Saturday, August 31, 2013
Friday, March 22, 2013
I can’t believe that in 2011 people still think DRM can work for anything but limit end user choices, security and privacy. Here is an article from EFF explaining what is going on with this on the HTML standardization front. Please join this struggle and sign EFF’s petition.
In case you don’t know or understand what this is all about, here is my attempt at explaining, by writing a fictional conversation between a DRM Programmer and a Technology Literate User.
DRM Programmer: I want you to buy my data (Movie/Music/Book/Game) and then be able to read (Watch/Listen to/Play) it but not copy it.
Technology Literate User: That is impossible, on computers reading is copying.
D: I will protect the data by encrypting it.
T: If you encrypt the data I won’t be able to read it.
D: I will give you a decryption key so you can decrypt the data and read it.
T: If you give me the decryption key, and let me read the data, I can then write (E.g. save) it, unencrypted, to somewhere else, and therefore copy it.
Friday, May 14, 2010
Diaspora had been getting a lot of press lately, and while I do think that utilizing peer-too-peer and distributed computing technologies to give users back the control over their social and personal information us a good idea, I`m not sure that server-style software is the right way to achieve this.
If breakup of the dominance of big, centralized, services in the social computing sphere is to be achieved, it should be done in the same manner that central FTP archives were made obsolete by P2P software and IM networks by multi-protocol clients – By writing convenient desktop software that will merge in the services of multiple providers to eliminate differentiation and facilitate competition.
Wednesday, November 28, 2007
When the link to EFF’s guide for Detecting packet injection popped up in my feed reader I was looking forward to learning the means EFF would offer the general public to learn and deal with the problem of bandwidth discrimination.
I was hoping to find a “user friendly” article that would allow me to explain and demonstrate this problem the less technically oriented among my peers.
However, the approach offered by the article, utilizing Wireshark to analyze network traffic, is well beyond the capabilities of common computer users, so I was greatly disappointed.