Windows 7’s New DRM – by “Yingqi G”

Last month saw a controversial update to Windows 7’s validation features. After the much aligned Windows Genuine Advantage several years ago, which requires you to verify your copy of Windows, February’s update to Windows Activation Technologies makes the check periodic. In light of the draconian DRM software in some recently released games, it seems consumers are fighting a losing battle to keep their computers free of the secret software police.

The only problem is that people are still buying the software. Among those who oppose DRM, one not uncommon argument is that DRM degrades the value of the product by making it less convenient to use than the alternative without DRM. This alternative is often just the original software with DRM removed, usually illegally. Thus, as the argument goes, DRM incentivizes piracy. Proponents of DRM believe that stronger, more pervasive DRM is the solution, while opponents of DRM believe the software publisher should remove the incentive to acquire copies illegally.

Both sides have seen their successes. On the one hand, many successful game publishers have managed to shift their software away from DRM by selling some value-add service, frequently in the form of multiplayer play. On the other hand, many game publishers have found success in digital distribution through Steam, a distribution channel tied to DRM that also requires regular online check-ins like Windows. In other words, history has yet to prove either side right.

Windows 7 adds an interesting twist to the question. While music, software, and other media containing controversial DRM are usually consumable entertainment, Windows 7 is an operating system. The DRM software doesn’t control your ability to enjoy any product in particular. It controls your ability to use your computer. It controls your ability to perform any number of functions, both in daily life and in business.

Fortunately, alternatives do exist. Apple is well-known for being equally if not more unfriendly to consumers for their completely pervasive DRM software that extends far beyond just verifying your operating system. And, of course, there’s the long tail containing UNIX, Linux, and other miscellaneous operating systems. Linux is a clear alternative to operating systems containing DRM software. However, again, as history seems to indicate, DRM isn’t a critical factor. Despite the clear-cut difference, that Linux doesn’t share Windows and OS X’s preference for potentially extremely inconvenient DRM, Linux has nowhere near the same market share.

The question of Linux’s market share is very hotly debated. However, it suffices to note that DRM on Windows hasn’t yet pushed a significant number of users to switch operating systems. There are plenty of reasons, and, unfortunately, none of them bode well for those of us who oppose DRM.

One reason is that many users just don’t notice it. While it’s still too soon to say anything about Windows 7’s new measures, Windows Genuine Advantage remained relatively invisible except for the one-time inconvenience when you first install Windows. Another large segment of Windows installations come from businesses, where IT generally shields users from DRM headaches. Time will tell whether these periodic check-ins will be any more visible.

Another reason is the network effect. Since Windows 7 is an operating system and not “just a piece of software”, its attraction lies not so much in its inherent values, but rather in the software users need that is available only for Windows. Two large categories of such software are games and in-house applications used by businesses.

To be clear, I personally dislike DRM and would prefer that Windows 7 didn’t have its new measures. Unfortunately, like the users I talked about, I will continue to use Windows 7. Despite the new features, I have yet to be inconvenienced enough to give up the software for which need Windows 7, and as long as that remains true, Microsoft is going to get away with more than just their new measures.

Software DRM –Winners & Losers: And How to Be A Winner – by “Kai C”

If you are reading this blog right now, you are a victim of DRM. How do I know?

#1 You are reading this blog because you know how to use computers

#2 You are being screwed, if you are honest

There are simply no winners in the DRM battle. Mega-corporations around the world spend millions of dollars to develop sophisticated DRM systems in an effort to protect their works from infringement. Industries endlessly lobby for anti-circumvention laws. All of these efforts end up hurting the companies as much as they hurt the consumers.

I will use Microsoft’s Operating System as a classic example of DRM failure. Microsoft developed one of the most complicated DRM systems called the Windows Genuine Advantage (WGA) program. The program provides technologies that help to determine whether the copy of windows passes product activation and validation as a genuine copy. It has been in use for all versions of Windows since XP. The result of Microsoft’s DRM system? A leet hacker cracked the WGA within 24 hours of its release.

DRM does not prevent illegal use of software, it just makes infringement more difficult. Honestly, I doubt that the WGA developers were so naïve as to believe that no one in the world can crack the system. They just wanted to prevent those without the technical expertise to infringement upon their products. I do believe that there are very few people in the world who has the programming expertise to crack WGA. But, do you think that the person who cracked the WGA just hid the secret in his hard drive? Obviously not, he posted it on the internet, and before you know it, the crack has been propagated to countless hacker wanna-be’s.

It only takes one person to hack DRM, everyone else can obtain it. Hackers love to share their hacked work. Whether it is to display their hacking abilities, or to show their hatred towards corporations like Microsoft, hackers simply do not keep to themselves. However, great news for Microsoft, the average person does not really know about the crack or how to implement it. So most people will still buy Windows at whatever price that Microsoft deems reasonable. But this does not come free of cost.

