Hacker Newsnew | past | comments | ask | show | jobs | submit | goodplay's commentslogin

Beginning with a partial solution to this problem is better than doing nothing at all. This sad state of affairs has gone on for far too long.


Wikipedia can be downloaded in its entirety in an easy to use package. For STEM articles, it's better than Britannica (and cheaper too).


Then let owners control whether it's enabled or not (by a hardware switch if necessary). As it currently stands, I can't imagine a benign reason that would drive intel and AMD to lock users out of their machines.


You can't think of any reason? Have you or do you work for a large company [1], especially hardware companies? I've sat through I don't know how many "planning" meetings, which were little better than design by committee, and whose outcome was not in the best interest of the customer despite the best intentions of everyone there.

1. Or the government or one of it's contractors. I've even sat through meetings 12 engineers sat around and argued about what to name something internal. I started calling this "name by committee".


Explain to me why I can't disable it for my home PC.


While I too wish it was able to be disabled easily, I'm surprised the parent poster is getting down voted. Having worked for hardware companies, and chip companies in particular, I can very easily see the benign answer being that this isn't even on their radar as something to do. That they are providing the ME features because Sales Guys say that some big enterprise customers want them, and once it was designed in, there wasn't a convincing proposal to make it an optional / opt-in feature, because there simply isn't someone on the engineering team who is voicing the concerns of the "home PC user who cares about this-kind-of-thing."

And even if there is, the "non-evil" reason for keeping this as is might be that "enterprise customer doesn't want something that is easily disabled, and we can't justify cost of a separate design / fab run for a small minority of customers", vs. "Haha, now we have a backdoor into EVERYTHING!"

(Hell, even the proposals about disable via hardware switch, or having the ME on a separate component probably boil down to money. To an outsider, hardware companies are funny beasts in that they really start caring about things like counting pennies and minimizing BOM cost as much as possible. I've been in worried meetings where we were literally counting and debating pennies, and wondering how I got there, but it makes sense at a company level since those pennies add up when you are building thousands or millions of something! This may have boiled down to "motherboard manufacturer doesn't want to have to put another mechanical part on the board, and they are looking to buy a shitload of our parts, let's keep them happy")

Please note: I'm not saying, or even advocating, that this is a good thing, or results in ideal outcomes when I say "benign". I'm just using it in the sense that this likely wasn't a malicious decision, but probably one motivated by money at some point, by people who didn't necessarily see the harm in it.


Nobody (aside from the US Government, obviously) really cares enough to buy hardware without a management engine, so why put the effort into writing and testing a configuration that a tiny segment of the population will use? (Also, Intel AMT contains some functionality that is actually used by the OS in everyday use, and turning it off would break that.)


Will you pay for the cost of designing a new architecture that contains such a switch when ME is responsible for many parts of the lifecycle?


Mozilla can solve this problem the right way by doing what debian does when it wants to collect statistics: Ask users if they want to donate their information to Mozilla on first run or during the installer.

Recording users' behavior by default with informing the user clearly and giving him the option to opt-out is abhorrent, regardless of the benignity of the reason behind it.

Disclosure: I use firefox, but periodically strip all relevant hidden add-ons and disable all information sending possible.


> Mozilla can solve this problem the right way by doing what debian does when it wants to collect statistics: Ask users if they want to donate their information to Mozilla on first run or during the installer.

> Recording users' behavior by default with informing the user clearly and giving him the option to opt-out is abhorrent, regardless of the benignity of the reason behind it.

(Even as a Firefox/Mozilla fan,) I completely agree that this behavior is what Mozilla should follow everywhere. I always choose to enable telemetry for Firefox because I want to help Mozilla and trust it. But defaults need to be sensible and protective of the user, first and foremost. If most people choose to turn it off on first run when asked for, then the actions to be taken would be educating users (in simple language) on the scope of data collection and improving the reputation of the organization/company behind it.


I dunno. The stats are really super useful for insight into how REAL PEOPLE (not self-selected do-gooders) use the software, and also how new things (like Stylo!) interact with the many unique hardware, driver, software environments people run Firefox on.


Then let's record video and audio from everyone who has installed Firefox to understand even better how the real users use the browser. Let's also record all the sites they visit and all the keys they press on a virtual keyboard.


