Ted Stevens, Senator from Alaska described the internet as a series of tubes, “Why, someone sent me an internet last week and it took five days to get to me.” The reason…the tubes were clogged. So we know that many US Senators and representatives have no idea WTF the internet even is, much less PTP/File Sharing, DRM, or “Cracking”. They may prefer to do things the good old fashion way, through the USPS or by Pony Express.
The Librarian of Congress James H. Billington break down his role in the ruling/change to the DMCA (Digital Millennium Copyright Act) , “I am to determine whether the prohibition on circumvention of technological measures that control access to copyrighted works is causing or is likely to cause adverse effects on the ability of users of any particular classes of copyrighted works to make noninfringing uses of those works.”
His findings…DRM Blows. And here is the summary the 6 Classes of Work that are now protected:
1) Purchased DVD’s may be ripped for educational purposes, criticism, commentary and videos without advertising
2) You can now jailbreak iPhones and Androids.
3) People may now unlock all cell phones.
4) Customers may bypass DRM for videogames for “investigative reasons”. AKA, you may purchase Assassins Creed 2, Crack it and Shat on Ubisoft legally : )
5) You can now bypass software that’s protected by an outdated hardware dongle?
6) eBooks can be cracked that previously did not allow text to be read aloud.
Thank you American Government for doing something that makes sense and not being so obviously the music and movie industry’s bitch. Thank you for once for taking the long shaft out of the customers and inserting it back into the RIAA & MPAA, to a place where it is truly home…
And in depth the 6 Classes of Work are described as follows:
The six classes of works are:
(1) Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances:
(i) Educational uses by college and university professors and by college and university film and media studies students;
(ii) Documentary filmmaking;
(iii) Noncommercial videos
(2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.
(3) Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network.
(4) Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if:
(i) The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and
(ii) The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law.
(5) Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace; and
(6) Literary works distributed in ebook format when all existing ebook editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book’s read-aloud function or of screen readers that render the text into a specialized format.
This is one small step for customers everywhere, and customers everywhere hope the RIAA & MPAA is willing to take one giant leap…off a cliff.