Comments on: Leave Six Strikes Alone! http://techgage.com/article/leave-six-strikes-alone/ PC enthusiasts one-stop resource for high-quality reviews, articles and current technology news. Tue, 28 Jul 2015 16:01:00 +0000 hourly 1 By: Rob Williams http://techgage.com/article/leave-six-strikes-alone/#comment-1086 Tue, 12 Mar 2013 16:32:00 +0000 http://techgage.com/?post_type=article&p=18868#comment-1086 I didn’t say “wait until it gets out of hand”, I said IF it does.

]]>
By: Marfig http://techgage.com/article/leave-six-strikes-alone/#comment-1083 Tue, 12 Mar 2013 12:35:00 +0000 http://techgage.com/?post_type=article&p=18868#comment-1083 I’m usually for anything that helps change our societies behavior regarding copyright infringement. One of the biggest cancers I’ve been had the displeasure of seeing growing for the past 5 years is that of the illustrious anonymous that speaks openly about their pirating activities in public channels. We’ve hit rock bottom in ethical behavior on the web. What used to be a embarrassing private admission is today a shameless display of empowerment. We truly should be ashamed of ourselves.

But truth the matter is that copyright infringement is but an expression of a much wider problem. That of copyright laws. And herein lies the rub. For while our governments insist in not reviewing these laws that have grown to become a veritable attack on consumer rights, any anti-copyright infringement policy like this Six-Strike “law” will always be seen by me as completely unfair, autocratic and worth fighting against.

I rather have a much more balanced set of copyright laws. Then they will have all my support in being enforced with even criminal charges if we must. What I will never support is attempts at enforcing a set of laws that have been growing increasingly more damaging of my rights as a consumer. For that reason the Six-Strike “law” is it too a cancer that should be fought.

]]>
By: William Usher http://techgage.com/article/leave-six-strikes-alone/#comment-1081 Tue, 12 Mar 2013 02:56:00 +0000 http://techgage.com/?post_type=article&p=18868#comment-1081 Wait until after it gets out of hand.

I love that way of thinking.

]]>
By: Computer Repair Sacramento http://techgage.com/article/leave-six-strikes-alone/#comment-1080 Mon, 11 Mar 2013 22:15:00 +0000 http://techgage.com/?post_type=article&p=18868#comment-1080 Even if you aren’t personally involved in illegal content sharing, account holders are responsible for the actions of anyone on their network. Program participants hope that receipt of a warning will encourage account holders to take measures to restrict unauthorized activity on their network by talking to household members, limiting unauthorized access by encrypting their WiFi network, and/or installing software or hardware to block access to peer-to-peer sites.

]]>
By: Rob Williams http://techgage.com/article/leave-six-strikes-alone/#comment-1074 Sat, 09 Mar 2013 17:20:00 +0000 http://techgage.com/?post_type=article&p=18868#comment-1074 Brett is not claiming that 17% is definitive. There are of COURSE going to be rarities that occur (like in ANY system) – and those are the ones that stand out. It’s no surprise at all that there are wrinkles to iron out. If this keeps up, and people do continue to receive notices for non-infringing material, then that’s when the courts need to be brought in and the Six Strikes system shut down due to its inefficiencies.

