Pages
Friday, December 22, 2006
French court: privacy more important than copyright
Cost analysis of Vista DRM
"Executive Summary
-----------------
Windows Vista includes an extensive reworking of core OS elements in order to provide content protection for so-called "premium content", typically HD data from Blu-Ray and HD-DVD sources. Providing this protection incurs considerable costs in terms of system performance, system stability, technical support overhead, and hardware and software cost. These issues affect not only users of Vista but the entire PC industry, since the effects of the
protection measures extend to cover all hardware and software that will ever come into contact with Vista, even if it's not used directly with Vista (for example hardware in a Macintosh computer or on a Linux server). This document analyses the cost involved in Vista's content protection, and the collateral damage that this incurs throughout the computer industry.
Executive Executive Summary
---------------------------
The Vista Content Protection specification could very well constitute the longest suicide note in history.
Introduction
------------
This document looks purely at the cost of the technical portions of Vista's ncontent protection. The political issues (under the heading of DRM) have been examined in exhaustive detail elsewhere and won't be commented on further, unless it's relevant to the cost analysis. However, one important point that must be kept in mind when reading this document is that in order to work, Vista's content protection must be able to violate the laws of physics,
something that's unlikely to happen no matter how much the content industry wishes it were possible. This conundrum is displayed over and over again in the Windows content-protection specs, with manufacturers being given no hard-and-fast guidelines but instead being instructed that they need to display as much dedication as possible to the party line. The documentation is peppered
with sentences like:
"It is recommended that a graphics manufacturer go beyond the strict letter of the specification and provide additional content-protection features, because this demonstrates their strong intent to protect premium content".
This is an exceedingly strange way to write technical specifications, but is dictated by the fact that what the spec is trying to achieve is fundamentally impossible. Readers should keep this requirement to display appropriate levels of dedication in mind when reading the following analysis"
Wonderful.
Thursday, December 21, 2006
No place like home
Free copies of Gore's Incnovenient Truth for teachers
"when Laurie David, the producer of the global warming documentary "An Inconvenient Truth," narrated by former vice president Al Gore, wanted to distribute 50,000 copies to schools across the country, the National Science Teachers Association said it wouldn't help her...
Gerry Wheeler, the executive director of the National Science Teachers Association, said he would put global warming at or near the top of the list of must-teach subjects, along with the science of HIV/AIDS.
In an interview, Wheeler said David had asked for an endorsement of the film, as well as its distribution, and that would have violated the association's rules. David said she asked only for distribution help and would have been happy to have the association include a note explicitly stating that it was not endorsing the movie."
Whatever the cause of the disagreement between David and the teachers association it's good to see the DVDs will still get distributed.
ARCH have moved
"The NHS's ill-starred computer project is in the news again. After polls showed that most doctors and patients oppose a compulsory national database of medical records, health minister Lord Warner produced a report on Monday and promised an opt-out. But don't break out the champagne yet. The report was cleverly spun; hidden in an appendix is confirmation that you can opt out of the Summary Care Record, but not the Detailed Care Record.
The first is merely a synopsis for emergency care. It will have your current prescriptions, and will say, for example, whether you are diabetic. But ministers are not offering an easy opt-out from the second - the database replacing your current GP and hospital records. They plan to "upload" your GP data over the next year or two to a regional hosting centre run by a government contractor. The data will initially remain under your GP's nominal control but, after hospital records have been uploaded too, the chief medical officer will be the custodian of the whole lot.
Your "electronic health record" will be used for many purposes, from cost control through audit to research. So the Home Office plans to use health data to help predict which children are likely to offend (despite a recent report to the information commissioner that collecting large amounts of data on children without their parents' consent will probably break human rights law)."
High Court rule against Home Office gagging order
FoI junkies should read the decision in full, the crux of which is contained in paragraphs 36 to 44. Someone made a data subject request to the Home Office and, not satisfied with the response, then complained to the Information Commissioner. The Commissioner's office then engaged in a protracted exchange of letters with the Home Office, extracts of which are provided in the decision. When it became clear to officials that their fencing wasn't disuading the Assistant Commissioner, they got David Blunkett to sign a gagging order. Next step the Information Tribunal where the government argued, as I understand it, that the Information Commissioner had no right to appeal Mr Blunkett's "section 28" gagging order. The Tribunal disagreed and quashed the section 28 certificate.
