View Single Post
Old 03-25-2008, 03:17 PM   #88
Steven Lyle Jordan
Grand Sorcerer
Steven Lyle Jordan ought to be getting tired of karma fortunes by now.Steven Lyle Jordan ought to be getting tired of karma fortunes by now.Steven Lyle Jordan ought to be getting tired of karma fortunes by now.Steven Lyle Jordan ought to be getting tired of karma fortunes by now.Steven Lyle Jordan ought to be getting tired of karma fortunes by now.Steven Lyle Jordan ought to be getting tired of karma fortunes by now.Steven Lyle Jordan ought to be getting tired of karma fortunes by now.Steven Lyle Jordan ought to be getting tired of karma fortunes by now.Steven Lyle Jordan ought to be getting tired of karma fortunes by now.Steven Lyle Jordan ought to be getting tired of karma fortunes by now.Steven Lyle Jordan ought to be getting tired of karma fortunes by now.
 
Steven Lyle Jordan's Avatar
 
Posts: 8,478
Karma: 5171130
Join Date: Jan 2006
Device: none
Quote:
Originally Posted by Alisa View Post
The main issue I see here is firstly that it's way easier said than done. That's a huge amount of packet inspection and imagine the database you'd have to maintain to identify copyrighted works! Besides, it seems it would be easily foiled with encryption. If my ISP tries to limit where and how I encrypt my data, we're going to have a bit of a problem.
Yeah... I never said it would be easy. However, it happens to be based on work that is already being carried out to identify and track child porn images, and identify the senders and recipients (something that, despite the Big Brother-ish implications, very few people seem to have a problem with). The way I see it, if they figure out a way to get it to work for one application, it can (and probably will) be applied to others, like digital music and e-books.

The benefit of the system is that it doesn't dig into individual PCs, it only tracks data moving through the ISP's networks. So as long as you're not sending illegal files to others, your ISP doesn't know what's on your PC, and doesn't interfere with your use of their network.

BTW, the systems being tested essentially read through encrypted (coded) data to reco the actual content (whew!). So the real catch is the database of content that books have to be identified against.
Steven Lyle Jordan is offline   Reply With Quote