It is, if the one master is less capable than the other.


What evidence do you have that Russian intelligence agencies are any less/more capable than the US ones?

If anything, it seems like the Russian intelligence agencies are more capable that the US ones right now ...


You can probably just compare the budgets...


Why isn't he thrown in jail, or why isn't the fence bulldozed down? Where I currently live (a somewhat well-off area), bulldozers (and self-entitled assholes) are a common occurrence.


I wonder if the property is on his name, or some shelter company.


>1. Can IP be encoded as a way of dodging the DMCA? a: no.

This is false if the IP being enforced is trademark (which I'm not even sure is covered by the DMCA).


Agreed with seeking a legal solution instead of just relying on a techincal one, but if the problem is the string of characters, just hash those instead without hashing the whole host:

[HASH:1AB543.124A3CC4.1AB543]/ads


What does ad-blocking have to do with copyright circumvention or copyright enforcement? The only think on that list is the domain name.

I'm certain that including a name in a list does not fall under copyright (ample precedent that backs it up). In the unlikey (and unfathomable) case that it is protected under copyright, I bet it would fall under fair use.

Trademark law isn't relevant to an entry in a machine database.


I think the argument would be that, say, the New York Times wrote an article, and that article included ads for their sponsor. This third party tool is making unauthorized edits to the New York Times' copyrighted material.

I'm a hardline free speech dude, but I find it difficult to justify "We changed around your copyrighted work to remove stuff we decided we don't like." If you don't like ads, pay up or go elsewhere. You do not have a right to anybody else's IP.


>This third party tool is making unauthorized edits to the New York Times' copyrighted material.

It's not a third party tool. It's a tool used by the first party (user) to modify information that was sent to him without effecting the publisher. I don't see how the publisher has any authority over what the user chooses to do with the information he obtained.

> I find it difficult to justify "We changed around your copyrighted work to remove stuff we decided we don't like." If you don't like ads, pay up or go elsewhere.

That's an interesting take on IP rights. By generalizing your argument, would you argue against newspaper snippets because a reader would only collect the article without adjacent ads? (with scissors made by a third-party, no less.)

> You do not have a right to anybody else's IP.

Fair use, Noncopyrightable items, old expired IP, and the public domain are all examples of rights I have to others IP. Rights have been - and I hope will continue to be - balanced between the concerns of IP "owners" and the rest of society to best serve everyone's interests. Tipping the scale in one side's favor like what you advocate here will disrupt that balance.


For the sake of argument, there's a difference between someone's IP and the wrapper it comes in. I'd be more than happy to pay for an audiobook through Amazon (or just get Audible), but until a recent hardware upgrade, I literally couldn't listen to them on the device I had access to during the period I had time to listen to them because Amazon decided I had to have their software to do so. So I found another place I could get the actual content in a different wrapper that did let me play it on my old Sansa+Rockbox (Downpour, if anyone's wondering). I'm more than happy to see an ad beside or before the main content, but whatever site I'm on did not make the ad and taking it off the page is no more changing their IP than taking a black marker to a physical newspaper.

I do block ads, though, despite actually wanting to see them to support the site. My problem is in the potential for viruses and tracking, and while that's a separate issue a few other threads are already talking about, there's been disappointingly little actual progress in making sure you can browse safely without resorting to nuking everything. I've been following the development on Brave because their proposed methods seem like one of the few ways to actually make it work.


> We changed around your copyrighted work to remove stuff we decided we don't like.

That is totally ok. For example, if I record a video from TV and remove the ads is that a violation? I think it is not as long as I use this video for myself and do not distribute it.

Copyright laws should not regulate what I do in my house or on my computer. I should be able to modify any copyrighted work as I wish as long I am not redistributing it (and yes, I should be able to inspect and patch copyright protection schemes too).


> I'm a hardline free speech dude, but I find it difficult to justify "We changed around your copyrighted work to remove stuff we decided we don't like."

How?

How can that possibly be hard to justify for anyone that even believes vaguely in the notion of freedom, much less someone "hardline"?

Do you think I break the law (or ethics) if I take the ads insert out of a newspaper I buy without reading them? How about if I hire a secretary to do so?

> This third party tool is making unauthorized edits to the New York Times' copyrighted material.