DRM adds significant cost to the producers and consumers. Microsoft hires very talented (aka very expensive) programmers to create the DRM system. And they constantly update the DRM in response to cracks. But that is just a cat and mouse game that adds on cost for no additional control over infringement. What happens here is that the honest users who buy genuine copies are paying additional cost for Microsoft to develop technologies that attempts to prevent illegal distributions of its products. But Microsoft fails to generate any success in raising revenue.

The DRM system does not change the number of people who would purchase the product. The honest consumers will purchase the product regardless of whether or not DRM exists. And the infringers will always find a way to go around DRM so they will not pay for the software either way. There is a deadweight loss for implementing the DRM system. Those most negatively affected by DRM are people with no intention of acquiring or sharing illegal copies of software. There is a major problem here. DRM is punishing honest users and it is not hurting copyright infringers.

Want to win in this deal? Be a pirate. Unfortunately, it looks like the only winners in the DRM game are the pirates. They are enjoying their software for free, and they are doing so rather easily. There will always be bored smart hackers who want to show off their skills. With the rapid emergence of high-speed internet, file sharing is becoming increasingly easy and convenient. Software companies certainly are not doing the right things to prevent this piracy problem. The prices that the software products are offered are not affordable by majority of personal consumers. As an example, below are three of the most common and overpriced software products offered on the market. Although I am not a lover of the free market, I am a genuine believer. When offered price is greater than bid price, exchange is not going to occur. In the case of software, the alternative path of piracy would be chosen.

Of course I am not actually encouraging people to pirate software. This is a message for software companies to help them prevent piracy. They must accept that piracy is here to stay. It is more important to minimize the scale of piracy. It should be obvious by this point that DRM is definitely not the solution. Pirates will continue their acts by circumventing the DRM. No U.S. congressional law can stop some boy in Norway from reverse engineering his DVD player. And it certainly is not going to prevent anonymous from posting everything that can screw over corporate America. Instead of spending money on developing more secure DRM, it would be wiser to use that fund to develop superior user experience to sell more products to the honest paying customers.

iPad DRM system – by “Brian W”

Steve Jobs has been heard saying that the upcoming Apple tablet “will be the most important thing I’ve ever done.” —Mac Rumors

Apple’s iPad has been the headline quite frequently lately with its forthcoming release in the next few days. One of its biggest criticisms comes from its inability to operate similar to Apple’s full OS. Instead, users are limited to applications approved by Apple available in their iTunes store. In essence, Apple has created a proprietary DRM system which will limit and slow down the evolution of the product. According to Ars Technica “books purchased through the iBookstore will have Fairplay DRM and won’t be compatible with other e-readers.” Apple went through this same exact process with the recording industry a little less than a year ago now. Similar to the iPad, Amazon’s Kindle is also locked up in DRM and unlinke the iPad can’t even make a deal with the publishing industry to allow users to read their texts aloud to them.

The problem with closed systems like the iPad is that it doesn’t allow for true competition resulting in the users suffering the most. What’s to stop—or even incentivize—Apple from allowing Mozilla to offer their browser Fire Fox for the iPad? They have been known to do it in the past and we only need to look to last summer for an example: the Google voice app that was denied. What’s disappointing is that these products could evolve and become more useful at much more rapid rate and in the end it is the consumers who are suffering the consequences. Like Cory Doctorow said, DRM only hurts the honest users, there will always be a group of more advanced users who will work around the system.

The Video Game Industry and DRM – Time for a Change – by “Ryan B”

While the online music industry is shifting away from utilizing DRM, or digital rights management, the video game industry continues to employ restrictive DRM technologies. Although these two industries are certainly not identical, video game companies may have some important lessons to learn from recent changes made by the major music labels.

Over the past couple of years, the major music labels have agreed to do away with DRM restrictions of digital songs sold through online music stores such as iTunes. DRM has proven to be an unsuccessful strategy for the online music industry, failing to stop the piracy of songs while driving away honest consumers who were frustrated by the lack of control they had over purchased music content. The subsequent decision to eliminate DRM restrictions was applauded by consumers, who are now purchasing online music more than ever. The lesson was a simple one: making your consumers happy is a good business move.

This concept, however, seems to have slipped passed some of the leading companies of the video game industry. Three recently released, high-profile games, Assassins Creed 2, Command and Conquer 4, and Silent Hunter 5 have a new form of DRM protection called “always-online DRM” that is frustrating even the most loyal fans of these franchises.


