![]() |
#136 |
Connoisseur
![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 87
Karma: 800
Join Date: Mar 2008
Location: Switzerland
Device: Kindle 3, BeBook
|
A Possible Break-Down on eBook Piracy
As for the general piracy debate, this thread lacks structure. I'll try to break the topic into sub-topics such that the discussion is more focused and less generalizing.
The corelation of copyright infringement and sales is unknown and specifically, any form of causality is unknown. Therefore I state the following axioms for the break-down. Axiom1: The goal is to maximize profits Axiom2: The effects of piracy are unknown Lemma1: The goal is not to minimize copyright infringement. This may be a side-effect, though Axiom2: There are customers that currently download illegal copies per default but that would acquire legal ebooks with the right deal Axiom3: This only considers potential customers, i.e. people willing and able to spend money. Others who won't spend money practically irregardless of the situation/deal are excluded. "Legend":
I believe the following cases should cover most of the possibilities, when you are looking to buy an ebook:
The idea now is to:
The net results of the cases overlap of course but the reasoning is different and so the solutions will likely differ as well Last edited by Ramen; 04-06-2008 at 12:19 PM. Reason: Clarifications |
![]() |
![]() |
![]() |
#137 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,478
Karma: 5171130
Join Date: Jan 2006
Device: none
|
Ramen,
Nicely done! I'd like to point out 2 things:
|
![]() |
![]() |
Advert | |
|
![]() |
#138 | ||
Connoisseur
![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 87
Karma: 800
Join Date: Mar 2008
Location: Switzerland
Device: Kindle 3, BeBook
|
Thanks and I welcome any additions people want. There are probably still lots of scenarios that are missing.
Quote:
What I meant is, axiom1 is the goal. If axiom1 is best served via reducing copyright infringement, then so be it. However, reducing copyright infringement (CI) is a tool, not a goal and since the relationship between CI and profit is unknown, reducing CI should not be a primary goal without specific reasons. Quote:
Edit: I've added case B.2.2.2.3 and clarified B.2.2.2.1/2. Last edited by Ramen; 04-06-2008 at 12:20 PM. Reason: Update |
||
![]() |
![]() |
![]() |
#139 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,478
Karma: 5171130
Join Date: Jan 2006
Device: none
|
We've had plenty of discussion about the distinctions between "piracy" and "illegality." I'll just say that I consider them to be essentially the same thing, and leave it at that.
And BTW, your earlier post about the realities of internet monitoring is exactly what I was alluding to at the beginning. Presently, encryption is the only thing preventing ISPs or the authorities from identifying packets and documents going back and forth. Though it's not a popular opinion (nor a desired one), the fact is that this one roadblock can be taken down. Imagine a new government regulation that restricts the encryption systems allowed by all national ISPs to a specific set of schemes, for which they have a universal or "skeleton" key... and the authority to outright block anything using a different encryption method. This is not only conceivable, it is enforceable, given today's technology. And as I stated before, if the government comes to consider it the only way to solve a problem, I can see them applying it without hesitation, "for the public safety." Naturally, they would apply something like that to control some more heinous crime, like child porn. But if it happened to make other transactions more secure, they would consider it a win-win... Again, I'm not saying that this is a desired direction... just a very possible one. |
![]() |
![]() |
![]() |
#140 | ||
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 11,531
Karma: 37057604
Join Date: Jan 2008
Device: Pocketbook
|
Quote:
If you don't think this is a desirable direction, why did you start the thread (and suggest the methodology)? Quote:
|
||
![]() |
![]() |
Advert | |
|
![]() |
#141 | |
Guru
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 820
Karma: 11012
Join Date: Nov 2007
Location: Warsaw, Poland
Device: Bookeen Cybook
|
Quote:
There is no way in the world to be able to identify a string of bytes as encrypted, or not. Nearly everything that goes through ISPs network makes no sense to the ISPs computers. It may be plain and simple communication between two programs, not encrypted in any way, but nothing but those two programs will know what the numbers mean. Only thing close to that I can see is identifying the stream as compressed - in compressed streams all values of bytes tend to show us with the same frequency... well compressed communication should be indistinguishable from noise. But that's not encrypted. And also nearly everything going through the Net is compressed. Jpg, Gif, Png, Tga formats are usually compressed, all video and audio streams used today have very good compression. Even if you send an uncompressed bmp image, you can count on the router one hop further to compress it in its chip so it takes less bytes to send to the next hop. The thing you propose would probably make the government block all communication but www (only pure html is left, no java, no flash, nothing good looking, no audio, no video streams) and email. And then in a few days someone would invent a way of sending everything disguised as emails or www pages, with proper html tags and everything, only different words would mean different bytes of the old communication for the sender and the recipient. If cleverly written, such communication would require reading by human to determine if its really www, or if its encoded signal disguised as www. In short, from my technical point of view, I don't think it would work. |
|
![]() |
![]() |
![]() |
#142 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,478
Karma: 5171130
Join Date: Jan 2006
Device: none
|
As I said... I was inviting comments... not passing judgement. Personally, I don't like the idea of having to track web traffic and spy on people. I also don't like DRM. And I don't like piracy. But there's reality to deal with here, so we're discussing whether the concept of TM would be workable, and if so, whether it would be better or worse than the alternatives. Nothing more.
