The Educated Wolf

This is great.


The Educated Wolf

This is great.

“Section 15. That the people shall be secure in their persons, papers, homes, effects, and electronic communications and data, from unreasonable searches and seizures; and no warrant to search any place, or seize any person or thing, or access electronic data or communication, shall issue without describing the place to be searched, or the person or thing to be seized, or the data or communication to be accessed, as nearly as may be, nor without probably cause, supported by written oath or affirmation.”
“It is nonsense to say that Title II is this terrible, horrible thing that kills investment," Feld said. "As the wireless industry never gets tired of telling me, there’s nothing more dynamic and [full of] investment wonderfulness than wireless, where they spend billions of dollars on licenses alone in order to provide a Title II service.”

Report: Verizon FiOS claimed public utility status to get government perks | Ars Technica

Well now, here’s some awesome doublespeak going on here by Verizon at least.

“If you blinked this week, you might have missed the news: two Senators accused the Justice Department of lying about NSA warrantless surveillance to the US supreme court last year, and those falsehoods all but ensured that mass spying on Americans would continue. But hardly anyone seems to care – least of all those who lied and who should have already come forward with the truth.”
“Librarians, the news media, defense lawyers and civil liberties groups on the right and left are trying to convince the justices that they should take a broad view of the privacy issues raised when police have unimpeded access to increasingly powerful devices that may contain a wealth of personal data: emails and phone numbers, photographs, information about purchases and political affiliations, books and a gateway to even more material online. “Cellphones and other portable electronic devices are, in effect, our new homes,” the American Civil Liberties Union said in a court filing that urged the court to apply the same tough standards to cellphone searches that judges have historically applied to police intrusions into a home. Under the Constitution’s Fourth Amendment, police generally need a warrant before they can conduct a search. The warrant itself must be based on “probable cause,” evidence that a crime has been committed. But in the early 1970s, the Supreme Court carved out exceptions for officers dealing with people they have arrested. The court was trying to set clear rules that allowed police to look for concealed weapons and prevent the destruction of evidence. Briefcases, wallets, purses and crumpled cigarette packs all are fair game if they are being carried by a suspect or within the person’s immediate control.”
“In order for a defendant to be found liable for contributory copyright infringement there must first be evidence of direct infringement carried out by others. In other words, to proceed against Gawker, Tarantino’s lawyers needed to show that visitors to Gawker’s site who read the article in question actually clicked the links to AnonFiles or Scribd and went on to commit direct infringement on the script. “However, nowhere in these paragraphs or anywhere else in the Complaint does Plaintiff allege a single act of direct infringement committed by any member of the general public that would support Plaintiff’s claim for contributory infringement. Instead, Plaintiff merely speculates that some direct infringement must have taken place,” wrote U.S. District Judge John F. Walter in his ruling.”

Viewing Pirated Material Is Not Direct Copyright Infringement, Judge Tells Tarantino | TorrentFreak (via infoneer-pulse)

Some interesting opinions here on indirect copyright infringement. As well as on the use of embedded frames.

“The new type of surveillance court orders envisioned by the administration would require phone companies to swiftly provide records in a technologically compatible data format, including making available, on a continuing basis, data about any new calls placed or received after the order is received, the officials said. They would also allow the government to swiftly seek related records for callers up to two phone calls, or “hops,” removed from the number that has come under suspicion, even if those callers are customers of other companies.”

Obama to Call for End to N.S.A.’s Bulk Data Collection - (via infoneer-pulse)

For some reason, that doesn’t sound like an end to bulk collection. Just a change in definition and venue.



Tech project by Thibault Brevet can connect to receipt printers to quickly provide a copy of the US constitution - video embedded below:

Hijacking the existing network of standard receipt printers, CONSTI2GO is a portable device that allows, on the press of a button, to print copies of the US Constitution.

Commissioned by Jeff Goldenson for

The project is to be shown during SXSW Interactive 2014.


Looks really neat.