Month: July 2005

  • Encryption and Copying

    Last week I criticized Richard Posner for saying that labeling content and adding filtering to P2P apps would do much to reduce infringement on P2P net. In responding to comments, Judge Posner unfortunately makes a very similar mistake: Several pointed out correctly that tags on software files, indicating that the file is copyrighted, can probably…

  • RIAA Saber-Rattling against Antispoofing Technologies?

    The RIAA has fired a shot across the bow of P2P companies whose products incorporate anti-spoofing technologies, according to a story (subscribers only) in Friday’s National Journal Tech Daily, by Sarah Lai Stirland. The statement came at a Washington panel on the implications of the Grokster decision. “There’s definitely a lot of spoofing going on…

  • Michigan Debuts Counterproductive Do-Not-Spam List for Kids

    The state of Michigan has a new registry of kids’ email addresses in the state. Parents can put their kids’ addresses on the list. It’s illegal to send to addresses on the list any email solicitations for products that kids aren’t allowed to buy (alcohol, guns, gambling, vehicles, etc.). The site has been accepting registrations…

  • Chess Computer Crushes Elite Human Player

    Last week Hydra, a chess-playing computer, completed its rout of Michael Adams, the seventh-ranked human player in the world. Hydra won five of six games, and Adams barely escaped with a draw in the other game. ChessBase has the details, including a page where you can play through the six games. It’s time to admit…

  • Posner and Becker, Law and Economics

    Richard Posner and Gary Becker turn their bloggic attention to the Grokster decision this week. Posner returns to the argument of his Aimster opinion. Becker is more cautious. After reiterating the economic arguments for and against indirect liability, Posner concludes: There is a possible middle way that should be considered, and that is to provide…

  • Book Club Discussion: Code, Chapter 5

    This week in Book Club we read Chapter 5 of Lawrence Lessig’s Code, and Other Laws of Cyberspace. Let’s discuss the chapter in the comments area below. For next week, we’ll read Chapter 6.