Hacker News new | past | comments | ask | show | jobs | submit login

It's not that clear cut. Since they're talking about taking lossy compression to the limit, there are ways to go so lossy that you're not longer infringing even if you can point exactly at where it's stored.

Like cliff's notes.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: