On WordPress
#ALASSANE OUATTARA#BNETD#CĂTE D&039;IVOIRE#FMI#Groupe BOUYGUES#La vraie histoire#LAURENT GBAGBO#Pont Ă pĂ©age#Pont HKB#SOCOPRIM
0 notes
Text
#15yrsago Court trashes fair use
A court in St Louis today ruled against EFF in the "BNETD" case, in which we were fighting for the right to write and use your own game-servers that run with the games you buy. We're appealing, but this sucks: it's not much of a leap from this to deciding that tools used to tweak a game's performance for creating machinima (see below ) is also a crime.
BnetD is an open source program that lets gamers play popular Blizzard titles like Warcraft with other gamers on servers that don't belong to Blizzard's Battle.net service. Blizzard argued that the programmers who wrote BnetD violated the DMCA's anti-circumvention provisions and that the programmers also violated several parts of Blizzard's EULA, including a section on reverse engineering.
The Electronic Frontier Foundation (EFF), co-counsel for the defendants, argued that programming and distributing BnetD was fair use. The programmers reverse-engineered Battle.net purely to make their free product work with it, not to violate copyright.
EFF Staff Attorney Jason Schultz said, "Consumers have a right to choose where and when they want to use the products they buy. This ruling gives Blizzard the ability to force you to use their servers whether you want to or not. Copyright law was meant to promote competition and creative alternatives, not suppress them."
https://boingboing.net/2004/09/30/court-trashes-fair-u.html
1 note
·
View note
Text
#15yrsago Bnetd brief: a legal doc that *sings*
Most legal briefs are boring and vaccilating, couched in a thousand maybes and coulds and other qualifiers. Thus, it's a pleasure to read a brief in which a lawyer lays down some muscular, no-nonsense prose in defense of a good cause.
My cow-orker Jason Schultz has just filed a brief in the Southern District Court in the BNETD case, in which Blizzard -- a Universal company that makes video games -- is suing some hackers who wrote their own free software version of Blizzard's game-server, called bnetd. The arguments from the other side are the height of bogosity, and Jason makes no bones about it in his brief. The prose here positively sings, and is as good a treatise on fair-use reverse engineering as you could hope to read.
https://boingboing.net/2004/02/18/bnetd-brief-a-legal.html
4 notes
·
View notes
Text
CÎte d'Ivoire : Communiqué du collectif des avocats de Pulchérie Gbalet
... travail, et ce avec la complicité du Directeur des ressources humaines du BNETD, de violence puis de séquestration par des personnes inconnues. from Google Alert - "ressources humaines" -H/F https://ift.tt/2Qun8Yj
0 notes