Berkeley CSUA MOTD:Entry 54445
Berkeley CSUA MOTD
2022/05/27 [General] UID:1000 Activity:popular

2012/7/26-9/24 [Computer/Networking] UID:54445 Activity:nil
7/26    Why big mega cable companies rule:
2022/05/27 [General] UID:1000 Activity:popular

You may also be interested in these entries...
2012/3/29-6/4 [Computer/HW/Memory, Computer/HW/CPU, Computer/HW/Drives] UID:54351 Activity:nil
3/29    A friend wants a PC (no mac). She doesn't want Dell. Is there a
        good place that can custom build for you (SSD, large RAM, cheap video
        card--no game)?
        \_ As a side note: back in my Cal days more than two decades ago when
           having a 387SX made me the only person with floating-point hardware,
           most machines were custom built.
2012/4/26-6/4 [Computer/Networking] UID:54371 Activity:nil
4/26    I see that soda has an ipv6 address but ipv6 traffic from this box
        doesn't actually work (ping6 <DEAD><DEAD>, ping6
        Is this expected to work?
        \_ Soda doesn't have a real IPv6 address.  The IPv6 addresses you see
           in ifconfig are just link-local addresses; any IPv6-capable machine
           will autogenerate these, whether or not it's connected to an IPv6
2012/1/19-3/3 [Computer/Networking, Politics/Foreign/Europe, Computer/SW] UID:54294 Activity:nil
1/19    Transcript between the Italian cruise ship captain and the Port
        Authority (
        This captain is amazing.
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
2010/11/1-2011/1/13 [Computer/Networking] UID:54002 Activity:nil
11/1    I'm moving from a home in Fremont to another home within the same ZIP
        code in Fremont, and AT&T customer service says I cannot transfer my
        DSL service because DSL is not available at my new home.  Is that BS?
        Are they just trying to push me to subscribe to their more expensive
        U-verse service?  I'm not asking for any lightening-speed connection.
            \_ could be
2009/11/4-17 [Computer/SW/P2P, Computer/Networking, Computer/SW/Security] UID:53495 Activity:nil
11/4    Holy cow, I got a warning from my ISP that they were notified
        by BSA/ that I was copying music/video/software.
        Do they do port scan or something? That's a first for me.
        \_ They hang out on P2P networks and track IP addresses.  -tom
           \_ I believe they are paid by content providers to perform this
              monitoring service, so you should only run this risk with content
Cache (7397 bytes) ->
Law & Disorder / Civilization & Discontents How Big Cable killed the open set-top box--and what to do about it Researcher argues the FCC's set-top box strategy is doomed to failure. Steve Garfield Steve Schultze once enjoyed the ability to record cable television content on the desktop computer in his Cambridge, MA home. But when he moved across the river to Boston, he was forced to switch to a digital cable service that encrypted most of its channels, greatly reducing the utility of his video recording gear. For more than a decade, the Federal Communications Commission (FCC) has tried to promote development of third-party set-top boxes--but poorly conceived strategy and cable company foot-dragging has largely foiled that agency. A final nail in the open set-top box coffin could come soon. The FCC currently prohibits cable providers from encrypting basic cable channels in order to preserve compatibility with third-party devices. But these third-party devices have become increasingly rare, so the FCC is considering dropping the encryption ban altogether. recent FCC filing, Schultze argues that the FCC's whole approach to the set-top box issue has been misguided. Rather than regulating set-top boxes themselves, Schultze advocates freeing devices inside the home from the legal control of DRM vendors. He suggests that could be accomplished by requiring cable-supplied set-top boxes to provide an unencrypted video interface to third-party devices. Alternatively, in an interview conducted earlier this month, he told Ars that another solution would be to reform the Digital Millennium Copyright Act (DMCA) to allow the circumvention of DRM schemes. A failed policy In 1996, Congress ordered the FCC to establish rules to promote the development of third-party cable set-top boxes. The FCC followed instructions, issuing a series of regulations requiring the cable industry to develop standards that would enable third-party devices to interoperate with the incumbents' networks. TiVo, Boxee, Windows Media Center--let a thousand third-party video devices bloom! But this approach had a basic problem: the companies developing the standards had a vested interest in seeing them fail. Cable incumbents prefer to have customers use their own proprietary set-top boxes. This gives them maximum control over the customer experience--and, as a consequence, maximum influence over the