|
![]() |
![]() |
![]() |
#143 | |
Stats:
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 233
Karma: 1189
Join Date: Nov 2007
Device: Sony PRS-505
|
Quote:
|
|
![]() |
![]() |
![]() |
#144 | |
Stats:
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 233
Karma: 1189
Join Date: Nov 2007
Device: Sony PRS-505
|
Quote:
This post is a good example of the finely segmented logic that should be somewhat compulsory for anybody discussing the topic of the e-book market in an even-handed mannner. The more "agumentatively valid" posts in this discussion will tend to resemble/address one or more of the contained segments of the logical tree described here, while those based upon an unreasonable agenda will tend to cross over gaps between topics or simply blanket many complex and specific issues under a single moral assertion. I wouldn't want to turn this description of this logical tree into yet another sticking point, but, as I kind of said, the arguments of somebody who constrains their assertions to the outer branches of such a tree will generally have a lot more grounding and be way harder to argue against as a bonus. |
|
![]() |
![]() |
![]() |
#145 | ||
zeldinha zippy zeldissima
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 27,827
Karma: 921169
Join Date: Dec 2007
Location: Paris, France
Device: eb1150 & is that a nook in her pocket, or she just happy to see you?
|
Quote:
in fact, a french boat, "Le Ponant", was taken over by pirates just this friday in the gulf of Aden, off the coast of Somalia. look : http://www.google.fr/search?q=Le+Ponant+pirate that's really on a whole different scale than copyright infringement. |
||
![]() |
![]() |
![]() |
#146 |
eReader
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,750
Karma: 4968470
Join Date: Aug 2007
Device: Note 5; PW3; Nook HD+; ChuWi Hi12; iPad
|
I very much like Ramen's analysis, but I'm not 100% sold on his initial axiom (and by extension the lemma).
I agree that maximizing profit is not the same as minimizing copyright infringement, and that while it may lead to a decrease in copyright infringement that is only a beneficial side-effect, and not a direct goal in the case that he's putting forward. The problem I have with his analysis is that I don't think it accurately represents the position of many publishers. I think that when it comes to electronic releases many are putting the lemma before the axiom. Much of their behavior can be better explained by stating that limiting copyright infringement is a more important goal than maximizing profit. I don't think it's a rational stance, and the basic structure works very well if you do switch those two goals, but I do think it's a very common one. |
![]() |
![]() |
![]() |
#147 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,478
Karma: 5171130
Join Date: Jan 2006
Device: none
|
Publishers more concerned with copyright infringement than profit? I wouldn't say so.