Always-online DRM requires a user to be online at all times in order for the game to run. On the one hand, this allows video game companies to combat piracy by periodically checking that a user is a valid one. On the other, this can create a truly dissatisfying gaming experience for those consumers who have legitimately purchased a gaming title.

For example, if a user is playing EA’s Command & Conquer 4 in single player mode, which does not require an internet connection, they can be booted from the game and lose the progress they’ve made on their mission if their internet connection happens to go out. One reviewer of the game complained that even without losing the connection, “the spectre of catastrophe hung over [his] head like a razor sharp guillotine.” Even worse, if a user happens to be somewhere that lacks internet service, he simply cannot play the game at all.

While always-online DRM might make sense in some future world in which an internet connection is available everywhere with constant reliability, this is clearly not the case today. Instead, always-online DRM punishes the very consumers who are keeping video game companies in business, those who have legally purchased the games. This approach to DRM, which holds combatting privacy above the gameplay experience of consumers, has proven to be incredibly damaging in the past. For example, another EA game, Spore, was released in late-2008 with DRM restrictions that prevented users from installing the game on more than three machines. In addition, Spore required users to verify that their copy was legitimate each and every time they went online. Users became so frustrated with this highly restrictive DRM system that piracy became rampant, landing Spore at the top of the list of most pirated games for 2008.

The lesson here is that video game companies must be sure that they don’t employ DRM technologies that are so restrictive that they end up alienating the very consumers upon which their businesses depend. While doing away with DRM protection entirely may not make sense for the video game industry, keeping consumers satisfied must be prioritized above and beyond keeping pirates at bay. Otherwise, once-loyal customers may end up joining the pirates in droves.

Who’s Responsible for Harassment? – by “Shirley B”

Harassment is no new phenomenon on the Internet.  As astutely stated by Penny Arcade, normal person + anonymity + audience = Total ****wad. (Don’t click if cursing offends!)  But for websites that present a platform for user-generated content, harassment has presented interesting new problems.  Are these websites liable for user content?  Are they simply providers of the platform on which users place content or are they themselves content providers?

Two years ago a Twitter user was harassing a woman named Ariel Waldman over the social networking website.  After submitting a complaint to Twitter, an administrator removed the tweets from the public time line.  However, when Waldman asked that the user be banned, she received a reply that the comments were not illegal, simply malicious, despite the fact that Twitter explicitly lists harassment as a violation of the Terms of Service, and reserve their right to remove content and users in violation of their Terms of Service (though are not obligated to).  Twitter promised to revise its Terms of Service to clarify its enforcement policies, but would do nothing further, for fear of a lawsuit.  Jason Goldman, the product manager for Twitter, stated in a post at getsatisfaction.com that “As a communication utility, Twitter does not get involved in disputes between users over issues of content except in very specific situations. Twitter is a provider of information, not a mediator.”  In the same post, Goldman also stated that the company was working on improving its blocking feature, which could solve the problem of harassment.  Problem solved.  The issue was only with Twitter’s ToS, its enforcement of it, and their insufficient blocking tool.  Not quite.

John Dozier Jr., an expert in Internet law, says that Twitter may have surrendered its safe harbor under the Communications Decency Act when it edited the user’s page, which it did when it removed it from the public feed.  “If they’ve edited content based on their subjective perspective, they put their immunity at risk and virtually their entire online business, because then they’d be liable to defamation claims or anything else that a publisher would,” Dozier says.  What if a website had knowledge of the harassment – had seen it, had watched it continue, and were fully aware of the problems it was causing – but did not take any action?  Could this lack of action, this implicit approval (or at least lack of disapproval) of the content entangle them in the same liabilities that publishers face?  Madeline Rodriguez takes this a step further in her article “Reexamining Section 230 of the CDA and Online Anonymous Speech: Defamation on the Internet and the Websites That Facilitate It.”  She says, “if an ICP [internet content provider], and certainly an ICF [internet content facilitator], has reason to know, or anticipate, that at least some of the postings on their website are defamatory, false, anonymous, annoying, or harassing in nature, then they will be considered a co-author of the defamatory, false, anonymous, annoying, or harassing postings, and just as liable as the original poster, losing their CDA 230 immunity completely, and be subject to full monetary, legal, and equitable damages by an aggrieved party.”  This seems to suggest that Twitter is co-author of the harassing posts, and as a creator, could be at risk of a lawsuit.

Malcolm Coles, a UK blogger who believes that Italy made the right decision in deciding against Google, argues that these Google executives are absolutely responsible for the content published on their website, because they are responsible for the systems that police that content.  While the problem that Madeline Rodriguez presents only seems relevant to cases in which the website owners have actual knowledge of illegal activity, Coles suggests that Google indeed should be able to have actual knowledge of every incidence of illegal activity on their website.  He blames Google for not having an adequate policing system, since the video was taken down two months after it was posted (though only two hours after an official request by the Italian police).  Coles claims that Google facilitated the posting of the content through its negligence, and that it “has ongoing control over that platform” which involves it in content publishing in a way it does not a “camera-maker or tissue-box manufacturer.”

Harassment presents a new problem for user-driven content websites.  It is difficult to find, unlike copyright infringements, often ambiguous, and is obviously a sensitive subject. It also involves publishing original opinions and user-generated content in a way that infringement does not.  While I certainly don’t think that websites such as Google, YouTube, Twitter, or the New York Times (for its comments sections) should be held liable for what others post, it is interesting to look at the fine line between facilitator and provider that these sites are walking in the case of harassment.



Google, Corporate propaganda, and the future of P2P – by “Sebastian P”

Last week, Google and bloggers all over had a fit about this ruling, a ruling in which three Google executives were convicted and sentenced to a 6 month suspended sentence (which is apparently legalese for “you’re wrong, we’re right, still feel free to tour our country”) for violation of Italian privacy laws as a result of a video uploaded onto Youtube that depicted a Down Syndrome Autism (apparently the media got this confused. The media getting something wrong? Could this be a trend?) teenager being taunted and beaten up. Why were people so upset with a ruling like this? Clearly if these people at Google allowed for such an atrocious video to be uploaded, they’re evil individuals who need to be put in jail… right? Well, sure. If they were involved and responsible. However, the uproar stems from just how little involvement these convicted “felons” had. They collectively had no idea the video was uploaded until after it was taken down, no involvement with the uploading process of the video (it’s completely automated on Youtube), and no involvement in the creation of said video.

Are they really at fault? Common sense says no. In fact, common sense questions the legitimacy of the Italian court system after such a ruling.

But wait. A group of individuals convicted for something they had no control over, worked with police to remove specific material, and really were too busy to know of everything that was on their website? Let’s take a look at The Pirate Bay.

When The Pirate Bay Trial took place a year ago, one of The Pirate Bay’s (TPB) stronger legal claims was that they provided a service similar to Google: they indexed the existence of so-called .torrents as a search engine and that the content indexed was unknown to the website’s owners.

An aside: My buddy Mike mentioned that there’s definitely a contingency of people who don’t believe Google and thePirateBay to serve the same function. If you’re in that contingency (or if you’re not, but feel the need to click on URLs anyway), check out thePirateGoogle.com (EDIT#2: Seems as though part of the website’s Google script functionality goes down once in a while. Wonder why. If you want to try the same functionality of thePirateGoogle, preface your search keywords with the phrase “filetype:Torrent”).

ThePirateGoogle
Because if thePirateBay had just changed their name we wouldn't have any problems...

Additionally, TPB had no involvement in the creation of said files (legal or illegal), no involvement in the uploading of said .torrent file (it’s automated as well), and cooperated with the police when asked to take down explicitly illegal material for which they had proof of (Sweedish Police + Child Porn + Pirate Bay The Tagline is right. It’s really much a do about nothing).

Sounds a lot like what Google is having fits about. So when Matt Sucherman, Vice President and Deputy Legal Counsel for Google says, “Common sense dictates that only the person who films and uploads a video to a hosting platform could take the steps necessary to protect the privacy and obtain the consent of the people they are filming,” doesn’t it indicate that common sense dictates that only the person who films and indexes their illegal movie recording on an search engine platform could take the steps necessary to protect the privacy and obtain the consent of the movie producers who made the original film? I contend common sense does indicate that.

So why then does the public view Google so favorably, yet view services such as thePirateBay as demonic?

Misinformation: The Prosecution’s Strongest Argument

In October of 2007, Alan Ellis, a 24-year-old man from Middlesbrough in the United Kingdom was arrested, his computers seized, and then questioned for many hours. This man was the creator of OiNK, which according to the BBC was an “extremely lucrative” website that:

“The site allowed the uploading and downloading of pre-release music and media to thousands of members.”

An IFPI spokesman said: “Once an album had been posted on the OiNK website, the users that download that music then passed the content to other websites, forums and blogs, where multiple copies were made.

“Within a few hours of a popular pre-release track being posted on the OiNK site, hundreds of copies can be found further down the illegal online supply chain.”

Oink
Oh Oink... You're still missed by music lovers everywhere

Now I love the BBC, almost as much as I love NPR (seriously. Great, rather unbiased news sources). But I jumped out of my chair when I read this in class during my junior year in high school. I knew then what others know today: All that stuff is wrong.