customer's wallet. Unsurprisingly, the standards produced by this process haven't worked well. The first-generation standard, called CableCARD, included a DRM scheme that required device manufacturers to submit to a burdensome certification process run by CableLabs, a consortium of cable companies. Moreover, the original CableCARD specification supported only "one-way" communication; devices could receive video content, but they couldn't take advantage of interactive features offered by the cable companies' own set-top boxes. So prodded by the FCC, the cable industry began work on successor technologies that address the CableCARD's shortcomings. The industry developed Tru2Way as a complement to CableCARD technology that would allow third-party devices to access interactive services like digital program guides. broad coalition of software and consumer electronics companies--but (shock, awe) the cable industry is strongly opposed to the idea. And it's hard to imagine a workable standard will emerge from negotiations between the parties when the cable side of the table has every incentive to scuttle, hobble, or delay the project. Carterfone ruling, which opened the pre-breakup AT&T's telephone network to third-party devices in 1968, as a model for what the FCC is trying to do in the cable business. "Unfortunately," he told me, "cable is a much more complicated technology than the phone system was or is. And so the cable companies have a lot more latitude to decide what they want to allow and what they want to prohibit." Indeed, he said, dropping the ban on encrypting basic channels would be "the final step in this progression whereby the cable companies have leveraged their control over their networks and used encryption in particular as a way to dictate what can happen in the home." Boxee has conceded that point, he said, agreeing to give Comcast veto power over the design of Boxee's products in return for at least some access to video content. Schultze said that cable providers have used the control provided by CableCARD to discourage the introduction of new devices. A number of devices, he said, had been "stuck in the certification queue." He speculated that when the FCC showed a renewed interest in the set-top box market a couple of years back, "CableLabs felt more pressure to certify devices. In the last couple of years, a couple of device manufacturers have made their way through the process." Schultze also said CableLabs has forced manufacturers to limit device functionality. For example, "in order to be certified to the CableLabs regime you have to agree to respect a copy protection flag, even if the underlying content stream is unencrypted." As a result, he said, "CableLabs-certified devices often can't tune to some of the same channels that non-CableLabs-certified devices can." Schultze believes that the FCC has been focusing on the wrong interface. Rather than restricting cable firms from encrypting content as it passes from the cable company to the customer's set-top box, Schultze believes cable companies should offer access to unencrypted video to devices inside the home. "The provider's set-top box (or CableCARD) could still be responsible for decrypting signals in order to prevent service theft," he wrote, "but the video signal emitted from that device could be mandated to be 'in the clear' to any device that wishes to interoperate." In the meantime, Schultze believes the current encryption ban "serves as a useful safety valve" to cable industry abuses. Reforming the DMCA Reforming the DMCA to allow reverse engineering would also address Schultze's concerns. "The DMCA has foreclosed the development of open devices that decrypt the encrypted channels," he said. It has precluded uses that occur "against the wishes of the content owners but within the legally defined boundaries of accessible fair use and recording." "If Congress invalidated the DMCA and we could crack HDCP, then it would be very easy for anyone to build a set-top box that just decodes that video signal coming out of the original set-top box," he said. "I think the HDMI port on the back of a set-top box is the closest thing we've got to an RJ-11 jack in the case of the Carterfone." But, he noted, not all public interest groups agree with this position. Some of them, he said, have conceded the in-home encryption issue to push for the adoption of AllVid. As for Schultze, he worries this strategy is "just repeating the same problem we've had the whole time" because it "gives cable companies a hook on certification and content control." Timothy B Lee / Timothy covers tech policy for Ars, with a particular focus on patent and copyright law, privacy, free speech, and open government. His writing has appeared in Slate, Reason, Wired, and the New York Times. Your California Privacy Rights The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Cond Nast.