this post was submitted on 02 Dec 2023
772 points (93.1% liked)

Technology

60074 readers
3240 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] [email protected] 7 points 1 year ago* (last edited 1 year ago) (1 children)

Yupes.

Their trickery was to make the distribution of "circunvention software" the illegal part, so that common people would be unable to exercise their fair use "rights".

Per that Law "anybody" can legally exercise their "fair use" rights so long as they have the technical expertise to code themselves the software to do so since per the very same Law nobody can distribute said tools.

So the Law de facto makes it illegal for everybody but a fraction of a percent of people who know how to code that specific kind of thing to rip their own DVDs.

In practice the only way to exercise one's fair use "rights" is if somebody else has broken the Law and distributed a tool to allow those who do not have quite a rare set of expertises and lots of time in their hands to code their own tools, to exercise said "right".

This is one of the slimiest Tech-related Laws ever passed.

[โ€“] [email protected] 5 points 1 year ago

My favourite: https://www.wikipedia.org/wiki/Illegal_number

An illegal prime is an illegal number which is also prime. One of the earliest illegal prime numbers was generated in March 2001 by Phil Carmody. Its binary representation corresponds to a compressed version of the C source code of a computer program implementing the DeCSS decryption algorithm, which can be used by a computer to circumvent a DVD's copy protection.[14]