Let’s go down the list of things wrong with that IFPI statement:

  1. OiNK was extremely lucrative.

By far one of the funniest claims. OiNK wasn’t making any money. In fact, for most months, it was losing money (not losing a lot of money, but definitely losing money). There were no ads on the website, so you couldn’t make the argument that he received ad revenue. So the only real “income” source that OiNK had was that pink donate button in the upper right hand corner. If someone has a business plan that’s rooted in an unintrusive donate button (that’s about 400 pixels in size and found on only some pages of a website in the upper right hand corner) that’ll be extremely lucrative, please e-mail me. I’d love to start a business with you.

2. OiNK uploaded pre-released tracks and distributed it them to hundreds of websites.

So funny thing about this claim. OiNK actually had a strict terms policy that demanded high quality music found in album form only. Note a couple of things. A) High Quality and B) album form only. The problems with that claim about the pre-release track is three-fold: For anyone who rips music into MP3, it’s hard getting  a high quality rip unless you have the actual medium (IE the CD). Second, because of the stipulation for high quality music, pre-released music that comes from a non-traditional medium (IE leaked by an insider), would not have received the final remastering that most music goes through, thus would not meet the quality standards of OiNK. Lastly, if OiNK stipulates that only Album torrents be shown on the website, how would single pre-release tracks be blamed on OiNK?

These two things are among many facts that spread to the general public by IFPI through legitimate new sources, but were grossly inaccurate. So inaccurate that Alan Ellis was A) released from prison after hours of testimony on how his software worked and B) found unanimously innocent by the courts on January 15, 2010, 2 years after the IFPI heralded a great triumph for the music industry.

In the OiNK story, you find a tactic the music and movie industry used by the industry: Corporate propaganda. Whatever, you call it, this misinformation severely hurts potentially innocent case-law, especially in a jury trial. For laws involving such technologically sophisticated mechanisms such as BitTorrent, how would any even-minded, yet unbiased individual differentiate between the facts and the lies?

They don’t. Or rather, it’s very hard to. This same misrepresentation of technology information happened during The Pirate Bay trial as well. The evidence presented by the prosecution during day 5, in which evidenced previously unshared with the defense that depicted inaccuracies in the sharing of files (they had a screenshot of a client, yet no information that explicitly links the material to thePirateBay among other things), exemplifies this discrepancy. If the jury/judge doesn’t understand how tracker information works, how would the defense respond correctly? It becomes increasingly difficult to. Thus, the prosecution gains the advantage for doing such a thing.

When cases such as Alan Ellis are broadcasted as a triumph of good vs. evil, but hold factual inaccuracies, what’s the file sharing website to do? When the court doesn’t understand how magnet linking through bittorrent clients don’t involve the tracker host (FYI, they don’t), how do bittorrent trackers claim safe haven? OiNK is dead and it won’t be back despite the fact Ellis was found innocent. When organizations such as the IFPI gain such an advantage to misrepresent specific facts or to simply tackle cases knowing individuals lack technological knowledge, we all lose.

What the future holds:

“Experts” from all over will tell you that the death of MiniNova means this for P2P and that the verdict of thePirateBay case will mean that for file-sharing, but in reality, nobody’s really sure.  P2P is a magnificent tool for sharing information. Clearly, too much information for many music and movie industry advocates. However, through all of this some facts remain clear: Peer to Peer networks provide a valuable resource in terms of crowd-sourcing bandwidth consumption. Gaming companies such as Blizzard have been doing this for years now (Case in point: If you have millions of people trying to update their World of Warcraft clients with a file that’s a few hundred megabytes, you’d use a form of bittorrent too). Twitter has also turned to Bittorrent as a method of managing their bandwidth.

I’m of the personal opinion that legal methods always seem to pre-empt illegal concerns. As the Sony vs. Universal Case showed with VCRs, generally positive uses out shadow the negative ones. Sure, business structures change, but that’s all part of how the world works.

-Sebastian

Leaking Through the Cracks – by “Michael C”

Last week, the Federal Trade Commission (FTC) notified close to 100 companies that their employees have been sharing sensitive customer and employee data on P2P file-sharing networks. The FTC did not release the list to the public, but FTC chairman Jon Leibowitz stated that “companies and institutions of all sizes are vulnerable to serious P2P-related breaches, placing consumers’ sensitive information at risk,” so it is quite possible that some bigger companies were affected, especially those who have many employees who all use computers.

In recent years, with more companies distributing laptops instead of desktops to employees, the problem has grown worse. Users can now take their work home with them, and are therefore more likely to mix their business and personal lives on the same computer, installing file-sharing programs to download their favorite songs, for example. After installing these programs, users are asked what folders they would like to share, and it’s easy for a casual user to breeze through this dialogue, accidentally selecting their documents folder containing all of their (and the company’s) sensitive files.