At the request of the first party (you) after receipt by the first party. They're not packaging it up and reselling it, they're automating your curation of a work you legally own a copy of for the purposes of your own consumption.

> You do not have a right to anybody else's IP.

Then the NYT should stop giving it away free.


I get in a lot of arguments with dudes who believe they have a right to stuff other people made without payment or consequence. The last one I remember is a bunch of DJs who didn't want to get permission to use samples.

I find the arguments pretty spurious and it's best not to engage.

It's their website. If you don't like their website, we got a whole other internet to enjoy.


This has nothing to do with believing that we have right to other people's work without payment. The fundamental issue is that these publishers are allowing public access to their work than expecting to have some control over how it is consumed. Hanging your painting in a public park and then demand that people not wear sunglasses when looking at it, or demanding that onlookers look at it sideways would be absurd. Don't hang your paintings in public parks. Hang it in a private gallery, and make no-sunglasses a term for admission.

Publishers would be better served if they restricted their articles, by demanding payment upfront before serving the article, rather than unreasonably and unrealistically demanding that people consume their content in a certain way. Don't blame your users for your failed business model.

As a side note, Copyright is not the place where this issue should be tackled as no copyright is being infringed (Content is not being redistributed).


It is their website but after I download the content to my hard drive it becomes my files and I can do whatever I want with them privately (as long as I do not redistribute it, claim authorship etc). That is how copyright should work, but of course the actual laws might be biased to the interests of some party. There is nothing new if you learn the history of human society, some groups of people always wanted to have more rights than others.


Two points:

Free sampling for the purposes of cultural remixing is explicitly built into (US) copyright (across media) as a mitigation to some of the harmful effects of artificial monopolies on culture. It's a compromise between those who think artificial monopolies are the only way to encourage the creation of culture and those who view such contrived monopolies as a net negative. There's a fundamental difference between copying and stealing. You seem to be intentionally conflating them by using phrases like "stuff other people made". It's not really "stuff" that they're "taking" and the copy is made by the copier, not the original composer. Nothing has been taken besides the right to artificially restrict the behavior of other people for the purpose of rent extraction.

Secondly, they give me a copy free when I request it. It just has ads included. But there's no reason I'm obligated to read the ads. It's exactly the case where they give me a free paper with an ad insert and I have the secretary throw away the ad insert before I read it.

Do you think I'm a monster because I throw out the ads in my weekly periodocal unread?

(For the record, I'm taking about ad blockers, not bypassing paywalls -- I generally just don't go to those sites. Your arguments hold more weight when discussing bypassing paywalls.)


Admiral's domain serves software that enforces access restrictions to copyrighted content. Including their domain in an ad-blocking list is a way to circumvent the restrictions.

Whether distributing a list of domain names counts as distributing "tools" or whatever the exact language of the act is, I don't know. This other subthread contains a better discussion: https://news.ycombinator.com/item?id=14991624


I doubt failing to contact a server would circumvent DRM. Blocking their servers would only make their DRM scheme fail and prevent access to said copyright material.

Using the DMCA to protect company's defective and flawed DRM scheme does not constitute circumvention. As such, I do not believe that DMCA's anti-circumvention laws are relevant.


They might use a scheme that would allow access by default and block it with a script from that domain. So blocking the domain becomes a circumvention (today I finally learned how to write this word).

Or that domain could be used to collect views stats for copyrighted content and make decisions based on that stats. Blocking this domain is obviously messing with copyright protection scheme which is illegal inder DMCA.


For example, the web page with copyrighted content can load a script from admiral's domain that would check whether a user is allowed to view the page or not. Adblocker is blocking that domain and therefore circumventing copyright protection scheme which is illegal under DMCA.

The people who invented this are really smart I must admit.


broadcom disagrees.


Are you referring to a bug which was fixed prior to Defcon?


>DEF CON provides conference WiFi with preauthorized certificates (WPA2), so [if you remove all other known open networks] then [you can have secure and sane WiFi at the conference].

Emphasis mine. Merely "removing" networks from your device does not preclude you from being attacked. Broadcom and all the locked-down devices that aren't iphones or high-end android devices who use them demonstrate this quite nicely.


I haven't heard any reports of people using the Broadcom attack on a vulnerable device at DEFCON (And there are a whole lot of people monitoring the airwaves)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: