Unlocking the iPod – Great Fair Use Article

Robert Levine:

Sometimes, however, the things Johansen tries to improve were made a certain way for a reason. When he was 15, Johansen got frustrated when his DVDs didn’t work the way he wanted them to. “I was fed up with not being able to play a movie the way I wanted to play it,” that is, on a PC that ran Linux.

To fix the problem, he and two hackers he met online wrote a program called DeCSS, which removed the encryption that limits what devices can play the discs. That meant the movies could be played on any machine, but also that they could be copied. After the program was posted online, Johansen received an award from the Electronic Frontier Foundation – and a visit from Norwegian police.

Johansen, now 22 and widely known as “DVD Jon” for his exploits, has also figured out how Apple’s iPod-iTunes system works. And he’s using that knowledge to start a business that is going to drive Steve Jobs crazy.

A disruptor
If you want to be specific – and for legal reasons, he does – Johansen has reverse-engineered FairPlay, the encryption technology Apple (Charts) uses to make the iPod a closed system. Right now, thanks to FairPlay, the songs Apple sells at its iTunes store cannot easily be played on other devices, and copy-protected songs purchased from other sites will not play on the iPod. (The iPod will play MP3 files, which do not have any copy protection, but major labels don’t sell music in that format.)

The Information Factories

George Gilder:

This change is as momentous as the industrial-age shift from craft production to mass manufacture, from individual workers in separate shops turning out finished products step by step to massive factories that break up production into thousands of parts and perform them simultaneously. No single computer could update millions of auctions in real time, as eBay does, and no one machine could track thousands of stock portfolios made up of offerings on all the world’s exchanges, as Yahoo does. And those are, at most, terascale tasks. Page and Brin understood that with clever software, scores of thousands of cheap computers working in parallel could perform petascale tasks – like searching everything Yahoo, eBay, Amazon.com, and anyone else could shovel onto the Net. Google appears to have attained one of the holy grails of computer science: a scalable massively parallel architecture that can readily accommodate diverse software.

Google’s core activity remains Web search. Having built a petascale search machine, though, the question naturally arose: What else could it do? Google’s answer: just about anything. Thus the company’s expanding portfolio of Web services: delivering ads (AdSense, AdWords), maps (Google Maps), videos (Google Video), scheduling (Google Calendar), transactions (Google Checkout), email (Gmail), and productivity software (Writely). The other heavyweights have followed suit.

How HP Kept Tabs on a Wall Street Journal Reporter

Pui-Wing Tam:

Unbeknownst to my family and me, someone was scoping out our trash earlier this year — someone hired by Hewlett-Packard Co.

The trash study was carried out in January by Security Outsourcing Solutions Inc., a Needham, Mass., investigative firm that H-P employed, according to a briefing H-P officials gave me yesterday. Whether the sleuths ever encountered my toddler’s dirty diapers, H-P said it doesn’t know.

I learned this — and more — as I sat in a conference room at H-P’s outside law firm yesterday in San Francisco, where attorney John Schultz ran through a litany of snooping tactics H-P’s agents used against me as part of its effort to identify which of its directors might be leaking news to the press. For around a year, Mr. Schultz told me, H-P collected information about me. H-P’s investigators tried at least five times, he said, to get access to my home-phone, cellphone and office-phone records. In several instances, they succeeded: H-P now has lists of calls I made to people such as my editors, my husband, my insurance company and a reporting source employed by one H-P rival.

H-P’s agents had my photo and reviewed videotaped footage of me, said Mr. Schultz, of the law firm of Morgan, Lewis & Bockius. They conducted “surveillance” by looking for me at certain events to see if I would show up to meet an H-P director. (I didn’t.) They also carried out “pre-trash inspections” at my suburban home early this year, Mr. Schultz said.

The Politics of Electronic Rights

Lessig:

echWorld (a UK publication) has an article about a “leaked” letter from the Initiative for Software Choice (ISC) (apparently MSFT funded) about, as the article puts it, the “potentially dire effects if too much encouragement was given to open source software development.”