In fact, their behavior suggests that they are primarily concerned with profit, and that they believe copyright infringement (and, by extension, file sharing) is the single most serious threat to their profit. Guys, let's pass on the "what is piracy" debates in this thread, and stay on topic, please. Last edited by Steven Lyle Jordan; 04-07-2008 at 08:49 AM. |
![]() |
![]() |
![]() |
#148 | |
Connoisseur
![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 87
Karma: 800
Join Date: Mar 2008
Location: Switzerland
Device: Kindle 3, BeBook
|
Quote:
Assuming your ban were workable, the US would crash spectacularly. Foreign corporations and governments would have a field-day as would the various (serious) crime syndicates. If you enforce this internationally, all countries would suffer. Remember, there are crucial and very legal crypto applications:
Now, taking your second scheme, all countries would need the same set of keys or some other distribution, as the internet isn't a national thing. Currently, fresh keys are generated on the fly to greatly improve security which would be a problem with this new scheme. This also brings things like forward secrecy into the play. Also, delibaretly breaking or crippling an encryption scheme is never more secure. It makes them monitored and it adds a huge central point of failure. Don't you remember the multiple personal record thefts last year? Last but not least, what you are describing is the very definition of a police state, mind you. All these schemes would be pointless if the government (or whoever) wouldn't log/monitor all traffic. You cannot retroactively log an incriminating packet, you need to log them beforehand. If you have proper hints that a crime will happen, the current legal system gives you sufficient ways to monitor a suspect. These new methods only facilitate investigating large parts of the population at once and without prior evidence. I'd like to note that I left out things like judical or congressional oversight, as they are jokes. Likewise, I did not make a distinction between pure logging and actual monitoring, as the former always leads to the later. See the US spying scandal of last year. We should rememner that privacy is essential to a democray (or a republic in the case of the US/a const. monarchy in the UK). Abolishing privacy is unconstitutional and should thus call the Office for the Protection of the Constitution into action. Same for violating the separation of powers and the separation of church and state. In the end, the question is really: What is more important to you, a free society or your profit? The same goes for terrorism and the like. What point is there in security, if you've destroyed your country in the process (with respect to it's principles or "soul"). Especially, when most anti-terror measures are little more than snake-oil to appease the masses. |
|
![]() |
![]() |
![]() |
#149 | |
Stats:
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 233
Karma: 1189
Join Date: Nov 2007
Device: Sony PRS-505
|
Quote:
The label of "piracy" on infringement of intellectual property probably has about as much relevance to actual naval piracy as a wine cork floating in the Baltic Sea where somebody took a permanent marker and wrote the word "piracy" on it. I'm pretty well aware of the whole "naval piracy was almost completely wiped out at one point and various factors have led to a resurgence in naval piracy in various waters of the world without adequate water police" concept. If I'm on a cruise ship that's being shot by rocket launchers (actual real thing that happened), then I'll start to worry about naval piracy, but until then I'll focus more on disapproving the various "higher" factors that create an atmosphere conducive to piracy, such as the child sex trade and general rampant pedophilia that pervades every damn island east of Asia including Japan, partially as a result of US intervention at some point in history. But, like I said, until then... When the pirate parties in Europe start representing outlaw navality, I'll just assume that they're abandoned representing individual rights in a new intellectual environment and adopted the ideal of total anarchy for those guys who boarded Bill Murray's big boat in The Life Aquatic with Steve Zissou. It's possible that my assumption at that point might be extremely off-base if they're not just a bunch of hipsters who, like sassy world citizens since times past immaterial, just want to be noticed by other Norwegians. Should this be the case, I would argue that the pirate flag that looks like a tape in The Pirate Bay's logo is actually a real flag containing valuable intellectual property. Edit: Just re-read and realized that you were assuming that I was responding to something that I wasn't, and I was responding to you responding to something besides that which I thought I was responding to in reference to an earlier, now somewhat irrelevant post. All in all, my post that I am editing here, right now, stands as a very effective commentary about the part of that one post that I was originally replying to, but this post doesn't contain quite the same bite that it would have had I been responding to a response to the thing I thought I was responsibly responding to and not the mistaken response to my response to the response to this thread. Last edited by spooky69; 04-07-2008 at 10:28 AM. |
|
![]() |
![]() |
![]() |
#150 |
Stats:
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 233
Karma: 1189
Join Date: Nov 2007
Device: Sony PRS-505
|
Citing a potential scenario where the entire United States economy dissipates based one single, ultra-important factor isn't a good way to start off an argument centered around the United States economy's potential future.
|
![]() |
![]() |
![]() |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Unutterably Silly The alternative alternative Friday Question 21 August 2009 | Wetdogeared | Lounge | 13 | 08-26-2009 09:47 AM |
Let discuss on new coming DRM | keng2000 | HanLin eBook | 14 | 06-26-2009 04:08 PM |
Alternative to DRM? | carandol | News | 4 | 01-21-2008 02:43 PM |
Newbie question: can we discuss pirates? | RCR | Introduce Yourself | 3 | 12-03-2007 11:45 AM |