X-Git-Url: https://pere.pagekite.me/gitweb/text-free-culture-lessig.git/blobdiff_plain/994f3dffc9e46825fe57c9e42189231a2b52f346..b8830e24eee8650d7e2a693bbdcaeca5f1cee7e8:/freeculture.xml diff --git a/freeculture.xml b/freeculture.xml index 2f7e8d5..37be603 100644 --- a/freeculture.xml +++ b/freeculture.xml @@ -7465,9 +7465,16 @@ often crazy. To see the point in a particularly absurd context, consider a favorite story of mine that makes the same point. - + Aibo robotic dog + + robotic dog + + + Sony + Aibo robotic dog produced by + Consider the robotic dog made by Sony named "Aibo." The Aibo learns tricks, cuddles, and follows you around. It eats only electricity @@ -7491,16 +7498,18 @@ was giving information to users of the Aibo pet about how to hack their computer "dog" to make it do new tricks (thus, aibohack.com). -If you're not a programmer or don't know many programmers, the -word hack has a particularly unfriendly connotation. Nonprogrammers -hack bushes or weeds. Nonprogrammers in horror movies do even -worse. But to programmers, or coders, as I call them, hack is a much -more positive term. Hack just means code that enables the program to -do something it wasn't originally intended or enabled to do. If you buy -a new printer for an old computer, you might find the old computer -doesn't run, or "drive," the printer. If you discovered that, you'd later be -happy to discover a hack on the Net by someone who has written a -driver to enable the computer to drive the printer you just bought. +If you're not a programmer or don't know many programmers, the word +hack has a particularly unfriendly +connotation. Nonprogrammers hack bushes or weeds. Nonprogrammers in +horror movies do even worse. But to programmers, or coders, as I call +them, hack is a much more positive +term. Hack just means code that enables the +program to do something it wasn't originally intended or enabled to +do. If you buy a new printer for an old computer, you might find the +old computer doesn't run, or "drive," the printer. If you discovered +that, you'd later be happy to discover a hack on the Net by someone +who has written a driver to enable the computer to drive the printer +you just bought. Some hacks are easy. Some are unbelievably hard. Hackers as a @@ -7516,7 +7525,9 @@ dance jazz. The dog wasn't programmed to dance jazz. It was a clever bit of tinkering that turned the dog into a more talented creature than Sony had built. - + + + I've told this story in many contexts, both inside and outside the United States. Once I was asked by a puzzled member of the audience, @@ -7603,6 +7614,16 @@ academic essay, unintelligible to most people. But it clearly showed the weakness in the SDMI system, and why SDMI would not, as presently constituted, succeed. + + Aibo robotic dog + + + robotic dog + + + Sony + Aibo robotic dog produced by + What links these two, aibopet.com and Felten, is the letters they then received. Aibopet.com received a letter from Sony about the @@ -7616,6 +7637,9 @@ AIBO-ware's copy protection protocol constituting a violation of the anti-circumvention provisions of the Digital Millennium Copyright Act. + + + And though an academic paper describing the weakness in a system of encryption should also be perfectly legal, Felten received a letter @@ -7662,6 +7686,12 @@ measures. It was designed to ban those devices, whether or not the use of the copyrighted material made possible by that circumvention would have been a copyright violation. +Aibo robotic dog +robotic dog + + Sony + Aibo robotic dog produced by + Aibopet.com and Felten make the point. The Aibo hack circumvented a copyright protection system for the purpose of enabling the dog to @@ -7762,6 +7792,12 @@ technologies absolutely, despite the potential that they might do some good, but permits guns, despite the obvious and tragic harm they do. Conrad, Paul +Aibo robotic dog +robotic dog + + Sony + Aibo robotic dog produced by + The Aibo and RIAA examples demonstrate how copyright owners are changing the balance that copyright law grants. Using code, copyright