|
|
Thread Tools | Search this Thread |
06-06-2018, 12:10 PM | #31 |
Evangelist
Posts: 482
Karma: 2267928
Join Date: Nov 2015
Device: none
|
But there are plugins for your application, which are supposed to extend the functionality of calibre. Why you allow your plugins to hack in the other applications' data? ADE is not a part of Calibre, and hacking its store should not be possible from within it.
|
06-06-2018, 12:24 PM | #32 | |
creator of calibre
Posts: 43,859
Karma: 22666666
Join Date: Oct 2006
Location: Mumbai, India
Device: Various
|
Quote:
Anyway, I have wasted enough time on this thread. Over and out. |
|
Advert | |
|
06-06-2018, 02:21 PM | #33 |
Banned
Posts: 666
Karma: 1752814
Join Date: Jan 2008
Device: Sony Reader PRS-505 : Onyx Boox Max : Sony PRS-900 : Onyx Kepler Pro
|
I'm pretty sure this doesn't apply to the Internet. If you leave data open to anyone in the world, it's not trespassing when someone decides to download it. I'm pretty sure also that a certain percentage leave them open deliberately. Wither it's to the global Internet at large or only their friends, the onus of securing data is on them.
|
06-07-2018, 04:01 AM | #34 |
Wizard
Posts: 1,161
Karma: 1404241
Join Date: Nov 2010
Location: Germany
Device: Sony PRS-650
|
I don't read often such a lot pseudo knowledge nonsense and blablabla at mobileread.
Seems summertime is coming and troll time starts ... |
07-30-2018, 04:59 AM | #35 |
Enthusiast
Posts: 49
Karma: 510
Join Date: Sep 2008
Device: PSR505
|
That comment made my day,
summer time = 35 degrees = the trolls pop up ... \Pete |
Advert | |
|
07-30-2018, 01:16 PM | #36 | |
Addict
Posts: 393
Karma: 6700000
Join Date: Jan 2012
Location: Gimel
Device: tablets
|
Quote:
One of the US DRM systems scatters the purchaser's name, address, credit card number, and expiration date around the document. Amber |
|
07-30-2018, 02:16 PM | #37 | |
Bibliophagist
Posts: 35,428
Karma: 145525534
Join Date: Jul 2010
Location: Vancouver
Device: Kobo Sage, Forma, Clara HD, Lenovo M8 FHD, Paperwhite 4, Tolino epos
|
Quote:
|
|
07-30-2018, 07:23 PM | #38 |
Wizard
Posts: 1,000
Karma: 12012526
Join Date: Aug 2013
Location: Canada
Device: Sony PRS-650
|
|
07-30-2018, 07:50 PM | #39 | |
Banned
Posts: 666
Karma: 1752814
Join Date: Jan 2008
Device: Sony Reader PRS-505 : Onyx Boox Max : Sony PRS-900 : Onyx Kepler Pro
|
Quote:
https://www.wired.com/2013/06/new-ebook-drm/ From the article: By studying a list of example words and phrases that could be changed in purchased books, you can see that the changes are minor – like from "very disturbing" to "not disturbing." That made me laugh.. Not something that would make for repeat business from me. Thanks for the info. |
|
07-30-2018, 08:42 PM | #40 |
Readaholic
Posts: 5,139
Karma: 89858112
Join Date: Sep 2011
Location: South Georgia
Device: Surface Pro 6 / Galaxy Tab A 8"
|
I would think that listing the buyers credit card info in the document would be illegal. If nothing else it will not be long before a lawyer sues them.
Apache |
07-30-2018, 09:05 PM | #41 |
You kids get off my lawn!
Posts: 4,220
Karma: 73492664
Join Date: Aug 2007
Location: Columbus, Ohio
Device: Oasis 2 and Libra H2O and half a dozen older models I can't let go of
|
If this is referring to the old B&N > Fictionwise > eReader.com > Palm Digital Media DRM, you had to enter your name and credit card (as of the time you purchased the book). The ebook encryption saved that info as hashed data (I'm probably not saying that right) that was supposed not able to be used to pull the name/credit card from it. Back in 2002 when I first started buying ebooks, this was my DRM of choice and I read a lot about it before I decided to buy books that used it.
