Berkeley CSUA MOTD:Entry 39523
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/08 [General] UID:1000 Activity:popular
7/8     

2005/9/6-7 [Computer/SW/Editors, Computer/SW/Security] UID:39523 Activity:low
9/6     Probably old news to some of you, but what do you all think of the
        "Street Performer Protocol"?
        http://www.firstmonday.org/issues/issue4_6/kelsey
        \_ I'd probably never go for it.
        \_ I think the ideas sounds interesting in parts, but I don't
           see how it could work as the primary mechanism for funding of
           copyrighted works.  An author who wishes to publish his first
           novel will not be able to get donations, so he needs someone
           else (i.e., a publishing house) to decide he is worth it,
           market the book and put it in stores.  That publishing house
           needs to have control of the copyright to at least some extent,
           because they publish and promote a lot of books by first-time
           authors and most of them don't make money, so to fund their
           operations they need to make their money from the few successful
           books.
           The idea might work for Stephen King.  -tom
           \_ Stephen King tried it and it failed him if I recall.
              \_ King tried putting his books up for download by serial,
                 with small payments, but without any escrow.  So very
                 few people actually paid for them because they were all
                 available on the the file-swapping services for free.
                 If he said "OK I want to make $100K off this book" and
                 waited until there was $100K in escrow, the file-swapping
                 problem would be mitigated.  -tom
        \_ It's overly optomistic about a performer's skill. One of the
           greatest resource of a publishing house is it's editors. First
           novels are hardly ever insta-classics without the vicious advice
           of an editor. Plotholes, meandering writing, lack of character,
           inaccurate facts, etc. sinks books even before they are finished.
           A good editor will fix that. Plus, a partially written book does
           nobody any good. Authors should create a finished product or they
           will find themselves lost like a potter  trying to glaze a wet
           piece of clay.
2025/07/08 [General] UID:1000 Activity:popular
7/8     

You may also be interested in these entries...
2010/1/22-30 [Computer/HW/Laptop, Computer/SW/OS/OsX] UID:53655 Activity:high
1/22    looking to buy a new development laptop
        needs ssdrive, >6 hr possible batt life, and runs linux reasonably
        Anyone have a recommendation? Thx.
        \_ thinkpad t23 w ssdrive and battery inplace of drive bay
        \_ Ever wondered what RICHARD STALLMAN uses for a laptop?  Well,
           wonder no more!
	...
2009/8/31-9/9 [Computer/SW/Compilers] UID:53312 Activity:nil
8/31    I'm trying to learn ActionScript, like a step by step tutorial.
        The site at http://www.actionscript.org/resources/categories/Tutorials/Flash/Beginner
        isn't well organized. It doesn't explain how to get started with
        an editor, compiler, IDE. And should I even learn AS2 when you can
        learn AS3? Is Adobe Flash CS4 >>> CS3 or just CS4 > CS3?
	...
2009/7/24-29 [Computer/SW/Editors/Vi] UID:53195 Activity:low
7/24    Is dos2unix available somewhere?  Someone added all those Ctrl-M's to
        motd.public.
        \_ %s/^V^M//g in vim. What has your editor done for you today?
           \_ that works great in vi actually... in vim :set filetype=unix
	...
2009/2/28-3/11 [Computer/SW/Compilers] UID:52661 Activity:nil
2/28    I'm looking for a recommendation of a compiler/IDE to use to
        develop C/C++ code under Linux. In school, we used jove/gcc and
        I still use emacs/vi and gcc to this day. However, it is really
        lacking. Under Windows I tried Visual Studio and there were some
        really nice things about it, although it was so overwhelming that
        after 6 months of occasional use I still didn't really know what I
	...
2008/9/22-24 [Science/Electric, Computer/Companies/Google, Computer/SW/Editors/Vi] UID:51263 Activity:kinda low
9/22    Gmail's "conversation feature" drives me nuts! Is there a way to
        disable that and make Gmail act like every other e-mail client on the
        planet? WTF thought this was a nice thing to have on by default?
