Hacker News new | past | comments | ask | show | jobs | submit | omegacharlie's comments login

I doubt that will happen for a tool with an arbitrary usecase of assisting in research however some projects related to reverse-engineering have been censored under the DMCA takedown regime.


A reassuring outcome. However what are the realistic implications of this ruling for potential future cases?

Similarly, How is challenging DMCA 1201 going?


> However what are the realistic implications of this ruling for potential future cases?

In future cases, rightsholders alleging DMCA liability will have to produce stronger evidence that a hoster knew about specific infringing user-uploaded content yet didn't remove it. Interacting with what might be infringing content, telling employees/users that using copyrighted content might be infringing (shocker, but this rightsholder really went for that one), and having the discretion to remove infringing content are not enough to establish that the hoster had actual knowledge of specific infringing user-uploaded content.

> How is challenging DMCA 1201 going?

Poorly, if you're referring to Green v. Department of Justice [1]. The EFF lost that case, and I'm not aware of whether they will appeal that particular case.

[1] https://www.eff.org/deeplinks/2025/01/second-circuit-rejects...


> Companies squeezing every last penny out out their customers is no news. And Canon is no stranger.

In relation to the rent-seeking behavior of Canon they allegedly nudged a certain open-source camera firmware project not to support some of their most high-end cameras. But with Canon losing interest in DSLRs I hope the situation changes.


Considering iOS devices are locked down to hell and back and achieving reboot persistence is extremely difficult, how hard is it to extract a sample of a malware payload in memory for purpose of forensics?


AFAIk it's extremely difficult. Even white-hat iOS forensics revolves around (ab)using old exploits in unpatched iPhones in order to access data.


I don't think this accurately describes the state of iPhone forensics today.


Quite difficult on production devices


emulators for many nintendo consoles have been developed and released while the console was still sold and have been left alone as long as they had no direct links to piracy, recent events are a bit of a change.

> There is some speculation Nintendo was involved with the death of the Nintendo 64 emulator UltraHLE a long time back, but this was never confirmed.

iirc it got c&d but a case was never filed in court, the source code turned up eventually anyways.


It is removed now.

    Updated Date: 2024-06-02T11:17:09Z
steamcommunity.com is also registered with Network Solutions. I wonder if that blew up in Valve's face.


Anyone aware if there is are any provisions under Finnish law for the detention of the defendant to be extended past half the sentence duration? For instance in a case of bad behavior while inside has been cited as justification in other regions.


> The notorious Utopia boot disc got around the obfuscation problem with a pirated Katana SDK and used the same reset technique, letting pirated software load by simply booting Utopia and switching discs when instructed. The Utopia crew flamed out quickly as they were stupid enough to put their photographs on the disc, leading to a knock on the door from German police

Someone know more to this story? (i.e what was exactly on the disc, and what were the legal basis of said police action)


Re: what was on the disc, you'd see a spinning 3D reindeer. I believe I still have one in my basement somewhere...


Dunno but German copyright laws are very authoritarian and also enforced.


This is all very interesting. Makes one wonder about the reliability of contingency plans by WL in case of indefinite absence of Assange.


There WAS supposedly a dead man's switch; numerous encrypted multi-gigabyte files have been shared over the years, and the theory was that their keys would be released if Assange or one of his associates didn't hit a button every X amount of time. But that doesn't seem to have materialized.


I don’t think any deadman’s switch has been confirmed by Wikileaks. They did however publish insurance files which are supposed to contain full unredacted archives of various leaks. One such insurance file was exposed when an either incompetent or malicious journalist at the guardian revealed the encryption key in a publication.

A deadman’s switch would be a specific mechanism to reveal such key. But the existence of it has to my knowledge never been confirmed by WL.


Howdy stranger!

With the debatable demise of organic community platforms and the rise of curated social-media recommendation by algorithms it is always nice to facilitate interaction between two vaguely-human entities. :-)

Take care!


Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: