lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4256A265.2080206@sdf.lonestar.org>
Date: Fri Apr  8 16:25:37 2005
From: bkfsec at sdf.lonestar.org (bkfsec)
Subject: Re: Case ID 51560370 - Notice of
	Claimed	Infringement

Randall Perry wrote:

> No, it isn't quiet that clean.
> The initial post was regarding eDonkey/eMule client.
> The files are broken into chunks.
> The files are 'verified' by a one-way hash.
>
Which brings up another couple of questions:

       1. Some networks of this type distribute their seeds in random 
caches amongst their population.  If you don't know it's there, are you 
liable for it?

       2. For a copyright violation to occur, you need a "significant 
portion of the original work."  Does having a chunk that qualifies as 
1/30th of a copyrighted work
            qualify for copyright violation via unauthorized 
distribution?  I don't know and IANAL, but I'd say that it's questionable.

                      -Barry


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