Nothing weird there. What is weird is, first, that such a letter has to be “leaked” (aren’t submissions to the EC a matter of public record?), and, second, the way in which the letter is made available on the TechWorld website. TechWorld gives you a link to the letter. The link states: “You can view the entire letter here.” And indeed, the link means what it says. You can ONLY view the letter. The PDF is locked so that it can’t be printed.

Website Tracks 911 Calls

John Cook & Scott Guitierrez:

ohn Eberly wasn’t looking for controversy. The 31-year-old Ballard resident just wanted a better way to track the whereabouts of fire trucks and emergency vehicles in the city, a service he said could help people avoid traffic bottlenecks, protests or dangerous situations such as gas leaks.

For the past year, Eberly has operated Seattle911.com, a Web site that until this week took real-time feeds of 911 calls from the Seattle Fire Department and plotted them on Google Maps. The site developed a cult following, with up to 200 unique visitors per day. The Seattle P-I incorporated the service into its Web site.

…….

Schneier, the security expert, says the Seattle Fire Department’s decision raises an interesting social question about the use of public information. He said it is the same issue as posting political donations or property records on Web sites.

“What the Fire Department is saying, which is interesting if you think about it, is that we are going to rely on the inconvenience of automating this to give you privacy,” Schneier said. “The government is not saying, ‘Hey, this data needs to be secret,’ they are saying, ‘This data needs to be inconvenient to get to.’ “

Our Federal Tax Dollars (and politicians) at Work: Intrastate Internet Gambling OK, but other Internet Gambling is Not

Cringely:

Last Saturday the United States Congress passed a port security bill that carried an amendment banning Internet gambling. This was a huge mistake, not because Internet gambling is a good thing (it was already illegal, in fact), but because the new law is either unenforceable or — if it can be enforced — will tear away the last shreds of financial privacy enjoyed by U.S. citizens. The stocks of Internet gambling companies, primarily traded in the UK, went into free-fall as their largest market was effectively taken away. I don’t own any of those shares, but I guarantee you they will fully recover, which is part of what makes this situation so pathetically stupid.

Ironically, many of the senators who voted for this legislation may not have even known the gambling bill was attached, since it didn’t appear in the officially published version of the port bill. But such ignorance is common in Congress, along with a smug confidence that people and institutions can be compelled to comply with laws, no matter how complex and arcane. The amendment was a surprise late addition, pushed by Senate Majority Leader Bill Frist, who has presidential ambitions and reportedly sees this battle against Internet gambling as part of his eventual campaign platform.

Only the new law isn’t really against Internet gambling at all, since it specifically authorizes intrastate Internet gambling, imposing on the net the artificial constraint of state boundaries. So the law that is supposed to end Internet gambling for good will actually make the practice more common, though evidently out of the hands of foreigners, which in this case includes not just operators from the UK but, if you live in South Carolina as I do, it also includes people from Florida and New York. Let a million local poker hands be dealt.

What the new law actually tries to control is the payment of gambling debts through the U.S. banking system, making such practices illegal (except, of course, for intrastate gambling, which probably means your state lottery). Once President Bush signs the bill, your bank and credit card companies will have 270 days to come up with a way to prohibit you from using your own money to pay for gambling debts or — though far less likely– to keep you from receiving your gambling profits. The law covers not just credit card payments but also checks and electronic funds transfers.

Congressional and Senate votes here. Tammy Baldwin voted yes as did Russ Feingold and Herb Kohl. It would be interesting to know if any of them were aware of what was in this bill.

RFID Tags in Your Passport

Bruce Schneier:

If you have a passport, now is the time to renew it — even if it’s not set to expire anytime soon. If you don’t have a passport and think you might need one, now is the time to get it. In many countries, including the United States, passports will soon be equipped with RFID chips. And you don’t want one of these chips in your passport.
RFID stands for “radio-frequency identification.” Passports with RFID chips store an electronic copy of the passport information: your name, a digitized picture, etc. And in the future, the chip might store fingerprints or digital visas from various countries.

Broadcast Flag & Indy Media

Kevin Marks raises some great issues in his review of Apple’s iTV announcement:

Reading Paul Boutin’s coverage of Apple’s video announcements today, There are several questions that come to mind (and I know Jobs prefers not to answer questions).

[..]

In other words, will it play HD content made by independents cleanly, or will it require broadcast flag handshakes?