The government then basically made the same argument to the High Court i.e. that the Information Commissioner had no right to question the Home Secretary's decision to issue a section 28 notice on national security grounds:
"Exemption from disclosure either is or is not required for the purpose of safeguarding national security. Accordingly, if it is exempt from disclosure the Commissioner has no powers which he can exercise under Part V, and accordingly has no function to perform in relation to those powers which could entitled him to second guess a Ministerial Certificate."
Mr Justice McKay, like the Tribunal, rejected this notion, concluding that section 51 of the Data Protection Act:
"entitles, if not requires, the Commissioner, if he considers it appropriate, to "check" (to use the language of the Directive) whether an exemption under section 28 has been properly claimed. If it has not, it is a necessary corollary that the data controller has not "observed" the requirements of the Act. He has failed to give the data subject access to material which is not exempt by reason of section 28. As the Tribunal has said, the consequence is that the Commissioner is entitled to seek to satisfy himself that the material is indeed exempt under section 28. The claimant can then decide whether the material can be disclosed to the Commissioner without that disclosure damaging national security."
It's an interesting and potentially worrying result for a government currently engaged in efforts to undermine the transparency facilitated by the Freesom of Information Act. I have no idea whether there were real national security issues at stake in this case or not and that is a question to be determined by further proceedings. But in principle it has to be correct that the Commissioner has the right to check the exercise of arbitrary power, does it not?
Linking to copyright infringement
"It's important to appreciate the limitations of this decision. On repeated occasions in recent times, judges of the Australian federal court have emphasised that whether a person is authorising infringement is a highly fact-dependent issue. That is, the judges say that it is a case-by-case analysis, and they really mean it. As I said at the time that the first instance judgment was handed down, just because a judge holds in this context that linking is authorisation of infringement, doesn't mean that linking in another context will be authorisation.
In other words, context is all.
In this Cooper case, you have to remember that Cooper:
- Set up a website visited by hundreds of thousands of people
- Set it up with the quite apparent aim of (a) allowing upload of links to MP3s, automatically, and (b) ensuring people could easily search for, and find, mp3 files they wanted
- Set it up to have lists constituting the Australian, UK, Billboard and other charts
So far as internet users and remote website operators were concerned, the website was in substance an invitation to use the hyperlinks provided and to add new links in order that sound recordings could be downloaded from remote websites, and a principal purpose of the website was to enable infringing copies of the downloaded sound recordings to be made.
That is what was held to be infringement by authorising - not just a blog with a single link to something unauthorised. It's closer to US-style Grokster-style inducement analysis (at least as outlined in the more sophisticated judgment of Kenny J) than a general ban on linking.
So when you see a quote like this:
"We don't make any distinctions between big websites or small websites", [the spokesman for Music Industry Piracy Investigations (MIPI)] said, adding that MIPI would consider individual blogs on a "case-by-case basis as to whether it would be appropriate to take action".
Ms Heindl's message to Australians is clear: "If you are linking to copyrighted material in an unauthorised fashion, then you can be held liable for copyright infringement."
You need to take it with a grain of salt. As I said. Context is all.
That said, I stand by my criticisms of yesterday. "
Wednesday, December 20, 2006
Post Office People
We should, however, remember that there are still thousands of truly dedicated people working for the organisation and doing a great job in spite of the things that have been visited upon them by government, media and management.
In a classic illustration of how things get done when people care, I recently received an important parcel which had the wrong address and postcode on it. In fact the only things that were correct on the parcel were my name and the number of the house. Yet it still found its way to to its rightful destination, albeit a little late, thanks to my local postman recognising my name and other people in the Post Office chain caring enough to send it to some likely sorting offices along the way. No one in the Post Office gained by putting that extra effort in - if anything their targets on time for delivery were nominally damaged - but they still gave a enough of damn to get the thing through.
Well done and thanks to all concerned, especially my local postman who has always been terrific.
The real meaning of the Wizard of Oz
There is at least a thick volume's worth of material to be filled with stories like this about children's literature and IP disputes in the genre. Maybe I should suggest that to my publishers as my next writing project? Here's what Tamanaha had to say:
"Every now and then I read something that comes as a complete surprise. You might have the same reaction to the following passage from Jack Weatherford's The History of Money (1997), which comes out of his discussion of the late nineteenth century debate over adding silver to the gold monetary standard:
The most memorable work of literature to come from the debate over gold and silver in the United States was The Wonderful Wizard of Oz, published in 1900, by journalist L. Frank Baum, who greatly distrusted the power of the city financiers and who supported a bimetallic dollar based on both gold and silver. Taking great literary license, he summarized and satirized the monetary debate and history of the era through a charming story about a naive but good Kansas farm girl named Dorothy, who represented the average rural American citizen. Baum seems to have based her character on the Populist orator Leslie Kelsey, nicknamed "the Kansas Tornado."I'm sure others know about this, and maybe I'm exposing my particular ignorance, but I had no idea that The Wizard of Oz was a political allegory. What makes this discovery especially jolting, for me at least, is that its meaning at the time--when many people would have recognized Baum's allusions--was so radically different from its taken-for-granted meaning today.
After the cyclone violently rips Dorothy and her dog out of Kansas and drops them in the East, Dorothy sets out on the gold road to fairyland, which Baum calls Oz, where the wicked witches and wizards of banking operate. Along the way she meets the Scarecrow, who represents the American farmer; the Tin Woodman, who represents the American factory worker; and the Cowardly Lion, who represents William Jennings Bryan. The party's march on Oz is a re-creation of the 1894 march of Coxey's Army, a group of unemployed men led by 'General' Jacob S. Coxey to demand another public issue of $500 million greenbacks and more work for common people...
I hesitate to sully a discovery that is fascinating for its own sake, but I will use this example to quickly make a serious (albeit tangential) point. The original meaning theory of constitutional interpretation has prominent contemporary advocates--including, famously, Justice Scalia--who point to solid political theory arguments in support. But we must be mindful of the elusiveness and haze that envelops original meanings. Unless we turn constitutional interpretation over to trained historians with ample resources and time (and even then there will be problems), our assumptions about original meaning will be precarious."
To make an even more tangential point in the context of what I call "digital decision making" in my book, policymakers dealing with large scale digital systems and technologies they don't understand, don't even come anywhere close to the competence of trained historians. If we are to be mindful of the elusiveness and haze Tamanaha notes here in relation to expert interpretation of original historical meanings, how much more so do we need to be in the deployment of high and wide impact digital systems of mass surveillance by people who have demonstrated little or no understanding of these systems.
Foolproof
"Mathematical proof is foolproof, it seems, only in the absence of fools...
Socrates, drawing figures in the sand, undertakes to coach an untutored slave boy, helping him to prove a special case of the Pythagorean theorem. I paraphrase very loosely:
Socrates: Here is a square with sides of length 2 and area equal to 4. If we double the area, to 8 units, what will the length of a side be?A purported trisection procedure is required to take an angle ? and produce ?/3. Since the procedure has to work with any angle, we can refute it by exhibiting just one angle that cannot be trisected. The standard example is 60 degrees. Suppose the vertex of a 60-degree angle is at the origin, and one side corresponds to the positive x axis. Then to trisect the angle you must draw a line inclined by 20 degrees to the x axis and passing through the origin.Boy: Umm, 4?
Socrates: Does 4 x 4 = 8?
Boy: Okay, maybe it's 3.
Socrates: Does 3 x 3 = 8?
Boy: I give up.
Socrates: Observe this line from corner to corner, which the erudite among us call a diagonal. If we erect a new square on the diagonal, note that one-half of the original square makes up one-fourth of the new square, and so the total area of the new square must be double that of the original square. Therefore the length of the diagonal is the length we were seeking, is it not?
Boy: Whatever...
To draw any line, all you need is two points lying on the line. In this case you already have one point, namely the origin. Thus the entire task of trisection reduces to finding one more point lying somewhere along the 20-degree line. Surely that must be easy! After all, there are infinitely many points on the line and you only need one of them. But the proof says it can't be done.
To see the source of the difficulty we can turn to trigonometry. If we knew the sine and cosine of 20 degrees, the problem would be solved; we could simply construct the point x=cos20, y=sin20. (Of course we need the exact values; approximations from a calculator or a trig table won't help.) We do know the sine and cosine of 60 degrees: The values are ?3/2 and 1/2. Both of these numbers can be constructed with ruler and compass. Furthermore, formulas relate the sine and cosine of any angle ? to the corresponding values for ?/3. The formulas yield the following equation (where for brevity the symbol u replaces the expression cos?/3):
cos? = 4u 3 - 3u.
For the 60-degree angle, with cos? = 1/2,the equation becomes 8u 3 - 6u = 1. Note that this is a cubic equation. That's the nub of the problem: No process of adding, subtracting, multiplying, dividing and taking square roots will ever solve the equation for the value of u."RIAA drop lawsuit v NY mum
Tuesday, December 19, 2006
What BlackBoard's patent tells you about them
"I talked about web 2.0 and some of the usual VLE topics I have covered (succession, metaphors, future directions, etc). From a BB audience perspective the key slide was one that focused on the patent where I played the YouTube movie on software patents, gave some of Michael Feldstein’s interpretations of the patent, and linked it back to the succession model. The Blackboard company representatives in the audience looked a little unhappy with this, although slightly battle weary too – I suspect they are getting tired of talking about it. In the questions someone asked me about other patents and I outlined some of their dangers and why I considered them an ‘educational menace’. So, it was a good audience to raise that topic in (in many ways better than preaching to the converted at an open source conference, say). I think it is also another example of why it is such a dumb move on BB’s part. Without the patent I wouldn’t have said anything bad about them, I had a lot of time for them. What the patent does is effectively polarise users, forcing them in to mutually opposing camps. It has made me much more of an advocate of open source for example, and that reaction manifested across many HE institutions will ultimately do a good deal of harm to BB."
How to fix almost anything
"To put this another way, when big shots can glide through life in gilded cocoons, it breaks the social feedback loop. Those in a position to do something about a problem do not feel an urgency to do so...
We naturally get worked up about the things that rattle our own cages. Potentially it is a mighty social force; but it goes untapped when the rich and powerful are exempt from the problems that most Americans face. If every CEO in America had to fly economy class, send their children to public school, and deal with computer help lines themselves rather than have gofers do it for them, the quality of life in America would increase measurably. If the very rich had trouble getting medical insurance they would show as much concern for that problem as they do for the diseases they themselves contract. This basically is the thinking behind Rep. Charles Rangel’s proposal to revive the draft. Imagine Dick Cheney speaking at one of those mega-buck Republican fundraisers, to an audience worried that their own offspring might be drafted. The bellicosity and swagger over an Iraq would be quite a bit less. "
Usability in the Movies -- Top 10 Bloopers
"The way Hollywood depicts usability could fill many a blooper reel. Here are 10 of the most egregious mistakes made by moviemakers.
1. The Hero Can Immediately Use Any UI
Break into a company -- possibly in a foreign country or on an alien planet -- and step up to the computer. How long does it take you to figure out the UI and use the new applications for the first time? Less than a minute if you're a movie star.The fact that all user interfaces are walk-up-and-use is probably the single most unrealistic aspect of how movies depict computers. In reality, we know all too well that even the smartest users have plenty of problems using even the best designs, let alone the degraded usability typically found in in-house MIS systems or industrial control rooms.
2. Time Travelers Can Use Current Designs
An even worse flaw is the assumption that time travelers from the past could use today's computer systems. In fact, they'd have no conception of any of modern technology's basic concepts, and so would be dramatically more stumped than the novice users we observe in user testing. Even someone who's never used Excel at least understands the general idea of computers and screens..."Read the whole thing.
Code Version 2.0
> 1Million innocents on DNA database
Monday, December 18, 2006
The big opt out
Basically the system is very insecure and arguably in breach of data protection and other human rights laws, as beautifully articulated by Ross Anderson in a BBC radio 4 interview this morning. (You need RealPlayer to listen to it).
Ross and others are also leading a campaign to make people aware of the the situation.
Feynman on Schooling
"I sometimes feel that it would be much better not to educate our children in such subjects as mathematics and science. If we left youngsters alone, there would be a better chance that, by accident, the kids would find a good book - or an old textbook - or a television program that would excite them. But when youngsters go to school, they learn that these subjects are dull, horrible and impossible to understand. When I went to school, I didn't learn that math and science were dull because I knew before I got there that they were interesting. All I saw was that they were dull in school. But I knew better".