LimeWire share folder selection
LimeWire share folder selection

This problem has actually become so common that there are “cybercrime gangs” that are dedicated to searching P2P sites to obtain sensitive documents. In their investigation, the FTC reported that they easily found everything from financial records to social security numbers, perfect for use in an identity theft. To test this, I fired up LimeWire, clicked on “documents” (in the search categories) and typed in “taxreturn.pdf.” Sure enough, after only a few seconds, I was able to download someone’s electronic tax return (completed in TurboTax), complete with financial information and social security number! After my experiment, I had no doubts in the FTC’s claims.

Searching LimeWire for taxreturn.pdf
Searching LimeWire for taxreturn.pdf
The downloaded tax return
The downloaded tax return (redacted by me)

The FTC has been pushing for tighter regulation of P2P software for years. They are in favor of legislation that requires P2P file-sharing programs to provide clearer notice about what files are being shared, and make sure that consent is obtained to share those files. Many industry watchers see P2P traffic growing exponentially (by some estimates, up to 400%) in the next few years, so the problem will only get worse. To address this, the government has finally acted—H.R. 1319, or the “Informed P2P User Act,” has been passed by the House and is currently being reviewed by a Senate committee. It would let the FTC place civil penalties on the P2P program distributors who do not meet a certain standard of providing “clear and conspicuous notice, in advance” to users about what specific files and folders the P2P program will share, and obtaining consent from the users before sharing those files on the public P2P network. There is also another bill being reviewed by Senate committee, H.R. 4098, or the “Secure Federal File Sharing Act,” which would require the government to issue rules regarding the use of P2P software by government employees, the people who are likely to have confidential information on their computers.

The issue of accidentally sharing confidential files via P2P has existed for a long time, probably since the advent of Napster. Yet, over ten years later, the Senate is only now considering legislation to make P2P programs safer. Why the delay? It seems like the government ignored the problem for a long time due to the illegal nature of P2P. Perhaps they felt that by creating legislation regarding P2P file sharing, they would be legitimatizing these programs. At this point, however, it is clear that P2P file sharing is not going anywhere anytime soon, and it has become mostly accepted in our society. Therefore, I’m glad that the government is taking steps to make P2P software more secure, rather than just shoving the problem under the rug and hoping that it goes away.

P2P, Piracy, and other things – by “Matt A”

A comparison of battery consumption between two individuals.

Peer-to-peer networks have come under a lot of fire over the past few years. Some of them have been able to slide under the radar by being very selective about their members, others have faced serious litigation, and a few have won their battles by squirming into the light of the DMCA’s safe harbor. One thing that hasn’t changed, however, is the technology. BitTorrent clients are freely available for download, and can be found easily with just minimal effort. P2P use scales beautifully: the more people using the service, the faster the downloads. And ever so slowly, its beginning to catch on as more and more legitimate means for distribution. Twitter is launching a new service based on BitTorrent technology to help lower the downtime on their central servers; instead of sending out updates to their various servers world-wide and rely on a lengthy direct download process, they will be using their servers as seeds in their own private swarm (it should also be noted that this project is named Murder for the flock of crows, not premeditated homicide). While this doesn’t involve the public as direct seeders, it still is a very valuable look at the legitimacy of P2P downloads. Another example, and indeed one of my favorites, is that of World of Warcraft, which has been using P2P technology to deliver its content for years. Granted the system isn’t ideal (it only seeds while downloading to avoid posing any undue bandwidth issues during play) and trying to deliver half a gigabyte of information to over 13 million people (or whatever the current number is) simultaneously without dedicated seeders upon completion isn’t the ideal system, but it improves download speeds regardless.

Society will find a way to fill its needs.

Now lets talk about piracy a little bit. Piracy has been intimately connected with P2P ever since it strolled out into the daylight. Lots of people with the same idea in mind using software that connects them, with the added benefit that the more connected they are, the faster their downloads? A match made in heaven. But P2P and its use for file-sharing runs into some moral boundaries and arguments. Is file-sharing a new distribution method or just plain stealing? Is it fighting the powerful ‘evil’ corporate machine or killing music and creativity? Then the economics arguments come in. Music can’t work this way, it will never happen! Or, music is a cultural phenomenon, it won’t respond to market forces. But this isn’t true. Economics works as it always does.

