Language Selection

English French German Italian Portuguese Spanish

Ruling won't slow file swapping, experts say

Filed under
Legal

In its ruling, the nation's top court found that file-swapping companies Grokster and StreamCast Networks should be held liable for the widespread copyright infringement their technologies enable.

The decision casts uncertainty on the fate of Grokster and other file-swapping companies, but not on the viability of file-swapping itself, an activity that has only flourished under legal attacks, observers said. That's because the software that underlies peer-to-peer networks, used now by more than 8 million people simultaneously around the world, is designed to function and evolve without the aid of any particular commercial venture.

"It operates in a decentralized way," said Wendy Seltzer, an attorney at the Electronic Frontier Foundation, which has represented Streamcast Networks. "It doesn't need to call into a home base; it doesn't need product updates from anyplace. What's out there continues to function and can continue to work on a completely distributed basis."

One need only look at Napster for an indication of how persistent file swapping has become and will continue to become, she said. The courts shut the peer-to-peer pioneer down in 2001, sidelining file swapping on the network because Napster computers were central to the system. But other software developers, many of them working independently, soon developed next-generation software that's now more sophisticated and more popular than ever.

As a result, illegal file swapping has only skyrocketed in recent years. In the United States, the average number of people swapping media files simultaneously on major peer-to-peer networks rose from nearly 3 million in 2003 to more than 6 million this year, according to BigChampagne, the Nielsen/NetRatings of file sharing. The vast majority are sharing unauthorized MP3 music files, said Eric Garland, head of BigChampagne.

What Monday's ruling may stop--or at least delay--are further innovations in peer-to-peer technology, said Adam Eisgrau, a lobbyist for P2P United, a trade association. "The reality is, if you've got the next best (peer to peer) mousetrap on your blackboard, you may well have used your eraser defensively today because those plans could be used against you in court."

"The only thing we can say for certain is that there will be more confusion, more litigation, more and more copyright infringement online and a long road ahead."

Full Story.

More in Tux Machines

Android essentials: 13 apps I can't live without

We spend a lot of time talking about Lollipop and OS-level issues with Android -- but you know what's just as important as the operating system on your phone or tablet? The apps that surround it. The right apps can make your device easier and more enjoyable to use. They can give it powers you didn't know were possible. They can make it feel like your own custom-tailored gadget -- whether you've been using it for two minutes or for two years. Read more

GHOST, a critical Linux security hole, is revealed

Researchers at cloud security company Qualys have discovered a major security hole, GHOST (CVE-2015-0235), in the Linux GNU C Library (glbibc). This vulnerability enables hackers to remotely take control of systems without even knowing any system IDs or passwords. Qualys alerted the major Linux distributors about the security hole quickly and most have now released patches for it. Josh Bressers, manager of the Red Hat product security team said in an interview that, "Red Hat got word of this about a week ago. Updates to fix GHOST on Red Hat Enterprise Linux (RHEL) 5, 6, and 7 are now available via the Red Hat Network." This hole exists in any Linux system that was built with glibc-2.2, which was released on November 10, 2000. Qualys found that the bug had actually been patched with a minor bug fix released on May 21, 2013 between the releases of glibc-2.17 and glibc-2.18. Read more

4MLinux Allinone Edition 11.0 Is a Complete OS

4MLinux Allinone Edition, a Linux distro that encompasses multiple tools for Maintenance (system rescue Live CD), Multimedia (e.g. playing video DVDs), Miniserver (using the inetd daemon), and Mystery (Linux games), is finally out of the Beta stages and has reached version 11.0. Read more

White House CTO calls for open source APIs, visibility for women

While Smith’s characterization of Washington as “incredibly entrepreneurial” may be a tad optimistic, she did appear sincere in her support for promoting the use of open source development, and introducing a culture of “APIs, not RFPs.” Echoing a mantra of executives at Google X, Smith also expressed a desire to find ways for the government to exhibit the sort of technological prowess that normally occurs only in wartime. She also emphasized that she and her deputy, former Twitter lawyer Alex Macgillivray, want to reduce the sort of regulatory morass that can inhibit innovation. Read more