        \_ Umm, why don't you just use another email service then...
           \_ Umm, I do, which is how I have something to compare to. I get
              mail in at least 4 places only one of which is Gmail. I
	...
2008/6/12-13 [Computer/SW/Editors/Emacs, Computer/SW/Editors/Vi, Computer/SW/Unix] UID:50233 Activity:nil
6/12    Does emacs or vi include a column paste?  I sometimes have a block
        text I want to insert horizntally next to another block/column.  This
        is common for data plotting etc.  In Microsoft Word has this, I need
        it in a Unix text editor.
        \_ Does M-x picture-mode in emacs work for you?
           \_ Yes, with the commands below, thanks.
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/13-8/19 [Computer/SW/Security, Computer/Companies/Yahoo] UID:54436 Activity:nil
7/13    Why would Yahoo store passwords unencrypted?  I recall that even 20+
        years ago the passwords stored in /etc/passwd on instructional
        machines here at Cal were one-way encrypted.  (I think those were
        Ultrix machines.)
        \_ Doesn't this say anything already?
           http://finance.yahoo.com/echarts?s=YHOO+Interactive#symbol=yhoo;range=5y
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2011/11/11-30 [Computer/SW/Security] UID:54224 Activity:nil
11/11   MacOSX's Sandbox security hole:
        http://preview.tinyurl.com/7ph2wtg [arstechnica]
	...
Cache (8192 bytes)
www.firstmonday.org/issues/issue4_6/kelsey -> www.firstmonday.org/issues/issue4_6/kelsey/
The Street Performer Protocol and Digital Copyrights We introduce the Street Performer Protocol, an electronic-commerce mecha nism to facilitate the private financing of public works. Using this pr otocol, people would place donations in escrow, to be released to an au thor in the event that the promised work be put in the public domain. T his protocol has the potential to fund alternative or "marginal" works. Introduction Consider a world without copyright enforcement. People write books or mu sic but they get paid only for a single performance or print run. Once the work is released, anyone who likes it may make copies and distribut e them. In that world, high-quality, easily copied works like stories, novels, reference books, and pieces of music are, in the economic sense , a "public good." That is, the creators of these works must spend scar ce resources producing them, but they do not reap most of the benefits. This leads to the prediction that these works will be produced a good de al less in that world than in ours, and a good deal less than the consu mers of these works would like. However, for various technical reasons, we appear to be heading into a world that will look a lot less like ou r world, and a lot more like that world with no copyright enforcement. In this paper, we consider a very simple and common approach to funding the production of public goods such as advertisement-free radio and tel evision stations and impromptu music performances in public places. The artist offers to continue producing their freely-available creations s o long as they keep getting enough money in donations to make it worth their while to do so. We discuss social, financial, and technical arran gements that can make this approach work fairly well, though we don't b elieve it will ever provide a complete solution to the problem of payin g creators for their creations. We primarily discuss the way a specific instantiation of this idea, called the "Street Performer Protocol," mi ght work. In the remainder of this paper, we discuss why we believe a continuation of the current situation in copyright enforcement, extended through te chnical means, is unlikely to work well; how to build the social, finan cial, and technical arrangements to make this approach work; We finish by considering the large number of open questions about this and related schemes. Why Copyright Will Be Hard to Enforce in the Future Before we discuss in detail how our protocol will work, we want to expla in why we are so pessimistic about copyright enforcement in the relativ ely near future. First, enforcing copyright laws is made easier when the creation and dis tribution of high-quality copies of information is relatively expensive and cumbersome. A plant that presses out pirated CDs and a network of trucks and salesmen that distribute them is relatively difficult to hid e Once found, there is no doubt in anyone's mind that the pirates were doing something illegal. Finally, the loss of the expensive equipment and the destruction of the distribution network probably represents a r eal benefit for the copyright holders, by eliminating a noticeable frac tion of the total pirated CD output. Perfect digital copies don't de grade over time, and they take relatively inexpensive equipment to use. A distribution