View Single Post
Old 07-18-2005, 07:20 AM   #23
hacker
Technology Mercenary
hacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with othershacker plays well with others
 
hacker's Avatar
 
Posts: 614
Karma: 2561
Join Date: Feb 2003
Location: New London, CT
Device: Direct Neural Implant
Quote:
Originally Posted by Alexander
But the outcome would be the same, wouldn't it? So who has the burden of proof later on how you obtained the electronic version if you also own the hardcover book?
It could be as simple as word analysis. Perhaps one single word out of order in the 500 page book, or a very slight misspelling, could easily identify your electronic copy as one that was not obtained from scanning or OCR'ing of your purchased copy.

But that doesn't even get into the issues with the Internet not having any anonymity. Your provider has a log of the transaction from you to a remote site or service hosting that electronic copy. Many routers along the chain (which may or may not already have monitoring on them) could also log the hit and traffic, etc.

As we've seen, merely implying intent can land someone in jail now, without any burdon of proof. They'll simply take everything in your house with a plug that looks like it has electronics (phones, radios, mp3 players, dvd players, whatever) and you'll never see them again, even if you are innocent.

We live in a very screwed up world right now.
hacker is offline