Language Selection

English French German Italian Portuguese Spanish

Analysis: What the ruling against Grokster really means

Filed under
Legal

As this morning's 55-page US Supreme Court decision in MGM v. Grokster has now had time to be fully disseminated and analyzed, consensus is taking shape that even peer-to-peer services not named in the lawsuit may find themselves in legal hot water very soon. By vacating a Ninth Circuit Court of Appeals ruling and remanding the case back to that circuit, legal analysts told Tom's Hardware Guide, the high court may have made fuzzy what was once a clear interpretation of fair use law: specifically, the matter of secondary copyright infringement liability.

In short, states the syllabus, it may be impossible to sue millions of infringing downloaders, so a plaintiff's only alternative may be to argue that the software manufacturer contributed to those millions of alleged infringements by encouraging them, promoting them, or simply by doing nothing to stop them.

But the Court stopped short of finding Grokster and Streamcast, respectively, guilty of infringement, leaving that for the lower court to determine. "I think this puts emphasis on lower courts looking at the intent of the parties putting forth the software and the system

The Court basically issued a very vague and somewhat schizophrenic ruling about exactly what companies in the digital media space can and can't do." On the one hand, stated Schultz, the Court states that a P2P proprietor cannot encourage infringement; but on the other hand, the decision leaves it to others--perhaps the lower court--to determine what such encouragement entails.

"We're getting into shades of subjectivity, stated P2P United's Eisgrau, "that may well stretch the credulity [of courts] and the ability of courts to deal with. For a technology-driven economy, what you want is an environment in which innovators feel safe to innovate, and investors feel safe to invest in innovators. This opinion today, regrettably, is scary because it swapped that universe of relative certainty for a brave and alarming new world in which there is no such assurance and, in fact, quite the contrary, now I think the watchword for inventors has to be, 'Be afraid; be very afraid.'"

There are still a lot of questions left unanswered. This isn't the definitive word on this topic at all."

Full Analysis.

More in Tux Machines

War Thunder on GNU/Linux and More on SteamVR

Leftovers: OSS

Security Leftovers

  • Wednesday's security advisories
  • Smartphones with fingerprint scanners under screen to hit market this year
    The majority of fingerprint scanners can be found either on the back of a smartphone or on the front, embedded in the home button. But it looks like that status quo is soon about to change. According to a report from The Investor, CrucialTec, a manufacturer of fingerprint modules based in South Korea, will launch its on-screen fingerprint scanning solution that allows you to unlock your device by placing a finger on the screen sometime this year. This means that we can expect to see the first smartphones featuring the new fingerprint technology hit the market in 2017. Unfortunately, CrucialTec did not reveal an exact time frame or the smartphone manufacturers it is currently working with.
  • Kaspersky launches 'secure operating system' -- with no trace of Linux in it [Ed: You must be pretty desperate for headlines and attention when your marketing pitch is, "we're not Linux!"]
  • Windows Botnet Spreading Mirai Variant
    A Chinese-speaking attacker is spreading a Mirai variant from a repurposed Windows-based botnet. Researchers at Kaspersky Lab published a report today, and said the code was written by an experienced developer who also built in the capability to spread the IoT malware to Linux machines under certain conditions.
  • Five New Linux Kernel Vulnerabilities Were Fixed in Ubuntu 16.10, 14.04 & 12.04
    We reported earlier that Canonical published multiple security advisories to inform Ubuntu users about the availability of new kernel updates that patch several flaws discovered recently by various developers. We've already told you about the issues that are affecting Ubuntu 16.04 LTS and Ubuntu 16.04.1 LTS (Xenial Xerus) users, so check that article to see how you can update your systems is you're still using the Linux 4.4 LTS kernel. But if you managed to upgrade to Ubuntu 16.04.2 LTS, which uses Ubuntu 16.10 (Yakkety Yak)'s Linux 4.8 kernel, then you need to read the following.
  • Another Linux Kernel Vulnerability Leading To Local Root From Unprivileged Processes