I tried a quick Google search, but couldn't find anything about it any more, other than "B&N is changing its DRM" blog posts. |
07-31-2018, 10:29 AM | #42 |
Sigil Developer
Posts: 7,644
Karma: 5433388
Join Date: Nov 2009
Device: many
|
Those same programs exist as standalone python programs, no calibre needed. So are you now going to condemn the entire python programming language!?! Any python based program could be used to launch or run the drm tool GUI quite easily.
|
07-31-2018, 11:03 AM | #43 | |
Wizard
Posts: 3,450
Karma: 10484861
Join Date: May 2006
Device: PocketBook 360, before it was Sony Reader, cassiopeia A-20
|
Quote:
It works extremely well. You - the person that has purchased the book legally - are going to guard it even more carefully than the CreditCard used to purchase the book |
|
08-10-2018, 12:02 PM | #44 | |
Guru
Posts: 696
Karma: 150000
Join Date: Feb 2010
Device: none
|
Quote:
Additionally, if the house or dwelling is occupied by someone who has a right to be there, at the time of the B&E, the breakin in itself is assumed to constitute an "immediate threat of death or serious bodily harm" to the occupant, which is sufficient to permit the use of deadly force to counteract said threat. |
|
08-10-2018, 10:05 PM | #45 |
Wizard
Posts: 3,108
Karma: 60231510
Join Date: Nov 2011
Location: Australia
Device: Kobo Aura H2O, Kindle Oasis, Huwei Ascend Mate 7
|
In my view it is a fallacy to equate offences against physical property with actions relating to intellectual property. Let's take the example of larceny and try to apply it to copying an epub file. A nice simple explanation of the elements of larceny can be found here:
Findlaw Elements of Larceny To prove larceny the prosecutor must prove beyond a reasonable doubt: 1. The unlawful taking and carrying away; 2. Of someone else's property; 3. Without the consent of the owner; and 4. With the intent to permanently deprive the owner of the property. It is very clear that neither 1 nor 4 can be proven since they have not in fact occurred. I suppose if a pirate steals someones computer or hard drive and carries it away with the requisite intention it is possible to argue that larceny has occurred not only in relation to the hard drive but also the intellectual property stored on the hard drive. But nothing belonging to the owner is taken and carried away by simply copying a file. And the owner is not deprived of the file since it remains undamaged wherever it is stored. The point I am making is that viewing intellectual property by way of analogy to physical property only goes so far. It is understandable why rights holders equate copyright infringement with theft, since they want to attach the same odium to copyright infringement, presumably in an attempt at simplification as even young children are quickly educated to understand that theft is wrong. Likewise, as st_albert pointed out in his reply to theducks in this thread, breaking and entering is not a good analogy for accessing a calibre server exposed to the web, whether or not there is any security on that server. Copying ebook files without the owners permission is not larceny. It is copyright infringement, a fundamentally different thing. Accessing another computer over the internet without authorisation is not breaking and entering, though it may be one of a number of different offences created in different jurisdictions. Whether copyright infringement is morally equivalent to larceny, or accessing a computer without permission to breaking and entering, is a different argument and will no doubt attract a variety of views. But reasoning by use of analogies between these concepts is of limited use and usually attended to attach the odium of one crime to something fundamentally different. |
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
GM, Ford, And Others Want to Make Working on Your Own Car Illegal | Apache | General Discussions | 82 | 05-18-2015 08:39 PM |
Looking for a consultant to assist in migrating from Kindle for PC to calibre | kgwdc | Calibre | 5 | 02-05-2014 02:43 AM |
illegal ebooks how many are there? | drewey25 | General Discussions | 52 | 01-09-2012 12:54 PM |
God to take action on illegal Bible distribution | charlieperry | Lounge | 42 | 11-20-2008 08:36 AM |