]]>
By: TymonTheThief http://techgage.com/article/leave-six-strikes-alone/#comment-1073 Sat, 09 Mar 2013 17:15:00 +0000 http://techgage.com/?post_type=article&p=18868#comment-1073 I did actually read it. And the person apparently ignored the fact there have already been tons of ‘mistaken’ strikes given out already. 17% chance he says? I know of four ‘strikes’ people have complained about who do not even USE bittorrent. Likewise, the MPAA/RIAA has ALREADY taken people to court in the past and sued them for ‘file sharing’ mistakenly when people in the past had NO file sharing software on their computer at all, have never had any, and so on. These ‘mistakes’ sure do happen a lot if it is only a 17% chance. People who are going to stand up for such an obviously corrupt system bent on protecting the greedy content distributors either have not done proper research, or the only research they have done is either poor, or they read the stuff the copyright distributor people are giving out. You know, the entirely impartial crap, that suggests every single download you make is illegal even if it’s covered by fair use doctrine? Yeah, surprise surprise people, not every download or stream you make that contains copyrighted stuff is piracy, even if they do count it as such, and (Which is what makes the six strikes program flawed to the core to begin with) you can’t account for that without paying 35 bucks and having to go to a hearing just to show you’re covered by fair use? Guilty until proven innocent…Isn’t that one reason the USA declared independence? Because of crap like this? Hrrrmmm…

]]>
By: Rob Williams http://techgage.com/article/leave-six-strikes-alone/#comment-1067 Sat, 09 Mar 2013 05:07:00 +0000 http://techgage.com/?post_type=article&p=18868#comment-1067 You might want to read the entire article before insulting the author. He’s also already responded to that game mod issue in these comments.

]]>
By: TymonTheThief http://techgage.com/article/leave-six-strikes-alone/#comment-1066 Sat, 09 Mar 2013 05:00:00 +0000 http://techgage.com/?post_type=article&p=18868#comment-1066 Leave six strikes alone? You sir are a moron and an obvious RIAA/MPAA lapdog. http://www.cinemablend.com/games/game-mods-get-hit-with-dmca-notice-from-six-strikes-policy-53305.html

Proof enough of that this system needs to be destroyed. Since when is game mod distribution considered copyright infringement?

]]>
By: Brett Thomas http://techgage.com/article/leave-six-strikes-alone/#comment-1065 Sat, 09 Mar 2013 00:57:00 +0000 http://techgage.com/?post_type=article&p=18868#comment-1065 Running out the door but wanted to further this discussion:
1) spoofing IPs for piracy is easy and actually happens all the time. You can actually change your packets to look as if they’re coming from a completely foreign IP if you know how.
2) The ISP would only have to record the MAC Frame wrapped around the initial outgoing SYN packet for each new connection. Believe me when I say that’s not NEARLY as much data as you think and that it happens all the time on corporate networks (though usually they use the IP headers instead of the MAC frames). I’m not even sure privacy laws would cover this if you dump the data of the packet, as then all you have is a record that the connection happened – almost like a phone bill. In fact, count the number of packets sent/received and you have the content of one line item (SMS or call) on your cell phone bill!

Needless to say that sounds pretty big-brother but since I know it already happens at corporate levels and is already mirrored on the telephone side of utilities, I can’t imagine it difficult to implement on one step larger of a scale…if it isn’t already.

However, please keep in mind that at this point we’re waxing hypothetical – which is fine, but readers of this discussion should know that none of this is actually in any way a known part of Six Strikes. It brings up some interesting privacy concerns and at the same time some protections, but we don’t have any real info that this is what they’ll be doing to protect user rights. When it comes to whether it’s viable, though, it is – and it’s easily implementable, whether or not that’s a good thing!

]]>
By: Kaffecruise http://techgage.com/article/leave-six-strikes-alone/#comment-1064 Sat, 09 Mar 2013 00:20:00 +0000 http://techgage.com/?post_type=article&p=18868#comment-1064 But then they would have to record every packet you send (and recieve i guess), no (sane) ISP is going to do that, wouldnt they need a warrent to do so?

If someone just sits idly by and recording a torrent swarm, or monitoring someone who downloads from a FTP or website, they would not be able to see the mac adress (which is very easily changed anywyays).

I dont feel this is being pedantic, it goes to show that spoofing an IP and somehow using mac adress to prove who is who is not going to happen, in real life, in any case, most people have their own router so the ISP would not be able to see the computers inside the LAN.

How would you even spoof someones IP and use it for piracy, without being on the same LAN (or having access to a computer or device on the LAN)?

]]>