<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: AP to digitally monitor copyright</title>
	<atom:link href="http://www.hyperorg.com/blogger/2009/07/25/ap-to-digitally-monitor-copyright/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.hyperorg.com/blogger/2009/07/25/ap-to-digitally-monitor-copyright/</link>
	<description>Let's just see what happens</description>
	<lastBuildDate>Sun, 16 Jun 2013 09:24:11 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Fernando Pereira</title>
		<link>http://www.hyperorg.com/blogger/2009/07/25/ap-to-digitally-monitor-copyright/comment-page-1/#comment-48524</link>
		<dc:creator>Fernando Pereira</dc:creator>
		<pubDate>Thu, 30 Jul 2009 08:01:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.hyperorg.com/blogger/?p=8476#comment-48524</guid>
		<description><![CDATA[IANAL, but the DMCA&#039;s anti-circumvention provisions do not mention encryption, they are more generally about any access controls and rights controls. The fact that the wrapper may be inept technically does not necessarily mean that (triavially) breaching is not circumvention.]]></description>
		<content:encoded><![CDATA[<p>IANAL, but the DMCA&#8217;s anti-circumvention provisions do not mention encryption, they are more generally about any access controls and rights controls. The fact that the wrapper may be inept technically does not necessarily mean that (triavially) breaching is not circumvention.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Glenn Fleishman</title>
		<link>http://www.hyperorg.com/blogger/2009/07/25/ap-to-digitally-monitor-copyright/comment-page-1/#comment-48433</link>
		<dc:creator>Glenn Fleishman</dc:creator>
		<pubDate>Sun, 26 Jul 2009 17:28:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.hyperorg.com/blogger/?p=8476#comment-48433</guid>
		<description><![CDATA[Not possible, Fernando. The wrapper is apparently just plain text inserted into the HTML. The DMCA is specifically about reverse-engineering encryption. If it&#039;s true DRM, no one is going to be able to read the stuff without a special reader (maybe embedded Flash or Java?), which would essentially turn the AP into a non-entity on the Internet. No one would read. Other sources would fill the gap, acquire revenue therefrom.]]></description>
		<content:encoded><![CDATA[<p>Not possible, Fernando. The wrapper is apparently just plain text inserted into the HTML. The DMCA is specifically about reverse-engineering encryption. If it&#8217;s true DRM, no one is going to be able to read the stuff without a special reader (maybe embedded Flash or Java?), which would essentially turn the AP into a non-entity on the Internet. No one would read. Other sources would fill the gap, acquire revenue therefrom.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Fernando Pereira</title>
		<link>http://www.hyperorg.com/blogger/2009/07/25/ap-to-digitally-monitor-copyright/comment-page-1/#comment-48432</link>
		<dc:creator>Fernando Pereira</dc:creator>
		<pubDate>Sun, 26 Jul 2009 17:25:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.hyperorg.com/blogger/?p=8476#comment-48432</guid>
		<description><![CDATA[Glenn: There&#039;s another possibility, which I just noted on my blog: use the DMCA against those who remove AP content from its tracking wrappers.]]></description>
		<content:encoded><![CDATA[<p>Glenn: There&#8217;s another possibility, which I just noted on my blog: use the DMCA against those who remove AP content from its tracking wrappers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Glenn Fleishman</title>
		<link>http://www.hyperorg.com/blogger/2009/07/25/ap-to-digitally-monitor-copyright/comment-page-1/#comment-48403</link>
		<dc:creator>Glenn Fleishman</dc:creator>
		<pubDate>Sat, 25 Jul 2009 20:28:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.hyperorg.com/blogger/?p=8476#comment-48403</guid>
		<description><![CDATA[The AP is so misguided that it&#039;s hard to know what the outcome will be.

It considers a headline plus a link to be a violation of its rights, which is clearly not going to be enforceable. 

It also apparently rejects all notion of fair use, citation, critique, parody, and teaching, all of which have various exceptions in copyright law and court rulings.

If AP follows through on all that, it will essentially waste all its member newspapers fees on litigation, a strategy that hasn&#039;t seemed to work for the RIAA, either.

The technology behind its tracking system is laughable. In one account that seems to provide real detail, the AP will embed microformatted metadata (i.e., fielded text in a known format) inside the HTML of articles. Which won&#039;t track bupkes unless someone using AP content copies that microformat.

This reminds me of the plot of Tom Clancy&#039;s first cyber novel (Rainbow 7?), in which a programmer says that the bad guys hid the malicious code in the copyright notice (somehow).]]></description>
		<content:encoded><![CDATA[<p>The AP is so misguided that it&#8217;s hard to know what the outcome will be.</p>
<p>It considers a headline plus a link to be a violation of its rights, which is clearly not going to be enforceable. </p>
<p>It also apparently rejects all notion of fair use, citation, critique, parody, and teaching, all of which have various exceptions in copyright law and court rulings.</p>
<p>If AP follows through on all that, it will essentially waste all its member newspapers fees on litigation, a strategy that hasn&#8217;t seemed to work for the RIAA, either.</p>
<p>The technology behind its tracking system is laughable. In one account that seems to provide real detail, the AP will embed microformatted metadata (i.e., fielded text in a known format) inside the HTML of articles. Which won&#8217;t track bupkes unless someone using AP content copies that microformat.</p>
<p>This reminds me of the plot of Tom Clancy&#8217;s first cyber novel (Rainbow 7?), in which a programmer says that the bad guys hid the malicious code in the copyright notice (somehow).</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Dynamic page generated in 0.324 seconds. -->
<!-- Cached page generated by WP-Super-Cache on 2013-06-16 16:57:33 -->