network is already available, in a simple form, today - the Internet. Anderson, 1996b and new storage technologies like DVDs, a futu re pirate is likely to require very little money to get started, and is likely to be an amateur sharing or giving away copies rather than a pe rson making a lot of money running a CD pirating operation. Technical mechanisms proposed for enforcing copyright automatically requi re a lot of police-state measures Our second reason is that the technical mechanisms proposed for enforcin g copyright automatically require a lot of police-state measures. Schem es to link each digital copy of some copyrighted work to an owner, and hold the owner responsible for pirated copies of the work, require that everyone buying a copy of the work provide a hard-to-forge ID; this le ads naturally to the existence of a database of all copyrighted works b ought, rented, or borrowed by each person. Schemes to keep all copyrigh ted content inside secure devices lead to different problems. The infra structure needed to make this kind of scheme effective is the infrastru cture needed to enforce restrictions on the distribution of some works; this infrastructure may be used to enforce copyright or to ban the red istribution of some books with about equal effectiveness. Schemes of th is kind also make it very tempting for copyright holders to lobby for b ans on technology that doesn't enforce copy protection. World Intellectual Property Organization) for draconian anti-piracy laws, laws that limit research into computer security and cryptography, and for laws that se riously restrict what kind of recording and computer equipment is made available for sale to the public. Technical Solutions: Copyright Commerce Systems Technical solutions to the problem have been proposed in many places. Th ese tend to fall into two categories: 1 Some schemes attempt to keep the content encrypted except when it is inside a secure perimeter of some kind. The secure device plays, displays, or executes the content only when it is authorized to do so. In this case, publication on the Net of this content implicates the purchaser, who is probably sued for enormous damages to the copyright holder's intellectual property. Note that it's quite possible to combine both kinds of scheme in the sam e system. Secure Perimeter Schemes There are several problems with secure perimeter schemes. The most funda mental problem is simply that, for graphics, video, audio, and text, th e value in the content must actually be displayed in a way that the use r can see or hear it. With s ome custom-designed equipment, it can probably be made fairly easy. Consider a consumer who is choosing between a secure device that implements a secure perimeter, a nd an insecure device that does not. It is almost certainly more expensive, since it must include tamper-resistant hardware and support various cryptographic mec hanisms to operate. The only reason the customer will have to buy the s ecure device is if many of the works he wants to buy are only available on for that device. However, if the secure device isn't yet in widespr ead use, it will be difficult to make any money selling copies of works for the secure device only. It's easier to sell or give away software that provides the secure perim eter in which the copyrighted material is kept. However, this is also f airly easy to defeat, even for relatively unsophisticated attackers. The satellite and cable TV industri es have given us several examples of this, and their record of resistin g attack doesn't give us lots of hope for the future of this approach. Along with the various attacks on the box, there are also more general attacks possible - capture the output intended for the screen or speake rs, and save it for posting to the Internet. Again, we expect to see so ftware to do this posted to the Internet, as well. This c an be prevented only by never allowing copyrighted music outside these secure perimeters. This involves, among other things, never broadcastin g music or films, since they could then be recorded and posted. With tools like anonymous remailers and the Eternity Service, material t hat's ever posted simply cannot be erased, short of destroying the whol e Service. This means that one posting of a copyrighted piece of music, video, or text makes it available for free (or at least very cheaply) via the Internet. Indeed, even without the Eternity Service, informatio n that is ever posted or made available on the Net is very hard to eras e, though legal threats can probably get it taken off the major search engines. Boneh and Shaw, 1995 attempt to trace the person who posted the copyrighted material, and to hold him responsible for the losses of the creator of that material. Since these losses are likely to be very large, and since criminal as well as civil...