Digitalizing creates an ‘infinite supply’ (perhaps limited only by your bandwidth) and drives costs of production to near zero (or in terms of bandwidth, rent-sharing occurs when downloaders provide the bandwidth through seeding), then the price at which individuals are willing to purchase it becomes zero. Economics says free music is the way to go, its just an ugly/frightening answer for some. I agree that free music can’t work, or at least completely free music. People talk about Pandora (which I consequently love) and Last.fm, but until a reliable wireless network can stream it to me wherever I want, then this cannot be a replacement. The best approach I have seen thus far is the EFF’s. In a nutshell, utilize the technology that is already here, utilize the systems that are already in place, and charge an amount that people are willing to pay. Society will fill its needs in whatever way necessary, even if its illegal. To avoid piracy, simply provide that same service at a reasonable price. Legalize a system, and then constrain it to fit a model. Use P2P for distribution and hosting, allow members to upload what they want, and use share ratios for ‘benefits’ or some small form of currency. Monthly fees will be paid to copyright holders based on their files’ popularity over the payment period, making it a merit based system. People may scoff or freak out, but this is the same system we have for cable television. Or internet subscriptions. Or satellite radio. Or libraries (well, mostly). It isn’t revolutionary, its a natural progression. The music industry (artists, etc) will be outsourcing its hosting efforts to its consumers, and be getting paid for it. Consumers can pick the right package for them, maybe they want infinite downloads at a higher price, or a set amount of data. There are plenty of ways to make the system work well, but no one wants to take a chance.

P2P technology isn’t running away, and neither are the music industry’s problems. Piracy is a natural approach to filling society’s unmet needs. Fill the needs with a system that cuts production costs, turns your consumers into producers and distributors, and gain back a significant market share.

Just when pirates thought that leaving the open sea meant safety.

Cultural [Re]Mediation: Evolving Reading Practices in the Digital Humanities – by “Brendan S”

I thought I would use this week’s blog post to give a rundown on some of the things I learned this past weekend at the “Past’s Digital Presence” Conference on the digital humanities which took place at Yale. I was lucky enough to be there all day recording video of the conference, and got to see almost a dozen presentations; several of them are, I think, quite relevant to themes we’ve been discussing in this course.

On a broad level, the conference was concerned with questions such as access to information, methods of sharing and analyzing culture, and our evolving roles – as researchers, librarians, readers – in consuming via these new methods. I’ll focus here on two of the talks, both of which fell under the session on “Evolving Reading Practices,” and dealt with how new technologies are altering how we interact with creative works via the Internet – particularly relevant to the topic of gatekeeping and online intermediaries,

Patrick Redding – “Viral Meters: Reading Frank O’Hara on YouTube”

In this talk, Redding talks about how digital media can blur the distinction between primary and secondary sources. Digital texts are mobile, and mutate frequently; we frequently interact with digital facsimiles and annotated hypertexts. In many cases, in fact, our initial interaction with a text is not in the traditional form of a book, paper, or film, but rather with text as multimedia hybrid. He illustrates these points through an analysis of various adaptations of and responses to Frank O’Hara on YouTube, presenting us with new ways of imagining traditional poetic concepts.

Redding presents five videos as examples. The first is a high school teacher’s take on “Having a Coke With You,” in which the teacher has inserted Google-imaged photos in order to provide students with visual context for concepts in O’Hara’s poem that might be unfamiliar.

The second, “As Planned,” incorporates music, type, and motion graphics to create not only a visualization of the poem, but also a visual reading, interpreting aspects of the poem such as its tone and syntax through visual forms. Third is “Lana Turner Has Collapsed,” a poetic riff on the mashup genre, set to a Nirvana song (a quick YouTube search turned up one with Madvillain as well). The last two are produced by independent filmmaker Joseph Fusco, and provide two very different interpretations of the same poem; the narrator, background music and visuals actually change the meaning of the piece.

(Here are the other three.)

I would guess that most (if not all) of these videos, are technically in violation of at least one copyright, but none has enough views to merit bothering with a takedown notice; it’s likely anyway that the copyright owners either aren’t even aware that these videos exist, or recognize their utility and cultural significance. Since none of the videos are direct, unaltered copies of creative work, each adds a new level of interpretation or understanding to O’Hara’s poetry, and even the songs fall under a loose definition of fair use, I can’t see any incentive for a copyright holder to want one of the videos removed. However if YouTube (through some hypothetical new technology) were to start preemptively identifying every case of infringement, it’s more than likely that videos such as these would get taken down for no good reason.

Rachael Sullivan – “Dickinson Meets DoubleClick: Remediating Poetry”

Sullivan’s talk was particularly interesting to me because it looked at how texts (in this case, literature) are altered not only by how they’re displayed and accessed online, but also by their context. Sullivan elaborates on two aspects of literacy in the digital age – immediacy, the act of looking at the text; and hypermediacy, in which the text is mediated by external elements. One of the most prominent among these external influences is online advertising.

DoubleClick (now a Google subsidiary), Google’s own AdSense, and other services provide targeted advertisements to many websites, including online repositories of literature and poetry such as Bartleby.com. The challenge that arises when looking at poetry online in this context is sifting through the “noise” that distracts from the text. In addition to advertisements surrounding a poem, for example, and influencing its reading, advertisements are sometimes even hyperlinked to words within the text itself, creating a potentially unreliable version of the text. Of course, this is not an altogether new issue – there are discrepancies in manuscripts vs. typeset poems, and a history of advertisements or other contextual influences in printed texts. But with the proliferation of digital media we’re seeing an exponential expansion of possibilities for remediating a text; with everything hyperlinked and searchable, practically nothing exists in isolation anymore.

The omnipresence of Google, through which it sometimes feels the whole Internet is filtered, raises many questions about the influence of online advertising in how we navigate and consume content. Advertising is of course Google’s bread and butter; everything from run of the mill search results to YouTube videos to maps and news are dished up to us alongside a healthy slough of linked advertising. I’m not sure to what extent this actually influence our online behavior, given that we’re so desensitized to ads that we hardly notice them anymore. Besides, Google’s ads are about as innocuous as they come, a far cry from pop-up cascades and insidious spyware.

Sullivan may appear to be overstating the significance of this particular way of remediating texts, but the questions she raises are worth thinking about, if only to develop a more conscious awareness of the Internet’s effects on how we read. The texts in question aren’t just poetry, but everything we interact with online – and the mediating elements are not confined to ads, but include complicated systems of hyperlinks connecting information in an untold number of ways. Intermediaries such as Google have a profound impact on how we navigate the web, not only through advertising, but most fundamentally through the search and ranking algorithms themselves.

Friend or Foe – by “Reynolds H”

Snake

The main issue with the myriad of user generated content sites(Youtube, Vimeo, etc) are that they offer a highly efficient network for the use and spread of copyright infringing content, obviously. The entire Viacom vs. Youtube lawsuit is based upon Viacom’s belief that Youtube, as a business, benefits from the availability and use of infringing content on the website. Viacom is pursuing Youtube on the basis that they are failing to adhere to the criteria for protecting under Act § 512, complaining that Youtube is neither “act[ing] expeditiously to remove, or disable access to, the material” nor “not receiving a financial benefit directly attributable to the infringing activity”. Viacom claims that Youtube has not put enough effort and technology into making sure that unlicensed copyrighted content is removed from the site. That is why, in the midst of a legal battle, the timing of Youtube’s revelation of the beta version of their new Video and Audio Identification software is so beautifully bratty.

Like a stubborn middle schooler, who only wants to do it their way, Youtube, after being sued, is taking a step toward efficiently handling infringing content. However, they want to make it know that they don’t have to do it. In a recent blog post, Youtube product manager, David King stated that the new Video and Audio Identification “goes above and beyond our legal responsibilities”. But like a stubborn middle schooler, Youtube’s creation may prove to further the reach of the copyright “take-down” abusers, they are currently fighting in court.

Youtube’s Video Identification uses copyright owner submitted material as a template for an automated system which matches the audio and/or video to user uploaded content. When matches are found, copyright owners have the option to block that content, track that content, or monetize the content. Youtube has essentially given greedy copyright owners an easy system to enact frivolous takedown’s on any videos that have any semblance to their copyrighted content. The idea of the software is justifiable and obviously the monetary motivation is at the heart of the system., Video Identification allows for copyright owners to, in effect, license their content to Youtube for monetary return. The system also allows Youtube to take a backseat to takedown claims, giving full onus to the system and the copyright owner. However this passive stance provides the opportunity for the unbridled abuse of the system. With what seems like little room for appeal from the user, the software deals a serious blow to any petitions of fair use. At the heart of the Lenz v. Universal case was how Universal was not acting in “good faith” and did not consider the application of fair use when it issued a takedown notice for her “use” of Prince’s “Lets go crazy”. This new software may take takedowns to an even further level. Imagine the potential of this software. What if a video is posted of a car ride conversation, which happens to involve the background car radio playing a famous song. This software potentially has the power to take match that background song, which has nothing to do with the video itself, and issue a takedown at the will of the copyright holder. Takedowns could begin to be issued even more frivolously than ever before, all while allowing the full burden of “good faith” and fair use consideration to rest on the shoulders of Youtube and its new software.

It will be interesting to see how Youtube chooses to implement this new technology. According to its website, this new software will make money, increase fan interaction, reduce infringement, and provide market data. With the rapid increase in ads, iTunes plugs, increase in competition, and a deal with Universal resulting in the creation of Vevo (Youtube’s music video channel), hopefully money making is still second to the users on Youtube’s priority list, but if not this may be the end of Youtube’s reputation as a place to “Broadcast Yourself”, hurting itself in the long run.